Analysis
-
max time kernel
82s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 00:34
Static task
static1
General
-
Target
c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe
-
Size
1.7MB
-
MD5
1f5d88b2072bc0d4002957df49dc8579
-
SHA1
08a8fc781fe24360e29a5781b64dfa8449aca5d5
-
SHA256
c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf
-
SHA512
fa3a872bcadfcd5f2bc96e4e38aaaf874d2ad93115e582c9a2891192cd96e2f12a81818ea2c7c4f6cf2347c4f5732350859a5cdcd85765651d529582d35377cf
-
SSDEEP
24576:jQnP8wGfV+j8Lc7alxAf6H1P3U3Sr3akPWqZl9K5pQCcHM31KYf0q8fr0z:knP0wj7alxXVvBaiZ69N70Lz0
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
redline
LiveTraffic
4.185.137.132:1632
Extracted
stealc
http://52.143.157.84
-
url_path
/c73eed764cc59dcb.php
Extracted
lumma
https://affordcharmcropwo.shop/api
https://cleartotalfisherwo.shop/api
https://worryfillvolcawoi.shop/api
https://enthusiasimtitleow.shop/api
https://dismissalcylinderhostw.shop/api
https://diskretainvigorousiw.shop/api
https://communicationgenerwo.shop/api
https://pillowbrocccolipe.shop/api
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral1/files/0x000a00000002324b-354.dat family_zgrat_v1 behavioral1/files/0x000900000002324e-386.dat family_zgrat_v1 behavioral1/files/0x0007000000023257-455.dat family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/files/0x000900000002324e-386.dat family_redline behavioral1/files/0x0007000000023254-403.dat family_redline behavioral1/files/0x0007000000023253-410.dat family_redline behavioral1/memory/1608-485-0x0000000000400000-0x0000000000450000-memory.dmp family_redline behavioral1/files/0x0007000000023278-821.dat family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cc2f2cf168.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 59 2800 rundll32.exe 68 1940 rundll32.exe 104 2132 rundll32.exe 141 780 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 7136 netsh.exe 6340 netsh.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cc2f2cf168.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cc2f2cf168.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation ce79c24c0b.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation explorgu.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation NewB.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 306OZ2y9nOlqxx7pk8TYTyhY.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation explorha.exe -
Executes dropped EXE 33 IoCs
pid Process 4084 explorha.exe 4456 cc2f2cf168.exe 1924 amert.exe 3632 ce79c24c0b.exe 5468 explorha.exe 5496 explorgu.exe 5480 alexxxxxxxx.exe 6076 32456.exe 3772 Traffic.exe 6132 propro.exe 5428 goldprimeldlldf.exe 5628 NewB.exe 392 swiiiii.exe 5460 koooooo.exe 6112 explorgu.exe 5900 random.exe 5288 file300un.exe 5856 jok.exe 5392 swiiii.exe 3256 306OZ2y9nOlqxx7pk8TYTyhY.exe 5840 BoeBAbJSw6dMqKtJeD5beVdC.exe 5412 CZ0rZ9Rx2EVb8Nbkmq8uuhnL.exe 1884 ik6UzkTzoR5u85BBFo1qLthb.exe 3540 u2ig.0.exe 3668 CMaSMVQz2P53I7N1fuuLyHpg.exe 6100 xRhpnDU0t8fkxSpJrNLloJd6.exe 5552 CMaSMVQz2P53I7N1fuuLyHpg.exe 3976 Install.exe 3168 u2ig.1.exe 3068 CMaSMVQz2P53I7N1fuuLyHpg.exe 2656 Install.exe 5288 CMaSMVQz2P53I7N1fuuLyHpg.exe 5836 CMaSMVQz2P53I7N1fuuLyHpg.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Wine c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe Key opened \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Wine cc2f2cf168.exe Key opened \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Software\Wine amert.exe -
Loads dropped DLL 11 IoCs
pid Process 2320 rundll32.exe 2800 rundll32.exe 1940 rundll32.exe 5848 rundll32.exe 2132 rundll32.exe 780 rundll32.exe 3668 CMaSMVQz2P53I7N1fuuLyHpg.exe 5552 CMaSMVQz2P53I7N1fuuLyHpg.exe 3068 CMaSMVQz2P53I7N1fuuLyHpg.exe 5288 CMaSMVQz2P53I7N1fuuLyHpg.exe 5836 CMaSMVQz2P53I7N1fuuLyHpg.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x00090000000232bb-1126.dat themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cc2f2cf168.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000042001\\cc2f2cf168.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\random.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1001084001\\random.exe" explorgu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: CMaSMVQz2P53I7N1fuuLyHpg.exe File opened (read-only) \??\D: CMaSMVQz2P53I7N1fuuLyHpg.exe File opened (read-only) \??\F: CMaSMVQz2P53I7N1fuuLyHpg.exe File opened (read-only) \??\D: CMaSMVQz2P53I7N1fuuLyHpg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 143 pastebin.com 144 pastebin.com -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 207 api.myip.com 208 api.myip.com 209 ipinfo.io 213 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00070000000231f0-102.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 636 c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe 4084 explorha.exe 4456 cc2f2cf168.exe 1924 amert.exe 5468 explorha.exe 5496 explorgu.exe 5900 random.exe 6112 explorgu.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 5480 set thread context of 5992 5480 alexxxxxxxx.exe 127 PID 5428 set thread context of 1608 5428 goldprimeldlldf.exe 136 PID 392 set thread context of 4944 392 swiiiii.exe 144 PID 5460 set thread context of 5656 5460 koooooo.exe 157 PID 5496 set thread context of 6112 5496 explorgu.exe 159 PID 5288 set thread context of 1660 5288 file300un.exe 167 PID 5392 set thread context of 5136 5392 swiiii.exe 175 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\explorha.job c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe File created C:\Windows\Tasks\explorgu.job amert.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 5236 392 WerFault.exe 140 5560 5460 WerFault.exe 152 4344 3256 WerFault.exe 173 6680 5840 WerFault.exe 176 6560 5412 WerFault.exe 177 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2ig.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2ig.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2ig.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3504 schtasks.exe 5052 schtasks.exe 6276 schtasks.exe 6396 schtasks.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133571828692545035" chrome.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 propro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 propro.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 636 c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe 636 c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe 4084 explorha.exe 4084 explorha.exe 4456 cc2f2cf168.exe 4456 cc2f2cf168.exe 1924 amert.exe 1924 amert.exe 1272 chrome.exe 1272 chrome.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 5552 powershell.exe 5552 powershell.exe 5552 powershell.exe 5468 explorha.exe 5468 explorha.exe 5496 explorgu.exe 5496 explorgu.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2132 rundll32.exe 2972 powershell.exe 2972 powershell.exe 2972 powershell.exe 3772 Traffic.exe 3772 Traffic.exe 3772 Traffic.exe 3772 Traffic.exe 3772 Traffic.exe 3772 Traffic.exe 3772 Traffic.exe 3772 Traffic.exe 3772 Traffic.exe 3772 Traffic.exe 3772 Traffic.exe 3772 Traffic.exe 3772 Traffic.exe 3772 Traffic.exe 3772 Traffic.exe 3772 Traffic.exe 1608 RegAsm.exe 1608 RegAsm.exe 5900 random.exe 5900 random.exe 6112 explorgu.exe 6112 explorgu.exe 6132 propro.exe 6132 propro.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeDebugPrivilege 5552 powershell.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe Token: SeCreatePagefilePrivilege 1272 chrome.exe Token: SeShutdownPrivilege 1272 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 636 c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 1272 chrome.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 1272 chrome.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3632 ce79c24c0b.exe 3168 u2ig.1.exe 3168 u2ig.1.exe 3168 u2ig.1.exe 3168 u2ig.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 636 wrote to memory of 4084 636 c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe 89 PID 636 wrote to memory of 4084 636 c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe 89 PID 636 wrote to memory of 4084 636 c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe 89 PID 4084 wrote to memory of 4456 4084 explorha.exe 94 PID 4084 wrote to memory of 4456 4084 explorha.exe 94 PID 4084 wrote to memory of 4456 4084 explorha.exe 94 PID 4084 wrote to memory of 2976 4084 explorha.exe 96 PID 4084 wrote to memory of 2976 4084 explorha.exe 96 PID 4084 wrote to memory of 2976 4084 explorha.exe 96 PID 4084 wrote to memory of 1924 4084 explorha.exe 97 PID 4084 wrote to memory of 1924 4084 explorha.exe 97 PID 4084 wrote to memory of 1924 4084 explorha.exe 97 PID 4084 wrote to memory of 3632 4084 explorha.exe 100 PID 4084 wrote to memory of 3632 4084 explorha.exe 100 PID 4084 wrote to memory of 3632 4084 explorha.exe 100 PID 3632 wrote to memory of 1272 3632 ce79c24c0b.exe 101 PID 3632 wrote to memory of 1272 3632 ce79c24c0b.exe 101 PID 1272 wrote to memory of 4932 1272 chrome.exe 103 PID 1272 wrote to memory of 4932 1272 chrome.exe 103 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 4532 1272 chrome.exe 104 PID 1272 wrote to memory of 3020 1272 chrome.exe 105 PID 1272 wrote to memory of 3020 1272 chrome.exe 105 PID 1272 wrote to memory of 4172 1272 chrome.exe 106 PID 1272 wrote to memory of 4172 1272 chrome.exe 106 PID 1272 wrote to memory of 4172 1272 chrome.exe 106 PID 1272 wrote to memory of 4172 1272 chrome.exe 106 PID 1272 wrote to memory of 4172 1272 chrome.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe"C:\Users\Admin\AppData\Local\Temp\c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\1000042001\cc2f2cf168.exe"C:\Users\Admin\AppData\Local\Temp\1000042001\cc2f2cf168.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\1000049001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000049001\amert.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\1000051001\ce79c24c0b.exe"C:\Users\Admin\AppData\Local\Temp\1000051001\ce79c24c0b.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.facebook.com/video4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff99c4f9758,0x7ff99c4f9768,0x7ff99c4f97785⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1864,i,3929790177670955281,16465780158484724736,131072 /prefetch:25⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1864,i,3929790177670955281,16465780158484724736,131072 /prefetch:85⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2188 --field-trial-handle=1864,i,3929790177670955281,16465780158484724736,131072 /prefetch:85⤵PID:4172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1864,i,3929790177670955281,16465780158484724736,131072 /prefetch:15⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1864,i,3929790177670955281,16465780158484724736,131072 /prefetch:15⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4600 --field-trial-handle=1864,i,3929790177670955281,16465780158484724736,131072 /prefetch:15⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 --field-trial-handle=1864,i,3929790177670955281,16465780158484724736,131072 /prefetch:85⤵PID:5820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5032 --field-trial-handle=1864,i,3929790177670955281,16465780158484724736,131072 /prefetch:85⤵PID:5900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 --field-trial-handle=1864,i,3929790177670955281,16465780158484724736,131072 /prefetch:85⤵PID:5936
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
PID:2320 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2800 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:3540
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\757987694264_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5552
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1940
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5468
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5496 -
C:\Users\Admin\AppData\Local\Temp\1000985001\alexxxxxxxx.exe"C:\Users\Admin\AppData\Local\Temp\1000985001\alexxxxxxxx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5480 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5904
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Checks computer location settings
PID:5992 -
C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:6132
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:5108
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:4944
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe"C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe"2⤵
- Executes dropped EXE
PID:6076
-
-
C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe"C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe"C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:5628 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe" /F3⤵
- Creates scheduled task(s)
PID:5052
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001073001\swiiiii.exe"C:\Users\Admin\AppData\Local\Temp\1001073001\swiiiii.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 8683⤵
- Program crash
PID:5236
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
PID:5848 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:6068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\757987694264_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001078001\koooooo.exe"C:\Users\Admin\AppData\Local\Temp\1001078001\koooooo.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5608
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5460 -s 8523⤵
- Program crash
PID:5560
-
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6112
-
-
C:\Users\Admin\AppData\Local\Temp\1001084001\random.exe"C:\Users\Admin\AppData\Local\Temp\1001084001\random.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5900
-
-
C:\Users\Admin\AppData\Local\Temp\1001085001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1001085001\file300un.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5288 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵PID:5236
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"3⤵PID:1660
-
C:\Users\Admin\Pictures\306OZ2y9nOlqxx7pk8TYTyhY.exe"C:\Users\Admin\Pictures\306OZ2y9nOlqxx7pk8TYTyhY.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\u2ig.0.exe"C:\Users\Admin\AppData\Local\Temp\u2ig.0.exe"5⤵
- Executes dropped EXE
PID:3540
-
-
C:\Users\Admin\AppData\Local\Temp\u2ig.1.exe"C:\Users\Admin\AppData\Local\Temp\u2ig.1.exe"5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of SendNotifyMessage
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD16⤵PID:4396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3256 -s 15485⤵
- Program crash
PID:4344
-
-
-
C:\Users\Admin\Pictures\BoeBAbJSw6dMqKtJeD5beVdC.exe"C:\Users\Admin\Pictures\BoeBAbJSw6dMqKtJeD5beVdC.exe"4⤵
- Executes dropped EXE
PID:5840 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:7160
-
-
C:\Users\Admin\Pictures\BoeBAbJSw6dMqKtJeD5beVdC.exe"C:\Users\Admin\Pictures\BoeBAbJSw6dMqKtJeD5beVdC.exe"5⤵PID:6316
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:6916
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:6356
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:7136
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:6396
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:3424
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵PID:6828
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:6016
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:3504
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:7140
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:6384
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5840 -s 7885⤵
- Program crash
PID:6680
-
-
-
C:\Users\Admin\Pictures\CZ0rZ9Rx2EVb8Nbkmq8uuhnL.exe"C:\Users\Admin\Pictures\CZ0rZ9Rx2EVb8Nbkmq8uuhnL.exe"4⤵
- Executes dropped EXE
PID:5412 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4012
-
-
C:\Users\Admin\Pictures\CZ0rZ9Rx2EVb8Nbkmq8uuhnL.exe"C:\Users\Admin\Pictures\CZ0rZ9Rx2EVb8Nbkmq8uuhnL.exe"5⤵PID:4696
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:4012
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:3632
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:6340
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:2204
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:6836
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5412 -s 9365⤵
- Program crash
PID:6560
-
-
-
C:\Users\Admin\Pictures\ik6UzkTzoR5u85BBFo1qLthb.exe"C:\Users\Admin\Pictures\ik6UzkTzoR5u85BBFo1qLthb.exe"4⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\7zS5CB1.tmp\Install.exe.\Install.exe /voNdidv "385118" /S5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
PID:3976 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"6⤵PID:2488
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵PID:5804
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵PID:6156
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True9⤵PID:6664
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bvsYAGfGVfhExjZmnp" /SC once /ST 00:36:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\PSDKJfZwxqLwdSgcp\oiJJZDuRYdKofkI\kkVOLhS.exe\" my /BZsite_idKnk 385118 /S" /V1 /F6⤵
- Creates scheduled task(s)
PID:6276
-
-
-
-
C:\Users\Admin\Pictures\CMaSMVQz2P53I7N1fuuLyHpg.exe"C:\Users\Admin\Pictures\CMaSMVQz2P53I7N1fuuLyHpg.exe" --silent --allusers=04⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
PID:3668 -
C:\Users\Admin\Pictures\CMaSMVQz2P53I7N1fuuLyHpg.exeC:\Users\Admin\Pictures\CMaSMVQz2P53I7N1fuuLyHpg.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.38 --initial-client-data=0x29c,0x2a0,0x2a4,0x298,0x2a8,0x6be6e1d0,0x6be6e1dc,0x6be6e1e85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5552
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\CMaSMVQz2P53I7N1fuuLyHpg.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\CMaSMVQz2P53I7N1fuuLyHpg.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3068
-
-
C:\Users\Admin\Pictures\CMaSMVQz2P53I7N1fuuLyHpg.exe"C:\Users\Admin\Pictures\CMaSMVQz2P53I7N1fuuLyHpg.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=3668 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240410003531" --session-guid=494eadd4-23a3-4992-8ada-7f40bec6d9d0 --server-tracking-blob="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 " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=4C040000000000005⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
PID:5288 -
C:\Users\Admin\Pictures\CMaSMVQz2P53I7N1fuuLyHpg.exeC:\Users\Admin\Pictures\CMaSMVQz2P53I7N1fuuLyHpg.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.38 --initial-client-data=0x298,0x2a8,0x2ac,0x274,0x2b0,0x6ae6e1d0,0x6ae6e1dc,0x6ae6e1e86⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5836
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.38\installer.exe"C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.38\installer.exe" --backend --initial-pid=3668 --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --server-tracking-data=server_tracking_data --show-intro-overlay --package-dir="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311" --session-guid=494eadd4-23a3-4992-8ada-7f40bec6d9d0 --server-tracking-blob="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 " --silent --desktopshortcut=1 --install-subfolder=109.0.5097.386⤵PID:6476
-
C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.38\installer.exeC:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.38\installer.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.38 --initial-client-data=0x260,0x264,0x268,0x23c,0x26c,0x7ff99a3b7c80,0x7ff99a3b7c8c,0x7ff99a3b7c987⤵PID:5536
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\assistant\assistant_installer.exe" --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera\assistant" --copyonly=0 --allusers=07⤵PID:6076
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0xe60040,0xe6004c,0xe600588⤵PID:6376
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"5⤵PID:5772
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\assistant\assistant_installer.exe" --version5⤵PID:6548
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0xe60040,0xe6004c,0xe600586⤵PID:6408
-
-
-
-
C:\Users\Admin\Pictures\xRhpnDU0t8fkxSpJrNLloJd6.exe"C:\Users\Admin\Pictures\xRhpnDU0t8fkxSpJrNLloJd6.exe"4⤵
- Executes dropped EXE
PID:6100 -
C:\Users\Admin\AppData\Local\Temp\7zS5F51.tmp\Install.exe.\Install.exe /voNdidv "385118" /S5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
PID:2656 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"6⤵PID:5280
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵PID:5924
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵PID:1400
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True9⤵PID:6728
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bvsYAGfGVfhExjZmnp" /SC once /ST 00:36:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\PSDKJfZwxqLwdSgcp\oiJJZDuRYdKofkI\CdqXxcS.exe\" my /cdsite_idnnz 385118 /S" /V1 /F6⤵
- Creates scheduled task(s)
PID:6396
-
-
-
-
C:\Users\Admin\Pictures\TS0V7kzjeZgmzaPlXr1AfZ3E.exe"C:\Users\Admin\Pictures\TS0V7kzjeZgmzaPlXr1AfZ3E.exe"4⤵PID:5636
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"3⤵PID:1108
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001107001\jok.exe"C:\Users\Admin\AppData\Local\Temp\1001107001\jok.exe"2⤵
- Executes dropped EXE
PID:5856
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:780
-
-
C:\Users\Admin\AppData\Local\Temp\1001108001\swiiii.exe"C:\Users\Admin\AppData\Local\Temp\1001108001\swiiii.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Checks processor information in registry
PID:5136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 392 -ip 3921⤵PID:640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5460 -ip 54601⤵PID:1380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3256 -ip 32561⤵PID:4968
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5840 -ip 58401⤵PID:6444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5412 -ip 54121⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\PSDKJfZwxqLwdSgcp\oiJJZDuRYdKofkI\CdqXxcS.exeC:\Users\Admin\AppData\Local\Temp\PSDKJfZwxqLwdSgcp\oiJJZDuRYdKofkI\CdqXxcS.exe my /cdsite_idnnz 385118 /S1⤵PID:2800
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵PID:6384
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:6804
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:6704
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:5772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:6336
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:7116
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:2160
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:2148
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:5192
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:3160
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:2972
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:6932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:2488
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:5184
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:1520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:4748
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:5564
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:620
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:2240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:5944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:836
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:6236
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:7080
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:4880
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:5820
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:6916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:6288
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:1692
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IYgGQCIDU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IYgGQCIDU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SispZMIUHlKkC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SispZMIUHlKkC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VMcfcqZeQaOU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VMcfcqZeQaOU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WUITINsQgCUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WUITINsQgCUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eHdwxxvqRpTedTcabtR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\eHdwxxvqRpTedTcabtR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\xFlMivLSBvkcEEVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\xFlMivLSBvkcEEVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\PSDKJfZwxqLwdSgcp\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\PSDKJfZwxqLwdSgcp\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ynivKcrpvjVAAlvE\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ynivKcrpvjVAAlvE\" /t REG_DWORD /d 0 /reg:64;"2⤵PID:4816
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IYgGQCIDU" /t REG_DWORD /d 0 /reg:323⤵PID:4496
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IYgGQCIDU" /t REG_DWORD /d 0 /reg:324⤵PID:5488
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IYgGQCIDU" /t REG_DWORD /d 0 /reg:643⤵PID:5772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SispZMIUHlKkC" /t REG_DWORD /d 0 /reg:323⤵PID:7156
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SispZMIUHlKkC" /t REG_DWORD /d 0 /reg:643⤵PID:6696
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VMcfcqZeQaOU2" /t REG_DWORD /d 0 /reg:323⤵PID:392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VMcfcqZeQaOU2" /t REG_DWORD /d 0 /reg:643⤵PID:7128
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WUITINsQgCUn" /t REG_DWORD /d 0 /reg:323⤵PID:4152
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WUITINsQgCUn" /t REG_DWORD /d 0 /reg:643⤵PID:6576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eHdwxxvqRpTedTcabtR" /t REG_DWORD /d 0 /reg:323⤵PID:4380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\eHdwxxvqRpTedTcabtR" /t REG_DWORD /d 0 /reg:643⤵PID:1380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\xFlMivLSBvkcEEVB /t REG_DWORD /d 0 /reg:323⤵PID:5484
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\xFlMivLSBvkcEEVB /t REG_DWORD /d 0 /reg:643⤵PID:3352
-
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe1⤵PID:6308
-
C:\Users\Admin\AppData\Local\Programs\Opera\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Programs\Opera\assistant\assistant_installer.exe" --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera\assistant" --run-assistant --allusers=01⤵PID:4908
-
C:\Users\Admin\AppData\Local\Programs\Opera\assistant\assistant_installer.exeC:\Users\Admin\AppData\Local\Programs\Opera\assistant\assistant_installer.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x540040,0x54004c,0x5400582⤵PID:3424
-
-
C:\Users\Admin\AppData\Local\Programs\Opera\assistant\browser_assistant.exe"C:\Users\Admin\AppData\Local\Programs\Opera\assistant\browser_assistant.exe"2⤵PID:5388
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --stream3⤵PID:620
-
C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.38\opera_crashreporter.exeC:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.38\opera_crashreporter.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.38 --initial-client-data=0x28c,0x290,0x294,0x288,0x298,0x7ff989907590,0x7ff9899075a0,0x7ff9899075b04⤵PID:5404
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480B
MD5c16d592d8079b632dae0e134e179816f
SHA1a3673fe78c551401ea84446533012baab0c8e63f
SHA2565dd8b5177fab2dfed99664cccd22d7e4e1ece5a9b49093755951caea66950325
SHA5124e87910dbccc70bac845f5f23b062a40f32de106328a7be5e8fe6bb918c7252333669b691903ddc072ba1923b8cb2640ee9213974e4e8bc0b0de84590433276e
-
Filesize
539B
MD59e96fb91f11f5daa6eec9e06232f2d8a
SHA1e44b414dc0e85aaf1f3bd3266c000d49348a80d2
SHA25627e8c90238a56ebd28db6381fd6ed5050f1b16b6603d4506deadf8c93542e0db
SHA512b4267bad7e885f60cf8c755094b2eed30cfb85f64d2de9bad9af42f64257977b28e9320d1385edaf46e81ead250b300df3136eb041e7b345b4837bf58bf86301
-
Filesize
539B
MD569fdfe599b7e5c674d2cf5e575ff913d
SHA12e8a0efe797e6a50532a12d5e85dc69345c24076
SHA256dd3ce0408cb35a6746a0c7399427adf0b479fd013f692839d78f661ad30c7cc1
SHA512002b04e65ab5c8fae87c22fe90052c9e04c31921f1b1d63a1b8f50921ccd284ee6791187c8d9fe08ba73f2c64cfdd7299e173c1030d9a7434342a6525480316f
-
Filesize
539B
MD5efaac7c3270ed5d6cd363c92c01df3eb
SHA137e197ea64bd03698d3f88acfdec7315d0606268
SHA2561b5a4ffea12e4b1e72e8fc30b01f046de18e62aecf911ccf9575858079a368df
SHA512227fdc4f26898fb734e415e5636078caa850b000ab42ce6c776b1a940094f070e6e0777026394bd632ca5b79f1ae35932491bd608555d8887af32362f49cb1eb
-
Filesize
15KB
MD543cde79d5871f2a2cf2b955000743621
SHA1564aca6622495e2e06e3bc9a6ccb2d764a139102
SHA25694a7dc818da93f5afeb8fe9a65e6a4284e198f59879cccedce925b04b840fec6
SHA512657e0a9ad02a8e4e813d7344609645cc0646c85d6626f3e6d47835b8c24e014e6894b38252b8ccd3e9b83f49c5889ca4405261e8cbc9ebbe6c787dee3d14eab9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e49cc65f-a497-4a11-b0c0-7ebd2e891992.tmp
Filesize6KB
MD5f1ef110ba11222fe4bc7af1df8edb6d7
SHA1834e96fc15e5933f0b73c42dc43b897949394a16
SHA2565e2beb108616ee5b0ca587170368fa0b8078c8012e57e6a7a928bbcf4c736eb7
SHA51200882cac11754c14834bd041d9495f1d9276e45c8b5e9c4ea393f48e49ab202fcc29dcbf87019f0a2cd9a083210d2ec525057ae05dbbcd88bbb325802d0b76b2
-
Filesize
260KB
MD5dac372653cd571d2ef30b8a59cd90652
SHA1f7ac9df689d4f4701dfd4b23f6f1edca13af8f9d
SHA256180ba0361c386f6dd1c852f95ee50d5f9bc31a1a79958f8981955870012b4e99
SHA512ae2cc3552ec0b6eb936c5f62314f869f9496efad7468305a6824df69ad97faa1296996dacdbe38d8a7c81c5093a0cf58ba9e4345a21375af1f1366629d0e65b3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
3KB
MD5fe3aab3ae544a134b68e881b82b70169
SHA1926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6
SHA256bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b
SHA5123fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280
-
Filesize
1KB
MD52730b7b80e5162a8019025bbea798685
SHA169b6904d93ad582be522851e1b138c7b6fbcc0ed
SHA256f4365abd73df4d70be9dcc12dc128f8ad504add56e13b2e245ccadd4322a7290
SHA512d00ad4fdd762dba4babc8222c6b3a7747a67bf708abe6e5dba06378a88ad7312e69b1987896439f43fb652a0b71afec511b3e7cb4d9d43d92659632015da5771
-
Filesize
1.9MB
MD5b3f05009b53af6435e86cfd939717e82
SHA1770877e7c5f03e8d684984fe430bdfcc2cf41b26
SHA2563ea8d40fcede1fc03e5603246d75d13e8d44d7229d4c390c39a55534053027f7
SHA512d2dee80aaa79b19f1eb1db85079a05f621780e06bfea9e838b62d757ba29399f9090ec7c6ff553377c9b712f3ba8dd812cdff39f3e28829928e86746a8ac6b27
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\Opera Browser.lnk
Filesize1KB
MD52712819cbb540c69371dad84e9017890
SHA1abf0ec3341c389982878588ef5fd75d599f1be93
SHA256e2551486b093e99081e812a921d1f51c5123117455470aaf39f6bc1e15f82d23
SHA5123fdbb7464bad56c80ee94372ab61fab7be64051ff99159aef3af7615deb381d94cdcf166bb181c5d5495cc28593bc09e9764918b57725836f4d5580865ec1b9e
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\additional_file0.tmp
Filesize2.5MB
MD520d293b9bf23403179ca48086ba88867
SHA1dedf311108f607a387d486d812514a2defbd1b9e
SHA256fd996b95ae46014edfd630bfc2bf8bc9e626adf883a1da017a8c3973b68ec348
SHA5125d575c6f0d914583f9bb54f7b884caf9182f26f850da9bdd962f4ed5ed7258316a46fafaf3828dccb6916baaadb681fe1d175a3f4ed59f56066dc7e32b66f7b6
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\e4fb68ae-76e6-4a36-96b0-c317f8c74226.tmp
Filesize232B
MD569228788bc5d569b3979fec5828c57cd
SHA18b908eb8adab0bc75004300202fc61f6d773440c
SHA2562c0edf69da61ff6f1d5095455bbfc611e688b17c758629397d9d27a78d1b7e18
SHA5128c44bd74f8080cc89369f89042d23361d5ef54de94b2a1f594864efe759e4327126529ae66d797ce1ce3709a0f134eb22d05cfbffa4d8ac19ea53f13486680a8
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\installer_prefs_include.json
Filesize1KB
MD5c7552e92e098608e1a397044f761b47d
SHA1ba580cc68ae63ed96f0556c61d7265d9f122eb54
SHA25624727962195dd057ded1dc0981a1cf071eeb654110ea2b5f9a19ee579ec37b5c
SHA512ec27d2d8deeabfae1d980a3bb387f276a2a289cbd62dfed37dc1fdec89c62708e69a206bc3d5448dc8459673945c0169373f55fa3078200090cd489da465550b
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\installer_prefs_include.json.backup
Filesize217B
MD50877f3d72379da38ceac5792bc9fdd4f
SHA119423305bbc320d576f1337a750313818347beac
SHA256cb56400eb931eaa859366e9e6605082fad1e82fe749210b817cebce9b34537db
SHA5128b874f11e8d0c73578e01d2b9e2a971c51b68dadd33bfa6218d7096ff2219bb6ca37e16ade02b985a5a388238b96644f4906523ac93feb84f206d623e67719b2
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404100035311\opera_package
Filesize103.9MB
MD5f9172d1f7a8316c593bdddc47f403b06
SHA1ed1e5a40b040af2c60ed6c2536b3bf7ee55e0e52
SHA256473f0d4b886db8cd39b900b92bdc0625a3fcec8addd43f71179696bdf186ec3b
SHA512f51ab2bdf29ca6839e4f7cf1fac1bdfc03ba2da4569a8f21e5d2ee13e6519097c3da40bf0b4ca7642286ed033d0126bbd14ef7842eb9f2db1d6e503849521b02
-
Filesize
1.7MB
MD51f5d88b2072bc0d4002957df49dc8579
SHA108a8fc781fe24360e29a5781b64dfa8449aca5d5
SHA256c5178f9bb4acda30a6789ac684246c078fce3904c8af54a92e06f2825bd071bf
SHA512fa3a872bcadfcd5f2bc96e4e38aaaf874d2ad93115e582c9a2891192cd96e2f12a81818ea2c7c4f6cf2347c4f5732350859a5cdcd85765651d529582d35377cf
-
Filesize
2.2MB
MD5485273a7bf074c03871b9e7dd3b87751
SHA137e0244ee68a3195ef8208fa126b1c0d8f8ac0f2
SHA2564208f082737424b4a03174b98b1ce992b409ee5d451d5343d12e6253d26072ae
SHA51229c8005211cd52ccde254e359b3562192c4ff6565d4a8e9809ed5813bf609fbc70163d7ddbc03fbddcec5687d95a95effdf66cb0700886b249fd23e5d9ebe1a3
-
Filesize
1.8MB
MD5f408ea298c2b6a06d5608ce030eae1c1
SHA11af9c0f44c5c192f6b74782f6807f2317a4ae8df
SHA25652941ec536d96605f1a4ce29820da80de61339ecd9ff35ccdcf246397859e3ee
SHA5121ca75fc66fc7bcba5854b01c993d714251b940a0dd33f1a60b898519c2e4bea6b316e92aa4320005b9ad41f4df69c374897d07a88cd22a0e7a2cc59a15cbd0fc
-
Filesize
1.1MB
MD52ce4fbaa60acd8434b8209fce9cb51a4
SHA124d868837a30edead2d4d6e48487885bb35cc980
SHA2569e22a19d03ff9982749f8e45bd097bbedc02ddba1a05afaea909b26463bddbd3
SHA51247666d6e1d1adc1a90bfc3dd4a647c30e1c51132a8d20b3ed72da4ce64ecbcbeb09f5e0f34b787fc369d20d7c14fdfdac59ac870f2c8ff447cbcb89a8128bc7a
-
Filesize
1.7MB
MD585a15f080b09acace350ab30460c8996
SHA13fc515e60e4cfa5b3321f04a96c7fb463e4b9d02
SHA2563a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b
SHA512ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f
-
Filesize
499KB
MD583d0b41c7a3a0d29a268b49a313c5de5
SHA146f3251c771b67b40b1f3268caef8046174909a5
SHA25609cc3364d5e1c15228822926bc65ce290c487dc3b7c0345bf265538110fa9cc9
SHA512705ecc7c421338e37ed0d58c2d9fad03fb3565db422a0c9d895e75a399bf5f2a70cfe3ffdc860ffe010d4d1a213e0a844aeadb89ea8e0c830a2fc8c03b7669b5
-
Filesize
464KB
MD5c084d6f6ba40534fbfc5a64b21ef99ab
SHA10b4a17da83c0a8abbc8fab321931d5447b32b720
SHA256afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624
SHA512a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
321KB
MD51c7d0f34bb1d85b5d2c01367cc8f62ef
SHA133aedadb5361f1646cffd68791d72ba5f1424114
SHA256e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c
SHA51253bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d
-
Filesize
379KB
MD590f41880d631e243cec086557cb74d63
SHA1cb385e4172cc227ba72baf29ca1c4411fa99a26d
SHA25623b62a27e3f5c424b16f31e5009af4f24c8bd13b1f035f87879e2a29236be7a0
SHA512eeb85b34aa66a7e9a1b1807012999ee439433df23126a52ffa8d4b3cb2026be3bcf63ca25f143de58ba929c0d4feeaf2a603fd6ec6b5379fc48147c22f3783e3
-
Filesize
376KB
MD536fe8e1624afd33cb399cae0421a4be2
SHA1a7a109bd984618a203c6de242251eb52fd4da528
SHA2567f56bc386f5c88d94f92e3dc5efd51c72951052829fabad2e7500ae405782244
SHA51264832cc8f30bd5138f580aab766d64fdfc3935724062e3d2625f66779ae66feee72eca497b49f5312c375b2faf175735dc21ed36572fc07ecbe59204a4930efe
-
Filesize
304KB
MD58510bcf5bc264c70180abe78298e4d5b
SHA12c3a2a85d129b0d750ed146d1d4e4d6274623e28
SHA256096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6
SHA5125ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d
-
Filesize
158KB
MD5586f7fecacd49adab650fae36e2db994
SHA135d9fb512a8161ce867812633f0a43b042f9a5e6
SHA256cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e
SHA512a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772
-
Filesize
6.7MB
MD5809d648fec095c2d4006c7a76c34d84a
SHA159afe5a2926d296fd10ab3957e0d77d9fb4127df
SHA256b90c5a504b7d72110b188b4fe090d282fd8f4b498ce017f3b781874cd619da80
SHA512b0aefd6a38e2d93086638451df64ce858af87a0a6a7ac7561c57a9b7d989340262965a665f1edb372e0fa09fe9b370ece5644fa4a652b879ad4aee4bc801fa19
-
Filesize
4.6MB
MD52a3159d6fef1100348d64bf9c72d15ee
SHA152a08f06f6baaa12163b92f3c6509e6f1e003130
SHA256668bf8a7f3e53953dd6789fc6146a205c6c7330832c5d20b439eedb7c52ed303
SHA512251c0d3cdd0597b962d4e32cf588a82454c42067cbe5e35b41b0548eea742ea25815e5d6830b63c1992b5730a4e6d7c005fb0019aa4c389549b06fff9a74b38c
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD524ef9e9f7d693a8f812159de6d17e484
SHA18d8af3cdb2b9d105bb345579075f05238de382a9
SHA2566e9b0c919d11ad04a5698221adc2b6cd21aa121a53d4cdc0e1530273c426df69
SHA512aac05e726dedfdd9b149acaf8640295e59f1ee6abbdc3607f9b4cea260602a6e433ad39ccddd321be0e14109eb03b47b45245466f134bf7c035cf710e84a45ad
-
Filesize
3KB
MD5b2d456c42b4495e20157a8d8977eb907
SHA1dd99829849a2616aee747184e427f2f3f8d85c4f
SHA25680a4da4766fbb9ea30f5f5e3134627e9732cf1ab532be3209034c0f21652929e
SHA512d3c8675bc8a6f967a53c75f3385bbac7e994801895473b7495201ef1ad1d0c1b388058992e67a789bbd964cb46d98dc459bac17a7e29490d52e879d018e6b1cd
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5dcbcc5168ee247e51677b17c3e3650bb
SHA150556e795d94d737190b800f4ca52b6ada9ff10b
SHA2568ea7842c9d2568004ad984a286aa62b6ff787ece4b6287167223f5f875496ea3
SHA5124b6968d5596235c9826c2461197ef5e347f12aac333ec5a03ceb3b1b6cad0e1e39cc59ddda889f8b938999a47f5d17155443ff79974df3559bca42884dc960a0
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
320KB
MD509681907f7f8dcf62e14dcde55e71150
SHA1cdcdb1cd6e18f700ed426f2fcc0be36709bd0bf9
SHA256c8147bc901b8d5a4b46890802826dba0447547ce8509ee593f51a3cfce551a2f
SHA512c4b2dadd7cabaf80fd72cb2ccd2190ee2c4b04ab9cf0479d762ed36967b100a26eaaadf8ccddd4722b5ad41309254fbdcb36ca346e8da1fd52b46437a087768c
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
40B
MD54b922a527544e811dfec8d9440210511
SHA1548a56e7a5cbe239c2805e206ab33b7693bf9c9c
SHA2564cb6d61aad560b5d544684c121aa8850d2f14beb66f36c948c1bd27e93537cd5
SHA512158dceaa5f0f2aae0627e8f5177e4092c8e6e601ff334bcec4674d28ac199b9f67b7938514bdf6a9dae5b8908d3a44dcb060c547143c601d9c7d344b129f48c4
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
541KB
MD51fc4b9014855e9238a361046cfbf6d66
SHA1c17f18c8246026c9979ab595392a14fe65cc5e9f
SHA256f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50
SHA5122af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12
-
Filesize
304KB
MD5cc90e3326d7b20a33f8037b9aab238e4
SHA1236d173a6ac462d85de4e866439634db3b9eeba3
SHA256bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7
SHA512b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521
-
Filesize
462KB
MD5613b8372ecb33c52f4448ed991adb5ee
SHA1aed2a8df0a1cfa02e957efdcf8d273bca99c6943
SHA256c34cb8c14825ab520e83bfd4c4b27f96f10572dbce7821fd1aad65ae61738f55
SHA512bb036498b7565377d483b07c540ade3487f1a0773964e6d3d385b18360b91cb0e3a419c77f707b9ebf3af428e063ae5aee5df5ac04859129cb01f5bdd6b5295b
-
Filesize
5.1MB
MD5e4c793fbac73cabe6f62251dcf0f6883
SHA1c43e7bc871ee8e4c165fd2c28a55dafabef1712b
SHA2568e2895a382854fabd2800fd5c39f1631d6b8e3c5e81ecfc34914695cfd1513ac
SHA512513eef2beabb60d30f294828264cbc660dc319d7bae1b327fe35862cd9e30cd1508617b0d8e42d5cf1e09afd7d54e596e2b26515a50b4406f4771b0990f03b08
-
Filesize
4.2MB
MD52f6567505cb9886cb70a937bec4eb2a5
SHA11c135945646cd927b06b8e98a4b91160550e7165
SHA2561ff3edd2785db8dac16106c3916a448df4352a4efec2b7dbade9882c936b5356
SHA512ebd6e674bf6d63ffaa3696a0a9efd2a45c7f5447fe41def7af244f8fa6be954ec8e17ed15168dd41976d9352f4a3ce85b5f6ee14a0d5b8be5ede1a40325be582
-
Filesize
7.2MB
MD5e22f713ca51e6ac129ed8dab1bedb8a6
SHA161280be1fa0cee8c8148bdd167eb7176bb1df1b8
SHA256c067cf39d43b39a560eca901609bc4d403f53f565d22370a0e9458b4e91a6824
SHA512345bee45708ba133449dd8567ff41e9dfda48c6de4efa41d0c7c8e874767d39266ca7d5ee51e39e91eb19361d1f27b1b5a274576ea424cc6b89bcc517ab55636
-
Filesize
6.7MB
MD5e94351c930dff186b2afe71b9ad057ff
SHA1a48252deb04de0687b02310bcac6469d1902d37f
SHA256a123cacc95568c5af838a5caaacd90c5d0ce2472b83060a25286c22e7d74e4b0
SHA51230b4637a3a23427c9fd28f93a9a19c9ccb8cc7bc82c272ce01fab0971d7ebaaf89a740cb6663844b43f622e832be3ee5ffc9f21af914c31641ce48c8fa15081c
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
2KB
MD5d47577c76235caa0d2334752ff9cf5a5
SHA12d33470ef846bb21c0770e48fc500c42fdcf32f5
SHA2569893f40fa36f889a9cd24a04f9f71e062c9d85d75d280ecd5a9e2ceed836b614
SHA51235b3ef74b03795e6bcd06f13baab0cc9e88ade6186291dde43ab392dabf165c338969ec5aa8ceb3bc1f884a9520b6c4cf606dea665fdc7bf01d8a59e254838d5
-
Filesize
2KB
MD57f18340690310ce7bcf77a9203642634
SHA125109de410936887cdd15964f007f3db65cecaef
SHA256b14ee4506952cbae4a7981f1fa837c84e2eaadceda4cb76d582bb9c128d8c1f5
SHA512332b52304d7d83556563b0f8b2aae3d26275a38793fd975a993bc099b13775585afd461c250703fa284a30703e53e99a9c624ecd43821cd965a50410719e84bf
-
Filesize
2KB
MD5f33a1e232cd3c3964a6e58fd81596890
SHA16137286851f786d608404671691ec53a90998aa2
SHA256e42f417d791116784806634a5fd9dbe0b6e79eba14f49e6e102520b69cc426a2
SHA5125268075741346742a732d2b888393d9aed70bcd51bb1004b8f852eab9615b5adc45d0c7227ce5f9c26fa8fbdcef39b0a9477dc8994d3836435f95d2b0133fa1f
-
Filesize
2KB
MD52b7b13b895b51cb0edc3e4e3b1e4ea92
SHA15c9b310ed53cb4a25e266b3cad0fcf4ad5ebcfc8
SHA256feaf9d00cb73934b2f63fced1cf224139a11ea2cf5310473d2cac682402cdd71
SHA512364ef0e68437f3caafbc3078f4db8a14f6d019e8a5f01c1cacf6c9e903b8d1b005ddada9af209a07a100dc480c58dca3037743e677cd1ea38670bed8e98c217a
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005