Analysis
-
max time kernel
151s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe
Resource
win10v2004-20220812-en
General
-
Target
be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe
-
Size
73KB
-
MD5
2ebd05b5a1d018ee574d8d46df0fc7a6
-
SHA1
a7108a9ff93a216ca7d94e70bd37be259cb58d45
-
SHA256
be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
-
SHA512
80d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
SSDEEP
1536:AZpibrjRkDgfnzFB9oCnyo2Vl8Eb3W7+ClJ6zL:A2brjRJfnJB3nyoWV3ilJk
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 47 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgwsvcn.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgsgui.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgectd.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashwbss.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgmgnt.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgscnd.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashwbss.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" aswusr.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgrdm.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" aswusr.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgmkdr.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgusrv.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgmkdr.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgscnd.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsva.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsdl.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgrdm.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashmls.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsdl.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgusrv.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsva.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashmls.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashwbss.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgsgui.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgscnd.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgwsvcn.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgsgui.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" aswusr.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgmgnt.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgwsvcn.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgwsvcn.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsdl.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgrdm.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgsgui.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsdl.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgmkdr.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgwsvcn.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgectd.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgrdm.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashwbss.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgusrv.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgwsvcn.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avirarka.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashsdl.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avgsgui.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" ashmls.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 64 IoCs
pid Process 240 ashsva.exe 316 ashsva.exe 928 avirarka.exe 1468 avirarka.exe 1072 avgwsvcn.exe 1092 avgwsvcn.exe 1920 avgsgui.exe 1520 avgsgui.exe 2012 avgwsvcn.exe 1708 avgwsvcn.exe 908 avgectd.exe 904 avgectd.exe 2040 ashwbss.exe 1976 ashwbss.exe 1956 ashsdl.exe 1528 ashsdl.exe 1112 avgsgui.exe 1920 avgsgui.exe 1212 ashsdl.exe 1596 ashsdl.exe 996 avgrdm.exe 1412 avgectd.exe 1764 aswusr.exe 632 aswusr.exe 1292 ashmls.exe 944 ashmls.exe 1056 avgrdm.exe 996 avgrdm.exe 836 aswusr.exe 1968 aswusr.exe 1984 avgrdm.exe 1744 avgrdm.exe 1068 ashsdl.exe 1644 ashsdl.exe 1536 avgrdm.exe 560 avgrdm.exe 1116 aswusr.exe 1932 aswusr.exe 568 avgsgui.exe 1856 avgsgui.exe 1396 avgrdm.exe 1576 avgrdm.exe 1972 avgmgnt.exe 1584 avgmgnt.exe 1120 ashmls.exe 1176 ashmls.exe 836 avgwsvcn.exe 560 avgwsvcn.exe 1292 ashsdl.exe 240 ashsdl.exe 1064 avgmkdr.exe 1472 avgmkdr.exe 920 ashwbss.exe 860 ashwbss.exe 1256 avgwsvcn.exe 1712 avgwsvcn.exe 1640 ashwbss.exe 1588 ashwbss.exe 672 avgusrv.exe 1116 avgusrv.exe 1736 avgsgui.exe 1396 avgsgui.exe 1112 avgusrv.exe 1708 avgusrv.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe ashsdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "ashmls.exe" aswusr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgmgnt.exe" avgrdm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgsgui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgsgui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe ashwbss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe ashwbss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgwsvcn.exe" ashwbss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgusrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe ashwbss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgwsvcn.exe" avirarka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgsgui.exe" avgwsvcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe ashsdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgrdm.exe" ashsdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgrdm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe ashwbss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgsgui.exe" avgmgnt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgectd.exe" avgwsvcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgrdm.exe" aswusr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgusrv.exe" avgsgui.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgscnd.exe" avgmkdr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "ashsva.exe" ashwbss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgrdm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgusrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe aswusr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgmkdr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgwsvcn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgsgui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgwsvcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "ashsdl.exe" avgsgui.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "aswusr.exe" avgrdm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe aswusr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgrdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgmkdr.exe" ashsdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "ashmls.exe" ashsva.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avirarka.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgectd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgrdm.exe" avgsgui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgwsvcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "ashsdl.exe" avgwsvcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgwsvcn.exe" avgscnd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe ashsva.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgectd.exe" ashsdl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe aswusr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgsgui.exe" aswusr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgsgui.exe" avgusrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgsgui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgusrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgwsvcn.exe" avgscnd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe ashsva.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgsgui.exe" ashsdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgusrv.exe" avgsgui.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe ashsdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgscnd.exe" avgmkdr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "ashsva.exe" be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe ashsdl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "ashsdl.exe" avgrdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "ashmls.exe" avgmgnt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "ashwbss.exe" avgwsvcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgmkdr.exe" avgwsvcn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "ashwbss.exe" avgscnd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe avgectd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "ashwbss.exe" avgectd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ctfmon.exe\Debugger = "avgmkdr.exe" ashsdl.exe -
Deletes itself 1 IoCs
pid Process 1080 cmd.exe -
Loads dropped DLL 64 IoCs
pid Process 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 316 ashsva.exe 316 ashsva.exe 1468 avirarka.exe 1468 avirarka.exe 1092 avgwsvcn.exe 1092 avgwsvcn.exe 1520 avgsgui.exe 1520 avgsgui.exe 1708 avgwsvcn.exe 1708 avgwsvcn.exe 904 avgectd.exe 904 avgectd.exe 1976 ashwbss.exe 1976 ashwbss.exe 1528 ashsdl.exe 1528 ashsdl.exe 1920 avgsgui.exe 1920 avgsgui.exe 1596 ashsdl.exe 1596 ashsdl.exe 1412 avgectd.exe 1412 avgectd.exe 632 aswusr.exe 632 aswusr.exe 944 ashmls.exe 944 ashmls.exe 996 avgrdm.exe 996 avgrdm.exe 1968 aswusr.exe 1968 aswusr.exe 1744 avgrdm.exe 1744 avgrdm.exe 1644 ashsdl.exe 1644 ashsdl.exe 560 avgrdm.exe 560 avgrdm.exe 1932 aswusr.exe 1932 aswusr.exe 1856 avgsgui.exe 1856 avgsgui.exe 1576 avgrdm.exe 1576 avgrdm.exe 1584 avgmgnt.exe 1584 avgmgnt.exe 1176 ashmls.exe 1176 ashmls.exe 560 avgwsvcn.exe 560 avgwsvcn.exe 240 ashsdl.exe 240 ashsdl.exe 1472 avgmkdr.exe 1472 avgmkdr.exe 860 ashwbss.exe 860 ashwbss.exe 1712 avgwsvcn.exe 1712 avgwsvcn.exe 1588 ashwbss.exe 1588 ashwbss.exe 1116 avgusrv.exe 1116 avgusrv.exe 1396 avgsgui.exe 1396 avgsgui.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ashsdl.exe avgrdm.exe File created C:\Windows\SysWOW64\avgrdm.exe ashsdl.exe File opened for modification C:\Windows\SysWOW64\avgmkdr.exe ashsdl.exe File created C:\Windows\SysWOW64\avgusrv.exe avgsgui.exe File created C:\Windows\SysWOW64\ashsdl.exe avgwsvcn.exe File opened for modification C:\Windows\SysWOW64\ashsva.exe ashwbss.exe File created C:\Windows\SysWOW64\ashsdl.exe avgsgui.exe File created C:\Windows\SysWOW64\ashsdl.exe ashwbss.exe File created C:\Windows\SysWOW64\avirarka.exe ashsva.exe File opened for modification C:\Windows\SysWOW64\avgrdm.exe ashsdl.exe File created C:\Windows\SysWOW64\ashwbss.exe avgmkdr.exe File created C:\Windows\SysWOW64\avgectd.exe ashmls.exe File created C:\Windows\SysWOW64\ashsdl.exe avgrdm.exe File created C:\Windows\SysWOW64\ashwbss.exe avgectd.exe File opened for modification C:\Windows\SysWOW64\aswusr.exe avgectd.exe File opened for modification C:\Windows\SysWOW64\avgrdm.exe aswusr.exe File created C:\Windows\SysWOW64\aswusr.exe avgrdm.exe File created C:\Windows\SysWOW64\avgwsvcn.exe ashmls.exe File created C:\Windows\SysWOW64\ashsdl.exe avgwsvcn.exe File opened for modification C:\Windows\SysWOW64\avgscnd.exe avgusrv.exe File created C:\Windows\SysWOW64\avgwsvcn.exe avirarka.exe File opened for modification C:\Windows\SysWOW64\avgwsvcn.exe avgscnd.exe File opened for modification C:\Windows\SysWOW64\ashsdl.exe ashwbss.exe File opened for modification C:\Windows\SysWOW64\ashsdl.exe avgsgui.exe File opened for modification C:\Windows\SysWOW64\aswusr.exe avgrdm.exe File created C:\Windows\SysWOW64\avgsgui.exe avgmgnt.exe File created C:\Windows\SysWOW64\ashsva.exe ashwbss.exe File opened for modification C:\Windows\SysWOW64\avgwsvcn.exe avgsgui.exe File opened for modification C:\Windows\SysWOW64\ashwbss.exe avgwsvcn.exe File opened for modification C:\Windows\SysWOW64\avgusrv.exe avgsgui.exe File created C:\Windows\SysWOW64\avgmkdr.exe ashsdl.exe File created C:\Windows\SysWOW64\avgscnd.exe avgmkdr.exe File opened for modification C:\Windows\SysWOW64\avgectd.exe ashmls.exe File opened for modification C:\Windows\SysWOW64\ashmls.exe aswusr.exe File created C:\Windows\SysWOW64\avgectd.exe avgwsvcn.exe File created C:\Windows\SysWOW64\avgrdm.exe aswusr.exe File opened for modification C:\Windows\SysWOW64\avgrdm.exe avgsgui.exe File opened for modification C:\Windows\SysWOW64\avgwsvcn.exe ashwbss.exe File opened for modification C:\Windows\SysWOW64\avgsgui.exe avgwsvcn.exe File created C:\Windows\SysWOW64\aswusr.exe avgrdm.exe File opened for modification C:\Windows\SysWOW64\ashmls.exe avgmgnt.exe File opened for modification C:\Windows\SysWOW64\avgmgnt.exe avgusrv.exe File created C:\Windows\SysWOW64\avgusrv.exe avgsgui.exe File opened for modification C:\Windows\SysWOW64\avgusrv.exe avgsgui.exe File opened for modification C:\Windows\SysWOW64\avgscnd.exe avgmkdr.exe File opened for modification C:\Windows\SysWOW64\ashmls.exe ashsva.exe File opened for modification C:\Windows\SysWOW64\avgectd.exe ashsdl.exe File opened for modification C:\Windows\SysWOW64\avgectd.exe avgwsvcn.exe File created C:\Windows\SysWOW64\avgscnd.exe avgusrv.exe File opened for modification C:\Windows\SysWOW64\avgmkdr.exe ashsdl.exe File created C:\Windows\SysWOW64\avgwsvcn.exe avgsgui.exe File opened for modification C:\Windows\SysWOW64\aswusr.exe avgrdm.exe File created C:\Windows\SysWOW64\avgsgui.exe avgusrv.exe File created C:\Windows\SysWOW64\avgwsvcn.exe avgscnd.exe File created C:\Windows\SysWOW64\avgwsvcn.exe avgscnd.exe File opened for modification C:\Windows\SysWOW64\avgwsvcn.exe avgscnd.exe File opened for modification C:\Windows\SysWOW64\avirarka.exe ashsva.exe File opened for modification C:\Windows\SysWOW64\avgsgui.exe ashsdl.exe File opened for modification C:\Windows\SysWOW64\avgrdm.exe ashmls.exe File opened for modification C:\Windows\SysWOW64\avgusrv.exe ashwbss.exe File opened for modification C:\Windows\SysWOW64\avgwsvcn.exe avirarka.exe File opened for modification C:\Windows\SysWOW64\avgsgui.exe aswusr.exe File created C:\Windows\SysWOW64\ashwbss.exe avgwsvcn.exe File created C:\Windows\SysWOW64\avgmkdr.exe avgwsvcn.exe -
Suspicious use of SetThreadContext 47 IoCs
description pid Process procid_target PID 1612 set thread context of 1620 1612 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 26 PID 240 set thread context of 316 240 ashsva.exe 36 PID 928 set thread context of 1468 928 avirarka.exe 46 PID 1072 set thread context of 1092 1072 avgwsvcn.exe 56 PID 1920 set thread context of 1520 1920 avgsgui.exe 66 PID 2012 set thread context of 1708 2012 avgwsvcn.exe 76 PID 908 set thread context of 904 908 avgectd.exe 86 PID 2040 set thread context of 1976 2040 ashwbss.exe 96 PID 1956 set thread context of 1528 1956 ashsdl.exe 106 PID 1112 set thread context of 1920 1112 avgsgui.exe 116 PID 1212 set thread context of 1596 1212 ashsdl.exe 126 PID 996 set thread context of 1412 996 avgrdm.exe 136 PID 1764 set thread context of 632 1764 aswusr.exe 146 PID 1292 set thread context of 944 1292 ashmls.exe 156 PID 1056 set thread context of 996 1056 avgrdm.exe 166 PID 836 set thread context of 1968 836 aswusr.exe 176 PID 1984 set thread context of 1744 1984 avgrdm.exe 186 PID 1068 set thread context of 1644 1068 ashsdl.exe 196 PID 1536 set thread context of 560 1536 avgrdm.exe 206 PID 1116 set thread context of 1932 1116 aswusr.exe 216 PID 568 set thread context of 1856 568 avgsgui.exe 226 PID 1396 set thread context of 1576 1396 avgrdm.exe 236 PID 1972 set thread context of 1584 1972 avgmgnt.exe 246 PID 1120 set thread context of 1176 1120 ashmls.exe 256 PID 836 set thread context of 560 836 avgwsvcn.exe 266 PID 1292 set thread context of 240 1292 ashsdl.exe 276 PID 1064 set thread context of 1472 1064 avgmkdr.exe 286 PID 920 set thread context of 860 920 ashwbss.exe 296 PID 1256 set thread context of 1712 1256 avgwsvcn.exe 306 PID 1640 set thread context of 1588 1640 ashwbss.exe 316 PID 672 set thread context of 1116 672 avgusrv.exe 326 PID 1736 set thread context of 1396 1736 avgsgui.exe 336 PID 1112 set thread context of 1708 1112 avgusrv.exe 346 PID 764 set thread context of 1204 764 avgmgnt.exe 356 PID 1524 set thread context of 2040 1524 avgsgui.exe 366 PID 1380 set thread context of 1956 1380 avgusrv.exe 376 PID 1556 set thread context of 1812 1556 avgscnd.exe 386 PID 1604 set thread context of 1504 1604 avgwsvcn.exe 396 PID 1924 set thread context of 2032 1924 ashsdl.exe 406 PID 764 set thread context of 1540 764 avgmkdr.exe 416 PID 1412 set thread context of 2012 1412 avgscnd.exe 426 PID 304 set thread context of 1856 304 avgwsvcn.exe 436 PID 436 set thread context of 1760 436 avgmkdr.exe 446 PID 928 set thread context of 940 928 avgscnd.exe 456 PID 1952 set thread context of 1856 1952 ashwbss.exe 466 PID 1612 set thread context of 1760 1612 ashsva.exe 476 PID 1692 set thread context of 1680 1692 ashmls.exe 486 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe Token: SeIncBasePriorityPrivilege 316 ashsva.exe Token: SeIncBasePriorityPrivilege 1468 avirarka.exe Token: SeIncBasePriorityPrivilege 1092 avgwsvcn.exe Token: SeIncBasePriorityPrivilege 1520 avgsgui.exe Token: SeIncBasePriorityPrivilege 1708 avgwsvcn.exe Token: SeIncBasePriorityPrivilege 904 avgectd.exe Token: SeIncBasePriorityPrivilege 1976 ashwbss.exe Token: SeIncBasePriorityPrivilege 1528 ashsdl.exe Token: SeIncBasePriorityPrivilege 1920 avgsgui.exe Token: SeIncBasePriorityPrivilege 1596 ashsdl.exe Token: SeIncBasePriorityPrivilege 1412 avgectd.exe Token: SeIncBasePriorityPrivilege 632 aswusr.exe Token: SeIncBasePriorityPrivilege 944 ashmls.exe Token: SeIncBasePriorityPrivilege 996 avgrdm.exe Token: SeIncBasePriorityPrivilege 1968 aswusr.exe Token: SeIncBasePriorityPrivilege 1744 avgrdm.exe Token: SeIncBasePriorityPrivilege 1644 ashsdl.exe Token: SeIncBasePriorityPrivilege 560 avgrdm.exe Token: SeIncBasePriorityPrivilege 1932 aswusr.exe Token: SeIncBasePriorityPrivilege 1856 avgsgui.exe Token: SeIncBasePriorityPrivilege 1576 avgrdm.exe Token: SeIncBasePriorityPrivilege 1584 avgmgnt.exe Token: SeIncBasePriorityPrivilege 1176 ashmls.exe Token: SeIncBasePriorityPrivilege 560 avgwsvcn.exe Token: SeIncBasePriorityPrivilege 240 ashsdl.exe Token: SeIncBasePriorityPrivilege 1472 avgmkdr.exe Token: SeIncBasePriorityPrivilege 860 ashwbss.exe Token: SeIncBasePriorityPrivilege 1712 avgwsvcn.exe Token: SeIncBasePriorityPrivilege 1588 ashwbss.exe Token: SeIncBasePriorityPrivilege 1116 avgusrv.exe Token: SeIncBasePriorityPrivilege 1396 avgsgui.exe Token: SeIncBasePriorityPrivilege 1708 avgusrv.exe Token: SeIncBasePriorityPrivilege 1204 avgmgnt.exe Token: SeIncBasePriorityPrivilege 2040 avgsgui.exe Token: SeIncBasePriorityPrivilege 1956 avgusrv.exe Token: SeIncBasePriorityPrivilege 1812 avgscnd.exe Token: SeIncBasePriorityPrivilege 1504 avgwsvcn.exe Token: SeIncBasePriorityPrivilege 2032 ashsdl.exe Token: SeIncBasePriorityPrivilege 1540 avgmkdr.exe Token: SeIncBasePriorityPrivilege 2012 avgscnd.exe Token: SeIncBasePriorityPrivilege 1856 avgwsvcn.exe Token: SeIncBasePriorityPrivilege 1760 avgmkdr.exe Token: SeIncBasePriorityPrivilege 940 avgscnd.exe Token: SeIncBasePriorityPrivilege 1856 ashwbss.exe Token: SeIncBasePriorityPrivilege 1760 ashsva.exe Token: SeIncBasePriorityPrivilege 1680 ashmls.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1620 1612 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 26 PID 1612 wrote to memory of 1620 1612 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 26 PID 1612 wrote to memory of 1620 1612 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 26 PID 1612 wrote to memory of 1620 1612 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 26 PID 1612 wrote to memory of 1620 1612 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 26 PID 1612 wrote to memory of 1620 1612 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 26 PID 1612 wrote to memory of 1620 1612 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 26 PID 1612 wrote to memory of 1620 1612 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 26 PID 1612 wrote to memory of 1620 1612 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 26 PID 1620 wrote to memory of 240 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 27 PID 1620 wrote to memory of 240 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 27 PID 1620 wrote to memory of 240 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 27 PID 1620 wrote to memory of 240 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 27 PID 1620 wrote to memory of 1928 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 28 PID 1620 wrote to memory of 1928 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 28 PID 1620 wrote to memory of 1928 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 28 PID 1620 wrote to memory of 1928 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 28 PID 1620 wrote to memory of 1204 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 30 PID 1620 wrote to memory of 1204 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 30 PID 1620 wrote to memory of 1204 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 30 PID 1620 wrote to memory of 1204 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 30 PID 1620 wrote to memory of 1932 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 31 PID 1620 wrote to memory of 1932 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 31 PID 1620 wrote to memory of 1932 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 31 PID 1620 wrote to memory of 1932 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 31 PID 1620 wrote to memory of 1080 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 34 PID 1620 wrote to memory of 1080 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 34 PID 1620 wrote to memory of 1080 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 34 PID 1620 wrote to memory of 1080 1620 be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe 34 PID 240 wrote to memory of 316 240 ashsva.exe 36 PID 240 wrote to memory of 316 240 ashsva.exe 36 PID 240 wrote to memory of 316 240 ashsva.exe 36 PID 240 wrote to memory of 316 240 ashsva.exe 36 PID 240 wrote to memory of 316 240 ashsva.exe 36 PID 240 wrote to memory of 316 240 ashsva.exe 36 PID 240 wrote to memory of 316 240 ashsva.exe 36 PID 240 wrote to memory of 316 240 ashsva.exe 36 PID 240 wrote to memory of 316 240 ashsva.exe 36 PID 316 wrote to memory of 928 316 ashsva.exe 37 PID 316 wrote to memory of 928 316 ashsva.exe 37 PID 316 wrote to memory of 928 316 ashsva.exe 37 PID 316 wrote to memory of 928 316 ashsva.exe 37 PID 316 wrote to memory of 1992 316 ashsva.exe 38 PID 316 wrote to memory of 1992 316 ashsva.exe 38 PID 316 wrote to memory of 1992 316 ashsva.exe 38 PID 316 wrote to memory of 1992 316 ashsva.exe 38 PID 316 wrote to memory of 1984 316 ashsva.exe 40 PID 316 wrote to memory of 1984 316 ashsva.exe 40 PID 316 wrote to memory of 1984 316 ashsva.exe 40 PID 316 wrote to memory of 1984 316 ashsva.exe 40 PID 316 wrote to memory of 1972 316 ashsva.exe 42 PID 316 wrote to memory of 1972 316 ashsva.exe 42 PID 316 wrote to memory of 1972 316 ashsva.exe 42 PID 316 wrote to memory of 1972 316 ashsva.exe 42 PID 316 wrote to memory of 320 316 ashsva.exe 43 PID 316 wrote to memory of 320 316 ashsva.exe 43 PID 316 wrote to memory of 320 316 ashsva.exe 43 PID 316 wrote to memory of 320 316 ashsva.exe 43 PID 928 wrote to memory of 1468 928 avirarka.exe 46 PID 928 wrote to memory of 1468 928 avirarka.exe 46 PID 928 wrote to memory of 1468 928 avirarka.exe 46 PID 928 wrote to memory of 1468 928 avirarka.exe 46 PID 928 wrote to memory of 1468 928 avirarka.exe 46 PID 928 wrote to memory of 1468 928 avirarka.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe"C:\Users\Admin\AppData\Local\Temp\be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe"C:\Users\Admin\AppData\Local\Temp\be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Sets file execution options in registry
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\ashsva.exe"C:\Windows\system32\ashsva.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\SysWOW64\ashsva.exe"C:\Windows\SysWOW64\ashsva.exe"4⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\avirarka.exe"C:\Windows\system32\avirarka.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\avirarka.exe"C:\Windows\SysWOW64\avirarka.exe"6⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1468 -
C:\Windows\SysWOW64\avgwsvcn.exe"C:\Windows\system32\avgwsvcn.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1072 -
C:\Windows\SysWOW64\avgwsvcn.exe"C:\Windows\SysWOW64\avgwsvcn.exe"8⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Windows\SysWOW64\avgsgui.exe"C:\Windows\system32\avgsgui.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1920 -
C:\Windows\SysWOW64\avgsgui.exe"C:\Windows\SysWOW64\avgsgui.exe"10⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1520 -
C:\Windows\SysWOW64\avgwsvcn.exe"C:\Windows\system32\avgwsvcn.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2012 -
C:\Windows\SysWOW64\avgwsvcn.exe"C:\Windows\SysWOW64\avgwsvcn.exe"12⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1708 -
C:\Windows\SysWOW64\avgectd.exe"C:\Windows\system32\avgectd.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:908 -
C:\Windows\SysWOW64\avgectd.exe"C:\Windows\SysWOW64\avgectd.exe"14⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:904 -
C:\Windows\SysWOW64\ashwbss.exe"C:\Windows\system32\ashwbss.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2040 -
C:\Windows\SysWOW64\ashwbss.exe"C:\Windows\SysWOW64\ashwbss.exe"16⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1976 -
C:\Windows\SysWOW64\ashsdl.exe"C:\Windows\system32\ashsdl.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1956 -
C:\Windows\SysWOW64\ashsdl.exe"C:\Windows\SysWOW64\ashsdl.exe"18⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\ashsdl.exe > nul19⤵PID:240
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr19⤵PID:1524
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com19⤵PID:1204
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip19⤵PID:1132
-
-
C:\Windows\SysWOW64\avgsgui.exe"C:\Windows\system32\avgsgui.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1112 -
C:\Windows\SysWOW64\avgsgui.exe"C:\Windows\SysWOW64\avgsgui.exe"20⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1920 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgsgui.exe > nul21⤵PID:764
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr21⤵PID:1292
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com21⤵PID:1984
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip21⤵PID:1504
-
-
C:\Windows\SysWOW64\ashsdl.exe"C:\Windows\system32\ashsdl.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1212 -
C:\Windows\SysWOW64\ashsdl.exe"C:\Windows\SysWOW64\ashsdl.exe"22⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1596 -
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip23⤵PID:1584
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\ashsdl.exe > nul23⤵PID:1956
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr23⤵PID:1940
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com23⤵PID:1748
-
-
C:\Windows\SysWOW64\avgectd.exe"C:\Windows\system32\avgectd.exe"23⤵PID:996
-
C:\Windows\SysWOW64\avgectd.exe"C:\Windows\SysWOW64\avgectd.exe"24⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1412 -
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip25⤵PID:1772
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com25⤵PID:828
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgectd.exe > nul25⤵PID:396
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr25⤵PID:1992
-
-
C:\Windows\SysWOW64\aswusr.exe"C:\Windows\system32\aswusr.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1764 -
C:\Windows\SysWOW64\aswusr.exe"C:\Windows\SysWOW64\aswusr.exe"26⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:632 -
C:\Windows\SysWOW64\ashmls.exe"C:\Windows\system32\ashmls.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1292 -
C:\Windows\SysWOW64\ashmls.exe"C:\Windows\SysWOW64\ashmls.exe"28⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\ashmls.exe > nul29⤵PID:908
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr29⤵PID:2016
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com29⤵PID:612
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip29⤵PID:1748
-
-
C:\Windows\SysWOW64\avgrdm.exe"C:\Windows\system32\avgrdm.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1056 -
C:\Windows\SysWOW64\avgrdm.exe"C:\Windows\SysWOW64\avgrdm.exe"30⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:996 -
C:\Windows\SysWOW64\aswusr.exe"C:\Windows\system32\aswusr.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:836 -
C:\Windows\SysWOW64\aswusr.exe"C:\Windows\SysWOW64\aswusr.exe"32⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1968 -
C:\Windows\SysWOW64\avgrdm.exe"C:\Windows\system32\avgrdm.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1984 -
C:\Windows\SysWOW64\avgrdm.exe"C:\Windows\SysWOW64\avgrdm.exe"34⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1744 -
C:\Windows\SysWOW64\ashsdl.exe"C:\Windows\system32\ashsdl.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1068 -
C:\Windows\SysWOW64\ashsdl.exe"C:\Windows\SysWOW64\ashsdl.exe"36⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1644 -
C:\Windows\SysWOW64\avgrdm.exe"C:\Windows\system32\avgrdm.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1536 -
C:\Windows\SysWOW64\avgrdm.exe"C:\Windows\SysWOW64\avgrdm.exe"38⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:560 -
C:\Windows\SysWOW64\aswusr.exe"C:\Windows\system32\aswusr.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1116 -
C:\Windows\SysWOW64\aswusr.exe"C:\Windows\SysWOW64\aswusr.exe"40⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1932 -
C:\Windows\SysWOW64\avgsgui.exe"C:\Windows\system32\avgsgui.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:568 -
C:\Windows\SysWOW64\avgsgui.exe"C:\Windows\SysWOW64\avgsgui.exe"42⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1856 -
C:\Windows\SysWOW64\avgrdm.exe"C:\Windows\system32\avgrdm.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1396 -
C:\Windows\SysWOW64\avgrdm.exe"C:\Windows\SysWOW64\avgrdm.exe"44⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Windows\SysWOW64\avgmgnt.exe"C:\Windows\system32\avgmgnt.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1972 -
C:\Windows\SysWOW64\avgmgnt.exe"C:\Windows\SysWOW64\avgmgnt.exe"46⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1584 -
C:\Windows\SysWOW64\ashmls.exe"C:\Windows\system32\ashmls.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1120 -
C:\Windows\SysWOW64\ashmls.exe"C:\Windows\SysWOW64\ashmls.exe"48⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1176 -
C:\Windows\SysWOW64\avgwsvcn.exe"C:\Windows\system32\avgwsvcn.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:836 -
C:\Windows\SysWOW64\avgwsvcn.exe"C:\Windows\SysWOW64\avgwsvcn.exe"50⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:560 -
C:\Windows\SysWOW64\ashsdl.exe"C:\Windows\system32\ashsdl.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1292 -
C:\Windows\SysWOW64\ashsdl.exe"C:\Windows\SysWOW64\ashsdl.exe"52⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:240 -
C:\Windows\SysWOW64\avgmkdr.exe"C:\Windows\system32\avgmkdr.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1064 -
C:\Windows\SysWOW64\avgmkdr.exe"C:\Windows\SysWOW64\avgmkdr.exe"54⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1472 -
C:\Windows\SysWOW64\ashwbss.exe"C:\Windows\system32\ashwbss.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:920 -
C:\Windows\SysWOW64\ashwbss.exe"C:\Windows\SysWOW64\ashwbss.exe"56⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:860 -
C:\Windows\SysWOW64\avgwsvcn.exe"C:\Windows\system32\avgwsvcn.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1256 -
C:\Windows\SysWOW64\avgwsvcn.exe"C:\Windows\SysWOW64\avgwsvcn.exe"58⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1712 -
C:\Windows\SysWOW64\ashwbss.exe"C:\Windows\system32\ashwbss.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1640 -
C:\Windows\SysWOW64\ashwbss.exe"C:\Windows\SysWOW64\ashwbss.exe"60⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1588 -
C:\Windows\SysWOW64\avgusrv.exe"C:\Windows\system32\avgusrv.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:672 -
C:\Windows\SysWOW64\avgusrv.exe"C:\Windows\SysWOW64\avgusrv.exe"62⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1116 -
C:\Windows\SysWOW64\avgsgui.exe"C:\Windows\system32\avgsgui.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1736 -
C:\Windows\SysWOW64\avgsgui.exe"C:\Windows\SysWOW64\avgsgui.exe"64⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1396 -
C:\Windows\SysWOW64\avgusrv.exe"C:\Windows\system32\avgusrv.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1112 -
C:\Windows\SysWOW64\avgusrv.exe"C:\Windows\SysWOW64\avgusrv.exe"66⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Sets file execution options in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1708 -
C:\Windows\SysWOW64\avgmgnt.exe"C:\Windows\system32\avgmgnt.exe"67⤵
- Suspicious use of SetThreadContext
PID:764 -
C:\Windows\SysWOW64\avgmgnt.exe"C:\Windows\SysWOW64\avgmgnt.exe"68⤵
- Modifies visiblity of hidden/system files in Explorer
- Sets file execution options in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Windows\SysWOW64\avgsgui.exe"C:\Windows\system32\avgsgui.exe"69⤵
- Suspicious use of SetThreadContext
PID:1524 -
C:\Windows\SysWOW64\avgsgui.exe"C:\Windows\SysWOW64\avgsgui.exe"70⤵
- Modifies visiblity of hidden/system files in Explorer
- Sets file execution options in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\SysWOW64\avgusrv.exe"C:\Windows\system32\avgusrv.exe"71⤵
- Suspicious use of SetThreadContext
PID:1380 -
C:\Windows\SysWOW64\avgusrv.exe"C:\Windows\SysWOW64\avgusrv.exe"72⤵
- Modifies visiblity of hidden/system files in Explorer
- Sets file execution options in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Windows\SysWOW64\avgscnd.exe"C:\Windows\system32\avgscnd.exe"73⤵
- Suspicious use of SetThreadContext
PID:1556 -
C:\Windows\SysWOW64\avgscnd.exe"C:\Windows\SysWOW64\avgscnd.exe"74⤵
- Modifies visiblity of hidden/system files in Explorer
- Sets file execution options in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1812 -
C:\Windows\SysWOW64\avgwsvcn.exe"C:\Windows\system32\avgwsvcn.exe"75⤵
- Suspicious use of SetThreadContext
PID:1604 -
C:\Windows\SysWOW64\avgwsvcn.exe"C:\Windows\SysWOW64\avgwsvcn.exe"76⤵
- Modifies visiblity of hidden/system files in Explorer
- Sets file execution options in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1504 -
C:\Windows\SysWOW64\ashsdl.exe"C:\Windows\system32\ashsdl.exe"77⤵
- Suspicious use of SetThreadContext
PID:1924 -
C:\Windows\SysWOW64\ashsdl.exe"C:\Windows\SysWOW64\ashsdl.exe"78⤵
- Modifies visiblity of hidden/system files in Explorer
- Sets file execution options in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\SysWOW64\avgmkdr.exe"C:\Windows\system32\avgmkdr.exe"79⤵
- Suspicious use of SetThreadContext
PID:764 -
C:\Windows\SysWOW64\avgmkdr.exe"C:\Windows\SysWOW64\avgmkdr.exe"80⤵
- Modifies visiblity of hidden/system files in Explorer
- Sets file execution options in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Windows\SysWOW64\avgscnd.exe"C:\Windows\system32\avgscnd.exe"81⤵
- Suspicious use of SetThreadContext
PID:1412 -
C:\Windows\SysWOW64\avgscnd.exe"C:\Windows\SysWOW64\avgscnd.exe"82⤵
- Modifies visiblity of hidden/system files in Explorer
- Sets file execution options in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\SysWOW64\avgwsvcn.exe"C:\Windows\system32\avgwsvcn.exe"83⤵
- Suspicious use of SetThreadContext
PID:304 -
C:\Windows\SysWOW64\avgwsvcn.exe"C:\Windows\SysWOW64\avgwsvcn.exe"84⤵
- Modifies visiblity of hidden/system files in Explorer
- Sets file execution options in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1856 -
C:\Windows\SysWOW64\avgmkdr.exe"C:\Windows\system32\avgmkdr.exe"85⤵
- Suspicious use of SetThreadContext
PID:436 -
C:\Windows\SysWOW64\avgmkdr.exe"C:\Windows\SysWOW64\avgmkdr.exe"86⤵
- Modifies visiblity of hidden/system files in Explorer
- Sets file execution options in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1760 -
C:\Windows\SysWOW64\avgscnd.exe"C:\Windows\system32\avgscnd.exe"87⤵
- Suspicious use of SetThreadContext
PID:928 -
C:\Windows\SysWOW64\avgscnd.exe"C:\Windows\SysWOW64\avgscnd.exe"88⤵
- Modifies visiblity of hidden/system files in Explorer
- Sets file execution options in registry
- Suspicious use of AdjustPrivilegeToken
PID:940 -
C:\Windows\SysWOW64\ashwbss.exe"C:\Windows\system32\ashwbss.exe"89⤵
- Suspicious use of SetThreadContext
PID:1952 -
C:\Windows\SysWOW64\ashwbss.exe"C:\Windows\SysWOW64\ashwbss.exe"90⤵
- Modifies visiblity of hidden/system files in Explorer
- Sets file execution options in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1856 -
C:\Windows\SysWOW64\ashsva.exe"C:\Windows\system32\ashsva.exe"91⤵
- Suspicious use of SetThreadContext
PID:1612 -
C:\Windows\SysWOW64\ashsva.exe"C:\Windows\SysWOW64\ashsva.exe"92⤵
- Modifies visiblity of hidden/system files in Explorer
- Sets file execution options in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1760 -
C:\Windows\SysWOW64\ashmls.exe"C:\Windows\system32\ashmls.exe"93⤵
- Suspicious use of SetThreadContext
PID:1692 -
C:\Windows\SysWOW64\ashmls.exe"C:\Windows\SysWOW64\ashmls.exe"94⤵
- Modifies visiblity of hidden/system files in Explorer
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1680 -
C:\Windows\SysWOW64\avgectd.exe"C:\Windows\system32\avgectd.exe"95⤵PID:1524
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip95⤵PID:788
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com95⤵PID:1780
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr95⤵PID:1104
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\ashmls.exe > nul95⤵PID:1512
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip93⤵PID:1232
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com93⤵PID:1572
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\ashsva.exe > nul93⤵PID:1292
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr93⤵PID:968
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip91⤵PID:2000
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr91⤵PID:920
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com91⤵PID:1992
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\ashwbss.exe > nul91⤵PID:520
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip89⤵PID:1288
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr89⤵PID:1208
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com89⤵PID:2032
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgscnd.exe > nul89⤵PID:1556
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com87⤵PID:1772
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr87⤵PID:268
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip87⤵PID:548
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgmkdr.exe > nul87⤵PID:1052
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgwsvcn.exe > nul85⤵PID:1396
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr85⤵PID:832
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com85⤵PID:1480
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip85⤵PID:1988
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip83⤵PID:1868
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com83⤵PID:1368
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr83⤵PID:560
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgscnd.exe > nul83⤵PID:1952
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip81⤵PID:1456
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com81⤵PID:1648
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr81⤵PID:364
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgmkdr.exe > nul81⤵PID:1532
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr79⤵PID:1988
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com79⤵PID:1704
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip79⤵PID:1256
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\ashsdl.exe > nul79⤵PID:1660
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com77⤵PID:320
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr77⤵PID:1072
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip77⤵PID:836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgwsvcn.exe > nul77⤵PID:1680
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com75⤵PID:820
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr75⤵PID:1984
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip75⤵PID:2004
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgscnd.exe > nul75⤵PID:2000
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com73⤵PID:1600
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr73⤵PID:1048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgusrv.exe > nul73⤵PID:1704
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip73⤵PID:1572
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip71⤵PID:952
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr71⤵PID:520
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgsgui.exe > nul71⤵PID:1072
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com71⤵PID:612
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com69⤵PID:832
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr69⤵PID:1696
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip69⤵PID:1604
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgmgnt.exe > nul69⤵PID:1936
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip67⤵PID:1232
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr67⤵PID:1600
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com67⤵PID:2032
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgusrv.exe > nul67⤵PID:1368
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com65⤵PID:1668
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr65⤵PID:2028
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip65⤵PID:612
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgsgui.exe > nul65⤵PID:1072
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip63⤵PID:1748
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com63⤵PID:1796
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr63⤵PID:832
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgusrv.exe > nul63⤵PID:1936
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip61⤵PID:304
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr61⤵PID:320
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com61⤵PID:2024
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\ashwbss.exe > nul61⤵PID:1600
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip59⤵PID:2004
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr59⤵PID:2028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgwsvcn.exe > nul59⤵PID:288
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com59⤵PID:572
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip57⤵PID:1460
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\ashwbss.exe > nul57⤵PID:1812
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr57⤵PID:1660
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com57⤵PID:1408
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip55⤵PID:688
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com55⤵PID:1740
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr55⤵PID:1076
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgmkdr.exe > nul55⤵PID:320
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip53⤵PID:1860
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr53⤵PID:1056
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com53⤵PID:1540
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\ashsdl.exe > nul53⤵PID:572
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip51⤵PID:816
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com51⤵PID:1552
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr51⤵PID:1460
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgwsvcn.exe > nul51⤵PID:1080
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip49⤵PID:1772
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com49⤵PID:1764
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr49⤵PID:1512
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\ashmls.exe > nul49⤵PID:1076
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip47⤵PID:1476
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com47⤵PID:1048
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr47⤵PID:1860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgmgnt.exe > nul47⤵PID:2028
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip45⤵PID:764
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com45⤵PID:1756
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr45⤵PID:972
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgrdm.exe > nul45⤵PID:1460
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip43⤵PID:1464
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com43⤵PID:1472
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr43⤵PID:1772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgsgui.exe > nul43⤵PID:1072
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com41⤵PID:612
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\aswusr.exe > nul41⤵PID:1720
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr41⤵PID:1940
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip41⤵PID:1476
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip39⤵PID:2032
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com39⤵PID:268
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr39⤵PID:1588
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgrdm.exe > nul39⤵PID:1868
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com37⤵PID:2004
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr37⤵PID:1464
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip37⤵PID:1992
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\ashsdl.exe > nul37⤵PID:1076
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com35⤵PID:612
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr35⤵PID:1748
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip35⤵PID:2028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgrdm.exe > nul35⤵PID:1936
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\aswusr.exe > nul33⤵PID:1908
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr33⤵PID:1668
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com33⤵PID:1628
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip33⤵PID:1648
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr31⤵PID:1616
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgrdm.exe > nul31⤵PID:1988
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com31⤵PID:1072
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip31⤵PID:1772
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\aswusr.exe > nul27⤵PID:1588
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr27⤵PID:1908
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com27⤵PID:1116
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip27⤵PID:1668
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip17⤵PID:928
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\ashwbss.exe > nul17⤵PID:1476
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr17⤵PID:1744
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com17⤵PID:1952
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip15⤵PID:1996
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgectd.exe > nul15⤵PID:1980
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr15⤵PID:1988
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com15⤵PID:2008
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip13⤵PID:1948
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com13⤵PID:1936
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgwsvcn.exe > nul13⤵PID:1072
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr13⤵PID:1960
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip11⤵PID:320
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com11⤵PID:1480
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgsgui.exe > nul11⤵PID:928
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr11⤵PID:712
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip9⤵PID:1120
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com9⤵PID:1080
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avgwsvcn.exe > nul9⤵PID:2028
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr9⤵PID:2040
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip7⤵PID:788
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com7⤵PID:1584
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\avirarka.exe > nul7⤵PID:1948
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr7⤵PID:1708
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip5⤵PID:1992
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com5⤵PID:1984
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr5⤵PID:1972
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\ashsva.exe > nul5⤵PID:320
-
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip3⤵PID:1928
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com3⤵PID:1204
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.scr3⤵PID:1932
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BE2F35~1.EXE > nul3⤵
- Deletes itself
PID:1080
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1652886415-281546320-1302773217489668681-424659950-18991872461998824990636420549"1⤵PID:764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee
-
Filesize
73KB
MD52ebd05b5a1d018ee574d8d46df0fc7a6
SHA1a7108a9ff93a216ca7d94e70bd37be259cb58d45
SHA256be2f357f59aeb145829d1727ea7a0cd7d1f99e89486bfa5816a651294f65ce8a
SHA51280d69f16219beb09823588286fd3c0ab52e53f0af3630904d96576c78c0d0306de083249087e176198cab5e55f49ac05df04d0318cffc22eafded1a6ba493dee