Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
AnaRAT.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
AnaRAT.exe
Resource
win10v2004-20240802-en
General
-
Target
AnaRAT.exe
-
Size
6.0MB
-
MD5
b300d99faf11ac3c6d3609c34f39ad5b
-
SHA1
039310584b1e8fb43a08a865f3ab1b64610c8013
-
SHA256
b8af724789e01cb47a661d40a22a5ec93a2f1499d0ace4cd5e1d7d9fffa89246
-
SHA512
2158ca82f753258c4abee3bf425f91bd26a79fcf7c53cbb98fd5980a53d678613258367a5f10117547f3d900456d78a0e4a7c85b0f1806948e8e5b767ccb26d0
-
SSDEEP
49152:xqU/dfDJH/bKaPMNNteROzxRwF0UCLhCkpMn8HmWIos0/Noyos5rQLiMCPSsAm6o:x1dfDy
Malware Config
Extracted
remcos
AUGUST CRYPTER TOOLZ GRACE STUB
teamfavour222.ddns.net :6767
odogwuvisual123.duckdns.org:6767
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
-YFLE4M
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
asyncrat
0.5.8
2 MONEY
twart.myfirewall.org:14143
udn3BZ1Fqt3jtiZx
-
delay
30
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Extracted
remcos
GOLAZO
agosto14.con-ip.com:7772
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-KKPQTN
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
njrat
Hallaj PRO Rat [Fixed]
FFF
tibiaserver.ddns.net:2323
64805e9b9efcd75e104b05fad0cb2a4c
-
reg_key
64805e9b9efcd75e104b05fad0cb2a4c
-
splitter
boolLove
Signatures
-
resource yara_rule behavioral1/memory/1972-97-0x0000000010000000-0x00000000101A5000-memory.dmp purplefox_rootkit behavioral1/memory/1972-99-0x0000000010000000-0x00000000101A5000-memory.dmp purplefox_rootkit behavioral1/memory/1972-96-0x0000000010000000-0x00000000101A5000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1972-97-0x0000000010000000-0x00000000101A5000-memory.dmp family_gh0strat behavioral1/memory/1972-99-0x0000000010000000-0x00000000101A5000-memory.dmp family_gh0strat behavioral1/memory/1972-96-0x0000000010000000-0x00000000101A5000-memory.dmp family_gh0strat -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Sub\\Client.exe" Client.exe -
Process spawned unexpected child process 15 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2684 1872 schtasks.exe 48 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2984 1872 schtasks.exe 48 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2628 1872 schtasks.exe 48 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2352 1872 schtasks.exe 48 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1532 1872 schtasks.exe 48 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1812 1872 schtasks.exe 48 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1568 1872 schtasks.exe 48 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2852 1872 schtasks.exe 48 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2732 1872 schtasks.exe 48 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2228 1872 schtasks.exe 48 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2728 1872 schtasks.exe 48 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2132 1872 schtasks.exe 48 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2088 1872 schtasks.exe 48 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1700 1872 schtasks.exe 48 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2828 1872 schtasks.exe 48 -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x000500000001a46d-139.dat family_stormkitty behavioral1/memory/2376-140-0x0000000001040000-0x0000000001096000-memory.dmp family_stormkitty -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools 6 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/2184-471-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/2144-469-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft behavioral1/memory/1768-468-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/2184-473-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/1768-480-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/2144-548-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft -
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/2144-469-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView behavioral1/memory/2144-548-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/1768-468-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView behavioral1/memory/1768-480-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1756 powershell.exe 2448 powershell.exe 2928 powershell.exe 1220 powershell.exe 2288 powershell.exe 1792 powershell.exe 2012 powershell.exe -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1960 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\64805e9b9efcd75e104b05fad0cb2a4c.exe svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\64805e9b9efcd75e104b05fad0cb2a4c.exe svchost.exe -
Executes dropped EXE 29 IoCs
pid Process 1972 0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe 2104 690c1b65a6267d6d0b201ba46089aabc.exe 2052 62264.exe 2736 73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe 2700 1231234.exe 2704 SCRIPT~1.EXE 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 2904 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe 2564 651654794161616171771852588547475885414152526396369965885471452525258.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 1092 Client.exe 2196 Launcher.exe 2376 zzzz.exe 1700 chargeable.exe 2688 690c1b65a6267d6d0b201ba46089aabc.exe 2756 OSPPSVC.exe 2684 chargeable.exe 2204 chargeable.exe 1632 chargeable.exe 536 chargeable.exe 2808 651654794161616171771852588547475885414152526396369965885471452525258.exe 1768 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe 2144 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe 2184 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe 1700 $77Microsoft To Do.exe 1644 svchost.exe 680 svchost.exe 1396 svchost.exe 2332 svchost.exe -
Loads dropped DLL 27 IoCs
pid Process 2316 AnaRAT.exe 2316 AnaRAT.exe 1972 0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe 1972 0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe 1972 0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe 2316 AnaRAT.exe 2316 AnaRAT.exe 2316 AnaRAT.exe 2316 AnaRAT.exe 2316 AnaRAT.exe 2316 AnaRAT.exe 2316 AnaRAT.exe 2316 AnaRAT.exe 2316 AnaRAT.exe 2316 AnaRAT.exe 2316 AnaRAT.exe 2316 AnaRAT.exe 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 2980 Process not Found 1180 Process not Found 2736 73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe 2736 73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe 2416 cmd.exe 1644 svchost.exe 2372 cmd.exe 2372 cmd.exe 1396 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000500000001a3e4-64.dat upx behavioral1/memory/2904-75-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/1972-94-0x0000000010000000-0x00000000101A5000-memory.dmp upx behavioral1/memory/1972-97-0x0000000010000000-0x00000000101A5000-memory.dmp upx behavioral1/memory/1972-99-0x0000000010000000-0x00000000101A5000-memory.dmp upx behavioral1/memory/1972-96-0x0000000010000000-0x00000000101A5000-memory.dmp upx behavioral1/memory/2904-309-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2904-308-0x0000000000400000-0x000000000048A000-memory.dmp upx behavioral1/memory/2904-483-0x0000000000400000-0x000000000048A000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zzzz.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zzzz.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zzzz.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\DriverrHub\\$77Microsoft To Do.exe\"" 1231234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 62264.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Client.exe" 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\zzzz = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zzzz.exe" 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\confuse = "C:\\Users\\Admin\\AppData\\Roaming\\confuse\\chargeable.exe" 73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysMain = "C:\\Users\\Admin\\AppData\\Local\\73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe" 73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cisco = "C:\\Users\\Admin\\Pictures\\Cisco\\VPNManager.exe" 651654794161616171771852588547475885414152526396369965885471452525258.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Sub\\WatchDog.exe" Client.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File created C:\ProgramData\NNYJZAHP\FileGrabber\Desktop\desktop.ini zzzz.exe File created C:\ProgramData\NNYJZAHP\FileGrabber\Documents\desktop.ini zzzz.exe File created C:\ProgramData\NNYJZAHP\FileGrabber\Pictures\desktop.ini zzzz.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 48 discord.com 49 discord.com -
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 api.ipify.org 26 api.ipify.org 27 ip-api.com 29 api.ipify.org 35 api.ipify.org 11 freegeoip.app 14 freegeoip.app -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 2104 set thread context of 2688 2104 690c1b65a6267d6d0b201ba46089aabc.exe 82 PID 1700 set thread context of 1632 1700 chargeable.exe 87 PID 1700 set thread context of 2684 1700 chargeable.exe 86 PID 1700 set thread context of 2204 1700 chargeable.exe 85 PID 1700 set thread context of 536 1700 chargeable.exe 84 PID 2904 set thread context of 1768 2904 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe 91 PID 2904 set thread context of 2144 2904 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe 92 PID 2904 set thread context of 2184 2904 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe 93 PID 1396 set thread context of 2332 1396 svchost.exe 110 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\it-IT\zzzz.exe a6a1abaf12a28ea8f6553356c3bdcf57.exe File opened for modification C:\Program Files (x86)\Windows Defender\it-IT\zzzz.exe a6a1abaf12a28ea8f6553356c3bdcf57.exe File created C:\Program Files (x86)\Windows Defender\it-IT\682643c589ab99 a6a1abaf12a28ea8f6553356c3bdcf57.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\xdwd.dll Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zzzz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 651654794161616171771852588547475885414152526396369965885471452525258.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 651654794161616171771852588547475885414152526396369965885471452525258.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chargeable.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnaRAT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SCRIPT~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chargeable.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 690c1b65a6267d6d0b201ba46089aabc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 690c1b65a6267d6d0b201ba46089aabc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 zzzz.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier zzzz.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2500 timeout.exe 1792 timeout.exe -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Launcher.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 Launcher.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Launcher.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Launcher.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" Launcher.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" Launcher.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings Launcher.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Launcher.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 Launcher.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Launcher.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Launcher.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Launcher.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Launcher.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Launcher.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg Launcher.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Launcher.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Launcher.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Launcher.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Launcher.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" Launcher.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 17 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2732 schtasks.exe 2728 schtasks.exe 1532 schtasks.exe 1812 schtasks.exe 2352 schtasks.exe 2088 schtasks.exe 1700 schtasks.exe 2828 schtasks.exe 2984 schtasks.exe 2628 schtasks.exe 2132 schtasks.exe 2356 schtasks.exe 2684 schtasks.exe 2852 schtasks.exe 1392 schtasks.exe 1568 schtasks.exe 2228 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1756 powershell.exe 2448 powershell.exe 2700 1231234.exe 2700 1231234.exe 2700 1231234.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2376 zzzz.exe 2376 zzzz.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2756 OSPPSVC.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2904 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe 2904 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe 2904 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe Token: SeDebugPrivilege 1756 powershell.exe Token: SeDebugPrivilege 1092 Client.exe Token: SeDebugPrivilege 2448 powershell.exe Token: SeDebugPrivilege 2700 1231234.exe Token: SeDebugPrivilege 2376 zzzz.exe Token: SeDebugPrivilege 2012 powershell.exe Token: SeDebugPrivilege 2288 powershell.exe Token: SeDebugPrivilege 1220 powershell.exe Token: SeDebugPrivilege 1792 powershell.exe Token: SeDebugPrivilege 2928 powershell.exe Token: SeDebugPrivilege 2756 OSPPSVC.exe Token: SeDebugPrivilege 2184 172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe Token: SeDebugPrivilege 1632 chargeable.exe Token: 33 1632 chargeable.exe Token: SeIncBasePriorityPrivilege 1632 chargeable.exe Token: SeDebugPrivilege 1700 $77Microsoft To Do.exe Token: 33 1632 chargeable.exe Token: SeIncBasePriorityPrivilege 1632 chargeable.exe Token: 33 1632 chargeable.exe Token: SeIncBasePriorityPrivilege 1632 chargeable.exe Token: SeDebugPrivilege 2688 690c1b65a6267d6d0b201ba46089aabc.exe Token: 33 1632 chargeable.exe Token: SeIncBasePriorityPrivilege 1632 chargeable.exe Token: SeDebugPrivilege 680 svchost.exe Token: 33 680 svchost.exe Token: SeIncBasePriorityPrivilege 680 svchost.exe Token: 33 1632 chargeable.exe Token: SeIncBasePriorityPrivilege 1632 chargeable.exe Token: 33 680 svchost.exe Token: SeIncBasePriorityPrivilege 680 svchost.exe Token: 33 1972 0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe Token: SeIncBasePriorityPrivilege 1972 0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe Token: 33 1632 chargeable.exe Token: SeIncBasePriorityPrivilege 1632 chargeable.exe Token: 33 680 svchost.exe Token: SeIncBasePriorityPrivilege 680 svchost.exe Token: 33 1632 chargeable.exe Token: SeIncBasePriorityPrivilege 1632 chargeable.exe Token: 33 680 svchost.exe Token: SeIncBasePriorityPrivilege 680 svchost.exe Token: 33 1632 chargeable.exe Token: SeIncBasePriorityPrivilege 1632 chargeable.exe Token: 33 680 svchost.exe Token: SeIncBasePriorityPrivilege 680 svchost.exe Token: SeDebugPrivilege 2332 svchost.exe Token: 33 1632 chargeable.exe Token: SeIncBasePriorityPrivilege 1632 chargeable.exe Token: 33 680 svchost.exe Token: SeIncBasePriorityPrivilege 680 svchost.exe Token: 33 1632 chargeable.exe Token: SeIncBasePriorityPrivilege 1632 chargeable.exe Token: 33 680 svchost.exe Token: SeIncBasePriorityPrivilege 680 svchost.exe Token: 33 1632 chargeable.exe Token: SeIncBasePriorityPrivilege 1632 chargeable.exe Token: 33 680 svchost.exe Token: SeIncBasePriorityPrivilege 680 svchost.exe Token: 33 1632 chargeable.exe Token: SeIncBasePriorityPrivilege 1632 chargeable.exe Token: 33 680 svchost.exe Token: SeIncBasePriorityPrivilege 680 svchost.exe Token: 33 1632 chargeable.exe Token: SeIncBasePriorityPrivilege 1632 chargeable.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2196 Launcher.exe 2808 651654794161616171771852588547475885414152526396369965885471452525258.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 1972 2316 AnaRAT.exe 30 PID 2316 wrote to memory of 1972 2316 AnaRAT.exe 30 PID 2316 wrote to memory of 1972 2316 AnaRAT.exe 30 PID 2316 wrote to memory of 1972 2316 AnaRAT.exe 30 PID 2316 wrote to memory of 1972 2316 AnaRAT.exe 30 PID 2316 wrote to memory of 1972 2316 AnaRAT.exe 30 PID 2316 wrote to memory of 1972 2316 AnaRAT.exe 30 PID 2316 wrote to memory of 2104 2316 AnaRAT.exe 31 PID 2316 wrote to memory of 2104 2316 AnaRAT.exe 31 PID 2316 wrote to memory of 2104 2316 AnaRAT.exe 31 PID 2316 wrote to memory of 2104 2316 AnaRAT.exe 31 PID 2316 wrote to memory of 2052 2316 AnaRAT.exe 32 PID 2316 wrote to memory of 2052 2316 AnaRAT.exe 32 PID 2316 wrote to memory of 2052 2316 AnaRAT.exe 32 PID 2316 wrote to memory of 2052 2316 AnaRAT.exe 32 PID 2316 wrote to memory of 2736 2316 AnaRAT.exe 33 PID 2316 wrote to memory of 2736 2316 AnaRAT.exe 33 PID 2316 wrote to memory of 2736 2316 AnaRAT.exe 33 PID 2316 wrote to memory of 2736 2316 AnaRAT.exe 33 PID 2316 wrote to memory of 2700 2316 AnaRAT.exe 34 PID 2316 wrote to memory of 2700 2316 AnaRAT.exe 34 PID 2316 wrote to memory of 2700 2316 AnaRAT.exe 34 PID 2316 wrote to memory of 2700 2316 AnaRAT.exe 34 PID 2052 wrote to memory of 2704 2052 62264.exe 35 PID 2052 wrote to memory of 2704 2052 62264.exe 35 PID 2052 wrote to memory of 2704 2052 62264.exe 35 PID 2052 wrote to memory of 2704 2052 62264.exe 35 PID 2052 wrote to memory of 2704 2052 62264.exe 35 PID 2052 wrote to memory of 2704 2052 62264.exe 35 PID 2052 wrote to memory of 2704 2052 62264.exe 35 PID 2316 wrote to memory of 2656 2316 AnaRAT.exe 36 PID 2316 wrote to memory of 2656 2316 AnaRAT.exe 36 PID 2316 wrote to memory of 2656 2316 AnaRAT.exe 36 PID 2316 wrote to memory of 2656 2316 AnaRAT.exe 36 PID 2316 wrote to memory of 2904 2316 AnaRAT.exe 37 PID 2316 wrote to memory of 2904 2316 AnaRAT.exe 37 PID 2316 wrote to memory of 2904 2316 AnaRAT.exe 37 PID 2316 wrote to memory of 2904 2316 AnaRAT.exe 37 PID 2316 wrote to memory of 2564 2316 AnaRAT.exe 38 PID 2316 wrote to memory of 2564 2316 AnaRAT.exe 38 PID 2316 wrote to memory of 2564 2316 AnaRAT.exe 38 PID 2316 wrote to memory of 2564 2316 AnaRAT.exe 38 PID 2316 wrote to memory of 2672 2316 AnaRAT.exe 39 PID 2316 wrote to memory of 2672 2316 AnaRAT.exe 39 PID 2316 wrote to memory of 2672 2316 AnaRAT.exe 39 PID 2316 wrote to memory of 2672 2316 AnaRAT.exe 39 PID 2656 wrote to memory of 1756 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 40 PID 2656 wrote to memory of 1756 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 40 PID 2656 wrote to memory of 1756 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 40 PID 2656 wrote to memory of 1092 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 43 PID 2656 wrote to memory of 1092 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 43 PID 2656 wrote to memory of 1092 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 43 PID 2656 wrote to memory of 2196 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 44 PID 2656 wrote to memory of 2196 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 44 PID 2656 wrote to memory of 2196 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 44 PID 2656 wrote to memory of 2448 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 45 PID 2656 wrote to memory of 2448 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 45 PID 2656 wrote to memory of 2448 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 45 PID 2656 wrote to memory of 2376 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 49 PID 2656 wrote to memory of 2376 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 49 PID 2656 wrote to memory of 2376 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 49 PID 2656 wrote to memory of 2376 2656 150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe 49 PID 2672 wrote to memory of 2012 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 66 PID 2672 wrote to memory of 2012 2672 a6a1abaf12a28ea8f6553356c3bdcf57.exe 66 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zzzz.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 zzzz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnaRAT.exe"C:\Users\Admin\AppData\Local\Temp\AnaRAT.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe"C:\Users\Admin\AppData\Local\0430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
C:\Users\Admin\AppData\Local\690c1b65a6267d6d0b201ba46089aabc.exe"C:\Users\Admin\AppData\Local\690c1b65a6267d6d0b201ba46089aabc.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Users\Admin\AppData\Local\690c1b65a6267d6d0b201ba46089aabc.exe"C:\Users\Admin\AppData\Local\690c1b65a6267d6d0b201ba46089aabc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2688 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"' & exit4⤵
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"'5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2356
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp64EB.tmp.bat""4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2372 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1792
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\62264.exe"C:\Users\Admin\AppData\Local\62264.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRIPT~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SCRIPT~1.EXE3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\svchost.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:680
-
-
-
-
C:\Users\Admin\AppData\Local\73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe"C:\Users\Admin\AppData\Local\73304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe4⤵
- Executes dropped EXE
PID:536
-
-
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe4⤵
- Executes dropped EXE
PID:2204
-
-
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe4⤵
- Executes dropped EXE
PID:2684
-
-
C:\Users\Admin\AppData\Roaming\confuse\chargeable.exeC:\Users\Admin\AppData\Roaming\confuse\chargeable.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\confuse\chargeable.exe" "chargeable.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1960
-
-
-
-
-
C:\Users\Admin\AppData\Local\1231234.exe"C:\Users\Admin\AppData\Local\1231234.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp1A54.tmp.bat""3⤵
- Loads dropped DLL
PID:2416 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:2500
-
-
C:\Users\Admin\AppData\Roaming\DriverrHub\$77Microsoft To Do.exe"C:\Users\Admin\AppData\Roaming\DriverrHub\$77Microsoft To Do.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
-
-
C:\Users\Admin\AppData\Local\150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe"C:\Users\Admin\AppData\Local\150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Client.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"3⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Windows\system32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\Client.exe" & exit4⤵PID:568
-
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\Client.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:1392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2196
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\zzzz.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\zzzz.exe"C:\Users\Admin\AppData\Local\Temp\zzzz.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2376
-
-
-
C:\Users\Admin\AppData\Local\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe"C:\Users\Admin\AppData\Local\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:2904 -
C:\Users\Admin\AppData\Local\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exeC:\Users\Admin\AppData\Local\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe /stext "C:\Users\Admin\AppData\Local\Temp\brdeokmuxprbhwgcasdrbllojj"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1768
-
-
C:\Users\Admin\AppData\Local\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exeC:\Users\Admin\AppData\Local\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe /stext "C:\Users\Admin\AppData\Local\Temp\ltqxgdwnlxjgjkugjdptmpgxkxryuj"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:2144
-
-
C:\Users\Admin\AppData\Local\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exeC:\Users\Admin\AppData\Local\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe /stext "C:\Users\Admin\AppData\Local\Temp\onvhhvhpzfbluqqkagkupcaoteazwulkp"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
-
C:\Users\Admin\AppData\Local\651654794161616171771852588547475885414152526396369965885471452525258.exe"C:\Users\Admin\AppData\Local\651654794161616171771852588547475885414152526396369965885471452525258.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Users\Admin\AppData\Local\651654794161616171771852588547475885414152526396369965885471452525258.exe"C:\Users\Admin\AppData\Local\651654794161616171771852588547475885414152526396369965885471452525258.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
-
C:\Users\Admin\AppData\Local\a6a1abaf12a28ea8f6553356c3bdcf57.exe"C:\Users\Admin\AppData\Local\a6a1abaf12a28ea8f6553356c3bdcf57.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Defender\it-IT\zzzz.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\dwm.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\1231234.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Desktop\OSPPSVC.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\egjtKZhlKS.bat"3⤵PID:304
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:2332
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:24⤵PID:2900
-
-
C:\Users\All Users\Desktop\OSPPSVC.exe"C:\Users\All Users\Desktop\OSPPSVC.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "zzzzz" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Defender\it-IT\zzzz.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2684
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "zzzz" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Defender\it-IT\zzzz.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2984
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "zzzzz" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Defender\it-IT\zzzz.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2628
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\dwm.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1532
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dwmd" /sc MINUTE /mo 12 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\dwm.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1812
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "12312341" /sc MINUTE /mo 14 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\1231234.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1568
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "1231234" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\1231234.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2852
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "12312341" /sc MINUTE /mo 8 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\1231234.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 10 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2228
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2728
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 6 /tr "'C:\Recovery\8cdd6da2-3d81-11ef-9400-f2a3cf4ad94f\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2132
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Desktop\OSPPSVC.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2088
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\All Users\Desktop\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1700
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Desktop\OSPPSVC.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2828
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
10KB
MD5e9faa70844e819a8a34f17ba51f29347
SHA1ea7ad09cf4da18866dc9cef3e827e9c324a8db6c
SHA2566a4225dc68dbf5d28868cdd31f3f06657659e239ebe917bc5af334c323b0a667
SHA51276b4f8b505fdd91c34ffda2f58d242a42ea9ed48d4a72ea8dd7f5360df3b093e414223bd23b6ca36e8afb7a7a63b3530cdcac7e036465fc2280217d821f98a8b
-
Filesize
148KB
MD580458c50ddcdab61b4f0beeba470daa0
SHA1aed0fbc7a831410fc203c9bc982104089f721e0c
SHA2560a0b7729203eac13438933fca6d93c9f3f75938347efe9aa1dcf1383518a8c6d
SHA5125cd0ac32bf07bd4825d42e3d6b8f457bea94d11dbc804393db91944c1c978da4fe29e151fe260f5b8f17d88dfff34776d0d5a0f08826e2c1371b17007eadd650
-
Filesize
307KB
MD506e53a3c4f811e3f2ec6b9537eb7abf5
SHA1319110069e006b3a8b19d48986ccbc04e143ee55
SHA256bb340cf5cc4bbe6df54453fb1c870aa3b39c02b7b65c2447a0470ed5d8fc0778
SHA51280a227b983fdcfa38bfe215850eebe23944a41ca153d2a7570f2e28e74fc4d1b355c27ae361ae709fc9175515bb9ff5e8b36cebb8a375004205dc4dc4eb48468
-
Filesize
339KB
MD5afdc741a1304a65da0ce003a6eaa6c3a
SHA1f5e1fbeaad5067209e24970792a6619b73abc381
SHA2564bb40b716a05baddda8040bc1971ceb23d13d372059b1a3a14f9fa5bf9199af3
SHA512f0f6e4c4b7ecbcc9b415fed960018ed78602408b9945342c11601ab01a27fdef1d68164700cade4699f0631fa6eeb17465ac78ab8bf93fad9c2e1dc2c64606e4
-
Filesize
265KB
MD5a2866baba3d49f8abea371b592de6a73
SHA189ee627f7df114e7ad13b4ad6e7a0ba5be8a7791
SHA2563313bcdc4fef6a53d6de3c9dcdc9ec33bf2642f1ab2027bbce976d35943134ec
SHA5125d947c44f0fda48d6bf856cd4c9be947428fe6711651c61646a38d8f3b1210d43e215aaf4340dd07ff3f7448e42f5d4a64fc47734ad2f54eaa6ad34b9bf33db3
-
Filesize
201KB
MD58f21bf6fd322f6b121286293a987c06d
SHA17fe4648d433637ab69285a325e2c1c5e9220cb09
SHA2566abb64f1823988c4efd32008a49ad15dee625b9d45bdd524b0af3556d2557619
SHA512516fafa6c3d158eb74a08442e6b7b6e6fe3caa8529574f0348ad9f8250dc937bc24ab0cb6a9dcecb7c2a1886384e1d9464f529342173e67dea8b6c6f2291a078
-
Filesize
368KB
MD5e8d10cf653f35a50c099cc50432f7fce
SHA13439cbee6680df96d83c9d51581b5b26c141a2d2
SHA25609e90e69ac27a607b249b868aaf889db165449faef137f375d225f4bea451d0a
SHA512a87f4747a835df9314e313d21145b098c6273aee37f664d398f88e4b5610069046e2c8d26d5e4bfc341cba42bff7f37daf6741f6fd24b1f462b47daabb9e039c
-
Filesize
409KB
MD54851060ec0cadc22d5bc6f1cbf810d85
SHA190d192d16dac939017d41b7d2c72251c4c66e6a3
SHA256dc8da8bd2d99e6a0e41df2223c63a848cd2c89404a23be90f6f1a3b0502e97b6
SHA51251703941b598a46bffaa7feee97e8b136a17ca21521ac378a4e8cb4731ec98ab79d85c469473d2b1ae13eedaac29c259bcb29c1363877b42fd61d8989257aa0f
-
Filesize
839KB
MD583c5d15e0f9ddaae4c60b43aae987e7e
SHA11490e207440f82c2c6f03299cec32ec030cf6cab
SHA2566f2f05110066ca866e9a390fc94c51e08daec362967b39b7a533e0d4839b5ef7
SHA5129399dcb41257bb8e95461d4612b8932261336de814268e3498c1791ddde7dac7d5bfdcd865c8c8a330ed8d6ce92596e7d7d09bc7ec496339b9ce534e76796c38
-
Filesize
989KB
MD5f5af125bcb1d1027bff05c91600c3724
SHA17dfc756c72b447af0d45a0d4c7b02e8154951f3c
SHA25623641d1dcab7f42354da9aa59c39b90805d415a7bcbf331646961ee2fc7bca90
SHA5124af3cc2baa415115b329e64b0ae4b1fb63c803ec94cdb481a74baa30848aa63aff77cbd4d0da84f8406461002b06ecd750f72ca0ef6a869295ec93cfaee18446
-
Filesize
391KB
MD5f069d4049635838ac2823d361edb0392
SHA127a60423d85517baef990ea3d84f9ecd5157c8c3
SHA2565df0822856fe80043f6025d67e7a8d00ed1b0c0bf674c369b8edc1a7a0db51c6
SHA51278d5248b87810aedbea1e8906f1ff082811add6f9ddc5239bcafb1a57ac9364fda3e0359c0df3446fd51bc516518c52380f6da6228be6555fd878a21db9636da
-
Filesize
595KB
MD521d57bc2f9d8c30d15c7120f76dae308
SHA1e8e7cd9e55ee9ebc64cc7843158b1c30c3f0bd2f
SHA25661b23e885fbe30c54542d47506ed8b0c910614affc3a16c1ba610263873c1a73
SHA51271015ddd850aee0c53a7e1610a666df27acf79762135ac333a0b3298289da0c7acdbc4e4868988dd7ba0699ed97bb7b5141a1c1ab562fafa4870684a00d860b8
-
Filesize
1.2MB
MD5835a4d5ff00e119b32f573c9987e9c3d
SHA1522031b3c21cb332c7197deb607b31cdea8c170c
SHA2560388029d8ec40231f22b288fb52165973fa02b357115324cd981ff5bbf71e09e
SHA5121fa43c10f3862e1fdebd64f37bb3587a9ade94e60e10ebeb449a263a70e61133f833b17ce4bc137c6b826e0b0592f589cae9fed16c0b69ff8b317c97ecb6ce0a
-
Filesize
182B
MD5a65f85e1a9b0821be88bd6110e5b6da6
SHA1fba58fbf6258c56e059766413f65790b7b582d10
SHA256fdae46e0ec6b2604c042dfe4caec04f3ca345c5dc3e6543e569d2cbc4d367437
SHA5126309cc9519e450aecb9efdf8c65f60b0a3592f7a256b6b08e02e83c4a223286a9aa4a7a1ea27fc118c87342744245ebd283d3f68403edb9aa46d5cc1545341ea
-
Filesize
37KB
MD58f00376c7ee9fb1653dc2ae09afa5589
SHA10005d278c062b496628e9c2a27043e87fc05689e
SHA2566d2223ee967236cbc2c35809fce753553cfdb0aac7ba34e7087e19d61eecaa18
SHA5122512a5b67867c7c1cfbc19f7adc7ad56c3a2bf821f0c74341d0e69ee89dc20bbdc9118714d67ada6a846edced58afc6d01b0fe7560f2166e02c9044f85bc00f9
-
Filesize
110KB
MD50dcc21bdebe05957ca2922be486abe22
SHA18bcbd8a839a58e0050c17221e6a1cc775f07586b
SHA25673304b5c73a1c90b192c8748348509c213890807d3ca34b08c8fb84652b0cbd3
SHA5120752ba22340fd3383132243580cb28a147e67b42bb920af8c0fde491d550556fdfa296e70d94f2ce9798faddd0dad4664e2c2edda8f6604b9ba9e63e8f875e0f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
100KB
MD521560cb75b809cf46626556cd5fbe3ab
SHA1f2eec01d42a301c3caacd41cddb0ef2284dbb5a6
SHA256d2525bab5cb322933c8978880975e0c189feece68ae3f1951bf46297c7f640fa
SHA51221eac0037b16f968ee8743b52dc73efdd34d24c2502d090b399a552dc6cb75f7d3090c10d448c66b868b1c4a7c46a5068b084b88b487e40b1e755356cb7557db
-
Filesize
210KB
MD54ca15a71a92f90c56b53d9d03da17657
SHA13d610aee0423eea84ad9dc0df7865e1bed982327
SHA256ab532f166e08886166c0ed6426bb6a8998de8273d37ccac5823528a1ba3d8ca1
SHA512e0d9e11b9a0fb84bab21cbe4638ead80319a9b38ed810a59a612ab844331adec32f2499425b0d9269f2eb3714e497ad31c9bdfded1f829533cc77bf2dea6464f
-
Filesize
22KB
MD54c8f3a1e15f370ca8afe2992902a6e98
SHA1dc6324d924ac31bea4ad7e4dd6720ecdad3877dd
SHA256dcdc72549f7ad41cc860738adbeee5e44f02222415fd84ed5c92538ac9049b92
SHA512b63c4e48f3024edcf1e1391b5df6ff65fc5111849eb093b429fa0f21c03339dbaeff835f18e250758498f3432874b85348530e47b2ada93f6f68615a5ccf66c0
-
Filesize
92KB
MD5a58d87b023e155c10b4e15fdfc6fcb06
SHA10ee449b782aeac54c0406adde543f19ecd9dfd38
SHA256331b040f0bd7731b64e72a837ad86943379ff02e239c305d200108fe7e3c8c61
SHA5121965574101a71a640efb135a49c4a968fd5feb328779c33936047afb2209424b44fba3a1ccdacee959ce5a016f22b49c8b42dc543476b11f83df0feb1b080eae
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
214B
MD514fc3f11b153ca5e6ef0d7617851a111
SHA1922bad6c77677529e65e87f76ccd5f42676ebd34
SHA25603aaa5f87980d3cead074e086782ec868bbce5765640c9fae99270fae6b61ffe
SHA51263a8fb1deac361af866343b0c59f025b9fd5643685ab31726eea37bf57e517c46c8af8e03c76d3b7372f8ea8904966e6c5ce7fa6683cbda46e3fcbd582dcbed9
-
Filesize
173B
MD5fad26880a406054dce9a17006547dc61
SHA1d206b5220986a63dc8948c32c25e88ed3b51696c
SHA25665cff2b2083666f7b2e9059d0f963bad325566714334d0f3e53a93aee1740e5b
SHA512e58cdca2adab920bdb2eb95dbe259b384b4482a8c9b98a831c584d5f4f67e84e076e320dd614164ec71640e45919d29a7800d3402e5c4fc26f9565d903324399
-
Filesize
154B
MD55caa639aea42a35722614a24553e6734
SHA19a8c41f3524fb428187beda054954b1fa8947b93
SHA256c2498c688896c00a47f8908b96c33a5d3e094f4486a42275df9d1749492be6a4
SHA51279e9d283543bcf4cbfe9f2865b45bf91c99f492b7839fa47c4f256ab984a11cb0e588023f0d2b5dead6481cd2eccfc42f32725bb8e07c6842af3749514e21e12
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
320KB
MD5de4824c195cf1b2bb498511ef461e49b
SHA1f15ca6d0e02c785cce091dbd716cd43e3f5a80bd
SHA25651813dfedbe02f03d08b4728187eadb4948d8be40c9d8fe6e4e1cb61fa7ae209
SHA512b211a636f2799d90ce38348dbbc7dbc69ac5374129c7896a137f03a57fe78139a030c1edb90cfc4203799d77a8720df431da75986aa1d8b16274030ad1db770a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\B28K0R9OCQ6AUL1SG1IO.temp
Filesize7KB
MD51d1255135b8ec863ac6543d4ee4fbce4
SHA1b9da052f66b3b07b06435153f6b66528dda72474
SHA2566b9259938ecad529f7ca1c4559dbf3b4a0e33b35665fde9d2df929bd25b7e412
SHA512a25a242adf9063018a8c5a7b791861310818031657e7932020b76ac7454bb876da4edadf0ad7b2bc844f9b080e5aaa9246eb7e07ecb340c0d483ef90cecd761b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NW4BK931H45592EKXK7Z.temp
Filesize7KB
MD5c630c1d4fbbc495530f7795b2b41c82f
SHA1e1c3f9dd207e5ecbaf9592faad39bc41cb86f9e2
SHA256e299853c7fc2d70851897197914f80de5a02ed216da245f2f7ac3c6427468511
SHA512845d705b60254c035c536dbad59042e1f89926a06cc534690979c8aa2d1642f6f55a0341ef3d167550956c1a9454712bba1a9e12f01272c7cbefbaf3e552430c
-
Filesize
110KB
MD5622612f0d0c64efaee69441b875aded0
SHA16959b24d41566cb7f468503feca38c312e0b6a18
SHA2564bd34e42d5175064c1e7cffc2c552291bf0cd3f157616f2abc83e8b862ecbbb0
SHA512369b3cc119c15c10041b1f00ed0691ad43dece0031d219da8c430c2fba3991452adf851afdc0183afcccbe4dc5e84451dc899e1f2319d1f8428d0608560d72e9
-
Filesize
152KB
MD54b6d4727ca3c277e5af47092ec9e3ef1
SHA18faea131181960c1f43ccee6a2b7bcdaa23fcd81
SHA2565fb62cc6421cf636023381cc6fd5a06e3b326a58ea3d3ce9c879f1cc408519f4
SHA5128a1814ec549a42771cbe83fe7612d7e269af27d092a5c0ae685e92772dc7effd2b14829090f0b12edfbabeb9804f80558f2b316efb4f48a6a3b500b1172c2bbc
-
Filesize
446KB
MD5385585748cd6feff767a913bd76c2457
SHA11bedac2bc0da78c4dbaaf3914816d84f5c08f005
SHA2560430dc1af2f95a33401d17b84b314a48cf619c9cae8e7fb8376466ca96ba8ec5
SHA51280619ee207d6c5a352d811405c40bcb9043fb2b2759ad40575e03e9e7b89f4ad55f6bc01dfe62a64b42dcd9b3b5bfef10503ce72f4efa0d2e39546f92047a880
-
Filesize
227KB
MD51a83a244d9e90a4865aac14bc0e27052
SHA1d2b65e7aed7657c9915f90f03d46902087479753
SHA256150704149f7e54c4f7cbdb776f33173979791bc0c625f42477815923d13f8712
SHA512f4b9d26d8a0841f9425abf038f85563ddee65e2404bc508fd23c8023bb565fd7f0ceaeaadde49c4951d3bbbb93f6b64b3cf610464855a2bf2d418477dd4fe03f
-
\Users\Admin\AppData\Local\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe
Filesize233KB
MD54ef3177a2e94ce3d15ae9490a73a2212
SHA1a34f47568ce7fcea97a002eebeae385efa98790c
SHA25687353d18dfdebf4d0747bbf21d58adaed2b04060d61cba3fa052d522640520f0
SHA512635ce5c0d1b9f7dd5d7b4c00f216af06dc7d818132ba87a57d3d54f6b30ee01f64430d2aa265f60027cc58dc2e738d5b674ee36ffdca34ff540ce44b7da7c502
-
Filesize
198KB
MD5f30e9ff8706f3ec72c82a74ee6328db9
SHA1b526d52d22600b28892f898a717eb25779ef3044
SHA256d22bf8ad4fc9b769ea2944bbdee78277ab29bac7199407baf7c3b489568a9489
SHA512a21220d5f1818c9c5aa55cf8560365888046a090b8892a9d87919b48ac921bd2fdfd6016ace77fa8205fde067c7d45cb01032a47f4325fcac560361d66cc58f6
-
\Users\Admin\AppData\Local\651654794161616171771852588547475885414152526396369965885471452525258.exe
Filesize1.6MB
MD5e2100d88aca7c0a44ba9bb988ccd3916
SHA1ddaf17adbc769556037bb4fbf4bce7065bf57ef3
SHA25675f846b15fa1b548a0143f35584b25875a03c03a783e9310c8573f3b76957688
SHA5125b7fb077ea9d7d1310db3eb26b6624e3d12fe9f3d55d0a37d57c28197dab7e05449c6611d5b9a02f054d8ad790e12050228c8d7b913bb55e3f2b0da694c67ec5
-
Filesize
608KB
MD5690c1b65a6267d6d0b201ba46089aabc
SHA19eb6859bae82bcf8b9df7cf4fc061cd9155fdc39
SHA256244f3a2fad1afa232909355901f33cca18ea95444c5d142c7aa308170db5294f
SHA512cc540851386a3b98227822b2c952a57caf15db4563f9c246b8be5bca0989aaff70e64191d010738db86598d76dd8ad4e59a50965224db9f623edb64f2f8b3e2a
-
Filesize
874KB
MD5a6a1abaf12a28ea8f6553356c3bdcf57
SHA1b7613fb9944bc3d8e11b5eb6f7ff706f04e8ad53
SHA256f2507211585dfe351ff53086f30b42572db223b2646e45f91b7f3e202bb0bb76
SHA512e525d119128c1ca1c05d379b9ebba9791b7b15390c8999773bff6517fde674178e17ee2c7c126b249c8c54b4dd1c07326ba24d52c8c192f067bc7e8545113a65