Resubmissions
28-11-2024 02:19
241128-cr9sks1kht 1027-11-2024 21:08
241127-zyzyaawqgn 1027-11-2024 20:16
241127-y145caymbs 1027-11-2024 20:13
241127-yzlxdavlen 1027-11-2024 19:53
241127-yl61dsxpcs 1027-11-2024 19:38
241127-ycrjcaxkfx 1027-11-2024 19:03
241127-xqsswsslej 1027-11-2024 19:03
241127-xqf44aslcr 327-11-2024 19:02
241127-xpxqfsslan 327-11-2024 18:32
241127-w6pkqs1mek 10Analysis
-
max time kernel
304s -
max time network
330s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-08-2024 21:47
Static task
static1
Behavioral task
behavioral1
Sample
Downloaders.zip
Resource
win11-20240802-en
Errors
General
-
Target
Downloaders.zip
-
Size
12KB
-
MD5
94fe78dc42e3403d06477f995770733c
-
SHA1
ea6ba4a14bab2a976d62ea7ddd4940ec90560586
-
SHA256
16930620b3b9166e0ffbd98f5d5b580c9919fd6ccdcc74fb996f53577f508267
-
SHA512
add85726e7d2c69068381688fe84defe820f600e6214eff029042e3002e9f4ad52dde3b8bb28f4148cca1b950cd54d3999ce9e8445c4562d1ef2efdb1c6bdeff
-
SSDEEP
384:6BfwcSEp9ZjKXSBIDv4dDfjlMJ7HWTHWB:efACW6Dr8HWTHWB
Malware Config
Extracted
phorphiex
http://185.215.113.66/
http://91.202.233.141/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
LLeT2zkStY3cvxMBFhoWXkG5VuZPoezduv
rwc4LVd9ABpULQ1CuCpDkgX2xVB1fUijyb
4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
17hgMFyLDwMjxWqw5GhijhnPdJDyFDqecY
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1epx67ne4vckqmaj4gwke8m322f4yjr6eh52wqw
bc1qmpkehfffkr6phuklsksnd7nhgx0369sxu772m3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
-
mutex
x88767657x
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
Extracted
snakekeylogger
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Password: )NYyffR0 1 - Email To:
[email protected]
Extracted
vidar
8.8
b1d953ef7170b7533c12ec48f4e2dfdc
https://tufure.xyz
https://steamcommunity.com/profiles/76561199662282318
https://t.me/t8jmhl
-
profile_id_v2
b1d953ef7170b7533c12ec48f4e2dfdc
-
user_agent
Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) AppleWebKit/534.6 (KHTML, like Gecko) Chrome/8.0.500.0 Safari/534.6
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:1604
127.0.0.1:22253
eu-central-7075.packetriot.net:6606
eu-central-7075.packetriot.net:7707
eu-central-7075.packetriot.net:8808
eu-central-7075.packetriot.net:1604
eu-central-7075.packetriot.net:22253
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Extracted
redline
185.215.113.9:12617
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/1560-257-0x0000000000410000-0x0000000000B5B000-memory.dmp family_vidar_v7 behavioral1/memory/2628-282-0x0000000000720000-0x0000000000E6B000-memory.dmp family_vidar_v7 behavioral1/memory/2628-322-0x0000000000720000-0x0000000000E6B000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000200000002aafd-250.dat family_xworm behavioral1/memory/2468-258-0x0000000000A70000-0x0000000000AB8000-memory.dmp family_xworm -
Modifies security service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysarddrvs.exe -
Phorphiex payload 4 IoCs
resource yara_rule behavioral1/files/0x000100000002aaec-22.dat family_phorphiex behavioral1/files/0x000100000002aaf3-44.dat family_phorphiex behavioral1/files/0x000200000002ab1b-476.dat family_phorphiex behavioral1/files/0x000600000002ab3a-617.dat family_phorphiex -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000f00000002ab43-704.dat family_redline behavioral1/memory/1868-709-0x00000000003B0000-0x0000000000402000-memory.dmp family_redline -
Snake Keylogger
Keylogger and Infostealer first seen in November 2020.
-
Snake Keylogger payload 2 IoCs
resource yara_rule behavioral1/memory/4528-200-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger behavioral1/memory/2716-825-0x0000000000400000-0x0000000000426000-memory.dmp family_snakekeylogger -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sylsplvc.exe -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000100000002ab13-267.dat family_asyncrat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 66b382f122c02_stk.exe -
pid Process 4236 powershell.exe 1172 powershell.exe 1556 powershell.exe 4444 powershell.exe 1924 powershell.exe 4032 powershell.exe 3752 powershell.exe 1204 powershell.exe 5024 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 66b382f122c02_stk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 66b382f122c02_stk.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PowerExpertNNT.lnk 66b382f122c02_stk.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msedge.lnk msedge.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\msedge.lnk msedge.exe -
Executes dropped EXE 52 IoCs
pid Process 4968 twztl.exe 2320 sysmablsvr.exe 5044 234627368.exe 3280 142033020.exe 3396 twztl.exe 2068 sysmysldrv.exe 772 InstallerPack_20.1.23770_win64.exe 4980 InstallerPack_20.1.23770_win64.exe 3856 m.exe 4864 130710817.exe 2180 m.exe 2596 twztl.exe 3596 robotic.exe 1356 187302694.exe 5072 asusns.exe 4528 asusns.exe 4312 twztl.exe 1668 m.exe 2468 msedge.exe 1096 stub.exe 1728 build2.exe 3244 InstallerPack_20.1.23770_win64.exe 2112 66b382f122c02_stk.exe 4856 tdrpload.exe 2632 twztl.exe 2964 svchost.exe 1384 66b382f122c02_stk.exe 688 66b382f122c02_stk.exe 872 1.exe 892 Hkbsse.exe 3428 sysarddrvs.exe 132 l2.exe 3876 66b382f122c02_stk.exe 1776 66b382f122c02_stk.exe 3556 keylogger.exe 1628 30165541.exe 2636 pi.exe 3932 2037629779.exe 2840 1111.exe 4928 networks_profile.exe 1068 networks_profile.exe 2016 backdoor.exe 3344 sylsplvc.exe 684 wahost.exe 2084 regasm.exe 1868 cookie250.exe 3432 Hkbsse.exe 1812 msedge.exe 2012 oobeldr.exe 4208 nxmr.exe 1768 sahost.exe 4232 Destover.exe -
Loads dropped DLL 6 IoCs
pid Process 1068 networks_profile.exe 1068 networks_profile.exe 1068 networks_profile.exe 1068 networks_profile.exe 1068 networks_profile.exe 1068 networks_profile.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmysldrv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sylsplvc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysarddrvs.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 asusns.exe Key opened \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 asusns.exe Key opened \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 asusns.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysmablsvr.exe" twztl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysmysldrv.exe" 142033020.exe Set value (str) \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000\Software\Microsoft\Windows\CurrentVersion\Run\ExtreamFanV6 = "C:\\Users\\Admin\\AppData\\Local\\ExtreamFanV6\\ExtreamFanV6.exe" 66b382f122c02_stk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysarddrvs.exe" 1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sylsplvc.exe" pi.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 66b382f122c02_stk.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 19 raw.githubusercontent.com 58 raw.githubusercontent.com 11 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 checkip.dyndns.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2112 66b382f122c02_stk.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4980 set thread context of 3640 4980 InstallerPack_20.1.23770_win64.exe 116 PID 772 set thread context of 640 772 InstallerPack_20.1.23770_win64.exe 118 PID 5072 set thread context of 4528 5072 asusns.exe 133 PID 1384 set thread context of 688 1384 66b382f122c02_stk.exe 170 PID 3876 set thread context of 1776 3876 66b382f122c02_stk.exe 196 -
Drops file in Windows directory 9 IoCs
description ioc Process File created C:\Windows\sysmablsvr.exe twztl.exe File created C:\Windows\Tasks\Hkbsse.job build2.exe File created C:\Windows\sysarddrvs.exe 1.exe File created C:\Windows\sylsplvc.exe pi.exe File opened for modification C:\Windows\sysmablsvr.exe twztl.exe File created C:\Windows\sysmysldrv.exe 142033020.exe File opened for modification C:\Windows\sysmysldrv.exe 142033020.exe File opened for modification C:\Windows\sysarddrvs.exe 1.exe File opened for modification C:\Windows\sylsplvc.exe pi.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1296 sc.exe 652 sc.exe 1916 sc.exe 2232 sc.exe 1796 sc.exe 1892 sc.exe 3756 sc.exe 3484 sc.exe 1296 sc.exe 4300 sc.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x000d00000002ab37-630.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 25 IoCs
pid pid_target Process procid_target 2204 1560 WerFault.exe 127 5076 2628 WerFault.exe 128 4912 1728 WerFault.exe 141 1504 1728 WerFault.exe 141 2756 1728 WerFault.exe 141 948 1728 WerFault.exe 141 1792 1728 WerFault.exe 141 4456 1728 WerFault.exe 141 1644 1728 WerFault.exe 141 1908 1728 WerFault.exe 141 1732 1728 WerFault.exe 141 1916 1728 WerFault.exe 141 4456 892 WerFault.exe 190 4196 892 WerFault.exe 190 3584 892 WerFault.exe 190 568 892 WerFault.exe 190 1800 892 WerFault.exe 190 5052 892 WerFault.exe 190 912 892 WerFault.exe 190 2016 892 WerFault.exe 190 2040 892 WerFault.exe 190 2476 892 WerFault.exe 190 4308 892 WerFault.exe 190 4720 892 WerFault.exe 190 3588 892 WerFault.exe 190 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysarddrvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2037629779.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysmablsvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 142033020.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66b382f122c02_stk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wahost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asusns.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cookie250.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Destover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oobeldr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallerPack_20.1.23770_win64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallerPack_20.1.23770_win64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66b382f122c02_stk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66b382f122c02_stk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 130710817.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallerPack_20.1.23770_win64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdrpload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66b382f122c02_stk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asusns.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66b382f122c02_stk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30165541.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language backdoor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language twztl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 234627368.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 187302694.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 72 netsh.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3556 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 cookie250.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 cookie250.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1812 schtasks.exe 3476 schtasks.exe 72 schtasks.exe 3344 schtasks.exe 3360 schtasks.exe 4072 schtasks.exe 1768 schtasks.exe 3608 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2468 msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 484 taskmgr.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 4980 InstallerPack_20.1.23770_win64.exe 772 InstallerPack_20.1.23770_win64.exe 3640 ftp.exe 640 ftp.exe -
Suspicious behavior: SetClipboardViewer 3 IoCs
pid Process 2068 sysmysldrv.exe 3428 sysarddrvs.exe 3344 sylsplvc.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 484 taskmgr.exe Token: SeSystemProfilePrivilege 484 taskmgr.exe Token: SeCreateGlobalPrivilege 484 taskmgr.exe Token: SeDebugPrivilege 1716 4363463463464363463463463.exe Token: SeDebugPrivilege 4536 New Text Document mod.exe Token: SeDebugPrivilege 4032 powershell.exe Token: SeDebugPrivilege 3596 robotic.exe Token: SeBackupPrivilege 3596 robotic.exe Token: SeSecurityPrivilege 3596 robotic.exe Token: SeSecurityPrivilege 3596 robotic.exe Token: SeSecurityPrivilege 3596 robotic.exe Token: SeSecurityPrivilege 3596 robotic.exe Token: SeDebugPrivilege 3752 powershell.exe Token: SeDebugPrivilege 4528 asusns.exe Token: SeDebugPrivilege 2468 msedge.exe Token: SeDebugPrivilege 1204 powershell.exe Token: SeDebugPrivilege 1096 stub.exe Token: SeDebugPrivilege 5024 powershell.exe Token: SeDebugPrivilege 1172 powershell.exe Token: SeDebugPrivilege 1556 powershell.exe Token: SeDebugPrivilege 2468 msedge.exe Token: SeDebugPrivilege 1384 66b382f122c02_stk.exe Token: SeDebugPrivilege 2964 svchost.exe Token: SeDebugPrivilege 2964 svchost.exe Token: SeDebugPrivilege 3876 66b382f122c02_stk.exe Token: SeDebugPrivilege 4444 powershell.exe Token: SeDebugPrivilege 1812 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe 484 taskmgr.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4968 twztl.exe 772 InstallerPack_20.1.23770_win64.exe 3856 m.exe 2112 66b382f122c02_stk.exe 4856 tdrpload.exe 2468 msedge.exe 688 66b382f122c02_stk.exe 872 1.exe 2636 pi.exe 4232 Destover.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1716 wrote to memory of 4968 1716 4363463463464363463463463.exe 95 PID 1716 wrote to memory of 4968 1716 4363463463464363463463463.exe 95 PID 1716 wrote to memory of 4968 1716 4363463463464363463463463.exe 95 PID 4968 wrote to memory of 2320 4968 twztl.exe 96 PID 4968 wrote to memory of 2320 4968 twztl.exe 96 PID 4968 wrote to memory of 2320 4968 twztl.exe 96 PID 2320 wrote to memory of 5044 2320 sysmablsvr.exe 97 PID 2320 wrote to memory of 5044 2320 sysmablsvr.exe 97 PID 2320 wrote to memory of 5044 2320 sysmablsvr.exe 97 PID 2320 wrote to memory of 3280 2320 sysmablsvr.exe 98 PID 2320 wrote to memory of 3280 2320 sysmablsvr.exe 98 PID 2320 wrote to memory of 3280 2320 sysmablsvr.exe 98 PID 3280 wrote to memory of 2068 3280 142033020.exe 100 PID 3280 wrote to memory of 2068 3280 142033020.exe 100 PID 3280 wrote to memory of 2068 3280 142033020.exe 100 PID 2068 wrote to memory of 1172 2068 sysmysldrv.exe 101 PID 2068 wrote to memory of 1172 2068 sysmysldrv.exe 101 PID 2068 wrote to memory of 1172 2068 sysmysldrv.exe 101 PID 2068 wrote to memory of 2788 2068 sysmysldrv.exe 102 PID 2068 wrote to memory of 2788 2068 sysmysldrv.exe 102 PID 2068 wrote to memory of 2788 2068 sysmysldrv.exe 102 PID 1172 wrote to memory of 4032 1172 cmd.exe 105 PID 1172 wrote to memory of 4032 1172 cmd.exe 105 PID 1172 wrote to memory of 4032 1172 cmd.exe 105 PID 2788 wrote to memory of 1296 2788 cmd.exe 106 PID 2788 wrote to memory of 1296 2788 cmd.exe 106 PID 2788 wrote to memory of 1296 2788 cmd.exe 106 PID 2788 wrote to memory of 1892 2788 cmd.exe 107 PID 2788 wrote to memory of 1892 2788 cmd.exe 107 PID 2788 wrote to memory of 1892 2788 cmd.exe 107 PID 2788 wrote to memory of 652 2788 cmd.exe 108 PID 2788 wrote to memory of 652 2788 cmd.exe 108 PID 2788 wrote to memory of 652 2788 cmd.exe 108 PID 2788 wrote to memory of 3756 2788 cmd.exe 109 PID 2788 wrote to memory of 3756 2788 cmd.exe 109 PID 2788 wrote to memory of 3756 2788 cmd.exe 109 PID 2788 wrote to memory of 3484 2788 cmd.exe 110 PID 2788 wrote to memory of 3484 2788 cmd.exe 110 PID 2788 wrote to memory of 3484 2788 cmd.exe 110 PID 1716 wrote to memory of 772 1716 4363463463464363463463463.exe 111 PID 1716 wrote to memory of 772 1716 4363463463464363463463463.exe 111 PID 1716 wrote to memory of 772 1716 4363463463464363463463463.exe 111 PID 1716 wrote to memory of 3856 1716 4363463463464363463463463.exe 113 PID 1716 wrote to memory of 3856 1716 4363463463464363463463463.exe 113 PID 1716 wrote to memory of 3856 1716 4363463463464363463463463.exe 113 PID 2068 wrote to memory of 4864 2068 sysmysldrv.exe 114 PID 2068 wrote to memory of 4864 2068 sysmysldrv.exe 114 PID 2068 wrote to memory of 4864 2068 sysmysldrv.exe 114 PID 4980 wrote to memory of 3640 4980 InstallerPack_20.1.23770_win64.exe 116 PID 4980 wrote to memory of 3640 4980 InstallerPack_20.1.23770_win64.exe 116 PID 4980 wrote to memory of 3640 4980 InstallerPack_20.1.23770_win64.exe 116 PID 772 wrote to memory of 640 772 InstallerPack_20.1.23770_win64.exe 118 PID 772 wrote to memory of 640 772 InstallerPack_20.1.23770_win64.exe 118 PID 772 wrote to memory of 640 772 InstallerPack_20.1.23770_win64.exe 118 PID 4536 wrote to memory of 3596 4536 New Text Document mod.exe 121 PID 4536 wrote to memory of 3596 4536 New Text Document mod.exe 121 PID 2068 wrote to memory of 1356 2068 sysmysldrv.exe 123 PID 2068 wrote to memory of 1356 2068 sysmysldrv.exe 123 PID 2068 wrote to memory of 1356 2068 sysmysldrv.exe 123 PID 4980 wrote to memory of 3640 4980 InstallerPack_20.1.23770_win64.exe 116 PID 4536 wrote to memory of 5072 4536 New Text Document mod.exe 124 PID 4536 wrote to memory of 5072 4536 New Text Document mod.exe 124 PID 4536 wrote to memory of 5072 4536 New Text Document mod.exe 124 PID 772 wrote to memory of 640 772 InstallerPack_20.1.23770_win64.exe 118 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 asusns.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 asusns.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Downloaders.zip1⤵PID:4576
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3580
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:484
-
C:\Users\Admin\Desktop\malware\4363463463464363463463463.exe"C:\Users\Admin\Desktop\malware\4363463463464363463463463.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\Desktop\malware\Files\twztl.exe"C:\Users\Admin\Desktop\malware\Files\twztl.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\sysmablsvr.exeC:\Windows\sysmablsvr.exe3⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\234627368.exeC:\Users\Admin\AppData\Local\Temp\234627368.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\142033020.exeC:\Users\Admin\AppData\Local\Temp\142033020.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\sysmysldrv.exeC:\Windows\sysmysldrv.exe5⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: SetClipboardViewer
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1296
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1892
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:652
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3756
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS7⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3484
-
-
-
C:\Users\Admin\AppData\Local\Temp\130710817.exeC:\Users\Admin\AppData\Local\Temp\130710817.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\187302694.exeC:\Users\Admin\AppData\Local\Temp\187302694.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1356
-
-
-
-
-
-
C:\Users\Admin\Desktop\malware\Files\InstallerPack_20.1.23770_win64.exe"C:\Users\Admin\Desktop\malware\Files\InstallerPack_20.1.23770_win64.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\ftp.exeC:\Windows\SysWOW64\ftp.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:640 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 17685⤵
- Program crash
PID:5076
-
-
-
-
-
C:\Users\Admin\Desktop\malware\Files\m.exe"C:\Users\Admin\Desktop\malware\Files\m.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3856
-
-
C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe"C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf HR" /sc HOURLY /rl HIGHEST3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:72
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\jewkkwnf\jewkkwnf.exe" /tn "jewkkwnf LG" /sc ONLOGON /rl HIGHEST3⤵
- Scheduled Task/Job: Scheduled Task
PID:3344
-
-
C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe"C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1384 -
C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe"C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:688
-
-
-
-
C:\Users\Admin\Desktop\malware\Files\tdrpload.exe"C:\Users\Admin\Desktop\malware\Files\tdrpload.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4856
-
-
C:\Users\Admin\Desktop\malware\Files\1.exe"C:\Users\Admin\Desktop\malware\Files\1.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:872 -
C:\Windows\sysarddrvs.exeC:\Windows\sysarddrvs.exe3⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:3428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"4⤵
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS4⤵
- System Location Discovery: System Language Discovery
PID:4928 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1916
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1296
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc5⤵
- Launches sc.exe
PID:1796
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4300
-
-
-
C:\Users\Admin\AppData\Local\Temp\30165541.exeC:\Users\Admin\AppData\Local\Temp\30165541.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\2037629779.exeC:\Users\Admin\AppData\Local\Temp\2037629779.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3932
-
-
-
-
C:\Users\Admin\Desktop\malware\Files\pi.exe"C:\Users\Admin\Desktop\malware\Files\pi.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2636 -
C:\Windows\sylsplvc.exeC:\Windows\sylsplvc.exe3⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: SetClipboardViewer
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\756722409.exeC:\Users\Admin\AppData\Local\Temp\756722409.exe4⤵PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\1127213725.exeC:\Users\Admin\AppData\Local\Temp\1127213725.exe4⤵PID:5336
-
-
-
-
C:\Users\Admin\Desktop\malware\Files\1111.exe"C:\Users\Admin\Desktop\malware\Files\1111.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Users\Admin\Desktop\malware\Files\nxmr.exe"C:\Users\Admin\Desktop\malware\Files\nxmr.exe"2⤵
- Executes dropped EXE
PID:4208
-
-
C:\Users\Admin\Desktop\malware\Files\Destover.exe"C:\Users\Admin\Desktop\malware\Files\Destover.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4232
-
-
C:\Users\Admin\Desktop\malware\New Text Document mod.exe"C:\Users\Admin\Desktop\malware\New Text Document mod.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\Desktop\malware\a\robotic.exe"C:\Users\Admin\Desktop\malware\a\robotic.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
C:\Users\Admin\Desktop\malware\a\asusns.exe"C:\Users\Admin\Desktop\malware\a\asusns.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OKmzKrla.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3752
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OKmzKrla" /XML "C:\Users\Admin\AppData\Local\Temp\tmp489E.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3476
-
-
C:\Users\Admin\Desktop\malware\a\asusns.exe"C:\Users\Admin\Desktop\malware\a\asusns.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4528
-
-
-
C:\Users\Admin\Desktop\malware\a\msedge.exe"C:\Users\Admin\Desktop\malware\a\msedge.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2468 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\malware\a\msedge.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\msedge.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'msedge.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "msedge" /tr "C:\ProgramData\msedge.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4072
-
-
-
C:\Users\Admin\Desktop\malware\a\stub.exe"C:\Users\Admin\Desktop\malware\a\stub.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1096 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
PID:4960 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3360
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp82B9.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
PID:1404 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3556
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
-
-
C:\Users\Admin\Desktop\malware\a\build2.exe"C:\Users\Admin\Desktop\malware\a\build2.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 7723⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 8203⤵
- Program crash
PID:1504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 8363⤵
- Program crash
PID:2756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 9443⤵
- Program crash
PID:948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 9483⤵
- Program crash
PID:1792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 9483⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 10403⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 10363⤵
- Program crash
PID:1908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 11883⤵
- Program crash
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 5844⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 6204⤵
- Program crash
PID:4196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 6884⤵
- Program crash
PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 7964⤵
- Program crash
PID:568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 8924⤵
- Program crash
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 9364⤵
- Program crash
PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 9564⤵
- Program crash
PID:912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 9644⤵
- Program crash
PID:2016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 9564⤵
- Program crash
PID:2040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 10884⤵
- Program crash
PID:2476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 11564⤵
- Program crash
PID:4308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 13644⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 14364⤵
- Program crash
PID:3588
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 8283⤵
- Program crash
PID:1916
-
-
-
C:\Users\Admin\Desktop\malware\a\l2.exe"C:\Users\Admin\Desktop\malware\a\l2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:132 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1768
-
-
-
C:\Users\Admin\Desktop\malware\a\keylogger.exe"C:\Users\Admin\Desktop\malware\a\keylogger.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3556
-
-
C:\Users\Admin\Desktop\malware\a\networks_profile.exe"C:\Users\Admin\Desktop\malware\a\networks_profile.exe"2⤵
- Executes dropped EXE
PID:4928 -
C:\Users\Admin\Desktop\malware\a\networks_profile.exe"C:\Users\Admin\Desktop\malware\a\networks_profile.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1068 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"4⤵PID:2040
-
-
C:\Windows\SYSTEM32\netsh.exenetsh wlan show profiles4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:72
-
-
-
-
C:\Users\Admin\Desktop\malware\a\backdoor.exe"C:\Users\Admin\Desktop\malware\a\backdoor.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2016
-
-
C:\Users\Admin\Desktop\malware\a\wahost.exe"C:\Users\Admin\Desktop\malware\a\wahost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:684 -
C:\Users\Admin\Desktop\malware\a\wahost.exe"C:\Users\Admin\Desktop\malware\a\wahost.exe"3⤵PID:772
-
-
-
C:\Users\Admin\Desktop\malware\a\regasm.exe"C:\Users\Admin\Desktop\malware\a\regasm.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\eVoVlc.exe"3⤵
- Command and Scripting Interpreter: PowerShell
PID:1924
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eVoVlc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp748B.tmp"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1812
-
-
C:\Users\Admin\Desktop\malware\a\regasm.exe"C:\Users\Admin\Desktop\malware\a\regasm.exe"3⤵PID:940
-
-
C:\Users\Admin\Desktop\malware\a\regasm.exe"C:\Users\Admin\Desktop\malware\a\regasm.exe"3⤵PID:1312
-
-
C:\Users\Admin\Desktop\malware\a\regasm.exe"C:\Users\Admin\Desktop\malware\a\regasm.exe"3⤵PID:2716
-
-
-
C:\Users\Admin\Desktop\malware\a\cookie250.exe"C:\Users\Admin\Desktop\malware\a\cookie250.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1868
-
-
C:\Users\Admin\Desktop\malware\a\sahost.exe"C:\Users\Admin\Desktop\malware\a\sahost.exe"2⤵
- Executes dropped EXE
PID:1768
-
-
C:\Users\Admin\Desktop\malware\Files\twztl.exe"C:\Users\Admin\Desktop\malware\Files\twztl.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3396
-
C:\Users\Admin\Desktop\malware\Files\InstallerPack_20.1.23770_win64.exe"C:\Users\Admin\Desktop\malware\Files\InstallerPack_20.1.23770_win64.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\ftp.exeC:\Windows\SysWOW64\ftp.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:3640 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1560 -s 19164⤵
- Program crash
PID:2204
-
-
-
-
C:\Users\Admin\Desktop\malware\Files\m.exe"C:\Users\Admin\Desktop\malware\Files\m.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2180
-
C:\Users\Admin\Desktop\malware\Files\twztl.exe"C:\Users\Admin\Desktop\malware\Files\twztl.exe"1⤵
- Executes dropped EXE
PID:2596
-
C:\Users\Admin\Desktop\malware\Files\twztl.exe"C:\Users\Admin\Desktop\malware\Files\twztl.exe"1⤵
- Executes dropped EXE
PID:4312
-
C:\Users\Admin\Desktop\malware\Files\m.exe"C:\Users\Admin\Desktop\malware\Files\m.exe"1⤵
- Executes dropped EXE
PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1560 -ip 15601⤵PID:5012
-
C:\Users\Admin\Desktop\malware\Files\InstallerPack_20.1.23770_win64.exe"C:\Users\Admin\Desktop\malware\Files\InstallerPack_20.1.23770_win64.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2628 -ip 26281⤵PID:728
-
C:\Users\Admin\Desktop\malware\Files\twztl.exe"C:\Users\Admin\Desktop\malware\Files\twztl.exe"1⤵
- Executes dropped EXE
PID:2632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1728 -ip 17281⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1728 -ip 17281⤵PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1728 -ip 17281⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1728 -ip 17281⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1728 -ip 17281⤵PID:3780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1728 -ip 17281⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1728 -ip 17281⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1728 -ip 17281⤵PID:1332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1728 -ip 17281⤵PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1728 -ip 17281⤵PID:988
-
C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe"C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3876 -
C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe"C:\Users\Admin\Desktop\malware\Files\66b382f122c02_stk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 892 -ip 8921⤵PID:1924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 892 -ip 8921⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 892 -ip 8921⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 892 -ip 8921⤵PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 892 -ip 8921⤵PID:1796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 892 -ip 8921⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 892 -ip 8921⤵PID:2632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 892 -ip 8921⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 892 -ip 8921⤵PID:3436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 892 -ip 8921⤵PID:72
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 892 -ip 8921⤵PID:2340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 892 -ip 8921⤵PID:1340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 892 -ip 8921⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe1⤵
- Executes dropped EXE
PID:3432
-
C:\ProgramData\msedge.exeC:\ProgramData\msedge.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:3608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#llzqlmcx#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Windows Upgrade Manager' /tr '''C:\Users\Admin\Windows Upgrade\wupgrdsv.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Windows Upgrade\wupgrdsv.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Windows Upgrade Manager' -RunLevel 'Highest' -Force; }1⤵
- Command and Scripting Interpreter: PowerShell
PID:4236
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Windows Upgrade Manager"1⤵PID:2716
-
C:\Users\Admin\Windows Upgrade\wupgrdsv.exe"C:\Users\Admin\Windows Upgrade\wupgrdsv.exe"1⤵PID:4240
-
C:\Users\Admin\Desktop\malware\Files\nxmr.exe"C:\Users\Admin\Desktop\malware\Files\nxmr.exe"1⤵PID:4912
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize2KB
MD50a6392a9418523a6cbf0f127696bc749
SHA17d89a23b1b87acd054a4835c34e6df47cbf5d45f
SHA256a5aa402997f196453aa7d18e02a2ccd3024a0b286df355743f5c0f1d506a0542
SHA512305b344a2bff46a67322473384866d87c5b58f3f9de3ffb07d416c2ff573e557b4945d2b6c18a738f1206c1c6f8238ff1b148f4ff18a9c2b12b7bbe94b819d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4EA478292998338A09FD0BC7EF51AE41_A87B24898C77B951495C6F6D7597659C
Filesize2KB
MD55a4588619e6ac64cd4c2f2a73ed071d5
SHA11d9f2eff48c6170c449be563442792f882594488
SHA2564376dfd7519b2ef9197c6aa62b4c88a9fd7d376d702b720c775d436cb5302ebc
SHA512353dadd27bf277960d6c018a38525e8bf7299d58b628959e7f810f0caf7a0df963c267591c00ed05a65f5624f8e8d9a306291b221c06e2c2dece78282c0520a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize450B
MD540ff521c2df698c72076683258639573
SHA1d977cdc19350ff1a0e31c3897cd153f24996f915
SHA2567c680529ed8584799e8a3c0440717ee42a951a573330d92350060a28e9cf9300
SHA51221d02f29d5a72cbb3560efd2f57998258c59f8ca399b334573d7dc5df268df93f46d6bd95938f8fb318981448df1f5b4029edbbbeeaf51ee1f564ac2a23d7028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4EA478292998338A09FD0BC7EF51AE41_A87B24898C77B951495C6F6D7597659C
Filesize458B
MD5534596cfc0e1e5f4427979ebc8b60285
SHA112a8bf61b38c910b64ad97843239c325a87006d1
SHA2569752337de93e7c1bfd7bfe96924a9457c728af9543ac6dc395b889b1aea1739d
SHA5129fef17de4bd7991df7821c06255742c16564bc3d3611bdcf96549120bd21936a84428baf9608c51516528e6564ea093da79f61c16d2ea229368336ed74263758
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
1KB
MD57e1ed0055c3eaa0bbc4a29ec1ef15a6a
SHA1765b954c1adbb6a6ecc4fe912fdaa6d0fba0ae7d
SHA2564c17576f64dea465c45a50573ee41771f7be9962ab2d07f961af4df5589bdcce
SHA512de7c784c37d18c43820908add88f08ab4864c0ef3f9d158cc2c9d1bab120613cb093dd4bfc5d7ed0c289414956cfe0b213c386f8e6b5753847dec915566297c8
-
Filesize
2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
Filesize
114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
18KB
MD58deb121d3b7098fa1080dd766a818fd4
SHA102979e1c1981c66d1494d6577623c30228996e15
SHA2563c0a69b9d4ae8b49c1c62c756072af3cda8791328d512763afa94e321ec1c1f0
SHA51282240d216310313bfbb0c23b38c48bc50d65a5c64dc4eee6d5ec693eedb53d5ac2b538b0a5a8508980933626d972b5a0e9998508b8bc3190750f0f2a864e2271
-
Filesize
18KB
MD50d0d2452872d607c951024defada807b
SHA1044d5d6fdb7129d7f46fc9316db11bbc1c06ed1d
SHA25642c5a50b9a487ecb2c3471f873a58adeb7b6b582ae5205b8911015fad59aba9c
SHA5124f1160a36469ac2932ae5615894a74a1ec298146b0ad2d9868dace2619de686eee07dee32469c4e99f34e0b7a5fd63ff901e7bf34282ac4ee9233a814e6518cd
-
Filesize
944B
MD56344564097353c8e7e68991fffa80d88
SHA12ac4d108a30ec3fbd2938b0563eb912415ea7c62
SHA256d0af6d69f8bc0c98e9fb61dead6327bbc8b4f5292529313515382d8f883de0da
SHA512e2b37a9001a91cb05483d72f88bd70a61ca5655939c2290fd1580710eec9d8d26a5fedbcb5223f5413b5dcc46f1d8b6b408e57be0e4ad4b37b55cbce9023a303
-
Filesize
944B
MD5781da0576417bf414dc558e5a315e2be
SHA1215451c1e370be595f1c389f587efeaa93108b4c
SHA25641a5aef8b0bbeea2766f40a7bba2c78322379f167c610f7055ccb69e7db030fe
SHA51224e283aa30a2903ebe154dad49b26067a45e46fec57549ad080d3b9ec3f272044efaaed3822d067837f5521262192f466c47195ffe7f75f8c7c5dcf3159ea737
-
Filesize
944B
MD51d2f377a683be7cb687c9bd016093a19
SHA19df0e7f30e6959d580d73cf3eabbb4db8d018027
SHA256263b8b3d6e58149e2976dafa19a5c3b0b414574f372173fb6d239819616698c7
SHA512a4b4d6717e82d4e1c9d2ec478901c867c329ece3b69e64b22bba1e68a49cc05b8470dce9235def25a127781525a970d5076bf13198b43109ec27f9fa3f2070d3
-
Filesize
5.8MB
MD56321268230dbba37143ec80139348e3f
SHA19487fdb3231e1a932bc1ea5a84adbdc6ad7bca44
SHA25613a119fa2216d25d8255efb07451e42d55c4a581f48cd69ed6b81f366f0f0dd2
SHA512c2842982cad2219db36d3eabb7c9fb7aeae94ae8e06a70ba595eb842e4526a570baee512e3e88478d8dd9149ada9c10860378cdb8b0e761b77f60cea8b319bde
-
Filesize
92KB
MD5be9388b42333b3d4e163b0ace699897b
SHA14e1109772eb9cb59c557380822166fe1664403bd
SHA256d281e0a0f1e1073f2d290a7eb1f77bed4c210dbf83a0f4f4e22073f50faa843f
SHA5125f887f1060b898c9a88745cde7cf509fdf42947ab8e5948b46c2df659468dc245b24d089bdbec0b314c40b83934698bf4b6feb8954e32810ff8f522aab0af19a
-
Filesize
5.9MB
MD55a28832bdad887ae963e72518b23b678
SHA10ec0f0bf17a0a34569628c1a14a1a77908fc8257
SHA256ae567fffdea29f87daed751ec9871fe1641edef7cf538f8082512e6e224b9706
SHA512f1c9007c1c04ec2d4b0803365f63cb178fa7bd70515ac51540794e65843ebef61d5a3d5a38c2bc80724b7c7f2af718457a97dee1297b60f379a3cdbc90b61377
-
Filesize
92KB
MD5e57f9e2fc24a1ace0267a7962c9e465e
SHA1840f5f4aed29f241642dab534e14f86c7cd5dfc6
SHA256aa66df748ef74df48c7d1c2954c49702b15e95787b1d3b562dba50894abc0910
SHA512d62dde392715a6c6869d621d87f3df2713293190676b24fdbac5b40dea07530edd8770f3b7ba69f6f2fda4c5275a8a05b5f4e91b90a4feb9537ec051193040c0
-
Filesize
7KB
MD5cf14448f02d12e7bb6a449658848b16f
SHA16b626e9a288dd5844788bff075806f05bf653a18
SHA25632cac3b9230d88f0fdcae005ea8f92236a5dd2488df7ca9c97ef66f145ca4e37
SHA5123fb30aebe173d881c432550d7d4085536afbb7961be4c6ceef91e3386d3b81c5312eb5c4b97bbb6d6323842ada8a562d0da262b2bf6e053a1ba569028b65e22f
-
Filesize
103KB
MD58bc26ed5eaedbd34b74d7b91b64456d3
SHA1486d3d999ec8066b0a3e71c97e77672ac4cf7b17
SHA256f0ec808a96ddd7ed3f07ca78d1cd27f7612dd8374b345a0db1b06d78eb6de8b8
SHA51253f2a0ac134feeead095277822f4671f825b621093515910b78c83d3cf7694bc3c664a0434fbfc6c95c40db0849f8edb09fdef20b840b96fab7f726690343089
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5KB
MD568b287f4067ba013e34a1339afdb1ea8
SHA145ad585b3cc8e5a6af7b68f5d8269c97992130b3
SHA25618e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
SHA51206c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
1KB
MD597ac03e8b13b9e72aa0b06d80a659089
SHA1903eee343d1734a70058b729e907ee5aee65f0fa
SHA256ca5edefc8a5a51520b171ef67b59af7dd6761ea3759654733774aace2dcb6426
SHA512abfda973f436812fb5be649a95d7ff686ea95633f7e73f1e2d71e8529047654dd598f2f37028b4098ddc9c4580a4c51861d42bfcd8442436a9b07f57ce7bf53d
-
Filesize
151B
MD59613977075b178d91a82c478a60bf655
SHA1a8249552e597a9b15c46112c779fdd16d8736d08
SHA256b993f64d538698b588beced7aeabb29733dc8e64283a594db8bbabdbffbda3ad
SHA512b1d624a53dea8b6a4d8a899e1feec0f65500e194f8ddc658272d10f9d1417720bfd150b295b2a19e808d7b0efd8d0bae80dcda6f621def03afc1eae0281b3137
-
Filesize
1KB
MD5cfb6654ed91e41cc37c6a2fde553b51f
SHA161ea499fb0a8802ec7b8e302c82c88113c9240c9
SHA25653873f766b8d97f9c61eecdb8dc7f4b2ae74e012462683f509efd51912b44eb3
SHA51208285c582967e75f013b1650e8d9083052a0ceded2694f684d16350529dabb9ea5bd1db7288fd83602076bcb18fb7575f64922369c9ea7374f23981388d73c07
-
Filesize
4KB
MD5202786d1d9b71c375e6f940e6dd4828a
SHA17cad95faa33e92aceee3bcc809cd687bda650d74
SHA25645930e1ff487557dd242214c1e7d07294dbedfa7bc2cf712fae46d8d6b61de76
SHA512de81012a38c1933a82cb39f1ac5261e7af8df80c8478ed540111fe84a6f150f0595889b0e087889894187559f61e1142d7e4971d05bceb737ed06f13726e7eae
-
Filesize
79KB
MD5e2e3268f813a0c5128ff8347cbaa58c8
SHA14952cbfbdec300c048808d79ee431972b8a7ba84
SHA256d8b83f78ed905a7948e2e1e371f0f905bcaaabbb314c692fee408a454f8338a3
SHA512cb5aeda8378a9a5470f33f2b70c22e77d2df97b162ba953eb16da085b3c434be31a5997eac11501db0cb612cdb30fa9045719fcd10c7227c56cc782558e0c3bc
-
Filesize
2.8MB
MD52055eb0fa5dfccef0c68146527b0c4f4
SHA19a04941b835e1f13d96a3b4fcd137038689105a3
SHA256da96b85bb04c797fd30df884ec895f8a03c7dc98c9e188733a4ee1d8754fec70
SHA5128aa28d3febc2c2aeeed19f75cb871ef5f5e5e105108b7f210c54dcf9c9aafb193a9287be99bacea3e713807a89fd9c8f637b45c849e2336e6397844187a643e4
-
Filesize
6.0MB
MD5a14e062d5ddb947dd490cd3956c7de8a
SHA11a55234d22f14e88d27cfdcd9512abf1a02d1e61
SHA2566ccb73967f66acd2af71b4d41a7b5f3755f04d1adba41bafc573f8c1cc14c26a
SHA512da887bfbf53f8a2945d740114d111602292923fd884cac3157d77d74a03c31891bbd167271ed4f71c77bbac133b42f2dc3414447e3aa200d9f0427d1ceebb0e8
-
Filesize
6.5MB
MD5f2908c73543719738bea99c02fdafe00
SHA12fc8790129fa21cb76642cbd7ab04fc1783e911b
SHA256be9862ad765af7e71a322549640747a6952c4e8bc18b6568c4781df33f0bbfd6
SHA512fa9d5987ef0f9f14d98d5070e09d980e944e4f06966b2601a3b01bfe95a0df239305bd4dad292a8808e6dee6e02d0d33079eda2ddb668ba31d2a9949173a2a31
-
Filesize
89KB
MD5e904bf93403c0fb08b9683a9e858c73e
SHA18397c1e1f0b9d53a114850f6b3ae8c1f2b2d1590
SHA2564c2efe2f1253b94f16a1cab032f36c7883e4f6c8d9fc17d0ee553b5afb16330c
SHA512d83f63737f7fcac9179ca262aa5c32bba7e140897736b63474afcf4f972ffb4c317c5e1d6f7ebe6a0f2d77db8f41204031314d7749c7185ec3e3b5286d77c1a3
-
Filesize
3.2MB
MD5d4e494aac738b34231cb341acb16b961
SHA14cdaf5333250193c1e8939c807728a804e9dd4ad
SHA256eda401786b61b9b555596c6f88f1ea858c8946491b6a37688d6c7c859cb3a04a
SHA512b490cd7dd1e1861ab723856417a9c60fb379e5adc0acbe9aceffa0cd6f4cb79493522282a1e799071bd53372fc22cadfec1bacfcba0eeda6b8392177c3cd0f8e
-
Filesize
5.4MB
MD541ab08c1955fce44bfd0c76a64d1945a
SHA12b9cb05f4de5d98c541d15175d7f0199cbdd0eea
SHA256dd12cb27b3867341bf6ca48715756500d3ec56c19b21bb1c1290806aa74cb493
SHA51238834ae703a8541b4fec9a1db94cfe296ead58649bb1d4873b517df14d0c6a9d25e49ff04c2bf6bb0188845116a4e894aae930d849f9be8c98d2ce51da1ef116
-
Filesize
79KB
MD51e8a2ed2e3f35620fb6b8c2a782a57f3
SHA1e924ce6d147ecc8b30b7c7cad02e5c9ae09a743a
SHA2563f16f4550826076b2c8cd7b392ee649aeb06740328658a2d30c3d2002c6b7879
SHA512ce4dc7fdd7f81a7a127d650f9175292b287b4803d815d74b64a4e5125cff66224d75e7ecade1d9c0e42f870bdb49a78e9613b1a49675ab5bc098611b99b49ade
-
Filesize
88KB
MD5ababca6d12d96e8dd2f1d7114b406fae
SHA1dcd9798e83ec688aacb3de8911492a232cb41a32
SHA256a992920e64a64763f3dd8c2a431a0f5e56e5b3782a1496de92bc80ee71cca5ba
SHA512b7fc70c176bdc74cf68b14e694f3e53142e64d39bd6d3e0f2e3a74ce3178ea606f92f760d21db69d72ae6677545a47c7bf390fb65cd5247a48e239f6ae8f7b8f
-
Filesize
7KB
MD5a7b1b22096cf2b8b9a0156216871768a
SHA148acafe87df586a0434459b068d9323d20f904cb
SHA25682fbb67bf03714661b75a49245c8fe42141e7b68dda3f97f765eb1f2e00a89a9
SHA51235b3c89b18135e3aca482b376f5013557db636a332a18c4b43d34d3983e5d070a926c95e40966fafea1d54569b9e3c4ab483eaca81b015724d42db24b5f3805f
-
Filesize
701KB
MD50e3ed8b5e5952cffc0e119b6082a6599
SHA1b8275da931abd327fb0ad3b102a5917aa950c636
SHA256e5797ef4bea22b1d24a9147c48726e9960ffa1b5866e04c11de117531483fe9d
SHA51215e06c4a477984dac67d7301d8019935af32e7a5fc47c6d69533f00e7aa3992cd8e496d02f05f9c2f4c43f3a928fe070276bdcb18f86bcab43faae3709522beb
-
Filesize
68KB
MD5698f5896ec35c84909344dc08b7cae67
SHA14c3eb447125f74f2eef63e14a5d97a823fa8d4e9
SHA2569cc2e2d5feeb360b2ea9a650809468f08e13c0e997ebadf5baa69ae3c27a958e
SHA5122230abef3f2ac7fff21f2af8a1df79a0ab3f7b1153ce696745ff5cef7f677bfe562dc820eb36be8e4819210ffa565d52e3b940f0cad5427d30a3aa05a4bcde2b
-
Filesize
481KB
MD5f9a4f6684d1bf48406a42921aebc1596
SHA1c9186ff53de4724ede20c6485136b4b2072bb6a6
SHA256e0a051f93d4c1e81cc142181d14249e246be4c169645d667267134b664e75042
SHA51267294a47dfef6aba404939497c403f93318841e9c5ee28b706f7506b5dff2630381e28e86f6dcbfdff2427092a515db1dc0a04e334e7f8de8b0b682269ff88fd
-
Filesize
304KB
MD51b099f749669dfe00b4177988018fc40
SHA1c007e18cbe95b286b146531a01dde05127ebd747
SHA256f7b57a665ac90377683c434a04b8b6894c369d34fdb03273778a8c9f8fdbb262
SHA51287dc26b28cb2c43c788d9ae9ef384b69be52b27500bc23cdc6acc8567e51705d99ef942cdc0b23fa6a7c84d4ddaaa8f05865a8e7bb4ad943ba5deabf7a4105fd
-
Filesize
51KB
MD5fbbc99e0b5c7a5f4b76886520f5a4f63
SHA1361b841c52643792c26868f90e0330ba2ab131ae
SHA2566054e52edc7112fcecaaf39f37c6bdaa35f98bfaff45d4e01802b9a8bedd2eef
SHA5125de0b99a9d3f7cdee1d9ed8122c62f096b59cca93c9ad4c4eb15da6bb08d5ea07c09f2864e8a841dcc4095e890e47dd595f51c535ab37713f807a151de52cb11
-
Filesize
4.4MB
MD5af6e384dfabdad52d43cf8429ad8779c
SHA1c78e8cd8c74ad9d598f591de5e49f73ce3373791
SHA256f327c2b5ab1d98f0382a35cd78f694d487c74a7290f1ff7be53f42e23021e599
SHA512b55ba87b275a475e751e13ec9bac2e7f1a3484057844e210168e2256d73d9b6a7c7c7592845d4a3bf8163cf0d479315418a9f3cb8f2f4832af88a06867e3df93
-
Filesize
271KB
MD5c2ec3c7d003e11d0db8aab918df1e47a
SHA19c1c3421a1d0207bec271b9cd38a48cb0a1fb285
SHA25697b1441bd0a459186311604d3cf3fc2b212dff334f4640d9171189080698c940
SHA512bb43cf35712213ec0643a48451791da6cd8e9c4f1281980dd972e8483ddba7f56b55d23cd4fc9eca91b1ca4e1bc7370769b71cdc3e250c9f1941eb72ce278170
-
Filesize
6.6MB
MD57306abcf62c8ee10a1692a6a85af9297
SHA169900ccc2400e685b981b3654af57c062ffb44e2
SHA25637c9a26faec0bb21171b3968d2e4254f6ae10ff7ae0d0b1493226685bc5d3b4b
SHA512cd00a60387e06fcc6f14242adb97a54575a49cf1e9b22c74aa5d8bb7617e571fc194049691e4ee0fcff8bdd659b04de62f46d07e2f3330c18ac7035134e183d1
-
Filesize
593KB
MD5f74f2df998219d602185c46107329e82
SHA1a0f8eeb2e5c712e690923fdaf3b7cefc64f3d63e
SHA2565f569c72db9c31528daf2e907938b9bb711ea3a050efe5bf5d514dc962c5415c
SHA512b28e1eafefaf4f71666bf6c216c8672eb615a5e369bd913b85d99b2774df76ffaa489f145722a93f80f2afcb76eef40e62dcf246793bcf867d696487e9343a9f
-
Filesize
538KB
MD56b1bbe4e391cdfd775780d8502ccbc41
SHA1a910f7ac9ed8fd57f7455f04e99bcd732bc8241a
SHA2562999b0ecf157b9f37dcfa1cb4a0ffff73092c416499a356fdb1558d66985e9a3
SHA5129ad2ca4cc8af0b6185be87d9026da5cdac2c52ff15b0fd2ba333ff3a25016e06a294d7cf5cf32b1869a1f5e3692f071f582ba2151ac16f9be738ea7862ab57d3
-
Filesize
499KB
MD529e3de6b17d0fdfb360834f038b59a39
SHA11e3fdca7e4dec1ebb618f69675928363657ba064
SHA2568cf6a3d7e5694a0453d85e67a038bb5804b6eb8969287f1d021bdb7b95234e9d
SHA512ebf889085bb105182739d7a748d8b12b26de3e47f11535260adac23beee3d5b43aa572b6043ace7ac068cee36529c3cf448986f3218aec742ab6fce4db47440a
-
Filesize
48KB
MD5a7ed4ba445aa61c4632dd6579c212bf5
SHA1a81d766d12a6dd8c3cec537387a089650b34e103
SHA25691fb355fdc173c40fa77f8a252031d6bc32fab91c5e5573da28044494691c820
SHA5122a0e0afdecf803657f2d67433399dc3119a3b4221334a9c8d7cb3e3e741457aaa26d2edd32377a102f1c539a4ef065cb5296d4cdfe7657993223e675e3fd4bae
-
Filesize
712KB
MD514b98daca4a9912ad416eb7c0231cc21
SHA158328f022b71c8b3001449e87f91fbad4ac973ea
SHA256850752cfce58c44ce5d48735f4d53ccc1f8d12b7e1ae00d367d9c42103d9ad99
SHA5121169760e0245b4b1f2676271e0e56b62db0157a08ada4098d7dfacbf5c1e2d6cac29275c04a2d59471d7a9d9420425c07387c63fd3bc9bc4f91a9b3d5addcb0a