Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2024 14:00
Static task
static1
Behavioral task
behavioral1
Sample
5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exe
Resource
win11-20240221-en
General
-
Target
5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exe
-
Size
1.8MB
-
MD5
1f66633ed92dee0b5c7f9ec0f4284c9b
-
SHA1
bb46eb42bcb8ae1da2f2e8ae1cf23ec7c2a183c8
-
SHA256
5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e
-
SHA512
ec180172afdd4257c3890e598ba32ac1977578f8830618176593e2f2a1fb19e6a19f8c99788c55858bb9cd506c3b48b1724efc87e14db792ab5bd916488397d8
-
SSDEEP
49152:GW/tTAtwTo1CkP2iXYnCckOEVEwfJkkJljKkyUsF4kDpE/:GWhAOsxYdJEVv8kyUtK
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
redline
LiveTraffic
4.185.137.132:1632
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
lumma
https://resergvearyinitiani.shop/api
https://associationokeo.shop/api
Signatures
-
Detect ZGRat V1 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe family_zgrat_v1 behavioral1/memory/3268-81-0x0000000000860000-0x00000000008DA000-memory.dmp family_zgrat_v1 C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe family_zgrat_v1 C:\Users\Admin\Pictures\KCPOZ9ACcNKhbaWsZ5n69Izr.exe family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1544-85-0x0000000000400000-0x0000000000450000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe family_redline behavioral1/memory/3748-426-0x0000000000890000-0x000000000091C000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1001025001\mk.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
Processes:
explorha.exea2854f4988.exerandom.exe5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exeexplorgu.exerandom.exeamadka.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a2854f4988.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amadka.exe -
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exeflow pid process 73 3208 rundll32.exe 88 5108 rundll32.exe 113 3580 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
random.exeamadka.exea2854f4988.exerandom.exe5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exeexplorgu.exeexplorha.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a2854f4988.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a2854f4988.exe -
Checks computer location settings 2 TTPs 7 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
chckik.exechrosha.exeboom8.exeexplorgu.exeamadka.exeexplorha.exeRegAsm.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation chckik.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation chrosha.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation boom8.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation explorgu.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation amadka.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation explorha.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Executes dropped EXE 23 IoCs
Processes:
explorgu.exeosminog.exegoldprimeldlldf.exerandom.exeamadka.exeTeamFour.exeexplorha.exealex1234.exea2854f4988.exeTraffic.exepropro.exe987123.exelumma21.exeyoffens_crypted_EASY.exelummalg.exechckik.exemk.exechrosha.exerandom.exelummalg.exeFullwork123.exefile300un.exeboom8.exepid process 2260 explorgu.exe 320 osminog.exe 3268 goldprimeldlldf.exe 3556 random.exe 2732 amadka.exe 1100 TeamFour.exe 1532 explorha.exe 4404 alex1234.exe 712 a2854f4988.exe 4592 Traffic.exe 2264 propro.exe 4932 987123.exe 3296 lumma21.exe 3748 yoffens_crypted_EASY.exe 4456 lummalg.exe 2280 chckik.exe 4596 mk.exe 1324 chrosha.exe 1580 random.exe 3732 lummalg.exe 1284 Fullwork123.exe 4280 file300un.exe 4592 boom8.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
random.exeamadka.exeexplorha.exea2854f4988.exerandom.exe5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exeexplorgu.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Wine amadka.exe Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Wine a2854f4988.exe Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Wine 5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exe Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Wine explorgu.exe -
Loads dropped DLL 7 IoCs
Processes:
rundll32.exerundll32.exerundll32.exeyoffens_crypted_EASY.exerundll32.exerundll32.exepid process 1988 rundll32.exe 3208 rundll32.exe 5108 rundll32.exe 3748 yoffens_crypted_EASY.exe 3748 yoffens_crypted_EASY.exe 1564 rundll32.exe 3580 rundll32.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\IWHmAsMhzUgMVF9GiufBzDKi.exe themida behavioral1/memory/3800-1156-0x00007FF778050000-0x00007FF778A30000-memory.dmp themida behavioral1/memory/3800-1158-0x00007FF778050000-0x00007FF778A30000-memory.dmp themida -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\u3do.1.exe upx C:\Users\Admin\Pictures\vpn0iNzZtAoWwKpBGUbGlW7d.exe upx C:\Users\Admin\Pictures\XnmaI7T2zVWozC4CjDS6whz8.exe upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
explorgu.exeexplorha.exechrosha.exefile300un.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\random.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000873001\\random.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\amadka.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000875001\\amadka.exe" explorgu.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a2854f4988.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000022001\\a2854f4988.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\random.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000053001\\random.exe" chrosha.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\.BLRVzdv\\svchost.exe\"" file300un.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 225 api.myip.com 226 api.myip.com 233 ipinfo.io 284 api.2ip.ua 285 api.2ip.ua 29 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exeexplorgu.exeamadka.exeexplorha.exepid process 3180 5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exe 2260 explorgu.exe 2732 amadka.exe 1532 explorha.exe -
Suspicious use of SetThreadContext 7 IoCs
Processes:
osminog.exegoldprimeldlldf.exealex1234.exelummalg.exelummalg.exeFullwork123.exefile300un.exedescription pid process target process PID 320 set thread context of 4456 320 osminog.exe RegAsm.exe PID 3268 set thread context of 1544 3268 goldprimeldlldf.exe RegAsm.exe PID 4404 set thread context of 4688 4404 alex1234.exe RegAsm.exe PID 4456 set thread context of 2300 4456 lummalg.exe RegAsm.exe PID 3732 set thread context of 2624 3732 lummalg.exe RegAsm.exe PID 1284 set thread context of 1440 1284 Fullwork123.exe RegAsm.exe PID 4280 set thread context of 3680 4280 file300un.exe msbuild.exe -
Drops file in Windows directory 4 IoCs
Processes:
amadka.exelumma21.exechckik.exe5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exedescription ioc process File created C:\Windows\Tasks\explorha.job amadka.exe File created C:\Windows\Tasks\chrosha.job lumma21.exe File created C:\Windows\Tasks\chrosha.job chckik.exe File created C:\Windows\Tasks\explorgu.job 5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3864 4456 WerFault.exe RegAsm.exe 680 3748 WerFault.exe yoffens_crypted_EASY.exe 748 2300 WerFault.exe RegAsm.exe 4516 2624 WerFault.exe RegAsm.exe 1444 1440 WerFault.exe RegAsm.exe 5400 5360 WerFault.exe RegAsm.exe 4888 5360 WerFault.exe RegAsm.exe 5544 5824 WerFault.exe RegAsm.exe 4508 4380 WerFault.exe ISetup8.exe 5628 5824 WerFault.exe RegAsm.exe 5400 1284 WerFault.exe jnvaj94DESBOuX3eSXt5EW42.exe 5616 5816 WerFault.exe rnSXM9nGx9djLZT5wna9dxPA.exe 7320 2584 WerFault.exe uzo.0.exe 7492 6916 WerFault.exe 1BFB.exe 7796 716 WerFault.exe u4hk.0.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
987123.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 987123.exe -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 7780 schtasks.exe 7332 schtasks.exe 6952 schtasks.exe 1088 schtasks.exe 2352 schtasks.exe 2368 schtasks.exe 7684 schtasks.exe -
Processes:
propro.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 propro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 propro.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exeexplorgu.exeRegAsm.exerundll32.exepowershell.exeamadka.exeexplorha.exe987123.exeTeamFour.exeTraffic.exepropro.exepid process 3180 5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exe 3180 5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exe 2260 explorgu.exe 2260 explorgu.exe 1544 RegAsm.exe 1544 RegAsm.exe 1544 RegAsm.exe 1544 RegAsm.exe 1544 RegAsm.exe 3208 rundll32.exe 3208 rundll32.exe 3208 rundll32.exe 3208 rundll32.exe 3208 rundll32.exe 3208 rundll32.exe 3208 rundll32.exe 3208 rundll32.exe 3208 rundll32.exe 3208 rundll32.exe 5080 powershell.exe 5080 powershell.exe 2732 amadka.exe 2732 amadka.exe 1532 explorha.exe 1532 explorha.exe 4932 987123.exe 4932 987123.exe 1100 TeamFour.exe 1100 TeamFour.exe 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 4592 Traffic.exe 4592 Traffic.exe 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 3508 2264 propro.exe 2264 propro.exe 3508 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
987123.exepid process 4932 987123.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
Processes:
osminog.exeRegAsm.exepowershell.exeTeamFour.exeTraffic.exepropro.exeRegAsm.exemsbuild.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 320 osminog.exe Token: SeDebugPrivilege 1544 RegAsm.exe Token: SeDebugPrivilege 5080 powershell.exe Token: SeDebugPrivilege 1100 TeamFour.exe Token: SeBackupPrivilege 1100 TeamFour.exe Token: SeSecurityPrivilege 1100 TeamFour.exe Token: SeSecurityPrivilege 1100 TeamFour.exe Token: SeSecurityPrivilege 1100 TeamFour.exe Token: SeSecurityPrivilege 1100 TeamFour.exe Token: SeDebugPrivilege 4592 Traffic.exe Token: SeBackupPrivilege 4592 Traffic.exe Token: SeSecurityPrivilege 4592 Traffic.exe Token: SeSecurityPrivilege 4592 Traffic.exe Token: SeSecurityPrivilege 4592 Traffic.exe Token: SeSecurityPrivilege 4592 Traffic.exe Token: SeDebugPrivilege 2264 propro.exe Token: SeShutdownPrivilege 3508 Token: SeCreatePagefilePrivilege 3508 Token: SeShutdownPrivilege 3508 Token: SeCreatePagefilePrivilege 3508 Token: SeShutdownPrivilege 3508 Token: SeCreatePagefilePrivilege 3508 Token: SeShutdownPrivilege 3508 Token: SeCreatePagefilePrivilege 3508 Token: SeShutdownPrivilege 3508 Token: SeCreatePagefilePrivilege 3508 Token: SeShutdownPrivilege 3508 Token: SeCreatePagefilePrivilege 3508 Token: SeShutdownPrivilege 3508 Token: SeCreatePagefilePrivilege 3508 Token: SeShutdownPrivilege 3508 Token: SeCreatePagefilePrivilege 3508 Token: SeShutdownPrivilege 3508 Token: SeCreatePagefilePrivilege 3508 Token: SeDebugPrivilege 4688 RegAsm.exe Token: SeDebugPrivilege 3680 msbuild.exe Token: SeDebugPrivilege 3412 powershell.exe Token: SeDebugPrivilege 5008 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
explorgu.exeosminog.exegoldprimeldlldf.exerundll32.exerundll32.exeamadka.exeexplorha.exealex1234.exeRegAsm.exedescription pid process target process PID 2260 wrote to memory of 320 2260 explorgu.exe osminog.exe PID 2260 wrote to memory of 320 2260 explorgu.exe osminog.exe PID 2260 wrote to memory of 320 2260 explorgu.exe osminog.exe PID 320 wrote to memory of 4456 320 osminog.exe RegAsm.exe PID 320 wrote to memory of 4456 320 osminog.exe RegAsm.exe PID 320 wrote to memory of 4456 320 osminog.exe RegAsm.exe PID 320 wrote to memory of 4456 320 osminog.exe RegAsm.exe PID 320 wrote to memory of 4456 320 osminog.exe RegAsm.exe PID 320 wrote to memory of 4456 320 osminog.exe RegAsm.exe PID 320 wrote to memory of 4456 320 osminog.exe RegAsm.exe PID 320 wrote to memory of 4456 320 osminog.exe RegAsm.exe PID 320 wrote to memory of 4456 320 osminog.exe RegAsm.exe PID 2260 wrote to memory of 3268 2260 explorgu.exe goldprimeldlldf.exe PID 2260 wrote to memory of 3268 2260 explorgu.exe goldprimeldlldf.exe PID 2260 wrote to memory of 3268 2260 explorgu.exe goldprimeldlldf.exe PID 3268 wrote to memory of 4636 3268 goldprimeldlldf.exe RegAsm.exe PID 3268 wrote to memory of 4636 3268 goldprimeldlldf.exe RegAsm.exe PID 3268 wrote to memory of 4636 3268 goldprimeldlldf.exe RegAsm.exe PID 3268 wrote to memory of 1544 3268 goldprimeldlldf.exe RegAsm.exe PID 3268 wrote to memory of 1544 3268 goldprimeldlldf.exe RegAsm.exe PID 3268 wrote to memory of 1544 3268 goldprimeldlldf.exe RegAsm.exe PID 3268 wrote to memory of 1544 3268 goldprimeldlldf.exe RegAsm.exe PID 3268 wrote to memory of 1544 3268 goldprimeldlldf.exe RegAsm.exe PID 3268 wrote to memory of 1544 3268 goldprimeldlldf.exe RegAsm.exe PID 3268 wrote to memory of 1544 3268 goldprimeldlldf.exe RegAsm.exe PID 3268 wrote to memory of 1544 3268 goldprimeldlldf.exe RegAsm.exe PID 2260 wrote to memory of 3556 2260 explorgu.exe random.exe PID 2260 wrote to memory of 3556 2260 explorgu.exe random.exe PID 2260 wrote to memory of 3556 2260 explorgu.exe random.exe PID 2260 wrote to memory of 1988 2260 explorgu.exe rundll32.exe PID 2260 wrote to memory of 1988 2260 explorgu.exe rundll32.exe PID 2260 wrote to memory of 1988 2260 explorgu.exe rundll32.exe PID 1988 wrote to memory of 3208 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 3208 1988 rundll32.exe rundll32.exe PID 3208 wrote to memory of 4688 3208 rundll32.exe netsh.exe PID 3208 wrote to memory of 4688 3208 rundll32.exe netsh.exe PID 3208 wrote to memory of 5080 3208 rundll32.exe powershell.exe PID 3208 wrote to memory of 5080 3208 rundll32.exe powershell.exe PID 2260 wrote to memory of 2732 2260 explorgu.exe amadka.exe PID 2260 wrote to memory of 2732 2260 explorgu.exe amadka.exe PID 2260 wrote to memory of 2732 2260 explorgu.exe amadka.exe PID 2260 wrote to memory of 1100 2260 explorgu.exe TeamFour.exe PID 2260 wrote to memory of 1100 2260 explorgu.exe TeamFour.exe PID 2732 wrote to memory of 1532 2732 amadka.exe explorha.exe PID 2732 wrote to memory of 1532 2732 amadka.exe explorha.exe PID 2732 wrote to memory of 1532 2732 amadka.exe explorha.exe PID 2260 wrote to memory of 4404 2260 explorgu.exe alex1234.exe PID 2260 wrote to memory of 4404 2260 explorgu.exe alex1234.exe PID 2260 wrote to memory of 4404 2260 explorgu.exe alex1234.exe PID 1532 wrote to memory of 712 1532 explorha.exe a2854f4988.exe PID 1532 wrote to memory of 712 1532 explorha.exe a2854f4988.exe PID 1532 wrote to memory of 712 1532 explorha.exe a2854f4988.exe PID 4404 wrote to memory of 4688 4404 alex1234.exe RegAsm.exe PID 4404 wrote to memory of 4688 4404 alex1234.exe RegAsm.exe PID 4404 wrote to memory of 4688 4404 alex1234.exe RegAsm.exe PID 4404 wrote to memory of 4688 4404 alex1234.exe RegAsm.exe PID 4404 wrote to memory of 4688 4404 alex1234.exe RegAsm.exe PID 4404 wrote to memory of 4688 4404 alex1234.exe RegAsm.exe PID 4404 wrote to memory of 4688 4404 alex1234.exe RegAsm.exe PID 4404 wrote to memory of 4688 4404 alex1234.exe RegAsm.exe PID 4688 wrote to memory of 4592 4688 RegAsm.exe Traffic.exe PID 4688 wrote to memory of 4592 4688 RegAsm.exe Traffic.exe PID 4688 wrote to memory of 2264 4688 RegAsm.exe propro.exe PID 4688 wrote to memory of 2264 4688 RegAsm.exe propro.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exe"C:\Users\Admin\AppData\Local\Temp\5e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"C:\Users\Admin\AppData\Local\Temp\1000836001\osminog.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 12484⤵
- Program crash
PID:3864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"C:\Users\Admin\AppData\Local\Temp\1000837001\goldprimeldlldf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4636
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:3556
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:4688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\497073144238_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"C:\Users\Admin\AppData\Local\Temp\1000875001\amadka.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\1000022001\a2854f4988.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\a2854f4988.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:712
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"4⤵PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe"C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3296
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Loads dropped DLL
PID:1564 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:3580 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵PID:2220
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\497073144238_Desktop.zip' -CompressionLevel Optimal6⤵
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵PID:6044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"C:\Users\Admin\AppData\Local\Temp\1000979001\TeamFour.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:3760
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:1936
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"C:\Users\Admin\AppData\Local\Temp\1000986001\987123.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4932
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"C:\Users\Admin\AppData\Local\Temp\1001001001\yoffens_crypted_EASY.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 7843⤵
- Program crash
PID:680
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe"C:\Users\Admin\AppData\Local\Temp\1001008001\lummalg.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4456 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:2300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 12204⤵
- Program crash
PID:748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe"2⤵PID:3492
-
-
C:\Users\Admin\AppData\Local\Temp\1001022001\chckik.exe"C:\Users\Admin\AppData\Local\Temp\1001022001\chckik.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe"C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\1000053001\random.exe"C:\Users\Admin\AppData\Local\Temp\1000053001\random.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\1000063001\lummalg.exe"C:\Users\Admin\AppData\Local\Temp\1000063001\lummalg.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3732 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:2688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:2624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 12366⤵
- Program crash
PID:4516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000074001\Fullwork123.exe"C:\Users\Admin\AppData\Local\Temp\1000074001\Fullwork123.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1284 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:1440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 12286⤵
- Program crash
PID:1444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe"C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4592 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN boom8.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe" /F5⤵
- Creates scheduled task(s)
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\1000172001\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000172001\ISetup8.exe"5⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\u3do.0.exe"C:\Users\Admin\AppData\Local\Temp\u3do.0.exe"6⤵PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\u3do.1.exe"C:\Users\Admin\AppData\Local\Temp\u3do.1.exe"6⤵PID:5968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "7⤵PID:6980
-
C:\Windows\SysWOW64\chcp.comchcp 12518⤵PID:7440
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F8⤵
- Creates scheduled task(s)
PID:7332
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 7886⤵
- Program crash
PID:4508
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000173001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000173001\toolspub1.exe"5⤵PID:5224
-
-
C:\Users\Admin\AppData\Local\Temp\1000174001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000174001\4767d2e713f2021e8fe856e3ea638b58.exe"5⤵PID:5552
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000084001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000084001\file300un.exe"4⤵PID:2248
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile5⤵PID:3472
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"5⤵PID:2740
-
C:\Users\Admin\Pictures\HFEIUCITpAnwWqjGbucItrgt.exe"C:\Users\Admin\Pictures\HFEIUCITpAnwWqjGbucItrgt.exe"6⤵PID:5664
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:5580
-
-
C:\Users\Admin\Pictures\HFEIUCITpAnwWqjGbucItrgt.exe"C:\Users\Admin\Pictures\HFEIUCITpAnwWqjGbucItrgt.exe"7⤵PID:8188
-
-
-
C:\Users\Admin\Pictures\9O6knpoeYTHNlyl7seh9WR71.exe"C:\Users\Admin\Pictures\9O6knpoeYTHNlyl7seh9WR71.exe"6⤵PID:5744
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:5172
-
-
C:\Users\Admin\Pictures\9O6knpoeYTHNlyl7seh9WR71.exe"C:\Users\Admin\Pictures\9O6knpoeYTHNlyl7seh9WR71.exe"7⤵PID:8168
-
-
-
C:\Users\Admin\Pictures\rnSXM9nGx9djLZT5wna9dxPA.exe"C:\Users\Admin\Pictures\rnSXM9nGx9djLZT5wna9dxPA.exe"6⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\u4hk.0.exe"C:\Users\Admin\AppData\Local\Temp\u4hk.0.exe"7⤵PID:716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 716 -s 12328⤵
- Program crash
PID:7796
-
-
-
C:\Users\Admin\AppData\Local\Temp\u4hk.1.exe"C:\Users\Admin\AppData\Local\Temp\u4hk.1.exe"7⤵PID:5432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "8⤵PID:3780
-
C:\Windows\SysWOW64\chcp.comchcp 12519⤵PID:7516
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F9⤵
- Creates scheduled task(s)
PID:1088
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5816 -s 11567⤵
- Program crash
PID:5616
-
-
-
C:\Users\Admin\Pictures\IJhfkjwWYHvVauHC5q2KW7mI.exe"C:\Users\Admin\Pictures\IJhfkjwWYHvVauHC5q2KW7mI.exe"6⤵PID:5952
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:5720
-
-
-
C:\Users\Admin\Pictures\XDoNxFk4iijTEQZzUfx5bXeE.exe"C:\Users\Admin\Pictures\XDoNxFk4iijTEQZzUfx5bXeE.exe"6⤵PID:6128
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:5824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5824 -s 5848⤵
- Program crash
PID:5544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5824 -s 5928⤵
- Program crash
PID:5628
-
-
-
-
C:\Users\Admin\Pictures\IWHmAsMhzUgMVF9GiufBzDKi.exe"C:\Users\Admin\Pictures\IWHmAsMhzUgMVF9GiufBzDKi.exe"6⤵PID:3800
-
-
C:\Users\Admin\Pictures\vpn0iNzZtAoWwKpBGUbGlW7d.exe"C:\Users\Admin\Pictures\vpn0iNzZtAoWwKpBGUbGlW7d.exe" --silent --allusers=06⤵PID:1076
-
C:\Users\Admin\Pictures\vpn0iNzZtAoWwKpBGUbGlW7d.exeC:\Users\Admin\Pictures\vpn0iNzZtAoWwKpBGUbGlW7d.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x2e0,0x2e4,0x2e8,0x2bc,0x2f4,0x6bf921f8,0x6bf92204,0x6bf922107⤵PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\vpn0iNzZtAoWwKpBGUbGlW7d.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\vpn0iNzZtAoWwKpBGUbGlW7d.exe" --version7⤵PID:3136
-
-
C:\Users\Admin\Pictures\vpn0iNzZtAoWwKpBGUbGlW7d.exe"C:\Users\Admin\Pictures\vpn0iNzZtAoWwKpBGUbGlW7d.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=1076 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240324140151" --session-guid=fca8cabb-74a4-4214-ac67-77deaf5682da --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=68050000000000007⤵PID:5512
-
C:\Users\Admin\Pictures\vpn0iNzZtAoWwKpBGUbGlW7d.exeC:\Users\Admin\Pictures\vpn0iNzZtAoWwKpBGUbGlW7d.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x2ec,0x2f0,0x2f4,0x24c,0x2f8,0x6a7d21f8,0x6a7d2204,0x6a7d22108⤵PID:5496
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241401511\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241401511\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"7⤵PID:7664
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241401511\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241401511\assistant\assistant_installer.exe" --version7⤵PID:7672
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241401511\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241401511\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x1e0040,0x1e004c,0x1e00588⤵PID:7592
-
-
-
-
C:\Users\Admin\Pictures\xcX5cGNoeVSIjxUghlbYkFTj.exe"C:\Users\Admin\Pictures\xcX5cGNoeVSIjxUghlbYkFTj.exe"6⤵PID:6412
-
C:\Users\Admin\AppData\Local\Temp\7zS191C.tmp\Install.exe.\Install.exe7⤵PID:7028
-
C:\Users\Admin\AppData\Local\Temp\7zS3677.tmp\Install.exe.\Install.exe /qLdidTzrOg "385118" /S8⤵PID:6556
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"9⤵PID:6596
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&10⤵PID:7552
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:3211⤵PID:7888
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:6411⤵PID:8180
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"9⤵PID:2120
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&10⤵PID:7720
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:3211⤵PID:8068
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:6411⤵PID:7276
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gBBKlbIWn" /SC once /ST 09:39:43 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="9⤵
- Creates scheduled task(s)
PID:7684
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gBBKlbIWn"9⤵PID:7932
-
-
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main4⤵PID:6040
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main5⤵PID:6048
-
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵PID:5700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\497073144238_Desktop.zip' -CompressionLevel Optimal6⤵PID:6684
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main4⤵PID:5944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001025001\mk.exe"C:\Users\Admin\AppData\Local\Temp\1001025001\mk.exe"2⤵
- Executes dropped EXE
PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\1001029001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1001029001\file300un.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:4280 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
C:\Windows\system32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"' & exit3⤵PID:4420
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"'4⤵
- Creates scheduled task(s)
PID:2352
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3680 -
C:\Users\Admin\Pictures\jnvaj94DESBOuX3eSXt5EW42.exe"C:\Users\Admin\Pictures\jnvaj94DESBOuX3eSXt5EW42.exe"4⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\uzo.0.exe"C:\Users\Admin\AppData\Local\Temp\uzo.0.exe"5⤵PID:2584
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\AFCBAEBAEB.exe"6⤵PID:5256
-
C:\Users\Admin\AppData\Local\Temp\AFCBAEBAEB.exe"C:\Users\Admin\AppData\Local\Temp\AFCBAEBAEB.exe"7⤵PID:7856
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\AFCBAEBAEB.exe8⤵PID:8076
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30009⤵
- Runs ping.exe
PID:2616
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 26166⤵
- Program crash
PID:7320
-
-
-
C:\Users\Admin\AppData\Local\Temp\uzo.1.exe"C:\Users\Admin\AppData\Local\Temp\uzo.1.exe"5⤵PID:5504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "6⤵PID:6568
-
C:\Windows\SysWOW64\chcp.comchcp 12517⤵PID:7524
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F7⤵
- Creates scheduled task(s)
PID:6952
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 14125⤵
- Program crash
PID:5400
-
-
-
C:\Users\Admin\Pictures\zVVEMVaQoWGIvSFyUgX2NeKe.exe"C:\Users\Admin\Pictures\zVVEMVaQoWGIvSFyUgX2NeKe.exe"4⤵PID:3696
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5492
-
-
C:\Users\Admin\Pictures\zVVEMVaQoWGIvSFyUgX2NeKe.exe"C:\Users\Admin\Pictures\zVVEMVaQoWGIvSFyUgX2NeKe.exe"5⤵PID:7880
-
-
-
C:\Users\Admin\Pictures\g8abFSeXtBgt4lg8TZ4mR0L8.exe"C:\Users\Admin\Pictures\g8abFSeXtBgt4lg8TZ4mR0L8.exe"4⤵PID:828
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5948
-
-
C:\Users\Admin\Pictures\g8abFSeXtBgt4lg8TZ4mR0L8.exe"C:\Users\Admin\Pictures\g8abFSeXtBgt4lg8TZ4mR0L8.exe"5⤵PID:7628
-
-
-
C:\Users\Admin\Pictures\KCPOZ9ACcNKhbaWsZ5n69Izr.exe"C:\Users\Admin\Pictures\KCPOZ9ACcNKhbaWsZ5n69Izr.exe"4⤵PID:3136
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:5348
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:5360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5360 -s 6246⤵
- Program crash
PID:5400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5360 -s 6166⤵
- Program crash
PID:4888
-
-
-
-
C:\Users\Admin\Pictures\o0eleANn1rIIf5GLa5z6aQgT.exe"C:\Users\Admin\Pictures\o0eleANn1rIIf5GLa5z6aQgT.exe"4⤵PID:5340
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:6712
-
-
-
C:\Users\Admin\Pictures\XnmaI7T2zVWozC4CjDS6whz8.exe"C:\Users\Admin\Pictures\XnmaI7T2zVWozC4CjDS6whz8.exe" --silent --allusers=04⤵PID:5908
-
C:\Users\Admin\Pictures\XnmaI7T2zVWozC4CjDS6whz8.exeC:\Users\Admin\Pictures\XnmaI7T2zVWozC4CjDS6whz8.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x2e0,0x2e4,0x2e8,0x2bc,0x2ec,0x6b1521f8,0x6b152204,0x6b1522105⤵PID:5236
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\XnmaI7T2zVWozC4CjDS6whz8.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\XnmaI7T2zVWozC4CjDS6whz8.exe" --version5⤵PID:5912
-
-
-
C:\Users\Admin\Pictures\y6EGXx8wLUakJVyVOSCBmzzx.exe"C:\Users\Admin\Pictures\y6EGXx8wLUakJVyVOSCBmzzx.exe"4⤵PID:6972
-
C:\Users\Admin\AppData\Local\Temp\7zSBBE.tmp\Install.exe.\Install.exe5⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\7zS2B3C.tmp\Install.exe.\Install.exe /qLdidTzrOg "385118" /S6⤵PID:6220
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"7⤵PID:2128
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&8⤵PID:7216
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:329⤵PID:7276
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:649⤵PID:7400
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"7⤵PID:5616
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&8⤵PID:7708
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:329⤵PID:8060
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:649⤵PID:7296
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gvwRdyMPQ" /SC once /ST 13:23:08 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="7⤵
- Creates scheduled task(s)
PID:7780
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gvwRdyMPQ"7⤵PID:8148
-
-
-
-
-
C:\Users\Admin\Pictures\zBWhmnKO2PGxQltF2pIwPCqU.exe"C:\Users\Admin\Pictures\zBWhmnKO2PGxQltF2pIwPCqU.exe"4⤵PID:7140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1001030001\boom8.exe"C:\Users\Admin\AppData\Local\Temp\1001030001\boom8.exe"2⤵PID:620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4456 -ip 44561⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3748 -ip 37481⤵PID:3520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2300 -ip 23001⤵PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2624 -ip 26241⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1440 -ip 14401⤵PID:3568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2624 -ip 26241⤵PID:5592
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"1⤵PID:5328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5360 -ip 53601⤵PID:5384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5360 -ip 53601⤵PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5824 -ip 58241⤵PID:5628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4380 -ip 43801⤵PID:5464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:5232
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:6024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5824 -ip 58241⤵PID:5332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1284 -ip 12841⤵PID:1020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 5816 -ip 58161⤵PID:5616
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\E673.dll1⤵PID:6664
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\E673.dll2⤵PID:6752
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵PID:6400
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵PID:6220
-
C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exeC:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe1⤵PID:6596
-
C:\Users\Admin\AppData\Local\Temp\1BFB.exeC:\Users\Admin\AppData\Local\Temp\1BFB.exe1⤵PID:6916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6916 -s 11082⤵
- Program crash
PID:7492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2080.bat" "1⤵PID:6500
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\2871.exeC:\Users\Admin\AppData\Local\Temp\2871.exe1⤵PID:5616
-
C:\Users\Admin\AppData\Local\Temp\310D.exeC:\Users\Admin\AppData\Local\Temp\310D.exe1⤵PID:6012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2584 -ip 25841⤵PID:7004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 6916 -ip 69161⤵PID:7364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 716 -ip 7161⤵PID:7736
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:7160
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\7867.exeC:\Users\Admin\AppData\Local\Temp\7867.exe1⤵PID:7364
-
C:\Users\Admin\AppData\Local\Temp\7867.exeC:\Users\Admin\AppData\Local\Temp\7867.exe2⤵PID:7288
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\8ca4b934-3953-4961-9470-9262ac24881f" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:7616
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
3KB
MD58358e35f7233f23485f5bebfdd94ac45
SHA1b055602516d07926b0bd13860887294482e2b24d
SHA256e43a3c5a6279c3fe669b46fe4acd681c5f4c58afb06efe6a8aefffc9bc1ccf42
SHA512984ff47aa9c00c4d13d53772f3c92c8b64e26fc2b8af5aca9df443eecf68dc238f29ad01d177c88458f8f2f5409522e59186d8205f4b8bec6926fcfec7f7f55d
-
Filesize
2KB
MD5f57bf6e78035d7f9150292a466c1a82d
SHA158cce014a5e6a6c6d08f77b1de4ce48e31bc4331
SHA25625a36c129865722052d07b37daa985a3e4b64def94120b6343fb5a96d9026415
SHA512fa240d2d26370589457780269bae17a883538f535e6e462cc1f969306522526faacd314d29e78f71902b799046e4395c86c34007d2cfee5090e01cd72150675f
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
2.9MB
MD58721caa3edad38a96ec28bba5c4f3679
SHA18709515b7d582cd06ef9e11b990f645dfa9e6e90
SHA25612a7d0f8e0e5b24f40a9697e09bb15c470aa1ada6b19f7f361abcc87fc9fb89e
SHA512fb9fb1184fb92bc0c7453c11acb6ca0d86032542f080c48d31213c8678f3e1ba8b2b30849e78b7aee6b74255c92af4376a1d220d18c7e7eb15cb18a2481b5759
-
Filesize
53KB
MD5124edf3ad57549a6e475f3bc4e6cfe51
SHA180f5187eeebb4a304e9caa0ce66fcd78c113d634
SHA256638c51e173ca6b3469494a7e2e0b656021a761f77b4a83f3e430e82e7b9af675
SHA512b6c1a9051feeffad54ba1092fd799d34a9578368d7e66b31780fe478c1def0eb4094dce2879003f7389f2f9d86b94a3ef3975e78092a604597841c9b8db120ee
-
Filesize
1KB
MD553da5d19ee995153a0fc669de023d1d2
SHA105c480e67f6eccfda1fe10f59ea2d2ff004c3e88
SHA2561170a04e8a9c1977c01be51389e412c075c4569bb13c0a76f37c402717a3156e
SHA512ad79c6de04ea0ea9bb8a19344bf13e6fd778c7a37090b5104676fa57fe37bc18b5a076999b791d6fedfbcba46a6fe509d3a934b4d9bb82e1ce2b6b16a2f56ff5
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241401511\additional_file0.tmp
Filesize2.5MB
MD520d293b9bf23403179ca48086ba88867
SHA1dedf311108f607a387d486d812514a2defbd1b9e
SHA256fd996b95ae46014edfd630bfc2bf8bc9e626adf883a1da017a8c3973b68ec348
SHA5125d575c6f0d914583f9bb54f7b884caf9182f26f850da9bdd962f4ed5ed7258316a46fafaf3828dccb6916baaadb681fe1d175a3f4ed59f56066dc7e32b66f7b6
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241401511\opera_package
Filesize2.6MB
MD5312e623b14cb76db74b63d5872713ae7
SHA122a7882f13b49a98d9979d12b88c344b1e8e71d7
SHA256fb529bf1171ceb708749f1eeab64e7edd706ff942e09919f15a3ad959b89d89b
SHA512fc8e6286ebeb787daa3cbc68f9ceaabd2759f6f2ea307e189ad0e0af5b8cca37786b786b9c453fad43c316f9eb1c705d3cf0db9f282068c66e91991e2e1f536c
-
Filesize
1.8MB
MD51f66633ed92dee0b5c7f9ec0f4284c9b
SHA1bb46eb42bcb8ae1da2f2e8ae1cf23ec7c2a183c8
SHA2565e26e3e65d976e56ebcc2bb3085dc4be94590dcde29bd866daeb19553ddf2b7e
SHA512ec180172afdd4257c3890e598ba32ac1977578f8830618176593e2f2a1fb19e6a19f8c99788c55858bb9cd506c3b48b1724efc87e14db792ab5bd916488397d8
-
Filesize
413KB
MD5d467222c3bd563cb72fa49302f80b079
SHA19335e2a36abb8309d8a2075faf78d66b968b2a91
SHA256fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e
SHA512484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7
-
Filesize
354KB
MD5f72f6b9036a9273958dc09effeb0a10a
SHA188c6d3521a345c8fd688a7a35c25299cdf96c5cd
SHA2565846798583be774901279b9bca21a8ef095d0f12e459a7a83535b5b0339046bc
SHA512b5b72ff06efe22888ab2f8715b899477e73335fd04ae42a37a1e6da794a4e0b3d7ac6ad7f24e7dddaca91bc96484776bb1c49d5385096523e2cb380bed83f314
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
293KB
MD55cd2922e6e7d2aeaea1ee725ae9b562e
SHA1ea276e30f56d7bfff98c1f5480b0b565db42fa48
SHA256b8fd930c7165a1a03b79bbc5c8bac3596a74271ea38b9bc5293d549852340cd2
SHA512a3eb78aab3a0961d8a88e7a76eebfa678fb7858843ee12aac247c71f9c78f041f574fa9647b08f7aa96c3d212e45d765d0359fa6e98820a41c5bbf9ef99ce085
-
Filesize
534KB
MD5a3f8b60a08da0f600cfce3bb600d5cb3
SHA1b00d7721767b717b3337b5c6dade4ebf2d56345e
SHA2560c608a9b1e70bf8b51a681a8390c8e4743501c45b84cf4d59727aba2fc33cadb
SHA51214f63e415133ca438d3c217d5fb3ecf0ad76e19969c54d356f46282230230f1b254fbfc8ae5f78809dc189a9648be2dc1398927b3f089c525cd1105a3843f60d
-
Filesize
464KB
MD5c084d6f6ba40534fbfc5a64b21ef99ab
SHA10b4a17da83c0a8abbc8fab321931d5447b32b720
SHA256afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624
SHA512a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1
-
Filesize
2.1MB
MD5206a0da5152fb08425572828dfd5ec29
SHA161f12766cd4c3fb73e9160d7767f2e3f223b65f2
SHA256d387a09663b0e1d2616abaff9be209b9c5331f8839a411ec00bfdb11a7d6c1c8
SHA512751140ebe6fb104dbedf87540079bc7b9e3e73dd151c8b1d34365da9183236710472bc97b9d0d0c290351d3c4d838d5e2266d5b59c17e963e2807f211f841d3e
-
Filesize
769KB
MD5b247cac6acbb2268fa7650dcf857a389
SHA15d39b4ff0c0ae4e2de93d5cc8c9c4d2fdb8c0fc1
SHA25656aec3aaf3d366808d6bd3cb1a411228aa7195d0cd9cad57c7905aa970fb34c1
SHA512dec68bb1ff5f921984869e08287e0f39a0a343686552cdb17ce7fd65d83c5921f03daa0302fdde0a1c80a2e90d8abe02d0af1cda53adbc33f7fed5f9ddc3046a
-
Filesize
742KB
MD5780943e8674463c282aa6bf9e835d907
SHA189f6d29110c77a082bc4a04f7ae34f6bb51fd937
SHA256472409fa924013317b2705a3fbaa8d98f9d1d4f770079ec8796c7399973ab480
SHA512d6b1e591fb2e38ecb0195b799f8edc5900c7155cac9641b374b2ccf82e7e075c24c62ada51e3392277771b6a880172a24d9ba0c8900c9d559c6a1aff29f2775b
-
Filesize
1.9MB
MD5c18f00378d10a56545d1437298476767
SHA13c4b655117b7b30f0caac60fd829c557d5180df4
SHA256e862ce0eff2f518bad02649ddc91d88f2c60196604b1f3c23456d5d58019ddb2
SHA512061a31ad8f7b2efda09e30bfe1ec2bf29d1e3e0bf87c31a4bff6da22cbb38138a89e7fbda2860ca0a32b5c249e45d662db68ae42a358f78d95434f177f2ea17d
-
Filesize
541KB
MD53b069f3dd741e4360f26cb27cb10320a
SHA16a9503aaf1e297f2696482ddf1bd4605a8710101
SHA256f63bdc068c453e7e22740681a0c280d02745807b1695ce86e5067069beca533e
SHA512bda58c074f7bd5171d7e3188a48cbdc457607ff06045e64a9e8e33fcb6f66f941d75a7bf57eb0ef262491622b4a9936342384237fa61c1add3365d5006c6d0d9
-
Filesize
1.7MB
MD585a15f080b09acace350ab30460c8996
SHA13fc515e60e4cfa5b3321f04a96c7fb463e4b9d02
SHA2563a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b
SHA512ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f
-
Filesize
315KB
MD55fe67781ffe47ec36f91991abf707432
SHA1137e6d50387a837bf929b0da70ab6b1512e95466
SHA256a8f1ae296787ddc24e0e7a241d0bc5829631c98a5eb186a8cfd5795c6d287db9
SHA5120e32d9a72b562d4c4a8c4edbd3d0ece54b67ee87c8ac382c6508c62b04b11a2dcd1fba23c3a78004fcd0c2b623dc854fd2fd82eb372dc7becdcbdd7ec7fe1b68
-
Filesize
832KB
MD5e3c0b0533534c6517afc94790d7b760c
SHA14de96db92debb740d007422089bed0bcddf0e974
SHA256198edf9613054f8a569ac804bf23081fbfa8566270fff05bba9dc3c9a32d9952
SHA512d12631796afca877c710b9308d1236fca1bfe3abe6582445d9df1bbb404160cff220316e3f600b3a87b46dd3bfb859734008b5c668e410466e82be9dc033249e
-
Filesize
350KB
MD504df085b57814d1a1accead4e153909e
SHA16d277da314ef185ba9072a9b677b599b1f46c35b
SHA25691a36d137ebfa812b055728807e11338d15d3a5d869cb4babdf779266688e4dd
SHA512f37678424e46e4f28e1047161db60ad737515558c8c8905ed598ca96b198304da7356e49e7bb9d1e77fe75372f0b5a7f670a353d093749c37bb85c40ec7fdafa
-
Filesize
297KB
MD5cc1e287519f78a28dab6bde8e1093829
SHA19262753386caa4054aa845d918364e964e5505aa
SHA256dbcb61ce94c4d2d216de2b503937a2a964b984577f2d7730b7c6428b2b5e8db2
SHA512527b6d905e2ca829369563baa7be9eaf4050ef9bbf438ccc98b9b821e76977aaebbda8471da8b81c0542395c5fc316b19d7034155f278640d0765bfc55dc1f43
-
Filesize
4.1MB
MD5c59b5442a81703579cded755bddcc63e
SHA1c3e36a8ed0952db30676d5cf77b3671238c19272
SHA256cac7fc4ae9c97eba7455992b2d41449ee257ec485c562bfc7245a90033b1d774
SHA512c9c834860982652e7ec1db085e534f6b1c35298ce75b29c2cbb0ac04ff40cd64363b458bcbd8c0983cf1ed778a4269372c6bc4ce7f831a6e1e70ee5f4a0772f9
-
Filesize
896KB
MD5d0ae6f84f940271293092d94b59a7e0a
SHA1ca683d5d312cf3170c178b0802c17336bb9443bd
SHA256694f65c9e281aa6cfc64a6d01ca534981752d2ff47422a46b757fade1a5c3647
SHA512b409c627c9d557967c6208c7d0972fa313b3e7db50aaf7eff29fae1c208229683b25e76f2310b310eb4dc0ad74ec5082993186ae26942fc5a07e265efbb629d9
-
Filesize
4.6MB
MD54bef2086f25c5813396d07b5fdce31ec
SHA189f3a0f7b5143abd610795bc2981ca5bbbc40071
SHA2565a63f85ed97a4f41aa7e13228c35eef1ad60984f54ed2f843191c21fe7c45a98
SHA51285dffa48f112024e9c644420f74c7bfff0e88b3c0e4b642f52927c5a5e46890acf8755d4f78d42badaf8512bdae2526bd9d79e61d71f99f5079fe50304ddf7a2
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.7MB
MD5eee5ddcffbed16222cac0a1b4e2e466e
SHA128b40c88b8ea50b0782e2bcbb4cc0f411035f3d5
SHA2562a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54
SHA5128f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc
-
Filesize
292KB
MD50d741321055d687fd67a4c638cfc579d
SHA1e620a53802fc888c34eff90aa9783e064e6bfa8d
SHA2560d7500dfaaac5fd44f989dcb0e6f337451baa2c39e47457493ab0990ae654e4b
SHA512f2b902c980b4e61ed254e1f6561311aaf625d5279eb894c5d3507cb231f0b596ccf44b8d9caf3c3439057cc96df45704fa5aafe5ff6142b2f473ca47d34220c9
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
Filesize
40B
MD5b2b344a25a3e51e343a5a00b313bc161
SHA16cb56e1d9a4f5a30573f008fec3dd1e7be31f81b
SHA2567b97e3e062703392db3b54a63755a7d84062b5c69323b002a8892c29909672bb
SHA512f9b8934695e2584150f04f8724c6b9db2c1943084d47531afb3edca656ce5856379f2ac36f1e5c7fd9ab250765dbe694db46446ddac447b839afff4c84031b20
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
Filesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705
-
Filesize
541KB
MD51fc4b9014855e9238a361046cfbf6d66
SHA1c17f18c8246026c9979ab595392a14fe65cc5e9f
SHA256f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50
SHA5122af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12
-
Filesize
304KB
MD5cc90e3326d7b20a33f8037b9aab238e4
SHA1236d173a6ac462d85de4e866439634db3b9eeba3
SHA256bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7
SHA512b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521
-
Filesize
3.7MB
MD5fc0a7582b4673a01fe7580555fc631cb
SHA12f30727af1dae9c93b98ba6908f8919a92c8a498
SHA2560cc6d0d3b0dd7f4dd6e94cc072638f2a7ae133a12987a6984ea5d229694f7f74
SHA512def5e71ed6e49b6ea60cdbdc373b9855f420deece8a8c98eb7cb9a27d5b28551d55efd3b1b44b289fdf6c486fe542eff968f31f7684319cab4f7a471abb362d8
-
Filesize
522KB
MD5b8616322186dcdf78032a74cf3497153
SHA1bf1c1568d65422757cc88300df76a6740db6eab5
SHA25643dda2be3813b81729b3d388f546838a36ee3471da5ed266fe958e2316f1f6ea
SHA5127b1e4ad944960fc2aa661426f77e64ff151cd8d5860e584874da1c4f03c6d195d4ee9031c36c24a234a851176b003254d14f9334712e07babc6934cf19a7b2fb
-
Filesize
2.8MB
MD552884c40f6ead762eb838f8bb550f82a
SHA1ec7e246403d9b39e47bb7678178fd86b02c69bd7
SHA256f725cd29dd4e27b830167f8df449edd8751a9152ef5fb9fb76ad1281eb23e0d7
SHA5125905be441c5a91f81c116ba0e921d6438b494130d3ea187a3c3bbb94da7fab2284ada9df34acf3163d3b5f6266d4ff4a518e32cad1eb1aedfffb7e1f262e4a2e
-
Filesize
3KB
MD5fad00b4d0aa189fc186fbc64347e757d
SHA17b4e8692023d198f13c7d73e57303ad7d2b7b9a8
SHA2566d9f84c5deecb31f2cb5f04a0fa7341d3adb9a39284cc16ab2a33f7a2ba5fba5
SHA5120a98c8f0d65ea4dace758c6cfeeda6ce74647866f60a1058ac8c965a1594a570f038f0a09323b2d5f6941d8525244551a60bf5c4215b326025bcea19f44a74bb
-
Filesize
437KB
MD5964a59e06bbf943e6a54214d22340dfb
SHA16af7592a06924591056cee99d2a34a65de09be5b
SHA2566d4bb679251b57cfe061863dca639ec8c687f80cada1b412ab997631d661a003
SHA512c85ce21a179a30d04a0a4f98cf3456eea4fa8f92962d50abced4a25274784072c4fd8b07858bb82eaa6fb9b4750e28940f4e4732b40aaa8d64c0eba21b013004
-
Filesize
3KB
MD577f624e89e01f237fd6dbebe7246c863
SHA15c44361002d62104d69c186727d0e21388f2d605
SHA25651b1d6fbb9de10af8c56c5fe50763c6b98f73c0a52448342d3c59788b8bb87c3
SHA512166c5b60559f5f6c89be250002284e0df22d462178982b1b6e9e8e760eef1d85b8f6ddbb3197500a7c7a92f77fccaf70a6328883408005f5ef794f0afb2ec8dd
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
2.8MB
MD5fe32b5956ad91dbad16cc5028d76b95f
SHA1aac8f67508cb8507423da7bd951c03901f7ca6f7
SHA2569d8c9ba0f588506afe4fc2bd279678b74f8d9527fecbf8b801603e5fb249c090
SHA51211fd3cd41f0841b08a58a56089fb783ca21bed8a86f219681877848b322c0a4409602cc0e8914ebd59756dbf69e1c6eabdba79b30b755ee75790a7bb633c1d1a
-
Filesize
960KB
MD58da5796f46264e0fa9547e500f679540
SHA160e858ec260b3bd8ed7d4d6edd3c794be9393900
SHA2562ec550a0da5fd0b9b28071c7fea3d854584adbabf25dd1b6ef0669ae263c7df3
SHA512e4049677c5d7e3409d0ef7dc5b6d5a039803053fd543747aa302688439ab8fad31c7930778114d55afe118d4ca4b8d24bdb90597e53084ca9eddd0da22cc2640
-
Filesize
1.7MB
MD5e1801e34ec0d4667dd663cff337b8b37
SHA1e3fe1a2f82fcfee743d4f18315415e0eeeb493fe
SHA25633e771b06a335b3493ee0f8c64e1f319a47827ebaeaedc020442b73dd4acd6c8
SHA512c3037df4bff58f0a560f261978bb5076df9cff020cf9d31805071b71bfde729f6a615fb9816711bb0ea7a08860a6d6656c4e89a31a5a15e72f167c6b27f27ff8
-
Filesize
286B
MD54fd5ad89f944654789bab60c179e61b5
SHA1a2a7535dedfff820536942da9628918f18cd3b81
SHA25685229548263907a2d6697fdaea8787170d96f5daf567affc61aa0142ea44edc8
SHA51282e70480c98f7ce2d4382969f2ba38722d9875c4e3e8b8692d44e2dac3ef17fb174d9b82285cfcf47f46666eaa59f6945bfb6e662d0e34a56c3d42172a5c1791