Analysis
-
max time kernel
43s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 03:59
Behavioral task
behavioral1
Sample
2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe
-
Size
58.2MB
-
MD5
80be5927fd12a2f3b00f8d66b0fb91b7
-
SHA1
97576ecdc61cc2c1b3b1ace805d6cda3636f71e2
-
SHA256
85b9128c0f0e79af0a37b838ab8d97bd8d2cb11a2362c22b694bc1c9ba27ca66
-
SHA512
b3400b47877d8fb1c7a22382b00cd26c1591f944a4673682179735fa4ffeba496861dfb27c6b197417b2beff0011247d500088c2dddede98f28720265342ac65
-
SSDEEP
1572864:tLOrJXzVj0mz3uu2etPQiWmoh8rb28CQV2Y:tLqJXBj0kuu3IDmnrb5r
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Extracted
raccoon
2ca5558c9ec8037d24a611513d7bd076
https://192.153.57.177:80
-
user_agent
MrBidenNeverKnow
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule behavioral1/files/0x00030000000178b0-3446.dat cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Raccoon Stealer V2 payload 3 IoCs
resource yara_rule behavioral1/memory/3368-3442-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral1/memory/3368-3438-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 behavioral1/memory/3368-3441-0x0000000000400000-0x0000000000416000-memory.dmp family_raccoon_v2 -
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/3336-3466-0x0000000000400000-0x0000000000451000-memory.dmp modiloader_stage2 -
XMRig Miner payload 29 IoCs
resource yara_rule behavioral1/memory/3112-3465-0x000000013F720000-0x000000013FA71000-memory.dmp xmrig behavioral1/memory/2080-3491-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/3676-3522-0x000000013FFD0000-0x0000000140321000-memory.dmp xmrig behavioral1/memory/1628-3516-0x000000013FE00000-0x0000000140151000-memory.dmp xmrig behavioral1/memory/2204-3500-0x000000013F0A0000-0x000000013F3F1000-memory.dmp xmrig behavioral1/memory/3112-3499-0x0000000002430000-0x0000000002781000-memory.dmp xmrig behavioral1/memory/3804-3550-0x000000013FB80000-0x000000013FED1000-memory.dmp xmrig behavioral1/memory/2624-3513-0x000000013F330000-0x000000013F681000-memory.dmp xmrig behavioral1/memory/3724-3510-0x000000013F720000-0x000000013FA71000-memory.dmp xmrig behavioral1/memory/3840-3498-0x000000013FF70000-0x00000001402C1000-memory.dmp xmrig behavioral1/memory/1916-3496-0x000000013F670000-0x000000013F9C1000-memory.dmp xmrig behavioral1/memory/3844-3493-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/3404-3492-0x000000013F080000-0x000000013F3D1000-memory.dmp xmrig behavioral1/memory/3220-3481-0x000000013F520000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/3324-3553-0x000000013F6F0000-0x000000013FA41000-memory.dmp xmrig behavioral1/memory/3112-3573-0x000000013FB10000-0x000000013FE61000-memory.dmp xmrig behavioral1/memory/1916-4026-0x000000013F670000-0x000000013F9C1000-memory.dmp xmrig behavioral1/memory/3840-4028-0x000000013FF70000-0x00000001402C1000-memory.dmp xmrig behavioral1/memory/3676-4030-0x000000013FFD0000-0x0000000140321000-memory.dmp xmrig behavioral1/memory/3804-4032-0x000000013FB80000-0x000000013FED1000-memory.dmp xmrig behavioral1/memory/3324-4034-0x000000013F6F0000-0x000000013FA41000-memory.dmp xmrig behavioral1/memory/3220-4036-0x000000013F520000-0x000000013F871000-memory.dmp xmrig behavioral1/memory/3404-4040-0x000000013F080000-0x000000013F3D1000-memory.dmp xmrig behavioral1/memory/2080-4039-0x000000013F760000-0x000000013FAB1000-memory.dmp xmrig behavioral1/memory/3844-4042-0x000000013F530000-0x000000013F881000-memory.dmp xmrig behavioral1/memory/2204-4044-0x000000013F0A0000-0x000000013F3F1000-memory.dmp xmrig behavioral1/memory/3724-4049-0x000000013F720000-0x000000013FA71000-memory.dmp xmrig behavioral1/memory/2624-4048-0x000000013F330000-0x000000013F681000-memory.dmp xmrig behavioral1/memory/1628-4051-0x000000013FE00000-0x0000000140151000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3044 powershell.exe 2852 powershell.exe 3612 powershell.exe 3604 powershell.exe 3680 powershell.exe -
Manipulates Digital Signatures 1 TTPs 2 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates\BBB25ADE32D8BB0153C5DCE5DB824DBF9467B718\Blob = 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 IEXPLORE.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates\BBB25ADE32D8BB0153C5DCE5DB824DBF9467B718\Blob = 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 IEXPLORE.EXE -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 1908 attrib.exe -
resource yara_rule behavioral1/files/0x0005000000018fc4-75.dat aspack_v212_v242 -
Executes dropped EXE 4 IoCs
pid Process 1516 stopwatch.exe 1672 anti.exe 1996 screenscrew.exe 932 PurchaseOrder.exe -
Loads dropped DLL 9 IoCs
pid Process 2604 cmd.exe 2604 cmd.exe 2604 cmd.exe 2604 cmd.exe 2604 cmd.exe 2604 cmd.exe 932 PurchaseOrder.exe 932 PurchaseOrder.exe 932 PurchaseOrder.exe -
resource yara_rule behavioral1/memory/3112-3416-0x000000013F720000-0x000000013FA71000-memory.dmp upx behavioral1/files/0x00030000000178b0-3446.dat upx behavioral1/memory/3840-3454-0x000000013FF70000-0x00000001402C1000-memory.dmp upx behavioral1/memory/1916-3451-0x000000013F670000-0x000000013F9C1000-memory.dmp upx behavioral1/memory/3676-3458-0x000000013FFD0000-0x0000000140321000-memory.dmp upx behavioral1/memory/3804-3463-0x000000013FB80000-0x000000013FED1000-memory.dmp upx behavioral1/memory/3112-3465-0x000000013F720000-0x000000013FA71000-memory.dmp upx behavioral1/memory/2080-3491-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/3676-3522-0x000000013FFD0000-0x0000000140321000-memory.dmp upx behavioral1/memory/1628-3516-0x000000013FE00000-0x0000000140151000-memory.dmp upx behavioral1/memory/2204-3500-0x000000013F0A0000-0x000000013F3F1000-memory.dmp upx behavioral1/memory/3804-3550-0x000000013FB80000-0x000000013FED1000-memory.dmp upx behavioral1/memory/2624-3513-0x000000013F330000-0x000000013F681000-memory.dmp upx behavioral1/memory/3724-3510-0x000000013F720000-0x000000013FA71000-memory.dmp upx behavioral1/memory/3840-3498-0x000000013FF70000-0x00000001402C1000-memory.dmp upx behavioral1/memory/1916-3496-0x000000013F670000-0x000000013F9C1000-memory.dmp upx behavioral1/memory/3844-3493-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/3404-3492-0x000000013F080000-0x000000013F3D1000-memory.dmp upx behavioral1/memory/3220-3481-0x000000013F520000-0x000000013F871000-memory.dmp upx behavioral1/memory/3324-3471-0x000000013F6F0000-0x000000013FA41000-memory.dmp upx behavioral1/memory/3324-3553-0x000000013F6F0000-0x000000013FA41000-memory.dmp upx behavioral1/memory/1916-4026-0x000000013F670000-0x000000013F9C1000-memory.dmp upx behavioral1/memory/3840-4028-0x000000013FF70000-0x00000001402C1000-memory.dmp upx behavioral1/memory/3676-4030-0x000000013FFD0000-0x0000000140321000-memory.dmp upx behavioral1/memory/3804-4032-0x000000013FB80000-0x000000013FED1000-memory.dmp upx behavioral1/memory/3324-4034-0x000000013F6F0000-0x000000013FA41000-memory.dmp upx behavioral1/memory/3220-4036-0x000000013F520000-0x000000013F871000-memory.dmp upx behavioral1/memory/3404-4040-0x000000013F080000-0x000000013F3D1000-memory.dmp upx behavioral1/memory/2080-4039-0x000000013F760000-0x000000013FAB1000-memory.dmp upx behavioral1/memory/3844-4042-0x000000013F530000-0x000000013F881000-memory.dmp upx behavioral1/memory/2204-4044-0x000000013F0A0000-0x000000013F3F1000-memory.dmp upx behavioral1/memory/3724-4049-0x000000013F720000-0x000000013FA71000-memory.dmp upx behavioral1/memory/2624-4048-0x000000013F330000-0x000000013F681000-memory.dmp upx behavioral1/memory/1628-4051-0x000000013FE00000-0x0000000140151000-memory.dmp upx -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 72 api.ipify.org 73 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3364 1916 WerFault.exe 384 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stopwatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PurchaseOrder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Delays execution with timeout.exe 5 IoCs
pid Process 3328 timeout.exe 1476 timeout.exe 1072 timeout.exe 2700 timeout.exe 2616 timeout.exe -
Kills process with taskkill 64 IoCs
pid Process 1432 taskkill.exe 2608 taskkill.exe 1424 taskkill.exe 2852 taskkill.exe 1648 taskkill.exe 1652 taskkill.exe 3572 taskkill.exe 1040 taskkill.exe 2396 taskkill.exe 1500 taskkill.exe 1904 taskkill.exe 2436 taskkill.exe 1376 taskkill.exe 1204 taskkill.exe 2008 taskkill.exe 2608 taskkill.exe 2024 taskkill.exe 1184 taskkill.exe 2916 taskkill.exe 3272 taskkill.exe 2420 taskkill.exe 1324 taskkill.exe 2660 taskkill.exe 1548 taskkill.exe 1796 taskkill.exe 2440 taskkill.exe 1980 taskkill.exe 3528 taskkill.exe 2620 taskkill.exe 1704 taskkill.exe 3516 taskkill.exe 1764 taskkill.exe 1120 taskkill.exe 3044 taskkill.exe 3228 taskkill.exe 2624 taskkill.exe 328 taskkill.exe 1432 taskkill.exe 1120 taskkill.exe 1676 taskkill.exe 3268 taskkill.exe 2472 taskkill.exe 3060 taskkill.exe 1876 taskkill.exe 2936 taskkill.exe 1916 taskkill.exe 1720 taskkill.exe 3844 taskkill.exe 3396 taskkill.exe 2632 taskkill.exe 2956 taskkill.exe 1696 taskkill.exe 2728 taskkill.exe 1004 taskkill.exe 2832 taskkill.exe 1932 taskkill.exe 1716 taskkill.exe 2160 taskkill.exe 1584 taskkill.exe 2972 taskkill.exe 1556 taskkill.exe 592 taskkill.exe 792 taskkill.exe 3300 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6815B1D1-74A9-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6809CAF1-74A9-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Modifies registry class 19 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 IEXPLORE.EXE -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 3280 notepad.exe 3236 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1448 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2276 taskkill.exe Token: SeDebugPrivilege 2936 taskkill.exe Token: SeDebugPrivilege 1464 taskkill.exe Token: SeDebugPrivilege 1376 taskkill.exe Token: SeDebugPrivilege 2008 taskkill.exe Token: SeDebugPrivilege 2224 taskkill.exe Token: SeDebugPrivilege 1184 taskkill.exe Token: SeDebugPrivilege 3060 taskkill.exe Token: SeDebugPrivilege 2500 taskkill.exe Token: SeDebugPrivilege 2128 taskkill.exe Token: SeDebugPrivilege 1324 taskkill.exe Token: SeDebugPrivilege 2420 taskkill.exe Token: SeDebugPrivilege 480 taskkill.exe Token: SeDebugPrivilege 1888 taskkill.exe Token: SeDebugPrivilege 812 taskkill.exe Token: SeDebugPrivilege 1548 taskkill.exe Token: SeDebugPrivilege 760 taskkill.exe Token: SeDebugPrivilege 280 taskkill.exe Token: SeDebugPrivilege 1720 taskkill.exe Token: SeDebugPrivilege 776 taskkill.exe Token: SeDebugPrivilege 1660 taskkill.exe Token: SeDebugPrivilege 1644 taskkill.exe Token: SeDebugPrivilege 2180 taskkill.exe Token: SeDebugPrivilege 668 taskkill.exe Token: SeDebugPrivilege 2176 taskkill.exe Token: SeDebugPrivilege 1872 taskkill.exe Token: SeDebugPrivilege 1876 taskkill.exe Token: SeDebugPrivilege 1256 taskkill.exe Token: SeDebugPrivilege 1584 taskkill.exe Token: SeDebugPrivilege 2760 taskkill.exe Token: SeDebugPrivilege 2720 taskkill.exe Token: SeDebugPrivilege 2784 taskkill.exe Token: SeDebugPrivilege 3008 taskkill.exe Token: SeDebugPrivilege 2788 taskkill.exe Token: SeDebugPrivilege 2444 taskkill.exe Token: SeDebugPrivilege 2608 taskkill.exe Token: SeDebugPrivilege 2572 taskkill.exe Token: SeDebugPrivilege 1228 taskkill.exe Token: SeDebugPrivilege 2468 taskkill.exe Token: SeDebugPrivilege 2372 taskkill.exe Token: SeDebugPrivilege 2964 taskkill.exe Token: SeDebugPrivilege 2828 taskkill.exe Token: SeDebugPrivilege 2792 taskkill.exe Token: SeDebugPrivilege 2364 taskkill.exe Token: SeDebugPrivilege 1436 taskkill.exe Token: SeDebugPrivilege 2972 taskkill.exe Token: SeDebugPrivilege 2360 taskkill.exe Token: SeDebugPrivilege 1904 taskkill.exe Token: SeDebugPrivilege 2172 taskkill.exe Token: SeDebugPrivilege 2936 taskkill.exe Token: SeDebugPrivilege 1464 taskkill.exe Token: SeDebugPrivilege 1376 taskkill.exe Token: SeDebugPrivilege 2008 taskkill.exe Token: SeDebugPrivilege 3064 taskkill.exe Token: SeDebugPrivilege 2312 taskkill.exe Token: SeDebugPrivilege 336 taskkill.exe Token: SeDebugPrivilege 2500 taskkill.exe Token: SeDebugPrivilege 2128 taskkill.exe Token: SeDebugPrivilege 1324 taskkill.exe Token: SeDebugPrivilege 2420 taskkill.exe Token: SeDebugPrivilege 480 taskkill.exe Token: SeDebugPrivilege 1888 taskkill.exe Token: SeDebugPrivilege 812 taskkill.exe Token: SeDebugPrivilege 1548 taskkill.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1516 stopwatch.exe 1672 anti.exe 1964 iexplore.exe 1964 iexplore.exe 2336 iexplore.exe 2336 iexplore.exe 2336 iexplore.exe 2336 iexplore.exe 2336 iexplore.exe 2336 iexplore.exe 2336 iexplore.exe 2336 iexplore.exe 1964 iexplore.exe 1964 iexplore.exe 1964 iexplore.exe 1964 iexplore.exe 1964 iexplore.exe 1964 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1516 stopwatch.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2336 iexplore.exe 2336 iexplore.exe 780 IEXPLORE.EXE 780 IEXPLORE.EXE 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2604 2692 2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe 30 PID 2692 wrote to memory of 2604 2692 2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe 30 PID 2692 wrote to memory of 2604 2692 2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe 30 PID 2692 wrote to memory of 2604 2692 2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe 30 PID 2604 wrote to memory of 2044 2604 cmd.exe 32 PID 2604 wrote to memory of 2044 2604 cmd.exe 32 PID 2604 wrote to memory of 2044 2604 cmd.exe 32 PID 2604 wrote to memory of 2044 2604 cmd.exe 32 PID 2604 wrote to memory of 1516 2604 cmd.exe 33 PID 2604 wrote to memory of 1516 2604 cmd.exe 33 PID 2604 wrote to memory of 1516 2604 cmd.exe 33 PID 2604 wrote to memory of 1516 2604 cmd.exe 33 PID 2604 wrote to memory of 1672 2604 cmd.exe 34 PID 2604 wrote to memory of 1672 2604 cmd.exe 34 PID 2604 wrote to memory of 1672 2604 cmd.exe 34 PID 2604 wrote to memory of 1672 2604 cmd.exe 34 PID 2604 wrote to memory of 1996 2604 cmd.exe 35 PID 2604 wrote to memory of 1996 2604 cmd.exe 35 PID 2604 wrote to memory of 1996 2604 cmd.exe 35 PID 2604 wrote to memory of 1996 2604 cmd.exe 35 PID 2604 wrote to memory of 3040 2604 cmd.exe 36 PID 2604 wrote to memory of 3040 2604 cmd.exe 36 PID 2604 wrote to memory of 3040 2604 cmd.exe 36 PID 2604 wrote to memory of 3040 2604 cmd.exe 36 PID 2604 wrote to memory of 2828 2604 cmd.exe 37 PID 2604 wrote to memory of 2828 2604 cmd.exe 37 PID 2604 wrote to memory of 2828 2604 cmd.exe 37 PID 2604 wrote to memory of 2828 2604 cmd.exe 37 PID 2604 wrote to memory of 1476 2604 cmd.exe 38 PID 2604 wrote to memory of 1476 2604 cmd.exe 38 PID 2604 wrote to memory of 1476 2604 cmd.exe 38 PID 2604 wrote to memory of 1476 2604 cmd.exe 38 PID 3040 wrote to memory of 2276 3040 cmd.exe 40 PID 3040 wrote to memory of 2276 3040 cmd.exe 40 PID 3040 wrote to memory of 2276 3040 cmd.exe 40 PID 3040 wrote to memory of 2276 3040 cmd.exe 40 PID 3040 wrote to memory of 2936 3040 cmd.exe 43 PID 3040 wrote to memory of 2936 3040 cmd.exe 43 PID 3040 wrote to memory of 2936 3040 cmd.exe 43 PID 3040 wrote to memory of 2936 3040 cmd.exe 43 PID 3040 wrote to memory of 1464 3040 cmd.exe 44 PID 3040 wrote to memory of 1464 3040 cmd.exe 44 PID 3040 wrote to memory of 1464 3040 cmd.exe 44 PID 3040 wrote to memory of 1464 3040 cmd.exe 44 PID 3040 wrote to memory of 1376 3040 cmd.exe 45 PID 3040 wrote to memory of 1376 3040 cmd.exe 45 PID 3040 wrote to memory of 1376 3040 cmd.exe 45 PID 3040 wrote to memory of 1376 3040 cmd.exe 45 PID 3040 wrote to memory of 2008 3040 cmd.exe 46 PID 3040 wrote to memory of 2008 3040 cmd.exe 46 PID 3040 wrote to memory of 2008 3040 cmd.exe 46 PID 3040 wrote to memory of 2008 3040 cmd.exe 46 PID 3040 wrote to memory of 2224 3040 cmd.exe 47 PID 3040 wrote to memory of 2224 3040 cmd.exe 47 PID 3040 wrote to memory of 2224 3040 cmd.exe 47 PID 3040 wrote to memory of 2224 3040 cmd.exe 47 PID 3040 wrote to memory of 1184 3040 cmd.exe 48 PID 3040 wrote to memory of 1184 3040 cmd.exe 48 PID 3040 wrote to memory of 1184 3040 cmd.exe 48 PID 3040 wrote to memory of 1184 3040 cmd.exe 48 PID 3040 wrote to memory of 3060 3040 cmd.exe 49 PID 3040 wrote to memory of 3060 3040 cmd.exe 49 PID 3040 wrote to memory of 3060 3040 cmd.exe 49 PID 3040 wrote to memory of 3060 3040 cmd.exe 49 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1908 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\!m.bat" "2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\stopwatch.exestopwatch.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\anti.exeanti.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\screenscrew.exescreenscrew.exe3⤵
- Executes dropped EXE
PID:1996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K fence.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:1720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:1696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:1040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:2832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:2400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:2916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:2632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:1764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:1032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:1860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2404
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1448
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:1932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2260
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:824
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:1676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1228
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1196
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:2976
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:468
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:1924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:2440
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1288
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:3044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
PID:2636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- System Location Discovery: System Language Discovery
PID:2084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:1424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:776
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1468
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2176
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:2852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:1796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:1376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:1432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1524
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2848
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1448
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:2956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2588
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2436
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:2160
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:824
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1564
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1496
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1652
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:1204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:1812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:1432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:3528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3448
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1196
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:4060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3312
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3944
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:1908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:2728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:3300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:4020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:1704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:1348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:3572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:3272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3468
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:3268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:3516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3448
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵
- Kills process with taskkill
PID:1500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:4028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:2584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵
- Kills process with taskkill
PID:3844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:2372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3476
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:3396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵
- Kills process with taskkill
PID:3228
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:2864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3460
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im shutdown.exe4⤵PID:3108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe4⤵PID:3992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im werfault.exe4⤵PID:3812
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer3⤵PID:2828
-
-
C:\Windows\SysWOW64\timeout.exetimeout 303⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\PurchaseOrder.exePurchaseOrder.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:932 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\PurchaseOrder.exe"4⤵
- Command and Scripting Interpreter: PowerShell
PID:3044
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TESAYt.exe"4⤵
- Command and Scripting Interpreter: PowerShell
PID:2852
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TESAYt" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFB40.tmp"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1448
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:1540
-
-
-
C:\Windows\SysWOW64\cipher.execipher /k /h /e C:\Users\Admin\Desktop\*3⤵PID:2256
-
-
C:\Windows\SysWOW64\cipher.execipher C:\Users\Admin\Desktop\*3⤵PID:2508
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\doc.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:24⤵
- Manipulates Digital Signatures
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:780
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:603151 /prefetch:24⤵PID:1736
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\infected.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1476
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\butdes.exebutdes.exe3⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\is-U9VQ6.tmp\butdes.tmp"C:\Users\Admin\AppData\Local\Temp\is-U9VQ6.tmp\butdes.tmp" /SL5="$3021E,2719719,54272,C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\butdes.exe"4⤵PID:1808
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\flydes.exeflydes.exe3⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\is-V5RQD.tmp\flydes.tmp"C:\Users\Admin\AppData\Local\Temp\is-V5RQD.tmp\flydes.tmp" /SL5="$201BC,595662,54272,C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\flydes.exe"4⤵PID:540
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\i.exei.exe3⤵PID:2388
-
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\gx.exegx.exe3⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\7zS853CC708\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS853CC708\setup.exe --server-tracking-blob=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4⤵PID:1876
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\bundle.exebundle.exe3⤵PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\rckdck.exerckdck.exe3⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\is-AMIN3.tmp\is-5CP0J.tmp"C:\Users\Admin\AppData\Local\Temp\is-AMIN3.tmp\is-5CP0J.tmp" /SL4 $40260 "C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\rckdck.exe" 6123423 527364⤵PID:1928
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\avg.exeavg.exe3⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\aj3121.exe"C:\Users\Admin\AppData\Local\Temp\aj3121.exe" /relaunch=8 /was_elevated=1 /tagdata4⤵PID:2796
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\telamon.exetelamon.exe3⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\is-9HN98.tmp\telamon.tmp"C:\Users\Admin\AppData\Local\Temp\is-9HN98.tmp\telamon.tmp" /SL5="$20276,1520969,918016,C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\telamon.exe"4⤵PID:1896
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "C:\Windows\system32\cmd.exe" /S /C ""C:\Users\Admin\AppData\Local\Temp\is-813PV.tmp\tt-installer-helper.exe" --getuid > "C:\Users\Admin\AppData\Local\Temp\is-813PV.tmp\~execwithresult.txt""5⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\is-813PV.tmp\tt-installer-helper.exe"C:\Users\Admin\AppData\Local\Temp\is-813PV.tmp\tt-installer-helper.exe" --getuid6⤵PID:908
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "C:\Windows\system32\cmd.exe" /S /C ""C:\Users\Admin\AppData\Local\Temp\is-813PV.tmp\tt-installer-helper.exe" --saveinstallpath --filename=C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\telamon.exe > "C:\Users\Admin\AppData\Local\Temp\is-813PV.tmp\~execwithresult.txt""5⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\is-813PV.tmp\tt-installer-helper.exe"C:\Users\Admin\AppData\Local\Temp\is-813PV.tmp\tt-installer-helper.exe" --saveinstallpath --filename=C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\telamon.exe6⤵PID:2900
-
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2616
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\gadget.msi"3⤵PID:848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K des.bat3⤵PID:864
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\System32\12520437.cpx4⤵PID:2932
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\System32\12520850.cpx4⤵PID:2128
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\g_.exeg_.exe3⤵PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\t.exet.exe3⤵PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\g.exeg.exe3⤵PID:292
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\e.exee.exe3⤵PID:1356
-
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h C:\GAB3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\Bootstraper.exeBootstraper.exe3⤵PID:1916
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\SalaNses'"4⤵
- Command and Scripting Interpreter: PowerShell
PID:3612
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop'"4⤵
- Command and Scripting Interpreter: PowerShell
PID:3604
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath 'C:\Users'"4⤵
- Command and Scripting Interpreter: PowerShell
PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 15244⤵
- Program crash
PID:3364
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- Delays execution with timeout.exe
PID:3328
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K proxy.bat3⤵PID:2956
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe4⤵PID:3860
-
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" "C:\GAB\3250.CompositeFont"3⤵
- Opens file in notepad (likely ransom note)
PID:3280
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\GAB\3250.ini3⤵
- Opens file in notepad (likely ransom note)
PID:3236
-
-
C:\Windows\SysWOW64\fontview.exe"C:\Windows\System32\fontview.exe" C:\GAB\3250.ttc3⤵PID:3932
-
-
C:\Windows\SysWOW64\fontview.exe"C:\Windows\System32\fontview.exe" C:\GAB\3250.TTF3⤵PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\cobstrk.execobstrk.exe3⤵PID:3112
-
C:\Windows\System\UoxTxbv.exeC:\Windows\System\UoxTxbv.exe4⤵PID:1916
-
-
C:\Windows\System\QdeaLHy.exeC:\Windows\System\QdeaLHy.exe4⤵PID:3840
-
-
C:\Windows\System\vWQMZZt.exeC:\Windows\System\vWQMZZt.exe4⤵PID:3676
-
-
C:\Windows\System\cmXWnJR.exeC:\Windows\System\cmXWnJR.exe4⤵PID:3804
-
-
C:\Windows\System\WWZCJTf.exeC:\Windows\System\WWZCJTf.exe4⤵PID:3324
-
-
C:\Windows\System\bHciyJp.exeC:\Windows\System\bHciyJp.exe4⤵PID:3220
-
-
C:\Windows\System\nsvrrar.exeC:\Windows\System\nsvrrar.exe4⤵PID:3404
-
-
C:\Windows\System\YMGESZT.exeC:\Windows\System\YMGESZT.exe4⤵PID:2080
-
-
C:\Windows\System\gTZHvMc.exeC:\Windows\System\gTZHvMc.exe4⤵PID:3844
-
-
C:\Windows\System\coAfyds.exeC:\Windows\System\coAfyds.exe4⤵PID:2204
-
-
C:\Windows\System\ABGfxeF.exeC:\Windows\System\ABGfxeF.exe4⤵PID:3724
-
-
C:\Windows\System\bqHzgrF.exeC:\Windows\System\bqHzgrF.exe4⤵PID:1628
-
-
C:\Windows\System\whSYlTb.exeC:\Windows\System\whSYlTb.exe4⤵PID:2624
-
-
C:\Windows\System\gJtWRSU.exeC:\Windows\System\gJtWRSU.exe4⤵PID:3792
-
-
C:\Windows\System\gQnmNUf.exeC:\Windows\System\gQnmNUf.exe4⤵PID:3144
-
-
C:\Windows\System\qqOcair.exeC:\Windows\System\qqOcair.exe4⤵PID:1652
-
-
C:\Windows\System\veoGuMS.exeC:\Windows\System\veoGuMS.exe4⤵PID:3248
-
-
C:\Windows\System\renAmOf.exeC:\Windows\System\renAmOf.exe4⤵PID:860
-
-
C:\Windows\System\RWpfimx.exeC:\Windows\System\RWpfimx.exe4⤵PID:1348
-
-
C:\Windows\System\TJJtjFm.exeC:\Windows\System\TJJtjFm.exe4⤵PID:3104
-
-
C:\Windows\System\uJyvtjC.exeC:\Windows\System\uJyvtjC.exe4⤵PID:1564
-
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\jaf.exejaf.exe3⤵PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\file.exefile.exe3⤵PID:4024
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:3680
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:3368
-
-
-
-
C:\Windows\system32\efsui.exeefsui.exe /efs /keybackup1⤵PID:808
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1228
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5c81⤵PID:2572
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "438955616-131909869077983328146001223272962094-2076013191-11395277541451657775"1⤵PID:112
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:2232
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1524
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD58f64a583b0823bfc2fdf7277e67b5e16
SHA1f8029c828d0aef58f8818b866f1f7f1ec2f095b8
SHA256b637a0f9031088d08147f397836fe1c16b15c70db696db4ddea05ec5b95b4f91
SHA512e8c7941c8a42f6408b0071c7f0ea06a226757d3a07e3943738296c5dd5e5e60d682424182f0d788f42a5758f1c76ef1ec89901acc43799833234f09f3b4278a2
-
Filesize
103KB
MD5f53095f5eeb28f8514a55729a6803c48
SHA1e8d5cb7316e0d6dccafb323f76c1e2f393b958fb
SHA256da185e64c40b7c26b8fc5da60424080794a89d347237c7def6cdfb669b75d0bf
SHA512f7a5fd30ff641134381ef0276ab9d2bf412fc0bdab4bc876e400a832e6982530cc456c1349ba3f70e9a29a3faa47cce9592b9a4d9ea3d882b460604b79d905a1
-
Filesize
217KB
MD587f2f20bdc81864f0ca9fc792474f930
SHA1d95432a9ad65a0c3920a964dff708bb4b8e07386
SHA2563406d0e80b47c1d271d714bf55748205e33d1f87f0242f66236d00a4a37bab59
SHA512382b60d8071a3dbdf872189da844011bef9c9bb042ff2b4295865cbb464d2f8029597a430e49e2b5a446e4560e4412d5d5963e1e58d0b769cd58ca480e64fa4b
-
Filesize
1.1MB
MD535ca95eaaaf921c6def1aa6a1ef91c3a
SHA129c84ae1baf0e22f8fad8646f91fe1e33c5a6453
SHA25605332a80dd689559e4a2d8f16d469fc979dd3cffafdebbc92021efa74016ac93
SHA5127911dfba15847977acebfd83a5134e02701a66e6c88faf9c1a19f61b8e83349a2100bc73322d48af099bf880a5aa44df655df80f7d4de833de0dd4b3e130aa66
-
Filesize
832KB
MD5016cf4fd2ecfa8c2ddaa6712091db6d8
SHA1fde2b65d64f0779623cb3c2b5040d47f6b4b201a
SHA256cf46327fc43c6dd066bd4eeebb5b208f1f60b17bf39f960f86f9f5833423ce61
SHA51222e4ff1d6e132373f1ce2473741139adec6d2681644743a0d676d0190a10435e3e5d68b1d8346fcdbbf139ad26b34563fe1da9d21e1cf1d7802ce09217cc75c5
-
Filesize
1.2MB
MD5389d3e3e6343fbf7963982d8242fd058
SHA11fbb8d0fe33b25a67fd13645944d6158188b3348
SHA256ca3d5155006c10327ef176d7bf39a49d0fad886ed2e51f59be4c433550c19b70
SHA512bc50e82740a4e5e8c68a9219ee71f3b4d61aafabf1382a8bd18cafe1ede1b91a68855bd64c3031ee4cfe3e173dee64d7205347345b5db41fc8ac2e7efcd67ebe
-
Filesize
73KB
MD532ccac15db083f73cbd2fb3fdd3a5a4b
SHA1926293a5f5ccb4474a1bc0fb93eeda6f600ace7e
SHA25635fd001d277ce6e3dd183ef3b6a6f8146757dd8ab580600f342d1bf6a087e911
SHA512677690097b1854995bd61a53bb761df620cf7042c6325cfb6cf5f3080072bdae579723c927128c35bd0c68ef2a24020b3a6ddcf3757d4c286effca7cbd403f6f
-
Filesize
64KB
MD5b128c4efac101466c7578cbec14dc57e
SHA15e9d921fae706b87faf69dc17fa977d7b295a3ec
SHA25631e50c5c2595ca6864014326b48bb12cb4948335b2b5d19a45c1d0528c2dde2a
SHA512749ef377075678726c439e25fc097bcc391758ace0e04c9aefc224a6f7628efd42b2128ccf2f9e46a1e2de32ec883affc4b53ad37931c266efae5f63070e30b1
-
Filesize
87KB
MD5dd4c3fdecbe653539dcff65e3359d837
SHA145e5ea13f96f723228fc1d9518f102df25c1838a
SHA256098a849ddfbe1afd6c4e54c42deecd31d32c12da507916ce0ecc88947bc8a70a
SHA512c3966d0f4a8c885e7ba4ee2b4df1c7623ec06cb8ed0587e5e86b4e3826de073cd5fd27f8505d427b413a8a19c1ea94ac21bd7a7cd5f8ee92d599489ec1e1ba71
-
Filesize
221KB
MD5d8519692c29d766a7f497e2327a4aafa
SHA1f02ce245e2da5904fd9a718e0b35f696f985b0e4
SHA2569e4bfe1ecdcf7a420fa6d7cc2a1a89fd4e2e2828632e049d77f581e7bde7cb58
SHA51269a358d63c254d354323e913671ca8dba513b145f58a982e4c48558f5e6720c3ba2dd2dc8e16c222bd9733ef65fa317b5c2af619253af6cac8cd5ef1f735c397
-
Filesize
64KB
MD505417e39513827be4b26f436e29f648e
SHA121eebdaa1e84454dd45aae408a373a26693896c9
SHA256aca237442810184ee339dce3818e0d8f36620c9e257e075263909d37002c239e
SHA5125711232d7e6dc9e59440c1ef5e7239e9c0f7388515f806b2647404ce62ac9916b6a806292917bf16b24a9794692b1c52b3e43d9137971bbfd3ce8bad68231ea8
-
Filesize
165KB
MD55adf7229ee565bc513f9437ef95c47e6
SHA1511da48f0ec39b5cc3604b0abd719e31c9fc56bc
SHA256da129dd0a38a3afcdea033c3fef080753450021c1b31ba003280a3a7130c66a3
SHA5121319cca99359fe272cd25d34a00ac41bb6e3119a91657c1d94a482e91090eedaa0964ff8a115bbdfb6b201ab70e76e92dba29ab19157bdb6d9b731ea426ac801
-
Filesize
128KB
MD58c9418ae9a0ffb7ac0ebfbd780b0b3cf
SHA18618f80268e809f8ab7450adec9c61c0a2f08d2b
SHA25603306c89bdbeb086521db7c8b04f9e0543b8f551b07a980285cba54c7bc7bc3a
SHA512f73ada6932a42b1ab2523c3235bd2e19614f57b04a1729518df26dc896dd0c565a9421f215574b243901b45638846fc9a35e9bd3360d1d5d1326ef69ac175179
-
Filesize
195KB
MD507da21dae70e712605b115fd18d4addf
SHA1d88c8054f5cee1d938dd0c0d39743f9a2ad202a7
SHA2569baa6582cb4bc484c0d07ad7fa7d22c1f316130d63610f8a5c0ef1f32d373514
SHA512855b23e9143dbeea2c0b4ed60a201a86b0e2fcb3581a82ddafdb70d1b55b590aa939b8a13cc8df57877fe7da54aef0e8eea439e18a1c917a6e74f7459237884d
-
Filesize
216KB
MD52b7650d77563bdfd75ee580c835e2cd6
SHA1ffd7fead0117f11d55445986ad10fcc0ee5d0a7a
SHA2566c952673f2ff3aa68cd93e42f9ef93ab5c737c03761b10462f542ab2bb661d78
SHA5126b1b91aba0442bf19673ac78697a74c26df0d0c4394c3e17e6ff9510b52f78882cfff5e507145c700f90a7f3ebd1fdb6c9f90b09eae78cd83d542265b27a492d
-
Filesize
160KB
MD591b5d4e878b0b096fd182c12052c511f
SHA1ffb17fbf224c70052a0eb7901f2526ead22233e5
SHA256751332452816e56ba7ea9af3ea98030414d50eeb18d74410aa86aa8d5567a71b
SHA512b42ce2799643e1e06085697c83d828730dd45bbf29b0d18b5416c345f71699e546be0a1d6285060a1e36113fcfb7d80a6518cea4cce4ca90f27ab25918456175
-
Filesize
71KB
MD5d3e5565884b751094df6825c37eeac5e
SHA1d63fd9d7d03b621205634d22701e72b06d4cbab7
SHA256dd503a4cb2b6607d36923548c2ba50d53f0595db4dae667c26ffb328f0966c0a
SHA512b428fa0244ebdaf13efeb629c29bb640c20f68827b623e57782804b64d6ca0ca0c9c68680aeaac1551bd1d62b2a1e5cb823f2592f165cf9ca7154fae392de097
-
Filesize
54KB
MD5a72a7fbcaa9a8d77295e466c12c1f749
SHA18e88f855b7dde8743b0ac63a5ccedcea8cf03488
SHA256ab475061e2479350a315bf3f72d65ae9acc37bebef4cf8df979f8f6ced659216
SHA512ebe3bdfb9b2911cc3d6c7f687b6ca7571df4c50605ced583a799dfb0deef9473f0f855ae5432ec03ed99f76b15d62ab1b5b8ae5b176a1331c223e998d36767e8
-
Filesize
72KB
MD54e123dc335f4c41671e597d37edcaffd
SHA1edae483a09a9c2b919ec27749bfe4ca2d7e8e956
SHA2568f7699a0fd02de79d565fbd5205be070b777b790f028c1fd7e6090e34ed81bda
SHA512cf03c556c0f98827a5c5a8f4fd5c37f882325435570ba4d6761f6b0f4f41fec99e64d3d246ae7367b367f12e8b6cc3c38a120623343860cc99021b7638ff6fc8
-
Filesize
960KB
MD51b03f733d2602ec5b3934aa16e3c5114
SHA1ef4a11dd4fcf9a7670794a995a41e3bcdf9591d2
SHA2560fee209b41eee7cc67615007ca7656177ca7c8e16470198dbb25c3341a8bfac7
SHA512e2112d8d3d81931ad6e544750507317d2862c240890b4f3e12404c9d4165600d4105e9fc664b43c90039ab5ee210c5844f7db6cf921689972a4ce255abc6db47
-
Filesize
256KB
MD5ff3cfd71ba97e8a511583fd91ba789bd
SHA12b314cea74d95b19fa325511cbf958500e286807
SHA25619a3d24682d12aad66af4b4475e0006f1e1446979e448f760350e60b6adec117
SHA5123ef852caf75da03d52ef08c73ba71b87c1ea6ad43835b9ff0699f18bd46bac64dc89e2ad246c153f32243af5b55b2b401e82d1b4185d82f8bc999917cfa37cf6
-
Filesize
196KB
MD5e81d8414c1ffcdca76decbe30bda10a9
SHA1d901805e62b6d500602d4bd91c8587936c63dd88
SHA256cc2582726934814c8395663348ff081b5ba3f1698bc1c7e5d98780ada3371010
SHA512cfcd029b3b39fcf6f0a6dc8cbfe6de1aa33a00b3231562ed7787bbd66671627a98a146bbccd5a1aca88ce81544454861684a473e936f740956d849e65099b850
-
Filesize
365KB
MD5da6b5090a9ed2b6b18a1d5bc0a8a63ad
SHA1ea92c66890034fd91e131e3ff079ea7637e2b1d1
SHA25652ad4d2642c08c374b7a0c533a01bebff014b44d9975db362ab0e5fb0da29130
SHA5123993e0151a174de555d6cbb1a8e3fddca2ff541d389043f354eb98711965fe43bd4b52e4916102744582ba4ae7cf0feacabeaf4a8a8daa18676976fbfbca750b
-
Filesize
64KB
MD50b25fa46955921f0bcf21f4f2c207570
SHA195335e4b97bdb67706c92a7d7072550142a1ac91
SHA25616a1bf3907f28113ebcaccf43313d94a0a753ee423ab0f4dbbee05960dbd93ef
SHA512f8b4fa7406381930005864d1e4f84195831870b86f2835ff8e282002e7033d9d9a474c0799c78860900024a255c868c892b7589a0d82a739a69d7f5d31ee4187
-
Filesize
365KB
MD5b1476b7e1e2a57216274a67916e2bab2
SHA1f74d720d24f4dcc0c1e77d8f503445870c188617
SHA256cee32a9084a546d58ae078b7cd8f32f28a2040c783c2fb59d7fecc687604a6bf
SHA512736b9f98a983bb7757d256058167959da961c9ec6b41f204ef385d3aac85b377874eb50078313e0442e624ea308e6e9cadaef549edd24bd31a5e06d136a6057d
-
Filesize
637KB
MD5e3a9c893cd405aca729270d3cbc49559
SHA13a0b64f43cfde8c183e78bfbe56245324cc9c9d2
SHA25632a9b170586d0a6f7954518427625a8c317ac7ef0cca6a149dd4403ec0abe3d8
SHA5129c99f0a589e4b5bcf108c4352be89fdff53084ebfe26ce07e18cfb8b9548efdcb1dcc890a157bd03e70f18cd2e1d67b1b4c0ffa86a364849dba88bd253adea56
-
Filesize
1.7MB
MD51374542cf280eef6addc45661c449c7d
SHA1ba71f2183f99deee30b99f7bca5110e11ccb47f5
SHA256fe5f99e2aa3a7742509690fe794ee549d7dfdc7521fffd80bd993523c44e61f1
SHA51283a81858f085662708afcf8925fc801a7c89c43a966095689b8bdb278001a5cda340ab5d6549c3ddeb3f1c5264482150727f406567c14d3e9fa3a49cae74f1e9
-
Filesize
256KB
MD58f6e3eb3393e28570a0d7d515e5e48a0
SHA1e630f65b359a6ebd9a26a431d7964aeed9ff0cdb
SHA2562509608aeca84c2944e89a90a5c88b4eae4cd6cf45dadafb19019f9ac1663e04
SHA5126d474b960e0e80cc7d4de6525af6cc2457837f77eda89a1498e3c20e7d48cb3dfdf5d2f3096ac979bcf40754aede899a568dcbbdffd0cc2f5e3c1c68a69ad34d
-
Filesize
71KB
MD5ebbca6e3c8463dad7ff8c31d2947042d
SHA1c7ae94d599bfb959638ac0f198d3a3ee21684420
SHA2566b62d89498b42d303a8431f118a1ccbfe78f147c1595b982fa7095635b34dcdc
SHA512ca6304a7478be0a93405406b965e20072650415ce30a8a2fd4c4314e9d3b8de51f5489cb87c03e64b16740456669778c9bc32afde1ae07a1dc0885211cac4ce0
-
Filesize
168KB
MD5a62047f75c0d6fe0dc24cea77efdcdfd
SHA1502a658e58cc4ee5549c32eb68e50727871a8cde
SHA2567d22ca816cbf010a565e52d397c307d819298f5479dccf575c3fbbda7508c3a7
SHA512a62e3ef03e42886b20fe12e0fa9ed990a96ac11fa50fcfd8da99f16b9e9919586d050998b2840b71731d12bd3b7ec645fe84060039e28215903840dacbf3b3f6
-
Filesize
168KB
MD507ff6fdc1a5da769e226782dc699eabc
SHA1f1c1eba0c96550c001211719ee5a39519ed9ab30
SHA256fa59c39ca12b2d8e186d2946c35ce84d096563a60899f8d66635851379a9adcd
SHA51211f2250d1885f358b7f504a98bcb4feddcf76aae3b635529cfe31e4a7fba2c7d1e37f256dfd58a58119fe1912c1c5a2216e06498902c4b80bb475982dd2d3e71
-
Filesize
504KB
MD5150ed9b2a009a71d2d819b5561167302
SHA13c6673a0985c07cd782001a316212f7f6dde026f
SHA25653020949de0e6f6d7a69e8d67bd766cc9c868640552f2c069d646896966e8d4b
SHA512c11bc3ca24c56a036944d75de2e9063252ec58c4e5789b366b695f5c2e888d256c1db1f8d5891235b3df8517ce345e769ad3f7181410cab61ad606f47edfe7a9
-
Filesize
448KB
MD5c4b633745a4c92a30ea57fb9fac99ef9
SHA1f241da09828c5502a666962ab63259723e5f6640
SHA2569bb19e79eaeaeea8910d64bf5563cb173c1d4819494f295ce98e0d5d418c5339
SHA5125a2fe21b99af1ceb760ecfce67213f04b5754f2f3cc317e7c9b5944a314b9af8d232e77697db12e12b12192e4da73f13da9628cf37bd1c41d7569d8958f30b8b
-
Filesize
121KB
MD5dd1e2ecd17620c6c80cdc79f20aa1bde
SHA10e57cde624315df0b0bfce11b02bc5cc88b5eb3d
SHA2564aafc38068e2a29dd63bdcbbbdc4e743eb4a4515b2e0c1e70b32f64cb949b974
SHA51241e886ba4de9d55b0372b8f1d4bacbcbd183e91bc7fdf69f422d8e8fdc5f87a8da70c81e137100eeec72483e19b5173be1ef157c1995b61729b0afbcc3256ffe
-
Filesize
377KB
MD5f81de0fb94500d0c667090c27c33cfd5
SHA1229023f0650c717caa12cd089e87da50f3365750
SHA2560d9008e12261d432b69adef7570d3cfbbb24d173839ec84388d1c6b533f680fc
SHA512677b2b71831011c2e77ac8fedf334725578433372f49e258f5cbe067307b699ebc7fd639a1fef6d9a836267354885d59dc5922a984e0d9d663d6c3d4fc7c6be7
-
Filesize
63KB
MD5ddca0eac084a0d438fc60aa310b66b31
SHA138e2cbe03f7868ea438cb83b5359e458ac9e6151
SHA256408848ec0cf386bf5e52800dcaa3113fc3fefd4c1c743bfe6871b6d91e9f7a21
SHA512f159c704abb29b9c8e74b0fcf42ec2c32469680f86d4763cdef627048d8c88d4edf92ddcbcaa513e55cbaeac1ca6104cde40b28d9fb3e75747c656fd2f2fdc2d
-
Filesize
205KB
MD5858d71e49cb80a522848f64d0af7c426
SHA10749d186f91237c247b6561ef24fd855c782e0dd
SHA256af54fc9a6bfa2dd6cb3c8b0e63397650aa7f43e30f5bae441d9e6bceb9e68261
SHA512e718c4c38af8495c06674966fe91cc4253881ccbf3fd8779065bf45bf8c93676eb241e7ae7e1a1631fa225a23dc15878382506d123d185a2e4ff52cea151ced8
-
Filesize
34KB
MD59e2ee65661bee40438d514fe592bfcf8
SHA1140a77e69329638a5c53dc01fbcfe0ce9ab93423
SHA256ac9ee085920a3d8b076d5e0c61dc9df42c4bac28d1fc968344f9ceddb3972f69
SHA5123b3c7ff00d8f12cea48008a2e95c194f7fc64ee96425a3cfefb8b65a9f7dad66fa16104ec1cf96ac6892426e5e8ab59dab91e3d56d76f58753b80f8ac48f2612
-
Filesize
12KB
MD5a0df416d0542222118e8c963edaad576
SHA1133894e068a35fb0ebc160513e745031420ce609
SHA2567c14d398453c61a18f99c581385bf04d4ed08949ee7fe226efcbe69ad6c33e48
SHA512fc8bfc34268e14c524009c8c195f7ffb6ea8681070f46fad3f06f6cc9441bd250dd36e7540c36ae5f06031da57dfb49fc06fddd8efd9af7861f0d4e957ec60b1
-
Filesize
12KB
MD5ba66231408492f0e6085ddadb087822f
SHA119b0faa9021a3138d60dd7228070121f361b627d
SHA2567f411475c0185f9dfecf704ad8c3ee5fcfdf42722a595babe7cb93dd7ba6200c
SHA512547ff4ff7cd210f8583560652a6218e6f518aed175a197baca14a091d8af2d20273b874cd75feef6d9bcfcfae24f95fd3cef9f8c2595983f7fbbee89a818c6a1
-
Filesize
10KB
MD5e83e135a35c8d52c10519e19ce98a452
SHA1adf764a640ceef918f07ffab62e3a9370a97fc4a
SHA256e7b34f803da510990f6d4abaf729d129887bff2c17ceadb39fec823e7f15a1dd
SHA5124eed36f28b5d954e4bb417d011e4e000b02a090250e128261e7f57cb3cf077c9e49d22f7a5973e865fcab15dd73b52a3905c4b681bda5a0d73ab309a8d7e271e
-
Filesize
68KB
MD55e142e4d090d689cd44fa8fe9882a743
SHA10301f8c9422f933c9d7a65bbe4f7c45feb4fef24
SHA256a23e6b523d0e3d16cd197e5a525e3f299144577dbdb860ab91e7c14652aad3d4
SHA51223f77ca93a178d4fdecf54ca1cb6cbc8d6c816deddc630d90fcaa5f3d028a9db29301d32b200c70bcbeb94c8491bd44ffeef51233cfeb011e2081825b167ba16
-
Filesize
4KB
MD59d2bf033acde5a212f6f5404d490e169
SHA1a0e28adf40a9d06710d20071dcaba2569b91b1dd
SHA25693e7c6c123d9b53a2d933f63093b4b85302023517f56abf057f9ef8a94d83b8b
SHA5128dcb0dd9dc72c2de61e26932b72d5923a43b0f512e8d2df5334f478a78ee80f492bb8cb193dd3a314a6a19dd95e4899b40e7b76c3b1f767f5e8b46d1b1b3c00d
-
Filesize
5KB
MD521475b17405b86f37a2c15a1df2733b3
SHA1e640903a5fa2a800a27b74c73a02ea855dcbd953
SHA2566e7a86167874f989433a264345e5ea6c0e000861cbca8153858b23d7d35d5ecc
SHA5125752f5cdd3d6e56de8d6382dced5b7425fead8cbdb21755fb504320157a4aad3a713fb8d5d4d52e843d60b0251b3c14ee6e7720824ace97b9fd8a5dbf7e0d8f0
-
Filesize
7KB
MD5ad75fb38d57de96a18fd5fcad4a282cb
SHA12689835e7573d1ea8cfdf6ae7fd77b671baccbc7
SHA256c7b31d6d41b52ea093fc845bb51f5fc8bb772b278a0cd8d0dac980dc9e6b08eb
SHA512ef3e09211a3e58428b94bda0f84d84e83e1e76f40b6f633a6a0e4121cfbdd4cf5253627be285e853d8c536a611f8abf6b2cfdff69033e596c56aaa5b625b6bc2
-
Filesize
12KB
MD5dcfe71d27bf49ba16fde0d1945bfb4a2
SHA186b3d8696b5da354ef42c8ab4a9d21cdaaf0dda1
SHA256eacbfca9a5ef05a108ef5337c773d82a43398bb8ea177e5ebeef62934dd75811
SHA5124da8efcfd4a77e230c61a527eb96b5193b9f5ddc0d476dfca8ce6ba7143ac5c8a1fd8b673cc2c7b554dae42ec01364a178f64532b6de17d44dce07b3089869c3
-
Filesize
24KB
MD5472eb4c6a71a0792d9ec79a3d24b6077
SHA14c5d55fbdd814a0a362bddb6b9cba39e3f7e59c4
SHA256a1aa44a0012e283913977349e1c632f3306291eba91063438fdafbc6e3dd0a18
SHA5120704ee6b16fbe2513fb2d96100d84ed23204bfd47d3fd9649bbd789426e5f9a9e2d6ef9f89452ecc626621161277325a4064345a10796855d0dfbe248dfc8058
-
Filesize
22KB
MD5aa275728f2e226ac907f2c04052ceba3
SHA194774390a6275d6d808a8239513701c26eca4792
SHA256386ec310583369827c0e254d1e98a70bebe8ab8eb81ee8844667307f8057e40d
SHA512ffa6027bb20e7dbe47b7df0717d27a6bee6839b0b6e67576215fbca06304ecf31dd72a83800297110fc277e41c8f253baa4517f6c3accc20026301c806bd6e22
-
Filesize
19KB
MD5c43a956eed29048a78113d55fbfdc716
SHA156ee949385d257cc976f85bbfb1070e6e103c3db
SHA2564f24ab635890d31f6ccad984754b7ae153e1634d11df7625615ad40c2b547a47
SHA5122e8e7c01f60fc0f3ef4021e735a9fbab9cfde5e48153fdb0684fb9d659e48d5dcdd2b0c4e1df346c72aac157b604bb66eb4fc33dcebfc884ddb07ee01a8febf3
-
Filesize
71KB
MD5f044f50bdf4794258699f5d1e44b8157
SHA13304ee9776cd5812cb7d49c95f3ab46d7a267824
SHA256e81845289cde2d8d67d928f08a74a7c27ba8ddaf859f4f85f90c0a1d403e1d0d
SHA51219bc95f88de751d8c28f6902b94655e33994a21269fd22211c85b420dabf4e509409226b7919f3ccf06cb2455891dd1c18f8cdfb5c8e961a367863070ce49588
-
Filesize
64KB
MD5fd98c850c1d024647df7d80dbd937c32
SHA1000b013b3935a597fafb2635df895b8e5004df04
SHA2567a6338bdb94e66ac962543b24f411ae5e35f4af636d0aa353da6b562e3c7addb
SHA51244bc1351e47d5438025e4a869d79b7212cdccac606bc05579309d9c0ddd34f49358205d2ce4e6df61a04112f281f685373a8d4cc405437f1d5a67210e72e3de7
-
Filesize
12KB
MD540f8022c3fe4e1cc97bb794e1b519b3f
SHA17ff107451b67b2d432db4706c697a9391c13a6f4
SHA2566b16818c057024f588f4f423cb1f50d24e092fca3c9b5c8c1943cf5b3ea70759
SHA51208a85d0203a0534067538ba0c1f40273409f61f212269cb3095df1defc114ff007efcb4c3c4897a345cda17db16c98b88ae61100b9e4636862d26edb8a402ba3
-
Filesize
7KB
MD56e78ea1629ed74deed4190d87aecbbea
SHA1c1e6e0eea7d9e7b7e693530ed43cc271567e5bf1
SHA2569ae1c525224824cbb209b46c64d19cfac121f1bee266a9924ec5319f7ea45295
SHA51260be03a64880316b9d8c1dac2e9884dd1bf764ceba0be2c47a114cec20c285f6a925dcfd4f1f855f863775e6896ad8e9239ed45523ac317c4388449dd93509d6
-
Filesize
6KB
MD589b3b99975cf9f7592ad2d77be92ecd1
SHA1ee700e439d50e0739b6f462946f4b39a6266c4bd
SHA256868bb859fa5a5ddb4027b1c8e7b6071fbccb62ad9608ee7b56583ba3b705d823
SHA512f10c49a944edc073be7772d6cc3087850528e93d48d791cfa8525881d0834f3534c5419ea4cad781d9780e329a86cca7b37cbb62afebb0179a3aa60a68dc91fe
-
Filesize
6KB
MD58a5dbabcb9b11e3e0c527b93e69d5e4d
SHA1c47add614ece5ed16ca456bac08b1f2cbaccfec9
SHA256824ea3f5eabd9c3b8e0041e78935feb65545f58760ce0c47a0d938ad75f8e241
SHA512ddcb3520d68321e6372630cb34473c7b310ffed1263cde8e1059837e63e42e7a7e644537044dee774e9ea3e912e485f2630bc106233e039ea925355ec29921c0
-
Filesize
8.8MB
MD5275d309f2328a91388f3d41649291695
SHA1e75b1dd650d26baa60ddc370e5b826fa69a8e537
SHA256c8a20f26bb22a7fdfae8a9aa8ec0a3a78e635a41daa1316c05579061b730fb4c
SHA512579020a9ebc44ae366ef17fe0b8026bec2d69babfb30ff3da855d887e94223b4b1cc1004627c330f465579e42f45fd48ee16c658d21ec6b5c87ae6b84b178d8b
-
Filesize
9.6MB
MD51e517ded77366d8316f36b3a2197f7ad
SHA196925170be0c5d48b0a252b336ad62cbbe088863
SHA256551648d337311b1d080e956bdb90cea6b4cbfd92caa7378974db9228a9da932b
SHA512c812d141b0ddeea3d86942e53c3412032c716e23f242feeed476b70feabf66765a31c6e09d6ae724dc65bf571963bf61439e5a196fb3aefddcbdbae771a8802e
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD54af325ea1171e80e13953b634f82584c
SHA1ec7305bbffe9e5b0b4b51f3da9350dee3dde44aa
SHA25663741ec4f05c25247c347e50c1e5a6e48463f12de6b79cb848460de7142f5a8f
SHA5126133811d893f422f1b99a8cbdf2c4fc1b6d2a200e0829d2ea1dca943d6d169279564a78f2b09f91253e115e3158ab18f6a48ac62e77356d09d3dda8b97ad943c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5223c69c08185bf0b254028e33cb1129c
SHA19231ca5c02750a0fc2e7b4662e5f68cd836343d3
SHA25683e4d1fa68e5c9dec9f1add5fb29768c049346b2a6bbe24d6ba0b1bf0fd82b8b
SHA512a0f6866ab3e4f601deb75f87a9de96a072050b01f0801ce4d3e4ef92253f2441e89fc77c6cb132aafd5a457bd4964d62a98dafaebedbd19b7f8ac1b24453ed69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e73113975b5d2e2c6c43247342b3ce8
SHA1949968da849d6121cc24e80bd49a85e349dba1b5
SHA256e07ce3580e1d7b2d6de3eea574ae433088736a0b2aeeea911f79bf52414cb814
SHA512deebd246a6d27b8d2dac1d68eec303db62111e9f34cec540c8b498985a69423c24674f3d9793e5b803b2685e785f9f3334f083f28102e1e79f5bc40bf651ea6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5937b5058bdd704a9b2b7f6eb426cbed5
SHA16e1f901ececb03310d841c66f369dc94a61c6d97
SHA256f3ec457ac22c9260ce2f64796261103bca53b42afebcb9d1d685c80b130418b2
SHA5129fbeb884f16c5a891310ca35bb21b567b14ee43c721ab706da025af81edcebc930f705acb67bdc620e0efb8fd1186489bcfb0065b087a9fe356adfe1212f73d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a9bec5acb5c89b8c0c0f78ab722a220
SHA1b8eec382dcb09fbe8050a7bf961ef9d2b4bc86f6
SHA256f0a3612b30f8f26aa8ae8ac4fedda185886875195cd9116d6d423d55d4494480
SHA51224aa114f2450f3f229dd3b0459487913d7f06d68ddaf4fd5c5c5f79bf67db046d063304b53f51873fd8561f0323b1bbe6b125be2cc06abac226aca11d66beed0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53368d573f320769dd884d55dacb512e7
SHA1fee5850e3e65700580f8c775d59dee33da8dac6a
SHA2564b210224d980978540156a3759ac3c1929cfbb59c4b77def4bbb9e82ff859773
SHA512b7a380060d69263adecba35a74682fde90146bffe704f0124edb0102b75f33d401592db5f9ae95cfae5f60d5b75623e5208ce66c86214cccc7f25d9e49898189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e064001d2d04aeaf358e5d0fcc631e4
SHA137d4adb1f91d1eab7ebb72daeffa7cccf5cdbce3
SHA2567d0f06cf541db28cc425cc54cd00a226e917f7948f092235a5be741f6efe49da
SHA51214aa6c1892c83136d372fa636cf7c5fb1bc5fede62ccd0901fa40c0011129073d801736586f9ceacdc9a369489c4e8e522c325a20fe57f6a18b43c0888d0d74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cfd5d3946eb254f016f3d7c94d8142b
SHA1867da0358a1e6d1b4b12577e7e2793bdeb49acae
SHA25653f3a46f56bff1887c300185d5f6cd23149b5e3885928c4c3e35d86df65a3cd4
SHA512bf5a2997a5d4d00a3fa5900ac8b2a6abf8f3aad7c08ddb48b55f5ca7b0d1e68bd2bf367ce56c5ca65f874ed5503004fbb7a10a84322353821420aedf3820ab0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526b5f9bdac02a6b77a6ddca99c84002c
SHA16f4e244ce8faebf036e53bd057eef953a8dc3017
SHA256f0608358163bb8e69dafec424090baf64584b9a4b22108362bf82f62561cb62d
SHA512401e1ca6eccc54d50f176fa4ee7d26c2687d9f709fa3884d29c3307fa0f802d67a9076f110f35f82f54a36e4fe69b5f13e3bac322fc69cd9a45c61f8c9cfe2a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2a51dd91749816fa0b7183b26e0bbeb
SHA18e351a6a7dd5d80a16e0deca1c58f3758ac0c6b7
SHA2561310579e30c2ccd7d76197cd7f138f97dc48840c4f7fa1748d616360b5ad76d0
SHA512317061f4bed769f282d13ab53402c8c64d27ab307f14b4ff78230f19327fb4a1c930bf8dbb7e3ec212a688671d09245c869abb7e0dfbf07ea7c8f7960f681da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff98185e9d03b7ec302f9b62f78f1857
SHA1e8a997ad4fbe2ea16fdaf7368e088e38e892fa89
SHA256e5f2ff22bd961dfec7337c5e05defb1efeb360844894892965c38773c448c541
SHA51227e7b974538711a13d8b43100838693918f008814f58c710ba16498b6fce3f1dfda9066ff19e9010000cd6ae93d55446fdee5ab690a434ff4651ff13414ca18e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576a85132c043c01f6cd4c732dc631d57
SHA1ca27c1b6401c196da70c26e7a3020994d7e5f407
SHA2560195cc9b374bc6727bd8cb788446fdf26245ce3ad4c196b68e523bc5def191d9
SHA5129003de397780beb37ec5f8e294e960927232ec4bbd250de898d658404044eaacc0bb8899f3402f3e432abbce49bb45b73e0f3067f4d5c38c42f4ef6e031f6df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a333c2277ed4f2189b297b6905d0206
SHA120b6e30863949f9f6dc581d26e8976ed85fc0262
SHA256704c090f81aa9548eff63ed32432dc4ea5e49c0950e1365fbd730d7ca01066ea
SHA51221d7300ae66076e264af5bae64ddea96e8d0c72a0b8b511706af9904a26ad166323cb13f65e7f9737397122b457146159643551d8905ce14dc0e7047d0b169fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ab699d5e15d7c233971435eddbff169
SHA10601c5d817d96409e6ce2446b94649c7abe6b3e3
SHA256d40ef491706d9f442bf1eedf1c5bb054766912d806c83e1b81d22e7c72a78e46
SHA5125bc10503816a096e4eca7452b5dcd5362c2410acc4c125ae322dc5969a929583ad91653f8df3e8a1b5a40e27f2440c428219ebea9d53c2ed6594798d7f6bbfd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b9123dffe7c0388189871427b80af0
SHA1ffe8346165496ab2d032838b0a41404219c3082e
SHA25609ec70d96ec42e1c5587ddb14d217b89e69edad55a3c22dba41f5b7c2378245f
SHA51200cd9bf8bbd766aee5becfaeaff0d1fddfd96d61dd6fe754c5141c2ad90f2d7ed3e97f0b5cd59f3e92b66a5f838b5344ad53adab8b32be431ebf954c94209eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e02c2b79dec9aec7941da8b8d194f7d
SHA11dee61af741cb80fd8a9658e97ee3e2761dd14fe
SHA2560d06f5459703e47e93e67fbe571096246872f03f3e5409d40891122ed2abb9ea
SHA5124efc0546d1bbdf5ee7e9f62b8fc1d02536e8f6dc44acfea1b34fb222019d13f585e3cfa63c774307de2e4377e9c23c431582bbfe7cf2675dd680f6aac4102234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c3f1601440e7a32c0d5828fc8e38b05
SHA1ad517b45447fbf86a2f7589fa02f0fce9afa67a1
SHA2561f13f9bbb5ebc71cfb207393ac995fcd760594142dfaa4c95ed15719c22fa717
SHA51244fd22a5f258b8569910b9622f6b16341a63ec4865401adc91eacce6bcb3d9654a7188762df9360420a1977189dceab9e84a5bd28da035c35bc52385d9d56afc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ed4ad3c2d4b48d08fa9c3c0f14cbad
SHA1b9fdb8ea5885054c022383d8fde7888b4dca1018
SHA2561a989a96faf4940a050506f9ff018cb5f7adf377d2b269e88ff285f528d453bd
SHA51221e03405d6ac664c39885ed1d63d7412c5b5acab8aebad583eba9342df0096f148109c5e53477a8af5baa0b20339383f2ed4f4c1bfee8420a859934ff2ff2b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b699599c800d112290564eb784baeb46
SHA16df6344c9d2a248866fcc3e1dbafe4e610d018ff
SHA256bb0e48c5856ccb35791aeb0031134d78a6d213e714179848b048ad0d6863e698
SHA5123d4f447b0b8c58dbf9af485d83ec3e4cbc3ae5992b3073b8976fdbe0ceed76d1adaedb92297ee7ce3c961b828f8b6edc99c5e31c999f11e5b8792284ce072de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f016060a4dcfe927ed84f8539f9b3c82
SHA1dfd2e1d8ef4553069f29f05a288df4d566b337ba
SHA25647c2af52944497c6def6bfd2ef156e7f40d1b26840fd0f17b7c3b418f6421528
SHA512d5d4fb280b26e03c34b29ff6e42f9ca25324bac958d1e69277ccd5b141cc89a366bfcc4905b750308274cf15382acddbe6779c963575033fdb0c97cc5d2cc1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507d101ed265d950ff89b26aa886150a7
SHA14c9a1c98fadef82ca36b293fb7df305f46a0463c
SHA2568222b2c347e3e0d7fd2a85bfb06b5d983305c57688a8a73525a7bae6ce2f35da
SHA51283a177675207a3ded2e20fc04082cc7f20e9332aafb700c59a5e62c8d637a5d49350fc72b95e5c01d96bc507acf94e03a58fc18b9b68e0940fa7dd493fc3a5a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527917e90d93368582d8f7032d3ce0611
SHA1c80bf691eb4b1ba383390254c25e699c9fa48ab7
SHA256a1135baf6b43fae7f3c21c6f35baba0097f90dbb78a259e5c3f153471f784983
SHA5126e86e7577ea8e281b626f19fe9ecfdfc0dce985417de5feb371e278f14600805e65cae1260bfc3d8775abce15dd0a452bd6694c8e94f3d2a0ca1812fbb2e1118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e030b851b2d837c09ecffbf8334e057
SHA12ffac12040fff8eafd1f9cdd9ffd98b7c631fd23
SHA256dc2f101c62cfe15657a76eb398cb71c60354983f70653b9afb2e4347b7530834
SHA512837283e75a8dc706ff29a40377135b143bfbae2750d665e5bd0d1c9bdb79b1d35f9d4a74280ef75c815be8458fd791aa41b0d33c1d8faad6816e3358fdd89069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f955eb0e0d5f1e5aee8a6a01bb6b7762
SHA148ff3bbdbb3a2ca856619d358a8e99a2d9143d22
SHA2564bc649c37a8d25240d35cfe36b14cb05b0880aec0c3dcbab9009efb34d0625d4
SHA5128203ec06e6ff67841ffa72e3136b0e20023d77c7a45d9d7d1adcef95443e8ff402755866959ef8fddaeeb32226a7ea5d55af22004f46a03bce595d0b95916b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b2306d4bd9124430bececc76da6c28a
SHA1db10967404564bc207eeef2b773eabfb96730ac8
SHA2566e7bca4b3b33ccbde766bf1934f9c5a3e6b0be121da24eb206cc7e0183033918
SHA5122c748e9769bf46aee769ab76b0df7ad71a8474aa49163049cfe6b5f27610afde66aa2461ac130f281d0ff9cd022099f1f1d059930190945f2b0cc0590c023ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5571f49683a4b25792e4d8e7b00acd328
SHA19d00bba6b8c03cf79a28be1f10582b9ab22f5d4a
SHA2569a3b134f70ecec754f3701058436eaa3705898ec87b79ac04787e91cbff67864
SHA512478884dca9b7214af49c009886da2f194e1c78dbfec2be9596cc36eb50d717cacad13a6c4dd608c28cf454401092b32fcbdadea1e6b4969587146ba7ba740cd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8cd8f566c74e612f90b4552236f3c4f
SHA1d2ee659d0383aeea5bdbb6d495ee6767cd43449e
SHA25642507a737631109be71306201146298ad2318a39093b65152812612859fb8d0b
SHA5122ebba0c0488d0a3a9812e1d6911e2ada64088e282a031e2448b488b00e6527bb17e195cf22acfeccd21ad47f9633eb370b13051e2c452760f339fd5aedca010b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52363c0716c3f98b1293a9d0303f23166
SHA1d4436a92aa98f4f9238407f13f5e493354a27008
SHA256bf93915c46254be1a5920c86e7edcfa3d5b8d36ce4358f862041f379a30d5837
SHA51218a16c0fd105b3df1d86fccf38b5b8d82f8d504815782dcebbc585c5648e3b266986867984846bc9bd58926c847d16d2f5d24c7ec8c9442c776c46e33c20d9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59572b9638c3014e854f1c79a064f85eb
SHA19c5444a3ece8645aba3fd195c80aa209cdcf3a31
SHA2564dd2b2d457fde71592a1e258e4d396ce1c1c93bd93af4167a77d15ddd927ec1b
SHA5123a774e003af0f2a049645fd85d04c939d52fef389de59a9c1c940b41766a56014c24c9cd779072a3c45e9cab6e8688ad025a79840e77d6fa59e7ec86730210cc
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6809CAF1-74A9-11EF-AF16-EA7747D117E6}.dat
Filesize3KB
MD579ffaba21ab9848383d22b42b268a7a3
SHA19bffada067493df14ba790df07793ca0d95113e5
SHA256db3281b268742e6068e9ea8d86b17becd159cdbd914a4c3d6c7600bccf4c4224
SHA5125eb9b05a2d019a16d3bc2a9db9c965a6ffb70640b56295a0e2a18b38a9b74328654d245d8588033058df44ef8da078f7f5289e548f5588dbcf24add0339f3235
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{6815B1D1-74A9-11EF-AF16-EA7747D117E6}.dat
Filesize3KB
MD5edf9fe50c94def5de484491abcdeda01
SHA18a880b71a87776c4b96087ded9c7c4a751802cca
SHA256b55fc76ca2039ffa59695750ae2cda78800dc8a36ad3cfe91227075ee7003821
SHA51212ee5b459e10dc685d8ef49bcbae42b1e2e167f4fee31e29148a9a4f201e9bb31d9570ab1c0d859ba79bfe17948c5aee34ba9eb85ea2a049d7f50919cb97f79a
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\!m.bat
Filesize1KB
MD5b3bc9de5b2d1fc6997532ffc8cef44a7
SHA159d711d68d222d2e8091535e6ceb8deccd549785
SHA256cc11089fbc22f48af01af3814eb7660ed135398ed55414fa4810882f2db84202
SHA512ab195f85e1935edd242e1f040a3409dde85d218062479bfe61ec7fbf64ecc69a413dc7be16faa141c5b180415cd4de943d6e0284467c79a737d18c7720079e1d
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\PurchaseOrder.exe
Filesize934KB
MD5f7f32729079353000cd97b90aa314cc1
SHA121dbddeea2b634263c8fbf0d6178a9751d2467b8
SHA2568e29aa00863b1746ba25132f7ecb7bcb869d3a7e647dc8d6d3255491c5ac5212
SHA5122c40c12b81e7c377ddf0a6691ebeedc895dcf02c9211a1563b840de735fab77968565b1d3d0c40cc0b2b583fd4bfa1c69f995fca758ea85f548bf5797b5bf847
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\avg.exe
Filesize5.8MB
MD50dc93e1f58cbb736598ce7fa7ecefa33
SHA16e539aab5faf7d4ce044c2905a9c27d4393bae30
SHA2564ec941f22985fee21d2f9d2ae590d5dafebed9a4cf55272b688afe472d454d36
SHA51273617da787e51609ee779a12fb75fb9eac6ed6e99fd1f4c5c02ff18109747de91a791b1a389434edfe8b96e5b40340f986b8f7b88eac3a330b683dec565a7eff
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\bundle.exe
Filesize429KB
MD5ae4581af98a5b38bce860f76223cb7c9
SHA16aa1e2cce517e5914a47816ef8ca79620e50e432
SHA2567c4b329a4018dc7e927a7d1078c846706efae6e6577f6809defaa51b636e7267
SHA51211ad90a030999bbb727dbfde7943d27f2442c247633cde5f9696e89796b0f750f85a9be96f01fa3fd1ec97653a334b1376d6bb76d9e43424cabe3a03893ecf04
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\code.js
Filesize4KB
MD5016bf2cf2bad527f1f1ea557408cb036
SHA123ab649b9fb99da8db407304ce9ca04f2b50c7b4
SHA25617bb814cfaa135628fd77aa8a017e4b0dcd3c266b8cdca99e4d7de5d215643c0
SHA512ac2d4f51b0b1da3c544f08b7d0618b50514509841f81bc9dad03329d5c1a90e205795a51ca59522d3aa660fb60faae19803eceeeea57f141217a6701a70510e7
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\doc.html
Filesize15KB
MD55622e7755e5f6585a965396b0d528475
SHA1b059dc59658822334e39323b37082374e8eeaac4
SHA256080cb8ef0cbf5a5de9163b365eec8b29538e579f14a9caa45c0f11bc173c4147
SHA51262f5abda3473ca043bf126eed9d0bcc0f775b5ac5f85b4fe52d1d656f476f62188d22cf79b229059a5d05e9258980c787cb755f08ca86e24e5f48655b5447f8e
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\download.jpg
Filesize8KB
MD501a5131931ef35acecbe557ba13f3954
SHA1c7afc7590d469432704d963ffcee31ad8bcfc175
SHA256d364872ddde28d81d23bb3b08f9e86f921b542f3a35fcaf12549cf5666462bd0
SHA512ce32352484d676bd0f47c24808707c603fe9f09e41afd63d90f07599f13a5e32c73b0970a9964632f76f5843dda87a033340ee12fadd87b9f219329d0c69b02e
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\favicon.ico
Filesize5KB
MD5e0c7cc30d8f9a3cf0140bf838198571b
SHA12494a9ab234b90ff0a3cc2dbc152483fb540afd3
SHA25673bb7f4a70650054fb42f4c7ab85d9a683253a0df26703ecd4a2bb3155d93cb4
SHA5127b87a3296fd984d89dacfa70bdc274ed9faf553c3e086d3e865ed7a2e55f92fbb55bd270a5863ebb6b95f3ce26d321b5936665741300676863f40111b95a6e75
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\fence.bat
Filesize167B
MD56465a5431e01a80bf71aca9e9698e5b0
SHA1d56ed108f13a6c49d57f05e2bf698778fd0b98dc
SHA2561c5f05fecfc1f4fd508f1d3bbb93a47e8b8196b9eded5de7152a6fa57ca7580f
SHA512db7f64b8af595d0bf6fd142471868df6d29ec7cfbb49a7e0da63d9bc8ca8f319e4c41f2c7baeafe17a3679861163400ccb36c18617982b244aaf482e9c264e55
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\flydes.exe
Filesize833KB
MD5b401505e8008994bf2a14fdf0deac874
SHA1e4f7f375b1e88dd71a0274a997ed5d9491bde068
SHA2566bcf6b84d71737787e3cc8d9d0eed9720f388cc2d0337832a7e8ca3c6f455a41
SHA5121bca98547ecf5a98d42b1d77cff50ca79ee560c893b2470aeb86887fef6e40a5ccdb72956f04a1d2a862827eebd3b7746e3043f3e6209597dcde9385ed55cc11
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\fries.jpg
Filesize12KB
MD5c4d9d3cd21ef4de91abc95f99c4bc7dc
SHA1b2cf457237c44c824068727b8440fe6a352a360c
SHA2566fd1c3bde9a6a478e39d1cf2121e980c0bcf59454fe1673d707aa70170953bc9
SHA512d10fbb0bdfb30160484950aa58bd2f97c38cf2d0914550b4041c9acd273e8013920ef1ee74216f92437a44ab81111a4c70ed3dc2df680ee4d187c22557900ee7
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\gx.exe
Filesize3.1MB
MD580bf3bf3b76c80235d24f7c698239089
SHA17f6071b502df985580e7c469c6d092472e355765
SHA2562b95e56af10406fbd3ecee38dab9e9c4a9b990d087f2ad2d7b1981c087829da2
SHA512076b8b6a80ea15738ce682cc715792546582d7a74f971f94f6b5b9cf8164f01280322baec7f72894ac4b8d63b9f2f6074e8fc5e47880ef6c0b57a47beef3581a
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\i.exe
Filesize12KB
MD5cea5426da515d43c88132a133f83ce68
SHA10c224d0bb777f1e3b186fdf58cc82860d96805cc
SHA2562be7a0865ded1c0bd1f92d5e09bb7b37a9e36a40487a687e0359c93878611a78
SHA5124c1f25147222c84dff513bebf00e828719454ad634ef9380cfc7835f0457a718b4b437ecb60c1fa72a7f83fbb67e1ddfcd225194eedda77034c72f8c752c642c
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\images.jpg
Filesize13KB
MD549f4fe0c8646909c7cf87adf68d896fd
SHA19193264c38e5ed9fa0f5be1d79f802cf946a74cf
SHA2569292dfcddc9e88e5dbc095ceeb83ce23400a3405a4d47fffc80656941c87d5ec
SHA5129df4db8c958110cea66f627170919346ed673d3c13aa55292484fc74ebac2864b0292cd4d66d35957b4b2740b2fe30ddfb9d9e04115d655fb58bf39e100d285e
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\infected.html
Filesize972B
MD5f48be9db7436f1c53508f1ad70064459
SHA116b20d3933cc6398859f1334a848982cccfd8501
SHA256f79460fad80962fabe51f271a2ad33fd54c418fbb0a8646c1d78654696d7d7b2
SHA512c7870b4fd16827817fa16c68f9d1a51270cfd9dc052861977a12ffcbc91a1668c82f168f8b33661d68579cfed766e15d0e436794d0eed164946eb9927355b638
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\nuggets.webp
Filesize32KB
MD5e40209599b592630dcac551daeb6b849
SHA1851150b573f94f07e459c320d72505e52c3e74f0
SHA2563c9aefa00fb2073763e807a7eccac687dcc26598f68564e9f9cf9ffdcd90a2be
SHA5126da5895f2833a18ddb58ba4a9e78dd0b3047475cae248e974dc45d839f02c62772a6ba6dfe51dd9a37f29b7ec9780e799f60f0e476655006dec693164e17eec2
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\rckdck.exe
Filesize6.2MB
MD5a79fb1a90fb3d92cf815f2c08d3ade6d
SHA125e5e553af5e2d21b5cfc70ba41afb65202f6fd5
SHA25643759b0c441fd4f71fe5eeb69f548cd2eb40ac0abfa02ea3afc44fbddf28dc16
SHA51282aa45337987c4f344361037c6ca8cf4fbf0fc1e5079ac03f54f3184354792965f6f3b28bd2ab7b511d21f29859e2832fc6b6122a49ddecde12afc7e26fd62dd
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\stopwatch.exe
Filesize68KB
MD5338a4b68d3292aa22049a22e9292e2a2
SHA19595e6f6d5e18a3e71d623ac4012e7633b020b29
SHA256490d833205f9dfe4f1950d40c845489aa2d2039a77ab10473384986f8442ea6f
SHA51206bc6463b65508d050c945d5bf08078eecd6982c74c7bab2a6722b99523189d24f530c10c05577e0dbd5b46e896d472112d036023ef5e576e2a8f9401b8668a5
-
C:\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\telamon.exe
Filesize2.3MB
MD56a80889e81911157ca27df5bc5ac2e09
SHA102ac28dd7124317e294fac847a05b69411c9cdb2
SHA2560b74c13914f712fce5bb41c25a443c4214a97792bdbb6fea05b98350901405ff
SHA512329ec105834f4531386090074994e5c4ddbdaf4cc4801956b675e258e9167f9e70cf31b8d636d119b59b57af0912decdc259d12999842008cec807a967c89aef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
659KB
MD55aa68bb2bf3b994bda93834ad34e7963
SHA10156732d5dd48feacfab3aa07764061d73b9116c
SHA256a90bfd9874c3e60650dba4c286b97ccdb375a456b95556feb38f3cba214770aa
SHA512e52fecbba96aa911552ef0e11d5d044ec44caf6e0947f64c9a17b04d846a3e86d19e4dfa5ac981fc98d44f941fda3a697c1d23ac6e8ef162f4bcdde9142f22f7
-
Filesize
688KB
MD5c765336f0dcf4efdcc2101eed67cd30c
SHA1fa0279f59738c5aa3b6b20106e109ccd77f895a7
SHA256c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28
SHA51206a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891
-
Filesize
2.1MB
MD5d21ae3f86fc69c1580175b7177484fa7
SHA12ed2c1f5c92ff6daa5ea785a44a6085a105ae822
SHA256a6241f168cacb431bfcd4345dd77f87b378dd861b5d440ae8d3ffd17b9ceb450
SHA512eda08b6ebdb3f0a3b6b43ef755fc275396a8459b8fc8a41eff55473562c394d015e5fe573b3b134eeed72edff2b0f21a3b9ee69a4541fd9738e880b71730303f
-
Filesize
195KB
MD534939c7b38bffedbf9b9ed444d689bc9
SHA181d844048f7b11cafd7561b7242af56e92825697
SHA256b127f3e04429d9f841a03bfd9344a0450594004c770d397fb32a76f6b0eabed0
SHA512bc1b347986a5d2107ad03b65e4b9438530033975fb8cc0a63d8ef7d88c1a96f70191c727c902eb7c3e64aa5de9ce6bb04f829ceb627eda278f44ca3dd343a953
-
Filesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
Filesize
5.0MB
MD58691a71035e8ba85d578cb944c864a93
SHA14bf9b4ee3c56798a001ba56e80f14f4a23e21385
SHA2561a1c0276d17e3a92faca1511e99fdceaa7f7c389dbb7e476e6d908466ce0a26d
SHA512d3b18883d070a38c4abf7a060460f99f23ee5e2a08081275e324b4b2bd3c76368b80db433b8c58fd8fc69dc148216ce5acf534ba57e486bc7a7a057baac93bf4
-
Filesize
126KB
MD52597a829e06eb9616af49fcd8052b8bd
SHA1871801aba3a75f95b10701f31303de705cb0bc5a
SHA2567359ca1befdb83d480fc1149ac0e8e90354b5224db7420b14b2d96d87cd20a87
SHA5128e5552b2f6e1c531aaa9fd507aa53c6e3d2f1dd63fe19e6350c5b6fbb009c99d353bb064a9eba4c31af6a020b31c0cd519326d32db4c8b651b83952e265ffb35
-
Filesize
93KB
MD57b4bd3b8ad6e913952f8ed1ceef40cd4
SHA1b15c0b90247a5066bd06d094fa41a73f0f931cb8
SHA256a49d3e455d7aeca2032c30fc099bfad1b1424a2f55ec7bb0f6acbbf636214754
SHA512d7168f9504dd6bbac7ee566c3591bfd7ad4e55bcac463cecb70540197dfe0cd969af96d113c6709d6c8ce6e91f2f5f6542a95c1a149caa78ba4bcb971e0c12a2
-
Filesize
1KB
MD59926ac37c14cb4b5f2de0fc2fbc77093
SHA10d901ce41abda8437ca564be36907b2a0ba48d8f
SHA2568f9c778fe2af1833ee9bbc0d329f9c4db5e5048dc1a51fc734dda0e7c56d0393
SHA5126029b76b080ce0222ac4be6a87e92cfb065201f46e1dd8b4dc8789543b8d4b8ee293f963af0918c47b0c60a1bfbab976651129ac088c8edafb90d6894ab66100
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\BBB25ADE32D8BB0153C5DCE5DB824DBF9467B718
Filesize1KB
MD5c6b7c249cea669546fcc6cc2864403a1
SHA1bb5098de310594589b3f6acbf77df41654043d32
SHA2564388c6df51c3aabc79322d943324638bbdad3410f228f4c9590fd5bb136fe9da
SHA5124217cbf0296637ffaf63bc84d58fc0d296271ef9be32e2ba98bddb46529778d24a3601b11f9482197cc8935b245c21ae34b884b95f627ef03f670bf87fed1348
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\BBB25ADE32D8BB0153C5DCE5DB824DBF9467B718
Filesize1KB
MD5769d9f234f803f2cd4254b9e4f0501f0
SHA140b077450c385fee55ef3ea05ba2ee0423fecc9e
SHA2568253dc4efe93b3676b8228c41fe20a5fcfe3d081ea53a6c502303f60f5f9e902
SHA512ca76693e4ec8e616e77e6d9a08031fa526d3dd8b2b0c88d82f2d22215d689b56ac4c7fae8401352deee06d17630afbb34ba0af954e0bdceff8f30b93aff1d1a5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD55416edadf88e96a48c540320e4cc2375
SHA13586a6feac57d572bd0421b640661ba6b149aa8a
SHA25692d65f3a66c7bb7c760aab3fc70b494887f58039008d2b6bc4522ac8c955a88f
SHA512312ca5de20aefb168d5f8b417c090970bd413d6c996be58cf0bb17079f4ac1a92b6a36363641c34c710712b3c7201d49fb6853ef1a2a4456a38b170dd2e3a61a
-
Filesize
5.2MB
MD526ddd4151aa46765523e57322511d3c5
SHA137eca9ac5cec7236003fe9f9536df337a0362986
SHA256934f0c564c1d26e5f617f4b2a1efd4072a081c38ec802bcabd6b757432ef595f
SHA512a7fb86917463bf1c3607db811f606aad0802461f101b7dd4699cd83198401371d8a1b696d439095c50d8dd8ffff32a0837f7b875df03cd5de7fae5d0efe02e3e
-
\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\anti.exe
Filesize1.9MB
MD5cb02c0438f3f4ddabce36f8a26b0b961
SHA148c4fcb17e93b74030415996c0ec5c57b830ea53
SHA25664677f7767d6e791341b2eac7b43df90d39d9bdf26d21358578d2d38037e2c32
SHA512373f91981832cd9a1ff0b8744b43c7574b72971b5b6b19ea1f4665b6c878f7a1c7834ac08b92e0eca299eb4b590bf10f48a0485350a77a5f85fc3d2dd6913db3
-
\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\butdes.exe
Filesize2.8MB
MD51535aa21451192109b86be9bcc7c4345
SHA11af211c686c4d4bf0239ed6620358a19691cf88c
SHA2564641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6
SHA5121762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da
-
\Users\Admin\AppData\Local\Temp\2024-09-17_80be5927fd12a2f3b00f8d66b0fb91b7_cobalt-strike_cobaltstrike_hijackloader_karagany_mafia_poet-rat_89ea3597-f401-492d-9caa-fd5e391df9fb\screenscrew.exe
Filesize111KB
MD5e87a04c270f98bb6b5677cc789d1ad1d
SHA18c14cb338e23d4a82f6310d13b36729e543ff0ca
SHA256e03520794f00fb39ef3cfff012f72a5d03c60f89de28dbe69016f6ed151b5338
SHA5128784f4d42908e54ecedfb06b254992c63920f43a27903ccedd336daaeed346db44e1f40e7db971735da707b5b32206be1b1571bc0d6a2d6eb90bbf9d1f69de13
-
Filesize
127KB
MD52027121c3cdeb1a1f8a5f539d1fe2e28
SHA1bcf79f49f8fc4c6049f33748ded21ec3471002c2
SHA2561dae8b6de29f2cfc0745d9f2a245b9ecb77f2b272a5b43de1ba5971c43bf73a1
SHA5125b0d9966ecc08bcc2c127b2bd916617b8de2dcbdc28aff7b4b8449a244983bfbe33c56f5c4a53b7cf21faf1dbab4bb845a5894492e7e10f3f517071f7a59727c
-
Filesize
36KB
MD5f840a9ddd319ee8c3da5190257abde5b
SHA13e868939239a5c6ef9acae10e1af721e4f99f24b
SHA256ddb6c9f8de72ddd589f009e732040250b2124bca6195aa147aa7aac43fc2c73a
SHA5128e12391027af928e4f7dad1ec4ab83e8359b19a7eb0be0372d051dfd2dd643dc0dfa086bd345760a496e5630c17f53db22f6008ae665033b766cbfcdd930881a