Analysis
-
max time kernel
15s -
max time network
171s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
29-09-2024 20:05
General
-
Target
DoomRat.exe
-
Size
13.1MB
-
MD5
567b550c62dc82e09dd15b9c32e0c72e
-
SHA1
3397499e49714d4bd4fbb49525cf3df06ec7d5eb
-
SHA256
5c4e60801dd978710cdce9a43bcd6e14e3fa8e6790dc981b4ad25307628b41a0
-
SHA512
5156d85a00591caa08df22f5536fc4b43099774a1d05386f4890561eaf388dedc5685c6cbe5d461da3c7fb2a7fa630291bdbb0bc56fb765cc89d1c2adfafcb35
-
SSDEEP
393216:bGV21SQhZ2YsHFUK2Jn1+TtIiFQS2NXNsIX3WabTToj:uFQZ2YwUlJn1QtIm28Inpzo
Malware Config
Extracted
Protocol: ftp- Host:
ftp.tripod.com - Port:
21 - Username:
onthelinux - Password:
741852abc
Extracted
xworm
-
Install_directory
%Temp%
-
install_file
chyrka228.exe
-
pastebin_url
https://pastebin.com/raw/MdxXj6A4
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
http://f/wcmd.htm
http://f/ppslog.php
http://f/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Extracted
azorult
http://195.245.112.115/index.php
Extracted
xtremerat
far3on.zapto.org
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Edhakj32.exeDddhpjof.exeJblijebc.exeBjlgdc32.exeCgndoeag.exe240929-ykmv5a1fna2c8b7740137af0934477546e6f42a7b64594e41258bf4d2b11f3868f62f9f159.exeCnkplejl.exeCnnlaehj.exeEhfjah32.exeCidjbmcp.exeDpgeee32.exeDoilmc32.exeAcpbbi32.exeDmdonkgc.exe240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exeEopbnbhd.exeDdadpdmn.exeCeehho32.exeEdpgli32.exeBfedoc32.exeEhfjah32.exeKgknhl32.exeKhpgckkb.exeKijjbofj.exeDfhjkabi.exe240929-ypfbvaxgjn2f60a6a7f3dee488ffccbbd36c43fa6be518b11c0acee023a08fce2e731a373d.exeJeekkafl.exeCmklglpn.exeDjhpgofm.exeAcgolj32.exe240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exeEhiffh32.exeFdbdah32.exeKbpbed32.exe240929-ydal8a1emc2708dcd4e4c232a4fc456ba4fc2882277914f4b43fc884f1e0d4467054db7985.exe240929-x7pgssxdkq239b875c87703067067708e731525de9140426702b9ffe077708237cd61c66a4.exePlhnda32.exe240929-ylqy6s1frc2d75730a3dbb9c30befe7175a0badcfd5521913ae5af83db04744f2db752d74b.exeJiaglp32.exeKelalp32.exeAggegh32.exeAgiamhdo.exeEglgbdep.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edhakj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dddhpjof.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jblijebc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bjlgdc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cgndoeag.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240929-ykmv5a1fna2c8b7740137af0934477546e6f42a7b64594e41258bf4d2b11f3868f62f9f159.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnkplejl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cnnlaehj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehfjah32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cidjbmcp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpgeee32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Doilmc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acpbbi32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmdonkgc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eopbnbhd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ddadpdmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ceehho32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Edhakj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Edpgli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bfedoc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehfjah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Kgknhl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Khpgckkb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kijjbofj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dfhjkabi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240929-ypfbvaxgjn2f60a6a7f3dee488ffccbbd36c43fa6be518b11c0acee023a08fce2e731a373d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jeekkafl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kgknhl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cmklglpn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Djhpgofm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" Doilmc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Acgolj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Acgolj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ehiffh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fdbdah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kbpbed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79ECA078-17FF-726B-E811-213280E5C831}" 240929-ydal8a1emc2708dcd4e4c232a4fc456ba4fc2882277914f4b43fc884f1e0d4467054db7985.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" 240929-x7pgssxdkq239b875c87703067067708e731525de9140426702b9ffe077708237cd61c66a4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehiffh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plhnda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dfhjkabi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" 240929-ylqy6s1frc2d75730a3dbb9c30befe7175a0badcfd5521913ae5af83db04744f2db752d74b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jiaglp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kelalp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Djhpgofm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ehfjah32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kijjbofj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dpgeee32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Aggegh32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ceehho32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240929-x7pgssxdkq239b875c87703067067708e731525de9140426702b9ffe077708237cd61c66a4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Agiamhdo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240929-ydal8a1emc2708dcd4e4c232a4fc456ba4fc2882277914f4b43fc884f1e0d4467054db7985.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fdbdah32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kbpbed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cmklglpn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eglgbdep.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bjlgdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Cnnlaehj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 240929-ylqy6s1frc2d75730a3dbb9c30befe7175a0badcfd5521913ae5af83db04744f2db752d74b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aggegh32.exe -
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Detect Blackmoon payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/6256-1061-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/6460-1044-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Detect XtremeRAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/5832-943-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1084-994-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/4000-1018-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/5832-936-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat -
Detect Xworm Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/4100-165-0x0000000000A80000-0x0000000000A96000-memory.dmp family_xworm behavioral1/memory/3032-169-0x0000000000570000-0x0000000000584000-memory.dmp family_xworm C:\Users\Admin\Downloads\240929-xxx17axajktiki toby.exe family_xworm -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\C7E54\\35244.exe" 240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exe -
Modifies firewall policy service 3 TTPs 4 IoCs
Processes:
240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\Downloads\240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe = "C:\\Users\\Admin\\Downloads\\240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe:*:enabled:@shell32.dll,-1" 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
Processes:
backup.exebackup.exebackup.exebackup.exe240929-yb5pks1elb2673a806dd91d3a495047838e91c8a21df388b5ce38dc13d75193d2ea0a4c926.exe240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exebackup.exe240929-ymvzhsxfnj2e5f0523637fd3bb151b6c947f09f3b8bf9fcba790cf1881923d3f182ba8a798.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 240929-yb5pks1elb2673a806dd91d3a495047838e91c8a21df388b5ce38dc13d75193d2ea0a4c926.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 240929-ymvzhsxfnj2e5f0523637fd3bb151b6c947f09f3b8bf9fcba790cf1881923d3f182ba8a798.exe -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
Processes:
resource yara_rule behavioral1/memory/700-937-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/700-937-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/700-937-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView -
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule C:\Windows\System\bNaYzPj.exe xmrig -
Modifies Windows Firewall 2 TTPs 1 IoCs
-
Executes dropped EXE 64 IoCs
Processes:
240929-yhcblsxennrak23.exe240929-ydzaksxejltiki toby.exe240929-yq271a1hmdff3c39fd25524e157e7930fda47483b0_JaffaCakes118.exe240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe240929-ykmv5a1fna2c8b7740137af0934477546e6f42a7b64594e41258bf4d2b11f3868f62f9f159.exe240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exe240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exe240929-yfap1axeknbuilder.exe240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exeCnkplejl.exeCeehho32.exeCnnlaehj.exe240929-ydal8a1emc2708dcd4e4c232a4fc456ba4fc2882277914f4b43fc884f1e0d4467054db7985.exe240929-ylgeqsxfjpff3976e7def72f18fd1484470618c8da_JaffaCakes118.exeDddhpjof.exe240929-yb5pks1elb2673a806dd91d3a495047838e91c8a21df388b5ce38dc13d75193d2ea0a4c926.exe240929-x27fesxbpnff3623f0f524b3a09e2833e0220cd040_JaffaCakes118.exe240929-x4a51a1cndff36de842be5e5499d75bfaa96a51890_JaffaCakes118.exe240929-x7pgssxdkq239b875c87703067067708e731525de9140426702b9ffe077708237cd61c66a4.exeDoilmc32.exe240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exe240929-x6l1aa1dmeff38928ef4a0574642a238b03588cec8_JaffaCakes118.exeEdhakj32.exe240929-ylqy6s1frc2d75730a3dbb9c30befe7175a0badcfd5521913ae5af83db04744f2db752d74b.exeEhfjah32.exeEhfjah32.exeEaonjngh.exeEhiffh32.exeEglgbdep.exe240929-yf2tgs1erbnew.exeEobocb32.exeEaakpm32.exeEdpgli32.exeEopbnbhd.exeFdbdah32.exe240929-xydc6s1apc1dbc62360cb97c45e89e235802edf09c594235274b6c6c2c3d35c41b11f2c22e.exe240929-x6sg3axcrrff38b67681ab7ed60197784cca17a6ef_JaffaCakes118.exeJeekkafl.exeJiaglp32.exeJblijebc.exebackup.exeKelalp32.exe240929-x24pjaxbpjNew Client.exeKgknhl32.exeKbpbed32.exeKijjbofj.exe240929-yldc3s1fqbff395614f783c57799b28d0ba00238d7_JaffaCakes118.exeKhpgckkb.exe240929-ymvzhsxfnj2e5f0523637fd3bb151b6c947f09f3b8bf9fcba790cf1881923d3f182ba8a798.exePhlacbfm.exePlhnda32.exebackup.exe240929-yjzhjaxeql2b42021e5c2a724f2f43b1a6f016fe4a228f954c740f23ae6cccb6fa88f14c89.exeAcgolj32.exeAcgolj32.exeAggegh32.exeAggegh32.exe240929-x622haxdjqff390075efc4c2be57ea0eb69462f3d4_JaffaCakes118.exeAgiamhdo.exeAcpbbi32.exebackup.exe240929-ym865sxfplff3a4e4e58b8f917b34a8b0e53bf16ed_JaffaCakes118.exeBjlgdc32.exeBiadeoce.exepid process 4100 240929-yhcblsxennrak23.exe 3032 240929-ydzaksxejltiki toby.exe 3144 240929-yq271a1hmdff3c39fd25524e157e7930fda47483b0_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 348 240929-ykmv5a1fna2c8b7740137af0934477546e6f42a7b64594e41258bf4d2b11f3868f62f9f159.exe 3800 240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exe 4812 240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exe 2712 240929-yfap1axeknbuilder.exe 404 240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exe 3904 Cnkplejl.exe 3324 Ceehho32.exe 1424 Cnnlaehj.exe 2288 240929-ydal8a1emc2708dcd4e4c232a4fc456ba4fc2882277914f4b43fc884f1e0d4467054db7985.exe 4828 240929-ylgeqsxfjpff3976e7def72f18fd1484470618c8da_JaffaCakes118.exe 4684 Dddhpjof.exe 1020 240929-yb5pks1elb2673a806dd91d3a495047838e91c8a21df388b5ce38dc13d75193d2ea0a4c926.exe 5052 240929-x27fesxbpnff3623f0f524b3a09e2833e0220cd040_JaffaCakes118.exe 3592 240929-x4a51a1cndff36de842be5e5499d75bfaa96a51890_JaffaCakes118.exe 3364 240929-x7pgssxdkq239b875c87703067067708e731525de9140426702b9ffe077708237cd61c66a4.exe 1260 Doilmc32.exe 1496 240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exe 2184 240929-x6l1aa1dmeff38928ef4a0574642a238b03588cec8_JaffaCakes118.exe 4040 Edhakj32.exe 4364 240929-ylqy6s1frc2d75730a3dbb9c30befe7175a0badcfd5521913ae5af83db04744f2db752d74b.exe 3144 Ehfjah32.exe 3676 Ehfjah32.exe 5104 Eaonjngh.exe 4664 Ehiffh32.exe 1048 Eglgbdep.exe 3764 240929-yf2tgs1erbnew.exe 32 Eobocb32.exe 4112 Eaakpm32.exe 4944 Edpgli32.exe 4296 Eopbnbhd.exe 4896 Fdbdah32.exe 1620 240929-xydc6s1apc1dbc62360cb97c45e89e235802edf09c594235274b6c6c2c3d35c41b11f2c22e.exe 3896 240929-x6sg3axcrrff38b67681ab7ed60197784cca17a6ef_JaffaCakes118.exe 4252 Jeekkafl.exe 3904 Jiaglp32.exe 2804 Jblijebc.exe 4656 backup.exe 4244 Kelalp32.exe 4216 240929-x24pjaxbpjNew Client.exe 812 Kgknhl32.exe 5164 Kbpbed32.exe 5196 Kijjbofj.exe 5208 240929-yldc3s1fqbff395614f783c57799b28d0ba00238d7_JaffaCakes118.exe 5304 Khpgckkb.exe 5384 240929-ymvzhsxfnj2e5f0523637fd3bb151b6c947f09f3b8bf9fcba790cf1881923d3f182ba8a798.exe 5596 Phlacbfm.exe 5608 Plhnda32.exe 5640 backup.exe 5688 240929-yjzhjaxeql2b42021e5c2a724f2f43b1a6f016fe4a228f954c740f23ae6cccb6fa88f14c89.exe 5716 Acgolj32.exe 5728 Acgolj32.exe 5892 Aggegh32.exe 5900 Aggegh32.exe 5944 240929-x622haxdjqff390075efc4c2be57ea0eb69462f3d4_JaffaCakes118.exe 5996 Agiamhdo.exe 6096 Acpbbi32.exe 6124 backup.exe 4336 240929-ym865sxfplff3a4e4e58b8f917b34a8b0e53bf16ed_JaffaCakes118.exe 4224 Bjlgdc32.exe 4660 Biadeoce.exe -
Loads dropped DLL 24 IoCs
Processes:
DoomRat.exepid process 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe 4532 DoomRat.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution 1 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
Processes:
240929-x1dfysxarlff34f218fd68aa2c7b7693d3ee7162f9_JaffaCakes118.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\ie13\Internat Explorer\Desktop.ini 240929-x1dfysxarlff34f218fd68aa2c7b7693d3ee7162f9_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
Processes:
flow ioc 1 pastebin.com 2 pastebin.com 449 pastebin.com 450 0.tcp.ap.ngrok.io 562 0.tcp.ap.ngrok.io -
Looks up external IP address via web service 12 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 476 whatismyipaddress.com 483 www.showmyipaddress.com 504 www.whatismyip.ca 374 whatismyipaddress.com 459 whatismyip.everdot.org 468 www.whatismyip.ca 473 whatismyip.everdot.org 491 www.whatismyip.ca 495 whatismyip.everdot.org 497 www.whatismyip.ca 372 whatismyipaddress.com 422 ip-api.com -
Drops file in System32 directory 64 IoCs
Processes:
240929-x7pgssxdkq239b875c87703067067708e731525de9140426702b9ffe077708237cd61c66a4.exeEglgbdep.exeJeekkafl.exeKhpgckkb.exeAcpbbi32.exeDpgeee32.exe240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exe240929-ylqy6s1frc2d75730a3dbb9c30befe7175a0badcfd5521913ae5af83db04744f2db752d74b.exeEaakpm32.exeFdbdah32.exeCidjbmcp.exeCeehho32.exeEopbnbhd.exeKijjbofj.exeAcgolj32.exeAgiamhdo.exe240929-ydal8a1emc2708dcd4e4c232a4fc456ba4fc2882277914f4b43fc884f1e0d4467054db7985.exeEdpgli32.exeBjlgdc32.exeCgndoeag.exeCfcqpa32.exeDfhjkabi.exe240929-ym865sxfplff3a4e4e58b8f917b34a8b0e53bf16ed_JaffaCakes118.exeDmdonkgc.exeEdhakj32.exeEobocb32.exeJiaglp32.exePhlacbfm.exeBiadeoce.exeEhfjah32.exeKelalp32.exeKbpbed32.exeBfedoc32.exeCcchof32.exeCnnlaehj.exeJblijebc.exeAggegh32.exeDdadpdmn.exeEhiffh32.exeKgknhl32.exe240929-yjzhjaxeql2b42021e5c2a724f2f43b1a6f016fe4a228f954c740f23ae6cccb6fa88f14c89.exe240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exeDoilmc32.exeEaonjngh.exeEhfjah32.exe240929-xydc6s1apc1dbc62360cb97c45e89e235802edf09c594235274b6c6c2c3d35c41b11f2c22e.exeAcgolj32.exeDjhpgofm.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Edhakj32.exe 240929-x7pgssxdkq239b875c87703067067708e731525de9140426702b9ffe077708237cd61c66a4.exe File opened for modification C:\Windows\SysWOW64\Edpgli32.exe Eglgbdep.exe File created C:\Windows\SysWOW64\Kelalp32.exe Jeekkafl.exe File created C:\Windows\SysWOW64\Phlacbfm.exe Khpgckkb.exe File created C:\Windows\SysWOW64\Biadeoce.exe Acpbbi32.exe File created C:\Windows\SysWOW64\Ehailbaa.exe Dpgeee32.exe File opened for modification C:\Windows\SysWOW64\Ceehho32.exe 240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exe File created C:\Windows\SysWOW64\Eaonjngh.exe 240929-ylqy6s1frc2d75730a3dbb9c30befe7175a0badcfd5521913ae5af83db04744f2db752d74b.exe File opened for modification C:\Windows\SysWOW64\Fdbdah32.exe Eaakpm32.exe File opened for modification C:\Windows\SysWOW64\Jeekkafl.exe Fdbdah32.exe File created C:\Windows\SysWOW64\Dfhjkabi.exe Cidjbmcp.exe File created C:\Windows\SysWOW64\Hbeloo32.dll Dpgeee32.exe File created C:\Windows\SysWOW64\Cnnlaehj.exe Ceehho32.exe File created C:\Windows\SysWOW64\Mflfak32.dll Eglgbdep.exe File created C:\Windows\SysWOW64\Aofcga32.dll Fdbdah32.exe File opened for modification C:\Windows\SysWOW64\Jiaglp32.exe Eopbnbhd.exe File opened for modification C:\Windows\SysWOW64\Plhnda32.exe Kijjbofj.exe File created C:\Windows\SysWOW64\Jajoep32.dll Acgolj32.exe File opened for modification C:\Windows\SysWOW64\Bjlgdc32.exe Agiamhdo.exe File created C:\Windows\SysWOW64\Ceehho32.exe 240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exe File created C:\Windows\SysWOW64\Diphbb32.dll 240929-ydal8a1emc2708dcd4e4c232a4fc456ba4fc2882277914f4b43fc884f1e0d4467054db7985.exe File created C:\Windows\SysWOW64\Jiaglp32.exe Edpgli32.exe File opened for modification C:\Windows\SysWOW64\Bfedoc32.exe Bjlgdc32.exe File created C:\Windows\SysWOW64\Cfcqpa32.exe Cgndoeag.exe File opened for modification C:\Windows\SysWOW64\Dmdonkgc.exe Cfcqpa32.exe File created C:\Windows\SysWOW64\Djhpgofm.exe Dfhjkabi.exe File created C:\Windows\SysWOW64\Aggegh32.exe Acgolj32.exe File created C:\Windows\SysWOW64\Option.bat 240929-ym865sxfplff3a4e4e58b8f917b34a8b0e53bf16ed_JaffaCakes118.exe File created C:\Windows\SysWOW64\Ddadpdmn.exe Dmdonkgc.exe File created C:\Windows\SysWOW64\Mmjcbkij.dll 240929-x7pgssxdkq239b875c87703067067708e731525de9140426702b9ffe077708237cd61c66a4.exe File opened for modification C:\Windows\SysWOW64\Ehfjah32.exe Edhakj32.exe File created C:\Windows\SysWOW64\Jiaglp32.exe Eobocb32.exe File created C:\Windows\SysWOW64\Kgknhl32.exe Jiaglp32.exe File created C:\Windows\SysWOW64\Ojlklgce.dll Phlacbfm.exe File created C:\Windows\SysWOW64\Nekiiopm.dll Biadeoce.exe File opened for modification C:\Windows\SysWOW64\Ddadpdmn.exe Dmdonkgc.exe File created C:\Windows\SysWOW64\Aaafckfg.dll Ehfjah32.exe File created C:\Windows\SysWOW64\Kijjbofj.exe Kelalp32.exe File opened for modification C:\Windows\SysWOW64\Abgiapmj.dll Kbpbed32.exe File opened for modification C:\Windows\SysWOW64\Cgndoeag.exe Bfedoc32.exe File opened for modification C:\Windows\SysWOW64\Cmklglpn.exe Ccchof32.exe File created C:\Windows\SysWOW64\Dddhpjof.exe Cnnlaehj.exe File created C:\Windows\SysWOW64\Hqbdnnae.dll Jblijebc.exe File created C:\Windows\SysWOW64\Acpbbi32.exe Aggegh32.exe File created C:\Windows\SysWOW64\Ogfapnkp.dll Bjlgdc32.exe File opened for modification C:\Windows\SysWOW64\Dpgeee32.exe Ddadpdmn.exe File opened for modification C:\Windows\SysWOW64\Eaakpm32.exe Ehiffh32.exe File opened for modification C:\Windows\SysWOW64\Khpgckkb.exe Kgknhl32.exe File opened for modification C:\Windows\SysWOW64\Agiamhdo.exe 240929-yjzhjaxeql2b42021e5c2a724f2f43b1a6f016fe4a228f954c740f23ae6cccb6fa88f14c89.exe File created C:\Windows\SysWOW64\Jnpnbg32.dll Ccchof32.exe File opened for modification C:\Windows\SysWOW64\Pjngmo32.dll 240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exe File created C:\Windows\SysWOW64\Eopbnbhd.exe Doilmc32.exe File opened for modification C:\Windows\SysWOW64\Eobocb32.exe Eaonjngh.exe File opened for modification C:\Windows\SysWOW64\Djhpgofm.exe Dfhjkabi.exe File opened for modification C:\Windows\SysWOW64\Cnnlaehj.exe Ceehho32.exe File created C:\Windows\SysWOW64\Hpdlhkad.dll Ehfjah32.exe File created C:\Windows\SysWOW64\Eobocb32.exe Eaonjngh.exe File created C:\Windows\SysWOW64\Cmnech32.dll 240929-xydc6s1apc1dbc62360cb97c45e89e235802edf09c594235274b6c6c2c3d35c41b11f2c22e.exe File opened for modification C:\Windows\SysWOW64\Kelalp32.exe Jeekkafl.exe File opened for modification C:\Windows\SysWOW64\Aggegh32.exe Acgolj32.exe File created C:\Windows\SysWOW64\Ccchof32.exe Biadeoce.exe File opened for modification C:\Windows\SysWOW64\Ccchof32.exe Biadeoce.exe File opened for modification C:\Windows\SysWOW64\Djmibn32.exe Djhpgofm.exe File created C:\Windows\SysWOW64\Kkcmfmhk.dll Eaakpm32.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 4 IoCs
Processes:
cmd.execmd.execmd.execmd.exepid process 6768 cmd.exe 4964 cmd.exe 5916 cmd.exe 6184 cmd.exe -
Processes:
resource yara_rule behavioral1/memory/3592-349-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/3592-260-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/4336-626-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral1/memory/404-721-0x0000000000400000-0x0000000000491000-memory.dmp upx C:\Windows\System\KavUpda.exe upx behavioral1/memory/4336-825-0x0000000000400000-0x0000000000440000-memory.dmp upx behavioral1/memory/3592-771-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral1/memory/6256-1061-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/6460-1044-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/5628-1001-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1420-996-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
Processes:
backup.exebackup.exe240929-x1dfysxarlff34f218fd68aa2c7b7693d3ee7162f9_JaffaCakes118.exebackup.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft\ie13\Internat Explorer\Desktop.ini 240929-x1dfysxarlff34f218fd68aa2c7b7693d3ee7162f9_JaffaCakes118.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
Processes:
240929-ym865sxfplff3a4e4e58b8f917b34a8b0e53bf16ed_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\system\KavUpda.exe 240929-ym865sxfplff3a4e4e58b8f917b34a8b0e53bf16ed_JaffaCakes118.exe -
Launches sc.exe 40 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 11024 sc.exe 5996 4360 2676 sc.exe 20468 5972 sc.exe 11196 12384 5184 17588 9736 7132 sc.exe 19644 9524 sc.exe 8228 9348 22920 21260 20620 1496 sc.exe 7652 sc.exe 7080 sc.exe 15552 5788 6960 6432 21936 20456 8580 8024 19652 6836 sc.exe 5388 sc.exe 21960 10708 sc.exe 20080 6920 sc.exe 6372 5220 21704 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3012 5052 WerFault.exe 240929-x27fesxbpnff3623f0f524b3a09e2833e0220cd040_JaffaCakes118.exe 6744 1084 WerFault.exe 5852 5208 WerFault.exe 240929-yldc3s1fqbff395614f783c57799b28d0ba00238d7_JaffaCakes118.exe 6520 1084 WerFault.exe 9104 7152 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Bjlgdc32.exebackup.execmd.execmd.exeEhailbaa.exeJblijebc.exeAggegh32.exeCeehho32.exeDddhpjof.exe240929-x24pjaxbpjNew Client.exeAcgolj32.exebackup.exeAcpbbi32.exe240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exeCnkplejl.exeDpgeee32.exeBqilgmdg.exeCmklglpn.exeBiadeoce.exePhlacbfm.exe240929-x622haxdjqff390075efc4c2be57ea0eb69462f3d4_JaffaCakes118.exeEaonjngh.exeFdbdah32.exeCgndoeag.exe240929-ypfbvaxgjn2f60a6a7f3dee488ffccbbd36c43fa6be518b11c0acee023a08fce2e731a373d.exe240929-yq271a1hmdff3c39fd25524e157e7930fda47483b0_JaffaCakes118.exe240929-x6l1aa1dmeff38928ef4a0574642a238b03588cec8_JaffaCakes118.exe240929-xydc6s1apc1dbc62360cb97c45e89e235802edf09c594235274b6c6c2c3d35c41b11f2c22e.exe240929-ym865sxfplff3a4e4e58b8f917b34a8b0e53bf16ed_JaffaCakes118.exe240929-x1dfysxarlff34f218fd68aa2c7b7693d3ee7162f9_JaffaCakes118.exebackup.exe240929-ydal8a1emc2708dcd4e4c232a4fc456ba4fc2882277914f4b43fc884f1e0d4467054db7985.exe240929-yb5pks1elb2673a806dd91d3a495047838e91c8a21df388b5ce38dc13d75193d2ea0a4c926.exeEhiffh32.exeBfedoc32.exe240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exeCnnlaehj.exeKelalp32.exeKijjbofj.exeKhpgckkb.exe240929-yfap1axeknbuilder.exeEdpgli32.exeJeekkafl.exePlhnda32.exe240929-ymvzhsxfnj2e5f0523637fd3bb151b6c947f09f3b8bf9fcba790cf1881923d3f182ba8a798.exeAgiamhdo.exejoateo.exeDfhjkabi.execmd.exe240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exeEhfjah32.exeDoilmc32.exe240929-ylqy6s1frc2d75730a3dbb9c30befe7175a0badcfd5521913ae5af83db04744f2db752d74b.exeEaakpm32.exe240929-yldc3s1fqbff395614f783c57799b28d0ba00238d7_JaffaCakes118.exeCfcqpa32.exe240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe240929-x4a51a1cndff36de842be5e5499d75bfaa96a51890_JaffaCakes118.exeEopbnbhd.exeEobocb32.exebackup.exeCcchof32.exeCidjbmcp.exebackup.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjlgdc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language backup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ehailbaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jblijebc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aggegh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ceehho32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dddhpjof.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-x24pjaxbpjNew Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acgolj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language backup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acpbbi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnkplejl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpgeee32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bqilgmdg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmklglpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Biadeoce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phlacbfm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-x622haxdjqff390075efc4c2be57ea0eb69462f3d4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eaonjngh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fdbdah32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cgndoeag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-ypfbvaxgjn2f60a6a7f3dee488ffccbbd36c43fa6be518b11c0acee023a08fce2e731a373d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-yq271a1hmdff3c39fd25524e157e7930fda47483b0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-x6l1aa1dmeff38928ef4a0574642a238b03588cec8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-xydc6s1apc1dbc62360cb97c45e89e235802edf09c594235274b6c6c2c3d35c41b11f2c22e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-ym865sxfplff3a4e4e58b8f917b34a8b0e53bf16ed_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-x1dfysxarlff34f218fd68aa2c7b7693d3ee7162f9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language backup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-ydal8a1emc2708dcd4e4c232a4fc456ba4fc2882277914f4b43fc884f1e0d4467054db7985.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-yb5pks1elb2673a806dd91d3a495047838e91c8a21df388b5ce38dc13d75193d2ea0a4c926.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ehiffh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bfedoc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cnnlaehj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kelalp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kijjbofj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Khpgckkb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-yfap1axeknbuilder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Edpgli32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jeekkafl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Plhnda32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-ymvzhsxfnj2e5f0523637fd3bb151b6c947f09f3b8bf9fcba790cf1881923d3f182ba8a798.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Agiamhdo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language joateo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dfhjkabi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ehfjah32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doilmc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-ylqy6s1frc2d75730a3dbb9c30befe7175a0badcfd5521913ae5af83db04744f2db752d74b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eaakpm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-yldc3s1fqbff395614f783c57799b28d0ba00238d7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cfcqpa32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240929-x4a51a1cndff36de842be5e5499d75bfaa96a51890_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eopbnbhd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eobocb32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language backup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ccchof32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cidjbmcp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language backup.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
System Time Discovery 1 TTPs 22 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
Processes:
net1.exenet1.exenet.exenet.exenet.exenet.exepid process 10344 22744 22832 4688 7192 net1.exe 8552 6952 6496 20328 7176 21336 10188 net1.exe 10532 net.exe 22916 21692 13540 9684 net.exe 21836 6652 net.exe 7184 net.exe 16512 11848 -
Kills process with taskkill 2 IoCs
Processes:
TASKKILL.exeTASKKILL.exepid process 6072 TASKKILL.exe 5092 TASKKILL.exe -
Modifies registry class 64 IoCs
Processes:
Djhpgofm.exeEhfjah32.exePhlacbfm.exeAcpbbi32.exeCgndoeag.exeCmklglpn.exeDfhjkabi.exeCnnlaehj.exe240929-ydal8a1emc2708dcd4e4c232a4fc456ba4fc2882277914f4b43fc884f1e0d4467054db7985.exeDoilmc32.exeAcgolj32.exe240929-ykmv5a1fna2c8b7740137af0934477546e6f42a7b64594e41258bf4d2b11f3868f62f9f159.exeEdhakj32.exeJeekkafl.exeDdadpdmn.exeKelalp32.exePlhnda32.exeCeehho32.exeJblijebc.exeKhpgckkb.exe240929-yjzhjaxeql2b42021e5c2a724f2f43b1a6f016fe4a228f954c740f23ae6cccb6fa88f14c89.exeCnkplejl.exe240929-ylqy6s1frc2d75730a3dbb9c30befe7175a0badcfd5521913ae5af83db04744f2db752d74b.exeKijjbofj.exeBqilgmdg.exeCcchof32.exeKbpbed32.exeEhiffh32.exeEaakpm32.exeEdpgli32.exeKgknhl32.exeAggegh32.exeBjlgdc32.exeBiadeoce.exeEopbnbhd.exeDmdonkgc.exeDpgeee32.exe240929-ypfbvaxgjn2f60a6a7f3dee488ffccbbd36c43fa6be518b11c0acee023a08fce2e731a373d.exeAcgolj32.exe240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Djhpgofm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ehfjah32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Phlacbfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Naqbda32.dll" Acpbbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Inogde32.dll" Cgndoeag.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cmklglpn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dfhjkabi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dfhjkabi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cnnlaehj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831} 240929-ydal8a1emc2708dcd4e4c232a4fc456ba4fc2882277914f4b43fc884f1e0d4467054db7985.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32 Doilmc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Acgolj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pjngmo32.dll" 240929-ykmv5a1fna2c8b7740137af0934477546e6f42a7b64594e41258bf4d2b11f3868f62f9f159.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Edhakj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Aaafckfg.dll" Ehfjah32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jeekkafl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jajoep32.dll" Acgolj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ddadpdmn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dhkgkgoe.dll" Kelalp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Leckbi32.dll" Plhnda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nagfjh32.dll" Dfhjkabi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ceehho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jblijebc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abgiapmj.dll" Khpgckkb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 240929-yjzhjaxeql2b42021e5c2a724f2f43b1a6f016fe4a228f954c740f23ae6cccb6fa88f14c89.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738} 240929-ykmv5a1fna2c8b7740137af0934477546e6f42a7b64594e41258bf4d2b11f3868f62f9f159.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cnkplejl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 240929-ydal8a1emc2708dcd4e4c232a4fc456ba4fc2882277914f4b43fc884f1e0d4467054db7985.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bdmoejcc.dll" 240929-ylqy6s1frc2d75730a3dbb9c30befe7175a0badcfd5521913ae5af83db04744f2db752d74b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kijjbofj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Acpbbi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nekiiopm.dll" Bqilgmdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ccchof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Kbpbed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ingfla32.dll" Ceehho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ceehho32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ekbngp32.dll" Edhakj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kpoqijhk.dll" Ehiffh32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Eaakpm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Edpgli32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pmekjp32.dll" Kgknhl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Plhnda32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Aggegh32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bjlgdc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nekiiopm.dll" Biadeoce.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ccchof32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Eopbnbhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ThreadingModel = "Apartment" Kgknhl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Bqilgmdg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Cmklglpn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dmdonkgc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Dpgeee32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79ECA078-17FF-726B-E811-213280E5C831}\InProcServer32\ = "C:\\Windows\\SysWow64\\Diphbb32.dll" 240929-ydal8a1emc2708dcd4e4c232a4fc456ba4fc2882277914f4b43fc884f1e0d4467054db7985.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 240929-ylqy6s1frc2d75730a3dbb9c30befe7175a0badcfd5521913ae5af83db04744f2db752d74b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pidcecbj.dll" Kijjbofj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Abgiapmj.dll" Kbpbed32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Phlacbfm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Djhpgofm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 240929-ypfbvaxgjn2f60a6a7f3dee488ffccbbd36c43fa6be518b11c0acee023a08fce2e731a373d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 240929-ykmv5a1fna2c8b7740137af0934477546e6f42a7b64594e41258bf4d2b11f3868f62f9f159.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Acgolj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ploija32.dll" 240929-yjzhjaxeql2b42021e5c2a724f2f43b1a6f016fe4a228f954c740f23ae6cccb6fa88f14c89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Biadeoce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" 240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Runs regedit.exe 1 IoCs
Processes:
regedit.exepid process 4836 regedit.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe240929-x27fesxbpnff3623f0f524b3a09e2833e0220cd040_JaffaCakes118.exe240929-x24pjaxbpjNew Client.exepid process 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 5052 240929-x27fesxbpnff3623f0f524b3a09e2833e0220cd040_JaffaCakes118.exe 4216 240929-x24pjaxbpjNew Client.exe 4216 240929-x24pjaxbpjNew Client.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exepid process 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
240929-yhcblsxennrak23.exe240929-ydzaksxejltiki toby.exe240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe240929-x27fesxbpnff3623f0f524b3a09e2833e0220cd040_JaffaCakes118.exe240929-ylgeqsxfjpff3976e7def72f18fd1484470618c8da_JaffaCakes118.exe240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exe240929-x24pjaxbpjNew Client.exe240929-xxx17axajktiki toby.exedescription pid process Token: SeDebugPrivilege 4100 240929-yhcblsxennrak23.exe Token: SeDebugPrivilege 3032 240929-ydzaksxejltiki toby.exe Token: SeDebugPrivilege 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe Token: SeDebugPrivilege 5052 240929-x27fesxbpnff3623f0f524b3a09e2833e0220cd040_JaffaCakes118.exe Token: SeImpersonatePrivilege 4828 240929-ylgeqsxfjpff3976e7def72f18fd1484470618c8da_JaffaCakes118.exe Token: SeTcbPrivilege 4828 240929-ylgeqsxfjpff3976e7def72f18fd1484470618c8da_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 4828 240929-ylgeqsxfjpff3976e7def72f18fd1484470618c8da_JaffaCakes118.exe Token: SeCreateTokenPrivilege 4828 240929-ylgeqsxfjpff3976e7def72f18fd1484470618c8da_JaffaCakes118.exe Token: SeBackupPrivilege 4828 240929-ylgeqsxfjpff3976e7def72f18fd1484470618c8da_JaffaCakes118.exe Token: SeRestorePrivilege 4828 240929-ylgeqsxfjpff3976e7def72f18fd1484470618c8da_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 4828 240929-ylgeqsxfjpff3976e7def72f18fd1484470618c8da_JaffaCakes118.exe Token: SeAssignPrimaryTokenPrivilege 4828 240929-ylgeqsxfjpff3976e7def72f18fd1484470618c8da_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 404 240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exe Token: SeRestorePrivilege 404 240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exe Token: SeBackupPrivilege 404 240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 404 240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exe Token: SeDebugPrivilege 4216 240929-x24pjaxbpjNew Client.exe Token: SeDebugPrivilege 5344 240929-xxx17axajktiki toby.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
240929-yb5pks1elb2673a806dd91d3a495047838e91c8a21df388b5ce38dc13d75193d2ea0a4c926.exe240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exe240929-ymvzhsxfnj2e5f0523637fd3bb151b6c947f09f3b8bf9fcba790cf1881923d3f182ba8a798.exepid process 1020 240929-yb5pks1elb2673a806dd91d3a495047838e91c8a21df388b5ce38dc13d75193d2ea0a4c926.exe 1496 240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exe 5384 240929-ymvzhsxfnj2e5f0523637fd3bb151b6c947f09f3b8bf9fcba790cf1881923d3f182ba8a798.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
240929-yb5pks1elb2673a806dd91d3a495047838e91c8a21df388b5ce38dc13d75193d2ea0a4c926.exe240929-x6l1aa1dmeff38928ef4a0574642a238b03588cec8_JaffaCakes118.exe240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exebackup.exe240929-ymvzhsxfnj2e5f0523637fd3bb151b6c947f09f3b8bf9fcba790cf1881923d3f182ba8a798.exebackup.exebackup.exe240929-ym865sxfplff3a4e4e58b8f917b34a8b0e53bf16ed_JaffaCakes118.exebackup.exejoateo.exebackup.exepid process 1020 240929-yb5pks1elb2673a806dd91d3a495047838e91c8a21df388b5ce38dc13d75193d2ea0a4c926.exe 2184 240929-x6l1aa1dmeff38928ef4a0574642a238b03588cec8_JaffaCakes118.exe 1496 240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exe 4656 backup.exe 5384 240929-ymvzhsxfnj2e5f0523637fd3bb151b6c947f09f3b8bf9fcba790cf1881923d3f182ba8a798.exe 5640 backup.exe 6124 backup.exe 4336 240929-ym865sxfplff3a4e4e58b8f917b34a8b0e53bf16ed_JaffaCakes118.exe 5568 backup.exe 3292 joateo.exe 5408 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
DoomRat.exeDoomRat.exe240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exe240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exe240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exedescription pid process target process PID 4700 wrote to memory of 4532 4700 DoomRat.exe DoomRat.exe PID 4700 wrote to memory of 4532 4700 DoomRat.exe DoomRat.exe PID 4532 wrote to memory of 1496 4532 DoomRat.exe cmd.exe PID 4532 wrote to memory of 1496 4532 DoomRat.exe cmd.exe PID 4532 wrote to memory of 4100 4532 DoomRat.exe 240929-yhcblsxennrak23.exe PID 4532 wrote to memory of 4100 4532 DoomRat.exe 240929-yhcblsxennrak23.exe PID 4532 wrote to memory of 3032 4532 DoomRat.exe 240929-ydzaksxejltiki toby.exe PID 4532 wrote to memory of 3032 4532 DoomRat.exe 240929-ydzaksxejltiki toby.exe PID 4532 wrote to memory of 3144 4532 DoomRat.exe Ehfjah32.exe PID 4532 wrote to memory of 3144 4532 DoomRat.exe Ehfjah32.exe PID 4532 wrote to memory of 3144 4532 DoomRat.exe Ehfjah32.exe PID 4532 wrote to memory of 3580 4532 DoomRat.exe 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe PID 4532 wrote to memory of 3580 4532 DoomRat.exe 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe PID 4532 wrote to memory of 3580 4532 DoomRat.exe 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe PID 4532 wrote to memory of 348 4532 DoomRat.exe backup.exe PID 4532 wrote to memory of 348 4532 DoomRat.exe backup.exe PID 4532 wrote to memory of 348 4532 DoomRat.exe backup.exe PID 4532 wrote to memory of 3800 4532 DoomRat.exe 240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exe PID 4532 wrote to memory of 3800 4532 DoomRat.exe 240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exe PID 4532 wrote to memory of 3800 4532 DoomRat.exe 240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exe PID 4532 wrote to memory of 4812 4532 DoomRat.exe 240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exe PID 4532 wrote to memory of 4812 4532 DoomRat.exe 240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exe PID 4532 wrote to memory of 4812 4532 DoomRat.exe 240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exe PID 4532 wrote to memory of 2712 4532 DoomRat.exe lBnXxIY.exe PID 4532 wrote to memory of 2712 4532 DoomRat.exe lBnXxIY.exe PID 4532 wrote to memory of 2712 4532 DoomRat.exe lBnXxIY.exe PID 4532 wrote to memory of 404 4532 DoomRat.exe 240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exe PID 4532 wrote to memory of 404 4532 DoomRat.exe 240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exe PID 4532 wrote to memory of 404 4532 DoomRat.exe 240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exe PID 3800 wrote to memory of 3904 3800 240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exe LtoFnSa.exe PID 3800 wrote to memory of 3904 3800 240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exe LtoFnSa.exe PID 3800 wrote to memory of 3904 3800 240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exe LtoFnSa.exe PID 4812 wrote to memory of 3324 4812 240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exe Ceehho32.exe PID 4812 wrote to memory of 3324 4812 240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exe Ceehho32.exe PID 4812 wrote to memory of 3324 4812 240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exe Ceehho32.exe PID 3580 wrote to memory of 580 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe winlogon.exe PID 3580 wrote to memory of 580 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe winlogon.exe PID 3580 wrote to memory of 580 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe winlogon.exe PID 3580 wrote to memory of 580 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe winlogon.exe PID 3580 wrote to memory of 580 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe winlogon.exe PID 3580 wrote to memory of 580 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe winlogon.exe PID 3580 wrote to memory of 632 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe lsass.exe PID 3580 wrote to memory of 632 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe lsass.exe PID 3580 wrote to memory of 632 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe lsass.exe PID 3580 wrote to memory of 632 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe lsass.exe PID 3580 wrote to memory of 632 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe lsass.exe PID 3580 wrote to memory of 632 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe lsass.exe PID 3580 wrote to memory of 712 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe fontdrvhost.exe PID 3580 wrote to memory of 712 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe fontdrvhost.exe PID 3580 wrote to memory of 712 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe fontdrvhost.exe PID 3580 wrote to memory of 712 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe fontdrvhost.exe PID 3580 wrote to memory of 712 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe fontdrvhost.exe PID 3580 wrote to memory of 712 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe fontdrvhost.exe PID 3580 wrote to memory of 720 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe fontdrvhost.exe PID 3580 wrote to memory of 720 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe fontdrvhost.exe PID 3580 wrote to memory of 720 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe fontdrvhost.exe PID 3580 wrote to memory of 720 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe fontdrvhost.exe PID 3580 wrote to memory of 720 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe fontdrvhost.exe PID 3580 wrote to memory of 720 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe fontdrvhost.exe PID 3580 wrote to memory of 728 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe svchost.exe PID 3580 wrote to memory of 728 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe svchost.exe PID 3580 wrote to memory of 728 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe svchost.exe PID 3580 wrote to memory of 728 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe svchost.exe PID 3580 wrote to memory of 728 3580 240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe svchost.exe -
System policy modification 1 TTPs 16 IoCs
Processes:
240929-ymvzhsxfnj2e5f0523637fd3bb151b6c947f09f3b8bf9fcba790cf1881923d3f182ba8a798.exebackup.exebackup.exebackup.exe240929-yb5pks1elb2673a806dd91d3a495047838e91c8a21df388b5ce38dc13d75193d2ea0a4c926.exe240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exebackup.exebackup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 240929-ymvzhsxfnj2e5f0523637fd3bb151b6c947f09f3b8bf9fcba790cf1881923d3f182ba8a798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 240929-ymvzhsxfnj2e5f0523637fd3bb151b6c947f09f3b8bf9fcba790cf1881923d3f182ba8a798.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 240929-yb5pks1elb2673a806dd91d3a495047838e91c8a21df388b5ce38dc13d75193d2ea0a4c926.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 240929-yb5pks1elb2673a806dd91d3a495047838e91c8a21df388b5ce38dc13d75193d2ea0a4c926.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe -
Views/modifies file attributes 1 TTPs 8 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 11672 18072 24896 7976 attrib.exe 7968 attrib.exe 6620 attrib.exe 22480 14060
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:580
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:720
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:980
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:632
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:712
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay1⤵PID:728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:800
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵PID:2920
-
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca2⤵PID:3556
-
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca2⤵PID:3564
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3828
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4028
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4152
-
-
C:\Windows\system32\ApplicationFrameHost.exeC:\Windows\system32\ApplicationFrameHost.exe -Embedding2⤵PID:2776
-
-
C:\Windows\System32\InstallAgent.exeC:\Windows\System32\InstallAgent.exe -Embedding2⤵PID:4116
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}2⤵PID:504
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k rpcss1⤵PID:844
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s LSM1⤵PID:892
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵PID:1008
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts1⤵PID:380
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService1⤵PID:968
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog1⤵PID:1064
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵PID:1072
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2656
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork1⤵PID:1088
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s nsi1⤵PID:1168
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵PID:1248
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp1⤵PID:1272
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s EventSystem1⤵PID:1388
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵PID:1400
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵PID:1452
-
c:\windows\system32\sihost.exesihost.exe2⤵PID:2944
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s NlaSvc1⤵PID:1480
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s Dnscache1⤵PID:1524
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵PID:1536
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder1⤵PID:1596
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s netprofm1⤵PID:1628
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:1696
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:1780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:1788
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵PID:1868
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s StateRepository1⤵PID:1888
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1476
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation1⤵PID:1756
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵PID:2192
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent1⤵PID:2204
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵PID:2212
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵PID:2428
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2456
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s CryptSvc1⤵PID:2476
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc1⤵PID:2492
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks1⤵PID:2500
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵PID:2512
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵PID:2524
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵PID:2980
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s TokenBroker1⤵PID:3160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\DoomRat.exe"C:\Users\Admin\AppData\Local\Temp\DoomRat.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\DoomRat.exe"C:\Users\Admin\AppData\Local\Temp\DoomRat.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:1496
-
-
C:\Users\Admin\Downloads\240929-yhcblsxennrak23.exeC:\Users\Admin\Downloads\240929-yhcblsxennrak23.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
C:\Users\Admin\Downloads\240929-ydzaksxejltiki toby.exe"C:\Users\Admin\Downloads\240929-ydzaksxejltiki toby.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Users\Admin\Downloads\240929-yq271a1hmdff3c39fd25524e157e7930fda47483b0_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-yq271a1hmdff3c39fd25524e157e7930fda47483b0_JaffaCakes118.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3144
-
-
C:\Users\Admin\Downloads\240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-ypx7na1greff3b706e4d261afcbe92de30992001fd_JaffaCakes118.exe4⤵
- Modifies firewall policy service
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3580
-
-
C:\Users\Admin\Downloads\240929-ykmv5a1fna2c8b7740137af0934477546e6f42a7b64594e41258bf4d2b11f3868f62f9f159.exeC:\Users\Admin\Downloads\240929-ykmv5a1fna2c8b7740137af0934477546e6f42a7b64594e41258bf4d2b11f3868f62f9f159.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Modifies registry class
PID:348
-
-
C:\Users\Admin\Downloads\240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exeC:\Users\Admin\Downloads\240929-yfrnhs1eqh2976456cdd7bfd86828f55e0d18ced5ae7e0545c532f3a8b271f82249d2cf6f7.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\Cnkplejl.exeC:\Windows\system32\Cnkplejl.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3904
-
-
-
C:\Users\Admin\Downloads\240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exeC:\Users\Admin\Downloads\240929-ycv7ja1elg26dcfff5e83feef1c0e0f63db2f5edff5574fb5a01e13729458ce8e74f8630ad.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\Ceehho32.exeC:\Windows\system32\Ceehho32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3324 -
C:\Windows\SysWOW64\Cnnlaehj.exeC:\Windows\system32\Cnnlaehj.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1424 -
C:\Windows\SysWOW64\Dddhpjof.exeC:\Windows\system32\Dddhpjof.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4684 -
C:\Windows\SysWOW64\Ehfjah32.exeC:\Windows\system32\Ehfjah32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3676 -
C:\Windows\SysWOW64\Eglgbdep.exeC:\Windows\system32\Eglgbdep.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:1048 -
C:\Windows\SysWOW64\Edpgli32.exeC:\Windows\system32\Edpgli32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4944
-
-
-
-
-
-
-
-
C:\Users\Admin\Downloads\240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-x6pfea1dmgff389b7d010cc0cdd80dc89a8e72ed1b_JaffaCakes118.exe4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Users\Admin\Downloads\240929-yfap1axeknbuilder.exeC:\Users\Admin\Downloads\240929-yfap1axeknbuilder.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Users\Admin\Downloads\240929-yb5pks1elb2673a806dd91d3a495047838e91c8a21df388b5ce38dc13d75193d2ea0a4c926.exeC:\Users\Admin\Downloads\240929-yb5pks1elb2673a806dd91d3a495047838e91c8a21df388b5ce38dc13d75193d2ea0a4c926.exe4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1020 -
C:\backup.exe\backup.exe \5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4656 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5640
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:6124 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5568 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\8⤵
- Modifies visibility of file extensions in Explorer
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5408
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\7⤵
- System Location Discovery: System Language Discovery
PID:6076 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\8⤵PID:5848
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\8⤵PID:5380
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\9⤵PID:5108
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\9⤵PID:6612
-
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\10⤵PID:520
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\10⤵PID:7108
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\10⤵PID:6284
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\10⤵PID:4892
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\10⤵PID:6292
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\10⤵PID:5040
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\10⤵PID:7820
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\10⤵PID:9048
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\10⤵PID:8972
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\10⤵PID:10136
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\10⤵PID:14180
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\9⤵PID:8136
-
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\10⤵PID:6232
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\10⤵PID:8540
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\data.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\data.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\10⤵PID:6872
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\10⤵PID:10852
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\10⤵PID:9476
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\10⤵PID:14168
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\9⤵PID:15460
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\8⤵PID:6532
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\8⤵PID:8304
-
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\9⤵PID:9008
-
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\10⤵PID:5324
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\10⤵PID:5756
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\10⤵PID:14148
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\7⤵PID:1472
-
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\8⤵PID:8044
-
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\9⤵PID:8460
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\backup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\backup.exe" C:\Program Files\Google\Chrome\Application\106.0.5249.119\10⤵PID:9024
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\System Restore.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\System Restore.exe" C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\11⤵PID:8808
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\106.0.5249.119\Extensions\11⤵PID:8284
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\11⤵PID:15524
-
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\7⤵PID:15916
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\6⤵PID:348
-
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\7⤵PID:6656
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\8⤵PID:5168
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\9⤵PID:6204
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\9⤵PID:8624
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\10⤵PID:8988
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\11⤵PID:8656
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\10⤵PID:10820
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\11⤵PID:12484
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\System Restore.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\System Restore.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\10⤵PID:12028
-
-
-
-
-
C:\Program Files (x86)\c7e54639\backup.exe"C:\Program Files (x86)\c7e54639\backup.exe" C:\Program Files (x86)\c7e54639\7⤵PID:12144
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\7⤵PID:12680
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\6⤵PID:9668
-
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\7⤵PID:13664
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\8⤵PID:8100
-
-
-
-
-
-
C:\Users\Admin\Downloads\240929-x7pgssxdkq239b875c87703067067708e731525de9140426702b9ffe077708237cd61c66a4.exeC:\Users\Admin\Downloads\240929-x7pgssxdkq239b875c87703067067708e731525de9140426702b9ffe077708237cd61c66a4.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3364 -
C:\Windows\SysWOW64\Edhakj32.exeC:\Windows\system32\Edhakj32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4040 -
C:\Windows\SysWOW64\Ehfjah32.exeC:\Windows\system32\Ehfjah32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3144 -
C:\Windows\SysWOW64\Ehiffh32.exeC:\Windows\system32\Ehiffh32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4664 -
C:\Windows\SysWOW64\Eaakpm32.exeC:\Windows\system32\Eaakpm32.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4112 -
C:\Windows\SysWOW64\Fdbdah32.exeC:\Windows\system32\Fdbdah32.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4896 -
C:\Windows\SysWOW64\Jeekkafl.exeC:\Windows\system32\Jeekkafl.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4252 -
C:\Windows\SysWOW64\Kelalp32.exeC:\Windows\system32\Kelalp32.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4244 -
C:\Windows\SysWOW64\Kijjbofj.exeC:\Windows\system32\Kijjbofj.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5196 -
C:\Windows\SysWOW64\Plhnda32.exeC:\Windows\system32\Plhnda32.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5608 -
C:\Windows\SysWOW64\Acgolj32.exeC:\Windows\system32\Acgolj32.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5728 -
C:\Windows\SysWOW64\Aggegh32.exeC:\Windows\system32\Aggegh32.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5892 -
C:\Windows\SysWOW64\Acpbbi32.exeC:\Windows\system32\Acpbbi32.exe16⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6096 -
C:\Windows\SysWOW64\Biadeoce.exeC:\Windows\system32\Biadeoce.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4660
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Downloads\240929-x4a51a1cndff36de842be5e5499d75bfaa96a51890_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-x4a51a1cndff36de842be5e5499d75bfaa96a51890_JaffaCakes118.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c move /y "C:\USERS\ADMIN\DOWNLOADS\240929-x4a51a1cndff36de842be5e5499d75bfaa96a51890_JaffaCakes118.exe" "C:\Users\Admin\AppData\lsass.exe"5⤵PID:5528
-
C:\Windows\SysWOW64\cmd.execmd /c move /y "C:\USERS\ADMIN\DOWNLOADS\240929-x4a51a1cndff36de842be5e5499d75bfaa96a51890_JaffaCakes118.exe" "C:\Users\Admin\AppData\lsass.exe"6⤵PID:216
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v userinit /t reg_sz /d "C:\WINDOWS\system32\userinit.exe,C:\Users\Admin\AppData\lsass.exe" /f5⤵
- System Location Discovery: System Language Discovery
PID:5748 -
C:\Windows\SysWOW64\cmd.execmd /c reg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v userinit /t reg_sz /d "C:\WINDOWS\system32\userinit.exe,C:\Users\Admin\AppData\lsass.exe" /f6⤵PID:6580
-
C:\Windows\SysWOW64\reg.exereg add "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" /v userinit /t reg_sz /d "C:\WINDOWS\system32\userinit.exe,C:\Users\Admin\AppData\lsass.exe" /f7⤵PID:7984
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c attrib +h "C:\Users\Admin\AppData\lsass.exe"5⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Windows\SysWOW64\cmd.execmd /c attrib +h "C:\Users\Admin\AppData\lsass.exe"6⤵
- Hide Artifacts: Hidden Files and Directories
PID:6184 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData\lsass.exe"7⤵
- Views/modifies file attributes
PID:7976
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd /c attrib +h "C:\Users\Admin\AppData"5⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
PID:5916 -
C:\Windows\SysWOW64\cmd.execmd /c attrib +h "C:\Users\Admin\AppData"6⤵
- Hide Artifacts: Hidden Files and Directories
PID:6768 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData"7⤵
- Views/modifies file attributes
PID:7968
-
-
-
-
-
C:\Users\Admin\Downloads\240929-x27fesxbpnff3623f0f524b3a09e2833e0220cd040_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-x27fesxbpnff3623f0f524b3a09e2833e0220cd040_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 2965⤵
- Program crash
PID:3012
-
-
-
C:\Users\Admin\Downloads\240929-ylgeqsxfjpff3976e7def72f18fd1484470618c8da_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-ylgeqsxfjpff3976e7def72f18fd1484470618c8da_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Users\Admin\Downloads\240929-ydal8a1emc2708dcd4e4c232a4fc456ba4fc2882277914f4b43fc884f1e0d4467054db7985.exeC:\Users\Admin\Downloads\240929-ydal8a1emc2708dcd4e4c232a4fc456ba4fc2882277914f4b43fc884f1e0d4467054db7985.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2288 -
C:\Windows\SysWOW64\Doilmc32.exeC:\Windows\system32\Doilmc32.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1260 -
C:\Windows\SysWOW64\Eopbnbhd.exeC:\Windows\system32\Eopbnbhd.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4296 -
C:\Windows\SysWOW64\Jiaglp32.exeC:\Windows\system32\Jiaglp32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
PID:3904 -
C:\Windows\SysWOW64\Kgknhl32.exeC:\Windows\system32\Kgknhl32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:812 -
C:\Windows\SysWOW64\Khpgckkb.exeC:\Windows\system32\Khpgckkb.exe9⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5304
-
-
-
-
-
-
-
C:\Users\Admin\Downloads\240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exeC:\Users\Admin\Downloads\240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exe4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1496
-
-
C:\Users\Admin\Downloads\240929-x6l1aa1dmeff38928ef4a0574642a238b03588cec8_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-x6l1aa1dmeff38928ef4a0574642a238b03588cec8_JaffaCakes118.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Users\Admin\joateo.exe"C:\Users\Admin\joateo.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3292
-
-
-
C:\Users\Admin\Downloads\240929-ylqy6s1frc2d75730a3dbb9c30befe7175a0badcfd5521913ae5af83db04744f2db752d74b.exeC:\Users\Admin\Downloads\240929-ylqy6s1frc2d75730a3dbb9c30befe7175a0badcfd5521913ae5af83db04744f2db752d74b.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4364 -
C:\Windows\SysWOW64\Eaonjngh.exeC:\Windows\system32\Eaonjngh.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5104 -
C:\Windows\SysWOW64\Eobocb32.exeC:\Windows\system32\Eobocb32.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:32
-
-
-
-
C:\Users\Admin\Downloads\240929-yf2tgs1erbnew.exeC:\Users\Admin\Downloads\240929-yf2tgs1erbnew.exe4⤵
- Executes dropped EXE
PID:3764
-
-
C:\Users\Admin\Downloads\240929-x6sg3axcrrff38b67681ab7ed60197784cca17a6ef_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-x6sg3axcrrff38b67681ab7ed60197784cca17a6ef_JaffaCakes118.exe4⤵
- Executes dropped EXE
PID:3896
-
-
C:\Users\Admin\Downloads\240929-xydc6s1apc1dbc62360cb97c45e89e235802edf09c594235274b6c6c2c3d35c41b11f2c22e.exeC:\Users\Admin\Downloads\240929-xydc6s1apc1dbc62360cb97c45e89e235802edf09c594235274b6c6c2c3d35c41b11f2c22e.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\Jblijebc.exeC:\Windows\system32\Jblijebc.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2804 -
C:\Windows\SysWOW64\Kbpbed32.exeC:\Windows\system32\Kbpbed32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:5164 -
C:\Windows\SysWOW64\Phlacbfm.exeC:\Windows\system32\Phlacbfm.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5596 -
C:\Windows\SysWOW64\Acgolj32.exeC:\Windows\system32\Acgolj32.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:5716 -
C:\Windows\SysWOW64\Aggegh32.exeC:\Windows\system32\Aggegh32.exe9⤵
- Executes dropped EXE
- Modifies registry class
PID:5900 -
C:\Windows\SysWOW64\Bqilgmdg.exeC:\Windows\system32\Bqilgmdg.exe10⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5156 -
C:\Windows\SysWOW64\Ccchof32.exeC:\Windows\system32\Ccchof32.exe11⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3576 -
C:\Windows\SysWOW64\Cmklglpn.exeC:\Windows\system32\Cmklglpn.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6024 -
C:\Windows\SysWOW64\Cidjbmcp.exeC:\Windows\system32\Cidjbmcp.exe13⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5812 -
C:\Windows\SysWOW64\Dfhjkabi.exeC:\Windows\system32\Dfhjkabi.exe14⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5584 -
C:\Windows\SysWOW64\Djhpgofm.exeC:\Windows\system32\Djhpgofm.exe15⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5788 -
C:\Windows\SysWOW64\Djmibn32.exeC:\Windows\system32\Djmibn32.exe16⤵PID:5316
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Downloads\240929-x24pjaxbpjNew Client.exe"C:\Users\Admin\Downloads\240929-x24pjaxbpjNew Client.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYANP /F5⤵PID:5192
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYANP /tr "C:\Users\Admin\Downloads\240929-x24pjaxbpjNew Client.exe" /sc minute /mo 55⤵
- Scheduled Task/Job: Scheduled Task
PID:5836
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe5⤵
- Kills process with taskkill
PID:5092
-
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe5⤵
- Kills process with taskkill
PID:6072
-
-
-
C:\Users\Admin\Downloads\240929-yldc3s1fqbff395614f783c57799b28d0ba00238d7_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-yldc3s1fqbff395614f783c57799b28d0ba00238d7_JaffaCakes118.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5208 -
C:\Windows\system32\pcaui.exe"C:\Windows\system32\pcaui.exe" /g {11111111-1111-1111-1111-111111111111} /x {60fdc094-58fa-41d5-bd57-5c9bd53e8d92} /a "Daemon Tools" /v "DT Soft Ltd." /s "Daemon Tools is incompatible with this version of Windows. For more information, contact DT Soft Ltd.." /b 2 /f 616281 /k 0 /e "C:\Users\Admin\Downloads\240929-yldc3s1fqbff395614f783c57799b28d0ba00238d7_JaffaCakes118.exe"5⤵PID:5396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5208 -s 2125⤵
- Program crash
PID:5852
-
-
-
C:\Users\Admin\Downloads\240929-ymvzhsxfnj2e5f0523637fd3bb151b6c947f09f3b8bf9fcba790cf1881923d3f182ba8a798.exeC:\Users\Admin\Downloads\240929-ymvzhsxfnj2e5f0523637fd3bb151b6c947f09f3b8bf9fcba790cf1881923d3f182ba8a798.exe4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5384
-
-
C:\Users\Admin\Downloads\240929-yjzhjaxeql2b42021e5c2a724f2f43b1a6f016fe4a228f954c740f23ae6cccb6fa88f14c89.exeC:\Users\Admin\Downloads\240929-yjzhjaxeql2b42021e5c2a724f2f43b1a6f016fe4a228f954c740f23ae6cccb6fa88f14c89.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:5688 -
C:\Windows\SysWOW64\Agiamhdo.exeC:\Windows\system32\Agiamhdo.exe5⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5996 -
C:\Windows\SysWOW64\Bjlgdc32.exeC:\Windows\system32\Bjlgdc32.exe6⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4224 -
C:\Windows\SysWOW64\Bfedoc32.exeC:\Windows\system32\Bfedoc32.exe7⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5272 -
C:\Windows\SysWOW64\Cgndoeag.exeC:\Windows\system32\Cgndoeag.exe8⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5284 -
C:\Windows\SysWOW64\Cfcqpa32.exeC:\Windows\system32\Cfcqpa32.exe9⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1180 -
C:\Windows\SysWOW64\Dmdonkgc.exeC:\Windows\system32\Dmdonkgc.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:2288 -
C:\Windows\SysWOW64\Ddadpdmn.exeC:\Windows\system32\Ddadpdmn.exe11⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
PID:5988 -
C:\Windows\SysWOW64\Dpgeee32.exeC:\Windows\system32\Dpgeee32.exe12⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2684 -
C:\Windows\SysWOW64\Ehailbaa.exeC:\Windows\system32\Ehailbaa.exe13⤵
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Windows\SysWOW64\Eidbij32.exeC:\Windows\system32\Eidbij32.exe14⤵PID:4624
-
C:\Windows\SysWOW64\Eangpgcl.exeC:\Windows\system32\Eangpgcl.exe15⤵PID:3976
-
C:\Windows\SysWOW64\Eaqdegaj.exeC:\Windows\system32\Eaqdegaj.exe16⤵PID:4648
-
C:\Windows\SysWOW64\Filiii32.exeC:\Windows\system32\Filiii32.exe17⤵PID:5896
-
C:\Windows\SysWOW64\Fineoi32.exeC:\Windows\system32\Fineoi32.exe18⤵PID:5732
-
C:\Windows\SysWOW64\Fhofmq32.exeC:\Windows\system32\Fhofmq32.exe19⤵PID:1564
-
C:\Windows\SysWOW64\Fkpool32.exeC:\Windows\system32\Fkpool32.exe20⤵PID:5516
-
C:\Windows\SysWOW64\Fggocmhf.exeC:\Windows\system32\Fggocmhf.exe21⤵PID:5296
-
C:\Windows\SysWOW64\Gkdhjknm.exeC:\Windows\system32\Gkdhjknm.exe22⤵PID:3504
-
C:\Windows\SysWOW64\Ghhhcomg.exeC:\Windows\system32\Ghhhcomg.exe23⤵PID:6176
-
C:\Windows\SysWOW64\Gkiaej32.exeC:\Windows\system32\Gkiaej32.exe24⤵PID:6320
-
C:\Windows\SysWOW64\Hkpheidp.exeC:\Windows\system32\Hkpheidp.exe25⤵PID:6584
-
C:\Windows\SysWOW64\Hkbdki32.exeC:\Windows\system32\Hkbdki32.exe26⤵PID:6784
-
C:\Windows\SysWOW64\Hnfjbdmk.exeC:\Windows\system32\Hnfjbdmk.exe27⤵PID:7068
-
C:\Windows\SysWOW64\Ikejgf32.exeC:\Windows\system32\Ikejgf32.exe28⤵PID:2244
-
C:\Windows\SysWOW64\Jqiipljg.exeC:\Windows\system32\Jqiipljg.exe29⤵PID:6728
-
C:\Windows\SysWOW64\Jbkbpoog.exeC:\Windows\system32\Jbkbpoog.exe30⤵PID:512
-
C:\Windows\SysWOW64\Niooqcad.exeC:\Windows\system32\Niooqcad.exe31⤵PID:7528
-
C:\Windows\SysWOW64\Oidhlb32.exeC:\Windows\system32\Oidhlb32.exe32⤵PID:7680
-
C:\Windows\SysWOW64\Ohnohn32.exeC:\Windows\system32\Ohnohn32.exe33⤵PID:8064
-
C:\Windows\SysWOW64\Pkadoiip.exeC:\Windows\system32\Pkadoiip.exe34⤵PID:2264
-
C:\Windows\SysWOW64\Pcmeke32.exeC:\Windows\system32\Pcmeke32.exe35⤵PID:5740
-
C:\Windows\SysWOW64\Ahcajk32.exeC:\Windows\system32\Ahcajk32.exe36⤵PID:7800
-
C:\Windows\SysWOW64\Bjicdmmd.exeC:\Windows\system32\Bjicdmmd.exe37⤵PID:4212
-
C:\Windows\SysWOW64\Bhcjqinf.exeC:\Windows\system32\Bhcjqinf.exe38⤵PID:7520
-
C:\Windows\SysWOW64\Cfigpm32.exeC:\Windows\system32\Cfigpm32.exe39⤵PID:5956
-
C:\Windows\SysWOW64\Codhnb32.exeC:\Windows\system32\Codhnb32.exe40⤵PID:7660
-
C:\Windows\SysWOW64\Ccdnjp32.exeC:\Windows\system32\Ccdnjp32.exe41⤵PID:2228
-
C:\Windows\SysWOW64\Dfgcakon.exeC:\Windows\system32\Dfgcakon.exe42⤵PID:7324
-
C:\Windows\SysWOW64\Dmfeidbe.exeC:\Windows\system32\Dmfeidbe.exe43⤵PID:6488
-
C:\Windows\SysWOW64\Elnoopdj.exeC:\Windows\system32\Elnoopdj.exe44⤵PID:7860
-
C:\Windows\SysWOW64\Ilmmni32.exeC:\Windows\system32\Ilmmni32.exe45⤵PID:5636
-
C:\Windows\SysWOW64\Jjafok32.exeC:\Windows\system32\Jjafok32.exe46⤵PID:1308
-
C:\Windows\SysWOW64\Kdkdgchl.exeC:\Windows\system32\Kdkdgchl.exe47⤵PID:7752
-
C:\Windows\SysWOW64\Lnmkfh32.exeC:\Windows\system32\Lnmkfh32.exe48⤵PID:5056
-
C:\Windows\SysWOW64\Mjokgg32.exeC:\Windows\system32\Mjokgg32.exe49⤵PID:8228
-
C:\Windows\SysWOW64\Ncabfkqo.exeC:\Windows\system32\Ncabfkqo.exe50⤵PID:8512
-
C:\Windows\SysWOW64\Qemhbj32.exeC:\Windows\system32\Qemhbj32.exe51⤵PID:7884
-
C:\Windows\SysWOW64\Qklmpalf.exeC:\Windows\system32\Qklmpalf.exe52⤵PID:6604
-
C:\Windows\SysWOW64\Ahgcjddh.exeC:\Windows\system32\Ahgcjddh.exe53⤵PID:8872
-
C:\Windows\SysWOW64\Dkceokii.exeC:\Windows\system32\Dkceokii.exe54⤵PID:11120
-
C:\Windows\SysWOW64\Gblbca32.exeC:\Windows\system32\Gblbca32.exe55⤵PID:11788
-
C:\Windows\SysWOW64\Kgkfnh32.exeC:\Windows\system32\Kgkfnh32.exe56⤵PID:14036
-
C:\Windows\SysWOW64\Loighj32.exeC:\Windows\system32\Loighj32.exe57⤵PID:11776
-
C:\Windows\SysWOW64\Nagiji32.exeC:\Windows\system32\Nagiji32.exe58⤵PID:12908
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Downloads\240929-x622haxdjqff390075efc4c2be57ea0eb69462f3d4_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-x622haxdjqff390075efc4c2be57ea0eb69462f3d4_JaffaCakes118.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5944
-
-
C:\Users\Admin\Downloads\240929-ym865sxfplff3a4e4e58b8f917b34a8b0e53bf16ed_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-ym865sxfplff3a4e4e58b8f917b34a8b0e53bf16ed_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat5⤵PID:1836
-
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y5⤵PID:4296
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y6⤵PID:4260
-
-
-
C:\Windows\SysWOW64\At.exeAt.exe 8:09:13 PM C:\Windows\Help\HelpCat.exe5⤵PID:5720
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 8:08:15 PM C:\Windows\Sysinf.bat5⤵PID:5544
-
C:\Windows\SysWOW64\at.exeat 8:08:15 PM C:\Windows\Sysinf.bat6⤵PID:7360
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 8:11:15 PM C:\Windows\Sysinf.bat5⤵PID:3536
-
C:\Windows\SysWOW64\at.exeat 8:11:15 PM C:\Windows\Sysinf.bat6⤵PID:7368
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y5⤵PID:5636
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y6⤵PID:7176
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y5⤵PID:6248
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y6⤵PID:7200
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y5⤵PID:6392
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y6⤵PID:7184
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y5⤵PID:6492
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y6⤵PID:7352
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y5⤵
- System Time Discovery
PID:6652 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y6⤵
- System Time Discovery
PID:7192
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled5⤵
- Launches sc.exe
PID:6836
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled5⤵
- Launches sc.exe
PID:6920
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled5⤵
- Launches sc.exe
PID:7132
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled5⤵
- Launches sc.exe
PID:2676
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Windows\regedt32.sys5⤵
- Runs regedit.exe
PID:4836
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f5⤵PID:7100
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f5⤵PID:6976
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe5⤵PID:7416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat6⤵PID:7740
-
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y6⤵PID:6668
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y7⤵PID:6928
-
-
-
C:\Windows\SysWOW64\At.exeAt.exe 8:09:22 PM C:\Windows\Help\HelpCat.exe6⤵PID:4536
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 8:08:24 PM C:\Windows\Sysinf.bat6⤵PID:6948
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 8:11:24 PM C:\Windows\Sysinf.bat6⤵PID:5832
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y6⤵PID:5788
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc /y7⤵PID:6204
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y6⤵PID:7672
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y7⤵PID:7432
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y6⤵PID:6512
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv /y7⤵PID:8620
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y6⤵PID:6764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop srservice /y7⤵PID:7164
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y6⤵
- System Time Discovery
PID:7184 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop 360timeprot /y7⤵
- System Time Discovery
PID:10188
-
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled6⤵
- Launches sc.exe
PID:7080
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled6⤵
- Launches sc.exe
PID:5388
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled6⤵
- Launches sc.exe
PID:7652
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled6⤵
- Launches sc.exe
PID:1496
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f6⤵PID:6568
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f6⤵PID:7028
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d6⤵PID:7180
-
-
C:\Windows\SysWOW64\cmd.execmd /c rmdir F:\Autorun.inf /s /q6⤵PID:5872
-
-
-
C:\Users\Admin\AppData\Local\Temp\240929-ym865sxfplff3a4e4e58b8f917b34a8b0e53bf16ed_JaffaCakes118~4.exe240929-ym865sxfplff3a4e4e58b8f917b34a8b0e53bf16ed_JaffaCakes118~4.exe5⤵PID:4188
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y5⤵PID:7764
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y5⤵PID:10312
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y5⤵PID:10552
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y5⤵PID:11016
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y5⤵
- System Time Discovery
PID:9684
-
-
-
C:\Users\Admin\Downloads\240929-xxx17axajktiki toby.exe"C:\Users\Admin\Downloads\240929-xxx17axajktiki toby.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5344
-
-
C:\Users\Admin\Downloads\240929-x1dfysxarlff34f218fd68aa2c7b7693d3ee7162f9_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-x1dfysxarlff34f218fd68aa2c7b7693d3ee7162f9_JaffaCakes118.exe4⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:6088 -
C:\Windows\SysWOW64\attrib.exe"C:\Windows\System32\attrib.exe" "C:\Program Files (x86)\Microsoft\ie13\Internat Explorer" +s5⤵
- Views/modifies file attributes
PID:6620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp.bat" "5⤵PID:13232
-
-
-
C:\Users\Admin\Downloads\240929-ypfbvaxgjn2f60a6a7f3dee488ffccbbd36c43fa6be518b11c0acee023a08fce2e731a373d.exeC:\Users\Admin\Downloads\240929-ypfbvaxgjn2f60a6a7f3dee488ffccbbd36c43fa6be518b11c0acee023a08fce2e731a373d.exe4⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5444 -
C:\Windows\SysWOW64\Eibfck32.exeC:\Windows\system32\Eibfck32.exe5⤵PID:5968
-
-
-
C:\Users\Admin\Downloads\240929-x4h6ls1cpbff36ed82db4fa8dad1e6a436b119761a_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-x4h6ls1cpbff36ed82db4fa8dad1e6a436b119761a_JaffaCakes118.exe4⤵PID:3608
-
C:\Users\Admin\Downloads\240929-x4h6ls1cpbff36ed82db4fa8dad1e6a436b119761a_JaffaCakes118.exe"C:\Users\Admin\Downloads\240929-x4h6ls1cpbff36ed82db4fa8dad1e6a436b119761a_JaffaCakes118.exe"5⤵PID:700
-
-
-
C:\Users\Admin\Downloads\240929-yk8gtsxerqff39360d929cf960632b847ab1f0132f_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-yk8gtsxerqff39360d929cf960632b847ab1f0132f_JaffaCakes118.exe4⤵PID:5760
-
C:\Users\Admin\Downloads\240929-yk8gtsxerqff39360d929cf960632b847ab1f0132f_JaffaCakes118.exe"C:\Users\Admin\Downloads\240929-yk8gtsxerqff39360d929cf960632b847ab1f0132f_JaffaCakes118.exe"5⤵PID:5832
-
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:1084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 5287⤵
- Program crash
PID:6520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 5447⤵
- Program crash
PID:6744
-
-
-
C:\Windows\SysWOW64\LaunchWinApp.exeC:\Windows\system32\LaunchWinApp.exe6⤵PID:4000
-
-
-
-
C:\Users\Admin\Downloads\240929-yd3m1axejm.exeC:\Users\Admin\Downloads\240929-yd3m1axejm.exe4⤵PID:5856
-
-
C:\Users\Admin\Downloads\240929-xvhhqawgrlff313c6a565450371bfd9540af20c089_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-xvhhqawgrlff313c6a565450371bfd9540af20c089_JaffaCakes118.exe4⤵PID:1560
-
C:\Users\Admin\Downloads\240929-xvhhqawgrlff313c6a565450371bfd9540af20c089_JaffaCakes118Srv.exeC:\Users\Admin\Downloads\240929-xvhhqawgrlff313c6a565450371bfd9540af20c089_JaffaCakes118Srv.exe5⤵PID:1420
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"6⤵PID:5628
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:5156
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5156 CREDAT:82945 /prefetch:28⤵PID:7004
-
-
-
-
-
-
C:\Users\Admin\Downloads\240929-x1b8wsxark1e537e47634035e0b3c41e62259ca5a7a32aa7c13d9fdd6687407d14633ab784.exeC:\Users\Admin\Downloads\240929-x1b8wsxark1e537e47634035e0b3c41e62259ca5a7a32aa7c13d9fdd6687407d14633ab784.exe4⤵PID:4184
-
C:\Windows\SysWOW64\Falcae32.exeC:\Windows\system32\Falcae32.exe5⤵PID:4252
-
C:\Windows\SysWOW64\Gdmmbq32.exeC:\Windows\system32\Gdmmbq32.exe6⤵PID:5648
-
C:\Windows\SysWOW64\Gkiaej32.exeC:\Windows\system32\Gkiaej32.exe7⤵PID:6304
-
C:\Windows\SysWOW64\Hkpheidp.exeC:\Windows\system32\Hkpheidp.exe8⤵PID:6564
-
C:\Windows\SysWOW64\Hgghjjid.exeC:\Windows\system32\Hgghjjid.exe9⤵PID:6756
-
C:\Windows\SysWOW64\Hhiajmod.exeC:\Windows\system32\Hhiajmod.exe10⤵PID:6968
-
C:\Windows\SysWOW64\Iqipio32.exeC:\Windows\system32\Iqipio32.exe11⤵PID:6032
-
C:\Windows\SysWOW64\Ibmeoq32.exeC:\Windows\system32\Ibmeoq32.exe12⤵PID:6192
-
C:\Windows\SysWOW64\Jjjghcfp.exeC:\Windows\system32\Jjjghcfp.exe13⤵PID:6548
-
C:\Windows\SysWOW64\Jkaicd32.exeC:\Windows\system32\Jkaicd32.exe14⤵PID:6368
-
C:\Windows\SysWOW64\Oondnini.exeC:\Windows\system32\Oondnini.exe15⤵PID:7820
-
C:\Windows\SysWOW64\Pkadoiip.exeC:\Windows\system32\Pkadoiip.exe16⤵PID:1556
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Downloads\240929-ypnm8a1gqeff3b38a8f6b0a9f736eafbf6e2d2f62c_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-ypnm8a1gqeff3b38a8f6b0a9f736eafbf6e2d2f62c_JaffaCakes118.exe4⤵PID:3792
-
C:\Users\Admin\Downloads\240929-ypnm8a1gqeff3b38a8f6b0a9f736eafbf6e2d2f62c_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-ypnm8a1gqeff3b38a8f6b0a9f736eafbf6e2d2f62c_JaffaCakes118.exe5⤵PID:6268
-
-
-
C:\Users\Admin\Downloads\240929-ykq8js1fne2cb38c7f7a26a53827c0563a79d16e97df267c274e8969c58b981b462081b7d0.exeC:\Users\Admin\Downloads\240929-ykq8js1fne2cb38c7f7a26a53827c0563a79d16e97df267c274e8969c58b981b462081b7d0.exe4⤵PID:6256
-
\??\c:\llllfff.exec:\llllfff.exe5⤵PID:6460
-
\??\c:\pjjdv.exec:\pjjdv.exe6⤵PID:6592
-
\??\c:\3vddv.exec:\3vddv.exe7⤵PID:6728
-
\??\c:\1thbnh.exec:\1thbnh.exe8⤵PID:7040
-
\??\c:\5rfxxrl.exec:\5rfxxrl.exe9⤵PID:2264
-
\??\c:\bttbth.exec:\bttbth.exe10⤵PID:6620
-
\??\c:\bhhbtn.exec:\bhhbtn.exe11⤵PID:6244
-
\??\c:\djppd.exec:\djppd.exe12⤵PID:7652
-
\??\c:\nhbbtt.exec:\nhbbtt.exe13⤵PID:8088
-
\??\c:\frrffrr.exec:\frrffrr.exe14⤵PID:7044
-
\??\c:\xxrrrrr.exec:\xxrrrrr.exe15⤵PID:7572
-
\??\c:\5ppvp.exec:\5ppvp.exe16⤵PID:7300
-
\??\c:\3fflxfl.exec:\3fflxfl.exe17⤵PID:6692
-
\??\c:\rxrrfxr.exec:\rxrrfxr.exe18⤵PID:6160
-
\??\c:\5vjdd.exec:\5vjdd.exe19⤵PID:8164
-
\??\c:\5bbthb.exec:\5bbthb.exe20⤵PID:6552
-
\??\c:\vjvvv.exec:\vjvvv.exe21⤵PID:6940
-
\??\c:\ppvvp.exec:\ppvvp.exe22⤵PID:4344
-
\??\c:\nhtbhb.exec:\nhtbhb.exe23⤵PID:6820
-
\??\c:\xxxflff.exec:\xxxflff.exe24⤵PID:4348
-
\??\c:\5bbttn.exec:\5bbttn.exe25⤵PID:3480
-
\??\c:\pddvj.exec:\pddvj.exe26⤵PID:8260
-
\??\c:\ppvpp.exec:\ppvpp.exe27⤵PID:9204
-
\??\c:\rffxxrl.exec:\rffxxrl.exe28⤵PID:10508
-
\??\c:\fxrlffr.exec:\fxrlffr.exe29⤵PID:11556
-
\??\c:\jdpvd.exec:\jdpvd.exe30⤵PID:12256
-
\??\c:\bnnttt.exec:\bnnttt.exe31⤵PID:16012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Downloads\240929-xtfyhazgphshake yo dick.exe"C:\Users\Admin\Downloads\240929-xtfyhazgphshake yo dick.exe"4⤵PID:6420
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"5⤵PID:7560
-
-
-
C:\Users\Admin\Downloads\240929-ylyzsa1frf2db1324de0fdd987869d01489ed764bfd2b5dd9760eaf673019416f342052703.exeC:\Users\Admin\Downloads\240929-ylyzsa1frf2db1324de0fdd987869d01489ed764bfd2b5dd9760eaf673019416f342052703.exe4⤵PID:6708
-
C:\Windows\SysWOW64\Hkeaqi32.exeC:\Windows\system32\Hkeaqi32.exe5⤵PID:6880
-
C:\Windows\SysWOW64\Hkgnfhnh.exeC:\Windows\system32\Hkgnfhnh.exe6⤵PID:7028
-
C:\Windows\SysWOW64\Idbodn32.exeC:\Windows\system32\Idbodn32.exe7⤵PID:5412
-
C:\Windows\SysWOW64\Ihphkl32.exeC:\Windows\system32\Ihphkl32.exe8⤵PID:5324
-
C:\Windows\SysWOW64\Igjngh32.exeC:\Windows\system32\Igjngh32.exe9⤵PID:6312
-
C:\Windows\SysWOW64\Jqiipljg.exeC:\Windows\system32\Jqiipljg.exe10⤵PID:6816
-
C:\Windows\SysWOW64\Jnpfop32.exeC:\Windows\system32\Jnpfop32.exe11⤵PID:6160
-
C:\Windows\SysWOW64\Niooqcad.exeC:\Windows\system32\Niooqcad.exe12⤵PID:7516
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Downloads\240929-x5d82sxcmnff376fa4e6d4b4a2d722905cd8b900a1_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-x5d82sxcmnff376fa4e6d4b4a2d722905cd8b900a1_JaffaCakes118.exe4⤵PID:6912
-
-
C:\Users\Admin\Downloads\240929-xsdfzszgmaff2f9a6f1ede586d67db29eeb8f246aa_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-xsdfzszgmaff2f9a6f1ede586d67db29eeb8f246aa_JaffaCakes118.exe4⤵PID:5144
-
-
C:\Users\Admin\Downloads\240929-yh4e4a1fketiki toby.exe"C:\Users\Admin\Downloads\240929-yh4e4a1fketiki toby.exe"4⤵PID:6256
-
-
C:\Users\Admin\Downloads\240929-ymj71s1gjg2e232d79400492fbc49eddc311df284a1c00e63a5e71dcf13d71ed9de56e5f54.exeC:\Users\Admin\Downloads\240929-ymj71s1gjg2e232d79400492fbc49eddc311df284a1c00e63a5e71dcf13d71ed9de56e5f54.exe4⤵PID:6700
-
C:\Windows\SysWOW64\Jkomneim.exeC:\Windows\system32\Jkomneim.exe5⤵PID:7016
-
C:\Windows\SysWOW64\Kageaj32.exeC:\Windows\system32\Kageaj32.exe6⤵PID:7208
-
C:\Windows\SysWOW64\Niooqcad.exeC:\Windows\system32\Niooqcad.exe7⤵PID:7500
-
C:\Windows\SysWOW64\Okchnk32.exeC:\Windows\system32\Okchnk32.exe8⤵PID:7608
-
C:\Windows\SysWOW64\Oohgdhfn.exeC:\Windows\system32\Oohgdhfn.exe9⤵PID:8112
-
C:\Windows\SysWOW64\Polppg32.exeC:\Windows\system32\Polppg32.exe10⤵PID:3476
-
C:\Windows\SysWOW64\Pcmeke32.exeC:\Windows\system32\Pcmeke32.exe11⤵PID:6752
-
C:\Windows\SysWOW64\Acfhad32.exeC:\Windows\system32\Acfhad32.exe12⤵PID:7844
-
C:\Windows\SysWOW64\Bjnmpl32.exeC:\Windows\system32\Bjnmpl32.exe13⤵PID:8092
-
C:\Windows\SysWOW64\Cbphdn32.exeC:\Windows\system32\Cbphdn32.exe14⤵PID:7108
-
C:\Windows\SysWOW64\Ckkiccep.exeC:\Windows\system32\Ckkiccep.exe15⤵PID:8032
-
C:\Windows\SysWOW64\Diccgfpd.exeC:\Windows\system32\Diccgfpd.exe16⤵PID:7816
-
C:\Windows\SysWOW64\Dblgpl32.exeC:\Windows\system32\Dblgpl32.exe17⤵PID:6368
-
C:\Windows\SysWOW64\Dikihe32.exeC:\Windows\system32\Dikihe32.exe18⤵PID:2464
-
C:\Windows\SysWOW64\Embddb32.exeC:\Windows\system32\Embddb32.exe19⤵PID:7240
-
C:\Windows\SysWOW64\Fcniglmb.exeC:\Windows\system32\Fcniglmb.exe20⤵PID:7552
-
C:\Windows\SysWOW64\Iloidijb.exeC:\Windows\system32\Iloidijb.exe21⤵PID:5184
-
C:\Windows\SysWOW64\Jjjpnlbd.exeC:\Windows\system32\Jjjpnlbd.exe22⤵PID:6840
-
C:\Windows\SysWOW64\Kkpbin32.exeC:\Windows\system32\Kkpbin32.exe23⤵PID:6496
-
C:\Windows\SysWOW64\Kqbdldnq.exeC:\Windows\system32\Kqbdldnq.exe24⤵PID:7748
-
C:\Windows\SysWOW64\Lgjijmin.exeC:\Windows\system32\Lgjijmin.exe25⤵PID:7600
-
C:\Windows\SysWOW64\Oeheqm32.exeC:\Windows\system32\Oeheqm32.exe26⤵PID:8668
-
C:\Windows\SysWOW64\Ojigdcll.exeC:\Windows\system32\Ojigdcll.exe27⤵PID:8888
-
C:\Windows\SysWOW64\Poimpapp.exeC:\Windows\system32\Poimpapp.exe28⤵PID:8256
-
C:\Windows\SysWOW64\Cofnik32.exeC:\Windows\system32\Cofnik32.exe29⤵PID:10408
-
C:\Windows\SysWOW64\Cfbcke32.exeC:\Windows\system32\Cfbcke32.exe30⤵PID:10780
-
C:\Windows\SysWOW64\Emanjldl.exeC:\Windows\system32\Emanjldl.exe31⤵PID:9812
-
C:\Windows\SysWOW64\Gblbca32.exeC:\Windows\system32\Gblbca32.exe32⤵PID:11700
-
C:\Windows\SysWOW64\Kjeiodek.exeC:\Windows\system32\Kjeiodek.exe33⤵PID:13744
-
C:\Windows\SysWOW64\Nflkbanj.exeC:\Windows\system32\Nflkbanj.exe34⤵PID:15224
-
C:\Windows\SysWOW64\Qdaniq32.exeC:\Windows\system32\Qdaniq32.exe35⤵PID:16856
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Downloads\240929-x6vmesxdjj229d43228023231af72855fc865471c406e7a37f67bd67e34a9959ea234b67bf.exeC:\Users\Admin\Downloads\240929-x6vmesxdjj229d43228023231af72855fc865471c406e7a37f67bd67e34a9959ea234b67bf.exe4⤵PID:6340
-
-
C:\Users\Admin\Downloads\240929-yqhhlaxgmnff3bc40e4a95c0067b7349abae6b9ef4_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-yqhhlaxgmnff3bc40e4a95c0067b7349abae6b9ef4_JaffaCakes118.exe4⤵PID:7276
-
-
C:\Users\Admin\Downloads\240929-xqlpkszfnc192b569e4de69bcd65d7ef14f94d094b0d5d373820596a544a310e96fc3a13a1.exeC:\Users\Admin\Downloads\240929-xqlpkszfnc192b569e4de69bcd65d7ef14f94d094b0d5d373820596a544a310e96fc3a13a1.exe4⤵PID:7700
-
-
C:\Users\Admin\Downloads\240929-xws1vawhmqweave.exeC:\Users\Admin\Downloads\240929-xws1vawhmqweave.exe4⤵PID:7432
-
-
C:\Users\Admin\Downloads\240929-x1rnksxbjmff353dc46aaaeb657fc490c0697b2ceb_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-x1rnksxbjmff353dc46aaaeb657fc490c0697b2ceb_JaffaCakes118.exe4⤵PID:7836
-
C:\Windows\SysWOW64\hefaz.exeC:\Windows\system32\hefaz.exe 940 "C:\Users\Admin\Downloads\240929-x1rnksxbjmff353dc46aaaeb657fc490c0697b2ceb_JaffaCakes118.exe"5⤵PID:9640
-
-
-
C:\Users\Admin\Downloads\240929-ypqgtaxgkqff3b4cf029657941a5abef886ebdc6ec_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-ypqgtaxgkqff3b4cf029657941a5abef886ebdc6ec_JaffaCakes118.exe4⤵PID:6336
-
C:\Users\Admin\Downloads\240929-ypqgtaxgkqff3b4cf029657941a5abef886ebdc6ec_JaffaCakes118.exe"C:\Users\Admin\Downloads\240929-ypqgtaxgkqff3b4cf029657941a5abef886ebdc6ec_JaffaCakes118.exe"5⤵PID:7488
-
-
-
C:\Users\Admin\Downloads\240929-yleada1fqcff3958a457c5a33550e4b62572db898c_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-yleada1fqcff3958a457c5a33550e4b62572db898c_JaffaCakes118.exe4⤵PID:7936
-
-
C:\Users\Admin\Downloads\240929-ynfwzsxfpqff3a6ade12a2fa3f600c080368ab576b_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-ynfwzsxfpqff3a6ade12a2fa3f600c080368ab576b_JaffaCakes118.exe4⤵PID:6120
-
-
C:\Users\Admin\Downloads\240929-xtrd8szgra1ac6df5b02840c7610c3655ffda356141cfd6aed26ccbe9e0320afb0c17e8f20.exeC:\Users\Admin\Downloads\240929-xtrd8szgra1ac6df5b02840c7610c3655ffda356141cfd6aed26ccbe9e0320afb0c17e8f20.exe4⤵PID:6432
-
C:\Windows\SysWOW64\Igdnabjh.exeC:\Windows\system32\Igdnabjh.exe5⤵PID:5264
-
C:\Windows\SysWOW64\Jgbjbp32.exeC:\Windows\system32\Jgbjbp32.exe6⤵PID:6424
-
C:\Windows\SysWOW64\Mkmkkjko.exeC:\Windows\system32\Mkmkkjko.exe7⤵PID:8220
-
C:\Windows\SysWOW64\Ncabfkqo.exeC:\Windows\system32\Ncabfkqo.exe8⤵PID:8524
-
C:\Windows\SysWOW64\Ojigdcll.exeC:\Windows\system32\Ojigdcll.exe9⤵PID:8900
-
C:\Windows\SysWOW64\Poimpapp.exeC:\Windows\system32\Poimpapp.exe10⤵PID:7972
-
C:\Windows\SysWOW64\Bklfgo32.exeC:\Windows\system32\Bklfgo32.exe11⤵PID:9592
-
C:\Windows\SysWOW64\Ckjbhmad.exeC:\Windows\system32\Ckjbhmad.exe12⤵PID:10376
-
C:\Windows\SysWOW64\Cdecgbfa.exeC:\Windows\system32\Cdecgbfa.exe13⤵PID:10796
-
C:\Windows\SysWOW64\Dflfac32.exeC:\Windows\system32\Dflfac32.exe14⤵PID:9396
-
C:\Windows\SysWOW64\Hbhboolf.exeC:\Windows\system32\Hbhboolf.exe15⤵PID:12376
-
C:\Windows\SysWOW64\Ipgbdbqb.exeC:\Windows\system32\Ipgbdbqb.exe16⤵PID:12824
-
C:\Windows\SysWOW64\Pdmdnadc.exeC:\Windows\system32\Pdmdnadc.exe17⤵PID:16532
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Downloads\240929-yq2lgaxgpkff3c2f93346a099d689148a323f52e4e_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-yq2lgaxgpkff3c2f93346a099d689148a323f52e4e_JaffaCakes118.exe4⤵PID:7152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7152 -s 5405⤵
- Program crash
PID:9104
-
-
-
C:\Users\Admin\Downloads\240929-yb9nja1eld5f64f63be36e9fcc5acf680ffff273e56473db262115b657d5c4e10563fa64ed.exeC:\Users\Admin\Downloads\240929-yb9nja1eld5f64f63be36e9fcc5acf680ffff273e56473db262115b657d5c4e10563fa64ed.exe4⤵PID:7640
-
\??\c:\tnhhhn.exec:\tnhhhn.exe5⤵PID:7360
-
\??\c:\jddvv.exec:\jddvv.exe6⤵PID:6164
-
\??\c:\lrrlllf.exec:\lrrlllf.exe7⤵PID:7824
-
\??\c:\bbhhhn.exec:\bbhhhn.exe8⤵PID:5580
-
\??\c:\htttnt.exec:\htttnt.exe9⤵PID:8348
-
\??\c:\3vvvd.exec:\3vvvd.exe10⤵PID:8788
-
\??\c:\rxffxff.exec:\rxffxff.exe11⤵PID:9080
-
\??\c:\bnnttb.exec:\bnnttb.exe12⤵PID:5040
-
\??\c:\1rlffrr.exec:\1rlffrr.exe13⤵PID:10756
-
\??\c:\rlllffx.exec:\rlllffx.exe14⤵PID:11568
-
\??\c:\5hbbth.exec:\5hbbth.exe15⤵PID:12640
-
\??\c:\7xxxxxf.exec:\7xxxxxf.exe16⤵PID:9316
-
\??\c:\nnnhbb.exec:\nnnhbb.exe17⤵PID:15984
-
\??\c:\rfxlfxx.exec:\rfxlfxx.exe18⤵PID:16668
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Downloads\240929-ysqxraxhkpff3d6aef981d8bf9a33ad10a5385ec4a_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-ysqxraxhkpff3d6aef981d8bf9a33ad10a5385ec4a_JaffaCakes118.exe4⤵PID:3952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Option.bat5⤵PID:6980
-
-
C:\Windows\SysWOW64\net.exenet.exe start schedule /y5⤵PID:6356
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start schedule /y6⤵PID:11156
-
-
-
C:\Windows\SysWOW64\At.exeAt.exe 8:09:28 PM C:\Windows\Help\HelpCat.exe5⤵PID:6264
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 8:08:31 PM C:\Windows\Sysinf.bat5⤵PID:2088
-
-
C:\Windows\SysWOW64\cmd.execmd /c at 8:11:31 PM C:\Windows\Sysinf.bat5⤵PID:8000
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wscsvc /y5⤵PID:6468
-
-
C:\Windows\SysWOW64\net.exenet.exe stop sharedaccess /y5⤵PID:6692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess /y6⤵PID:15084
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop wuauserv /y5⤵PID:9016
-
-
C:\Windows\SysWOW64\net.exenet.exe stop srservice /y5⤵PID:10292
-
-
C:\Windows\SysWOW64\net.exenet.exe stop 360timeprot /y5⤵
- System Time Discovery
PID:10532
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled5⤵
- Launches sc.exe
PID:10708
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config SharedAccess start= disabled5⤵
- Launches sc.exe
PID:11024
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config wscsvc start= disabled5⤵
- Launches sc.exe
PID:5972
-
-
C:\Windows\SysWOW64\sc.exeC:\Windows\system32\sc.exe config srservice start= disabled5⤵
- Launches sc.exe
PID:9524
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f5⤵PID:11544
-
-
C:\Windows\SysWOW64\reg.exeC:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f5⤵PID:11596
-
-
C:\Windows\system\KavUpda.exeC:\Windows\system\KavUpda.exe5⤵PID:9268
-
-
-
C:\Users\Admin\Downloads\240929-xv663szhmgff31dfde99741cd6f92575af703657ef_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-xv663szhmgff31dfde99741cd6f92575af703657ef_JaffaCakes118.exe4⤵PID:6756
-
C:\Users\Admin\Downloads\240929-xv663szhmgff31dfde99741cd6f92575af703657ef_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-xv663szhmgff31dfde99741cd6f92575af703657ef_JaffaCakes118.exe5⤵PID:10424
-
-
-
C:\Users\Admin\Downloads\240929-xvr26azhleff3178588d92ed8a24a591dfb549083e_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-xvr26azhleff3178588d92ed8a24a591dfb549083e_JaffaCakes118.exe4⤵PID:6988
-
C:\Users\Admin\Downloads\240929-xvr26azhleff3178588d92ed8a24a591dfb549083e_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-xvr26azhleff3178588d92ed8a24a591dfb549083e_JaffaCakes118.exe5⤵PID:16160
-
-
-
C:\Users\Admin\Downloads\240929-ygrpxaxemngdifuncs.exeC:\Users\Admin\Downloads\240929-ygrpxaxemngdifuncs.exe4⤵PID:8824
-
-
C:\Users\Admin\Downloads\240929-x28ngs1cjh1f667cea06a91b84a56578dc5394446beb6467ec1ca49089d0f3d0f19e0af130.exeC:\Users\Admin\Downloads\240929-x28ngs1cjh1f667cea06a91b84a56578dc5394446beb6467ec1ca49089d0f3d0f19e0af130.exe4⤵PID:7620
-
C:\Windows\System\bNaYzPj.exeC:\Windows\System\bNaYzPj.exe5⤵PID:8212
-
-
C:\Windows\System\JJTzbrc.exeC:\Windows\System\JJTzbrc.exe5⤵PID:7968
-
-
C:\Windows\System\ljrUhrc.exeC:\Windows\System\ljrUhrc.exe5⤵PID:8312
-
-
C:\Windows\System\NavSbvM.exeC:\Windows\System\NavSbvM.exe5⤵PID:7872
-
-
C:\Windows\System\SHnAJTf.exeC:\Windows\System\SHnAJTf.exe5⤵PID:8480
-
-
C:\Windows\System\NGVpMeH.exeC:\Windows\System\NGVpMeH.exe5⤵PID:8276
-
-
C:\Windows\System\vyOYyIc.exeC:\Windows\System\vyOYyIc.exe5⤵PID:6340
-
-
C:\Windows\System\vXXNLOL.exeC:\Windows\System\vXXNLOL.exe5⤵PID:7368
-
-
C:\Windows\System\tXSlnoo.exeC:\Windows\System\tXSlnoo.exe5⤵PID:8568
-
-
C:\Windows\System\SltmOmt.exeC:\Windows\System\SltmOmt.exe5⤵PID:8436
-
-
C:\Windows\System\uqIMBHh.exeC:\Windows\System\uqIMBHh.exe5⤵PID:3768
-
-
C:\Windows\System\fbauBoH.exeC:\Windows\System\fbauBoH.exe5⤵PID:7412
-
-
C:\Windows\System\fddutRo.exeC:\Windows\System\fddutRo.exe5⤵PID:8532
-
-
C:\Windows\System\skRjNPy.exeC:\Windows\System\skRjNPy.exe5⤵PID:8536
-
-
C:\Windows\System\stXdlOj.exeC:\Windows\System\stXdlOj.exe5⤵PID:8468
-
-
C:\Windows\System\LLTCHfD.exeC:\Windows\System\LLTCHfD.exe5⤵PID:8548
-
-
C:\Windows\System\OyLmiWQ.exeC:\Windows\System\OyLmiWQ.exe5⤵PID:8608
-
-
C:\Windows\System\zVwVYGD.exeC:\Windows\System\zVwVYGD.exe5⤵PID:8944
-
-
C:\Windows\System\mbPusdY.exeC:\Windows\System\mbPusdY.exe5⤵PID:9032
-
-
C:\Windows\System\RvqYWkz.exeC:\Windows\System\RvqYWkz.exe5⤵PID:8520
-
-
C:\Windows\System\jYOMdQq.exeC:\Windows\System\jYOMdQq.exe5⤵PID:8744
-
-
C:\Windows\System\zIOmLal.exeC:\Windows\System\zIOmLal.exe5⤵PID:9072
-
-
C:\Windows\System\PzBYTdO.exeC:\Windows\System\PzBYTdO.exe5⤵PID:8788
-
-
C:\Windows\System\zAVTqvu.exeC:\Windows\System\zAVTqvu.exe5⤵PID:6524
-
-
C:\Windows\System\tjvLErr.exeC:\Windows\System\tjvLErr.exe5⤵PID:7896
-
-
C:\Windows\System\UizgyQD.exeC:\Windows\System\UizgyQD.exe5⤵PID:5800
-
-
C:\Windows\System\SEwZWNJ.exeC:\Windows\System\SEwZWNJ.exe5⤵PID:7632
-
-
C:\Windows\System\odqAXYC.exeC:\Windows\System\odqAXYC.exe5⤵PID:5752
-
-
C:\Windows\System\KFPdXXn.exeC:\Windows\System\KFPdXXn.exe5⤵PID:8544
-
-
C:\Windows\System\GAQltLX.exeC:\Windows\System\GAQltLX.exe5⤵PID:6256
-
-
C:\Windows\System\frPvBIO.exeC:\Windows\System\frPvBIO.exe5⤵PID:1560
-
-
C:\Windows\System\pTKGpET.exeC:\Windows\System\pTKGpET.exe5⤵PID:9116
-
-
C:\Windows\System\fSNnKuf.exeC:\Windows\System\fSNnKuf.exe5⤵PID:6884
-
-
C:\Windows\System\RXiBDTa.exeC:\Windows\System\RXiBDTa.exe5⤵PID:7220
-
-
C:\Windows\System\nocVPZa.exeC:\Windows\System\nocVPZa.exe5⤵PID:9220
-
-
C:\Windows\System\WGOHNzz.exeC:\Windows\System\WGOHNzz.exe5⤵PID:9240
-
-
C:\Windows\System\PFTXdHh.exeC:\Windows\System\PFTXdHh.exe5⤵PID:9256
-
-
C:\Windows\System\NUlMxKv.exeC:\Windows\System\NUlMxKv.exe5⤵PID:9272
-
-
C:\Windows\System\udlnxft.exeC:\Windows\System\udlnxft.exe5⤵PID:9288
-
-
C:\Windows\System\GtCfCEx.exeC:\Windows\System\GtCfCEx.exe5⤵PID:9304
-
-
C:\Windows\System\lrdzTCb.exeC:\Windows\System\lrdzTCb.exe5⤵PID:9320
-
-
C:\Windows\System\lOuAtTW.exeC:\Windows\System\lOuAtTW.exe5⤵PID:9336
-
-
C:\Windows\System\Skaugma.exeC:\Windows\System\Skaugma.exe5⤵PID:9352
-
-
C:\Windows\System\AAGiNWQ.exeC:\Windows\System\AAGiNWQ.exe5⤵PID:9376
-
-
C:\Windows\System\vPcUfEe.exeC:\Windows\System\vPcUfEe.exe5⤵PID:9412
-
-
C:\Windows\System\sISwMme.exeC:\Windows\System\sISwMme.exe5⤵PID:9448
-
-
C:\Windows\System\MgJZLel.exeC:\Windows\System\MgJZLel.exe5⤵PID:9464
-
-
C:\Windows\System\EAWisTs.exeC:\Windows\System\EAWisTs.exe5⤵PID:9480
-
-
C:\Windows\System\gOMnytf.exeC:\Windows\System\gOMnytf.exe5⤵PID:9496
-
-
C:\Windows\System\SAVwOTb.exeC:\Windows\System\SAVwOTb.exe5⤵PID:9512
-
-
C:\Windows\System\FVzwtOR.exeC:\Windows\System\FVzwtOR.exe5⤵PID:9532
-
-
C:\Windows\System\UDNDRKh.exeC:\Windows\System\UDNDRKh.exe5⤵PID:9548
-
-
C:\Windows\System\yxnkOdd.exeC:\Windows\System\yxnkOdd.exe5⤵PID:9568
-
-
C:\Windows\System\UxAHwHv.exeC:\Windows\System\UxAHwHv.exe5⤵PID:9612
-
-
C:\Windows\System\LxVKRGp.exeC:\Windows\System\LxVKRGp.exe5⤵PID:9628
-
-
C:\Windows\System\tbTFXbu.exeC:\Windows\System\tbTFXbu.exe5⤵PID:9644
-
-
C:\Windows\System\bkxewpV.exeC:\Windows\System\bkxewpV.exe5⤵PID:9660
-
-
C:\Windows\System\cKfycer.exeC:\Windows\System\cKfycer.exe5⤵PID:9676
-
-
C:\Windows\System\LWVOUgR.exeC:\Windows\System\LWVOUgR.exe5⤵PID:9692
-
-
C:\Windows\System\LQRwola.exeC:\Windows\System\LQRwola.exe5⤵PID:9708
-
-
C:\Windows\System\OfANjzP.exeC:\Windows\System\OfANjzP.exe5⤵PID:9724
-
-
C:\Windows\System\KrjAzvI.exeC:\Windows\System\KrjAzvI.exe5⤵PID:9740
-
-
C:\Windows\System\hFnwicD.exeC:\Windows\System\hFnwicD.exe5⤵PID:9756
-
-
C:\Windows\System\gYhHxxs.exeC:\Windows\System\gYhHxxs.exe5⤵PID:9776
-
-
C:\Windows\System\cqpvTLC.exeC:\Windows\System\cqpvTLC.exe5⤵PID:9796
-
-
C:\Windows\System\owiycDy.exeC:\Windows\System\owiycDy.exe5⤵PID:9816
-
-
C:\Windows\System\Wbywzvi.exeC:\Windows\System\Wbywzvi.exe5⤵PID:9840
-
-
C:\Windows\System\zpzYXNX.exeC:\Windows\System\zpzYXNX.exe5⤵PID:9864
-
-
C:\Windows\System\JkNQCid.exeC:\Windows\System\JkNQCid.exe5⤵PID:9880
-
-
C:\Windows\System\ItVjfVt.exeC:\Windows\System\ItVjfVt.exe5⤵PID:9896
-
-
C:\Windows\System\IKlBkDs.exeC:\Windows\System\IKlBkDs.exe5⤵PID:9912
-
-
C:\Windows\System\fQpCAQX.exeC:\Windows\System\fQpCAQX.exe5⤵PID:9928
-
-
C:\Windows\System\VXfzRXx.exeC:\Windows\System\VXfzRXx.exe5⤵PID:9944
-
-
C:\Windows\System\GPyirOx.exeC:\Windows\System\GPyirOx.exe5⤵PID:9972
-
-
C:\Windows\System\eAqJfQT.exeC:\Windows\System\eAqJfQT.exe5⤵PID:9988
-
-
C:\Windows\System\xPuZFdp.exeC:\Windows\System\xPuZFdp.exe5⤵PID:10012
-
-
C:\Windows\System\wfFKHLm.exeC:\Windows\System\wfFKHLm.exe5⤵PID:10028
-
-
C:\Windows\System\JMSKFkh.exeC:\Windows\System\JMSKFkh.exe5⤵PID:10044
-
-
C:\Windows\System\PgXTnvL.exeC:\Windows\System\PgXTnvL.exe5⤵PID:10060
-
-
C:\Windows\System\vprJTXN.exeC:\Windows\System\vprJTXN.exe5⤵PID:10076
-
-
C:\Windows\System\ZcQSUNm.exeC:\Windows\System\ZcQSUNm.exe5⤵PID:10092
-
-
C:\Windows\System\jTFnfjk.exeC:\Windows\System\jTFnfjk.exe5⤵PID:10108
-
-
C:\Windows\System\jEePSVD.exeC:\Windows\System\jEePSVD.exe5⤵PID:10124
-
-
C:\Windows\System\atnUWkH.exeC:\Windows\System\atnUWkH.exe5⤵PID:10140
-
-
C:\Windows\System\LauCwIL.exeC:\Windows\System\LauCwIL.exe5⤵PID:10156
-
-
C:\Windows\System\XntRbHO.exeC:\Windows\System\XntRbHO.exe5⤵PID:10172
-
-
C:\Windows\System\voUUQBa.exeC:\Windows\System\voUUQBa.exe5⤵PID:10204
-
-
C:\Windows\System\sonSlDR.exeC:\Windows\System\sonSlDR.exe5⤵PID:10220
-
-
C:\Windows\System\MjTLAHk.exeC:\Windows\System\MjTLAHk.exe5⤵PID:10236
-
-
C:\Windows\System\noYNeDs.exeC:\Windows\System\noYNeDs.exe5⤵PID:9176
-
-
C:\Windows\System\BbOSEUP.exeC:\Windows\System\BbOSEUP.exe5⤵PID:6724
-
-
C:\Windows\System\kQiFOJk.exeC:\Windows\System\kQiFOJk.exe5⤵PID:6624
-
-
C:\Windows\System\daGhDyH.exeC:\Windows\System\daGhDyH.exe5⤵PID:6060
-
-
C:\Windows\System\taJiwIO.exeC:\Windows\System\taJiwIO.exe5⤵PID:8540
-
-
C:\Windows\System\nrZFQHS.exeC:\Windows\System\nrZFQHS.exe5⤵PID:10260
-
-
C:\Windows\System\mLwoWNv.exeC:\Windows\System\mLwoWNv.exe5⤵PID:10280
-
-
C:\Windows\System\RWrWwaa.exeC:\Windows\System\RWrWwaa.exe5⤵PID:10924
-
-
C:\Windows\System\diBFWsY.exeC:\Windows\System\diBFWsY.exe5⤵PID:8880
-
-
C:\Windows\System\uYOSraR.exeC:\Windows\System\uYOSraR.exe5⤵PID:9080
-
-
C:\Windows\System\goWkKZB.exeC:\Windows\System\goWkKZB.exe5⤵PID:1880
-
-
C:\Windows\System\xrPqYly.exeC:\Windows\System\xrPqYly.exe5⤵PID:4892
-
-
C:\Windows\System\QeAGplx.exeC:\Windows\System\QeAGplx.exe5⤵PID:6112
-
-
C:\Windows\System\WFequQz.exeC:\Windows\System\WFequQz.exe5⤵PID:7008
-
-
C:\Windows\System\LLkghrN.exeC:\Windows\System\LLkghrN.exe5⤵PID:5348
-
-
C:\Windows\System\LXXPsjC.exeC:\Windows\System\LXXPsjC.exe5⤵PID:9300
-
-
C:\Windows\System\lKJfznp.exeC:\Windows\System\lKJfznp.exe5⤵PID:9460
-
-
C:\Windows\System\qRTRjRO.exeC:\Windows\System\qRTRjRO.exe5⤵PID:10388
-
-
C:\Windows\System\JdGjQFY.exeC:\Windows\System\JdGjQFY.exe5⤵PID:8344
-
-
C:\Windows\System\BdMZEDE.exeC:\Windows\System\BdMZEDE.exe5⤵PID:8560
-
-
C:\Windows\System\LxUJXlw.exeC:\Windows\System\LxUJXlw.exe5⤵PID:10356
-
-
C:\Windows\System\smcjlrt.exeC:\Windows\System\smcjlrt.exe5⤵PID:9792
-
-
C:\Windows\System\AgsIsSt.exeC:\Windows\System\AgsIsSt.exe5⤵PID:10008
-
-
C:\Windows\System\zrYLxQl.exeC:\Windows\System\zrYLxQl.exe5⤵PID:10504
-
-
C:\Windows\System\oJOLjGV.exeC:\Windows\System\oJOLjGV.exe5⤵PID:6896
-
-
C:\Windows\System\UCmyVbZ.exeC:\Windows\System\UCmyVbZ.exe5⤵PID:10772
-
-
C:\Windows\System\JQxTyNE.exeC:\Windows\System\JQxTyNE.exe5⤵PID:9936
-
-
C:\Windows\System\pWglBbY.exeC:\Windows\System\pWglBbY.exe5⤵PID:7824
-
-
C:\Windows\System\gEKNGcw.exeC:\Windows\System\gEKNGcw.exe5⤵PID:8792
-
-
C:\Windows\System\JfdrUXm.exeC:\Windows\System\JfdrUXm.exe5⤵PID:5476
-
-
C:\Windows\System\jkIVcXa.exeC:\Windows\System\jkIVcXa.exe5⤵PID:5672
-
-
C:\Windows\System\oiWjQCs.exeC:\Windows\System\oiWjQCs.exe5⤵PID:10576
-
-
C:\Windows\System\OCWRkka.exeC:\Windows\System\OCWRkka.exe5⤵PID:10404
-
-
C:\Windows\System\yziCCee.exeC:\Windows\System\yziCCee.exe5⤵PID:10684
-
-
C:\Windows\System\ertTdpW.exeC:\Windows\System\ertTdpW.exe5⤵PID:10812
-
-
C:\Windows\System\mkPFCIA.exeC:\Windows\System\mkPFCIA.exe5⤵PID:2340
-
-
C:\Windows\System\wiQroZd.exeC:\Windows\System\wiQroZd.exe5⤵PID:9312
-
-
C:\Windows\System\RUcmWgy.exeC:\Windows\System\RUcmWgy.exe5⤵PID:10212
-
-
C:\Windows\System\gqdjLYj.exeC:\Windows\System\gqdjLYj.exe5⤵PID:8484
-
-
C:\Windows\System\KiyKyDs.exeC:\Windows\System\KiyKyDs.exe5⤵PID:10872
-
-
C:\Windows\System\eGZaaZR.exeC:\Windows\System\eGZaaZR.exe5⤵PID:9436
-
-
C:\Windows\System\rPwBtuO.exeC:\Windows\System\rPwBtuO.exe5⤵PID:9604
-
-
C:\Windows\System\hSVdqUV.exeC:\Windows\System\hSVdqUV.exe5⤵PID:9808
-
-
C:\Windows\System\aQeVNDt.exeC:\Windows\System\aQeVNDt.exe5⤵PID:10020
-
-
C:\Windows\System\wOEBFrf.exeC:\Windows\System\wOEBFrf.exe5⤵PID:10888
-
-
C:\Windows\System\fvHyIDr.exeC:\Windows\System\fvHyIDr.exe5⤵PID:9360
-
-
C:\Windows\System\lBnXxIY.exeC:\Windows\System\lBnXxIY.exe5⤵PID:2712
-
-
C:\Windows\System\vYmzRKa.exeC:\Windows\System\vYmzRKa.exe5⤵PID:9096
-
-
C:\Windows\System\WYznEJT.exeC:\Windows\System\WYznEJT.exe5⤵PID:11092
-
-
C:\Windows\System\hrkDnWD.exeC:\Windows\System\hrkDnWD.exe5⤵PID:8244
-
-
C:\Windows\System\QaPwHWH.exeC:\Windows\System\QaPwHWH.exe5⤵PID:10936
-
-
C:\Windows\System\jBRnGDB.exeC:\Windows\System\jBRnGDB.exe5⤵PID:3972
-
-
C:\Windows\System\PjpNzIl.exeC:\Windows\System\PjpNzIl.exe5⤵PID:1984
-
-
C:\Windows\System\LGwUqIn.exeC:\Windows\System\LGwUqIn.exe5⤵PID:10984
-
-
C:\Windows\System\bzjGkOs.exeC:\Windows\System\bzjGkOs.exe5⤵PID:10608
-
-
C:\Windows\System\MfnqlQg.exeC:\Windows\System\MfnqlQg.exe5⤵PID:10696
-
-
C:\Windows\System\zkXCPrz.exeC:\Windows\System\zkXCPrz.exe5⤵PID:10748
-
-
C:\Windows\System\TRaCsDE.exeC:\Windows\System\TRaCsDE.exe5⤵PID:10776
-
-
C:\Windows\System\LwqQxHO.exeC:\Windows\System\LwqQxHO.exe5⤵PID:10844
-
-
C:\Windows\System\poNKUth.exeC:\Windows\System\poNKUth.exe5⤵PID:10908
-
-
C:\Windows\System\vFOzrVD.exeC:\Windows\System\vFOzrVD.exe5⤵PID:9720
-
-
C:\Windows\System\oPhiWhp.exeC:\Windows\System\oPhiWhp.exe5⤵PID:8640
-
-
C:\Windows\System\cJsPooe.exeC:\Windows\System\cJsPooe.exe5⤵PID:3480
-
-
C:\Windows\System\XSdJvKU.exeC:\Windows\System\XSdJvKU.exe5⤵PID:10856
-
-
C:\Windows\System\RZgKGIi.exeC:\Windows\System\RZgKGIi.exe5⤵PID:11268
-
-
C:\Windows\System\vCMZydz.exeC:\Windows\System\vCMZydz.exe5⤵PID:11284
-
-
C:\Windows\System\NgDdWLm.exeC:\Windows\System\NgDdWLm.exe5⤵PID:11300
-
-
C:\Windows\System\azYpEky.exeC:\Windows\System\azYpEky.exe5⤵PID:11324
-
-
C:\Windows\System\xRwmIUJ.exeC:\Windows\System\xRwmIUJ.exe5⤵PID:11620
-
-
C:\Windows\System\ndsDtvA.exeC:\Windows\System\ndsDtvA.exe5⤵PID:11688
-
-
C:\Windows\System\SPqzHLg.exeC:\Windows\System\SPqzHLg.exe5⤵PID:11712
-
-
C:\Windows\System\HhOssyt.exeC:\Windows\System\HhOssyt.exe5⤵PID:11740
-
-
C:\Windows\System\oUfxCLN.exeC:\Windows\System\oUfxCLN.exe5⤵PID:11768
-
-
C:\Windows\System\cwMMQCN.exeC:\Windows\System\cwMMQCN.exe5⤵PID:11796
-
-
C:\Windows\System\acHhbof.exeC:\Windows\System\acHhbof.exe5⤵PID:11824
-
-
C:\Windows\System\CCqurEh.exeC:\Windows\System\CCqurEh.exe5⤵PID:11852
-
-
C:\Windows\System\oCJrALn.exeC:\Windows\System\oCJrALn.exe5⤵PID:11868
-
-
C:\Windows\System\noAJeic.exeC:\Windows\System\noAJeic.exe5⤵PID:11888
-
-
C:\Windows\System\mEWWUgn.exeC:\Windows\System\mEWWUgn.exe5⤵PID:11904
-
-
C:\Windows\System\DxyZERd.exeC:\Windows\System\DxyZERd.exe5⤵PID:11920
-
-
C:\Windows\System\YxMnREJ.exeC:\Windows\System\YxMnREJ.exe5⤵PID:11936
-
-
C:\Windows\System\ZOHmPWh.exeC:\Windows\System\ZOHmPWh.exe5⤵PID:11952
-
-
C:\Windows\System\CpFzxxY.exeC:\Windows\System\CpFzxxY.exe5⤵PID:11968
-
-
C:\Windows\System\KMrjZYs.exeC:\Windows\System\KMrjZYs.exe5⤵PID:11984
-
-
C:\Windows\System\ssIplPF.exeC:\Windows\System\ssIplPF.exe5⤵PID:12000
-
-
C:\Windows\System\IrgfqcB.exeC:\Windows\System\IrgfqcB.exe5⤵PID:12016
-
-
C:\Windows\System\jABbhHr.exeC:\Windows\System\jABbhHr.exe5⤵PID:12032
-
-
C:\Windows\System\eeeSnza.exeC:\Windows\System\eeeSnza.exe5⤵PID:12048
-
-
C:\Windows\System\ETTiOaF.exeC:\Windows\System\ETTiOaF.exe5⤵PID:12064
-
-
C:\Windows\System\VLJuOSP.exeC:\Windows\System\VLJuOSP.exe5⤵PID:12084
-
-
C:\Windows\System\TKSaSFL.exeC:\Windows\System\TKSaSFL.exe5⤵PID:12100
-
-
C:\Windows\System\yGRPNYO.exeC:\Windows\System\yGRPNYO.exe5⤵PID:12116
-
-
C:\Windows\System\tsxTmyV.exeC:\Windows\System\tsxTmyV.exe5⤵PID:12132
-
-
C:\Windows\System\DAnbCdA.exeC:\Windows\System\DAnbCdA.exe5⤵PID:12160
-
-
C:\Windows\System\EMRndSI.exeC:\Windows\System\EMRndSI.exe5⤵PID:12196
-
-
C:\Windows\System\hBFnOTy.exeC:\Windows\System\hBFnOTy.exe5⤵PID:12212
-
-
C:\Windows\System\IioJpED.exeC:\Windows\System\IioJpED.exe5⤵PID:12244
-
-
C:\Windows\System\HMtHVuI.exeC:\Windows\System\HMtHVuI.exe5⤵PID:12272
-
-
C:\Windows\System\RNPgNQy.exeC:\Windows\System\RNPgNQy.exe5⤵PID:8848
-
-
C:\Windows\System\AOaGFGM.exeC:\Windows\System\AOaGFGM.exe5⤵PID:11088
-
-
C:\Windows\System\qHAVQIq.exeC:\Windows\System\qHAVQIq.exe5⤵PID:11100
-
-
C:\Windows\System\mGGbtIJ.exeC:\Windows\System\mGGbtIJ.exe5⤵PID:7356
-
-
C:\Windows\System\EsYAZuT.exeC:\Windows\System\EsYAZuT.exe5⤵PID:4024
-
-
C:\Windows\System\kzgjHvH.exeC:\Windows\System\kzgjHvH.exe5⤵PID:1260
-
-
C:\Windows\System\SQXbwdW.exeC:\Windows\System\SQXbwdW.exe5⤵PID:9160
-
-
C:\Windows\System\pTmgHKD.exeC:\Windows\System\pTmgHKD.exe5⤵PID:4120
-
-
C:\Windows\System\MmdpIaH.exeC:\Windows\System\MmdpIaH.exe5⤵PID:5724
-
-
C:\Windows\System\SVuQoyj.exeC:\Windows\System\SVuQoyj.exe5⤵PID:7596
-
-
C:\Windows\System\YiLFNGx.exeC:\Windows\System\YiLFNGx.exe5⤵PID:11212
-
-
C:\Windows\System\qzxarvi.exeC:\Windows\System\qzxarvi.exe5⤵PID:9120
-
-
C:\Windows\System\WmRmLfz.exeC:\Windows\System\WmRmLfz.exe5⤵PID:8356
-
-
C:\Windows\System\wfeHQSi.exeC:\Windows\System\wfeHQSi.exe5⤵PID:7348
-
-
C:\Windows\System\cWIObBX.exeC:\Windows\System\cWIObBX.exe5⤵PID:10288
-
-
C:\Windows\System\ruGXfCE.exeC:\Windows\System\ruGXfCE.exe5⤵PID:10196
-
-
C:\Windows\System\suzVkEF.exeC:\Windows\System\suzVkEF.exe5⤵PID:9212
-
-
C:\Windows\System\JkcNJRR.exeC:\Windows\System\JkcNJRR.exe5⤵PID:7336
-
-
C:\Windows\System\tbWigdX.exeC:\Windows\System\tbWigdX.exe5⤵PID:7000
-
-
C:\Windows\System\zabQZFH.exeC:\Windows\System\zabQZFH.exe5⤵PID:7640
-
-
C:\Windows\System\YJSLhyB.exeC:\Windows\System\YJSLhyB.exe5⤵PID:12300
-
-
C:\Windows\System\HRgUcnx.exeC:\Windows\System\HRgUcnx.exe5⤵PID:12324
-
-
C:\Windows\System\pNUPodf.exeC:\Windows\System\pNUPodf.exe5⤵PID:12344
-
-
C:\Windows\System\GeRujDj.exeC:\Windows\System\GeRujDj.exe5⤵PID:12388
-
-
C:\Windows\System\dquLSHJ.exeC:\Windows\System\dquLSHJ.exe5⤵PID:12416
-
-
C:\Windows\System\NjTbAUC.exeC:\Windows\System\NjTbAUC.exe5⤵PID:12440
-
-
C:\Windows\System\RlYAZOT.exeC:\Windows\System\RlYAZOT.exe5⤵PID:12868
-
-
C:\Windows\System\VFTIcUJ.exeC:\Windows\System\VFTIcUJ.exe5⤵PID:12896
-
-
C:\Windows\System\iBEZQEE.exeC:\Windows\System\iBEZQEE.exe5⤵PID:12924
-
-
C:\Windows\System\bTZHZhN.exeC:\Windows\System\bTZHZhN.exe5⤵PID:12940
-
-
C:\Windows\System\CnZFoEi.exeC:\Windows\System\CnZFoEi.exe5⤵PID:12980
-
-
C:\Windows\System\YdOhWwJ.exeC:\Windows\System\YdOhWwJ.exe5⤵PID:13016
-
-
C:\Windows\System\rSGVywo.exeC:\Windows\System\rSGVywo.exe5⤵PID:13052
-
-
C:\Windows\System\qMTjqXi.exeC:\Windows\System\qMTjqXi.exe5⤵PID:13084
-
-
C:\Windows\System\yfYGYRQ.exeC:\Windows\System\yfYGYRQ.exe5⤵PID:13128
-
-
C:\Windows\System\JKtnNHv.exeC:\Windows\System\JKtnNHv.exe5⤵PID:13160
-
-
C:\Windows\System\JzzquQw.exeC:\Windows\System\JzzquQw.exe5⤵PID:13184
-
-
C:\Windows\System\OVvifGX.exeC:\Windows\System\OVvifGX.exe5⤵PID:13212
-
-
C:\Windows\System\aXpffEO.exeC:\Windows\System\aXpffEO.exe5⤵PID:13256
-
-
C:\Windows\System\UoePVPb.exeC:\Windows\System\UoePVPb.exe5⤵PID:13284
-
-
C:\Windows\System\dTZAGiZ.exeC:\Windows\System\dTZAGiZ.exe5⤵PID:13308
-
-
C:\Windows\System\tsQHeii.exeC:\Windows\System\tsQHeii.exe5⤵PID:9392
-
-
C:\Windows\System\opzXeWx.exeC:\Windows\System\opzXeWx.exe5⤵PID:5680
-
-
C:\Windows\System\EJXasgx.exeC:\Windows\System\EJXasgx.exe5⤵PID:8896
-
-
C:\Windows\System\IRnGAAT.exeC:\Windows\System\IRnGAAT.exe5⤵PID:10920
-
-
C:\Windows\System\bKwOWaH.exeC:\Windows\System\bKwOWaH.exe5⤵PID:6532
-
-
C:\Windows\System\VdyEzED.exeC:\Windows\System\VdyEzED.exe5⤵PID:7080
-
-
C:\Windows\System\yPisLyF.exeC:\Windows\System\yPisLyF.exe5⤵PID:11296
-
-
C:\Windows\System\ITlGBsv.exeC:\Windows\System\ITlGBsv.exe5⤵PID:11668
-
-
C:\Windows\System\BGaCTHx.exeC:\Windows\System\BGaCTHx.exe5⤵PID:11876
-
-
C:\Windows\System\IOWoxCR.exeC:\Windows\System\IOWoxCR.exe5⤵PID:12092
-
-
C:\Windows\System\wCpjqVU.exeC:\Windows\System\wCpjqVU.exe5⤵PID:12112
-
-
C:\Windows\System\wAafbSu.exeC:\Windows\System\wAafbSu.exe5⤵PID:11048
-
-
C:\Windows\System\SThsDKv.exeC:\Windows\System\SThsDKv.exe5⤵PID:8852
-
-
C:\Windows\System\sgobFdi.exeC:\Windows\System\sgobFdi.exe5⤵PID:10228
-
-
C:\Windows\System\phECPHG.exeC:\Windows\System\phECPHG.exe5⤵PID:12464
-
-
C:\Windows\System\JzhddVm.exeC:\Windows\System\JzhddVm.exe5⤵PID:7868
-
-
C:\Windows\System\CLFeiyZ.exeC:\Windows\System\CLFeiyZ.exe5⤵PID:9560
-
-
C:\Windows\System\mLKjizR.exeC:\Windows\System\mLKjizR.exe5⤵PID:9588
-
-
C:\Windows\System\fmuefHp.exeC:\Windows\System\fmuefHp.exe5⤵PID:6768
-
-
C:\Windows\System\YkNdMjz.exeC:\Windows\System\YkNdMjz.exe5⤵PID:9876
-
-
C:\Windows\System\LHVyHpE.exeC:\Windows\System\LHVyHpE.exe5⤵PID:9672
-
-
C:\Windows\System\UheGvnq.exeC:\Windows\System\UheGvnq.exe5⤵PID:6836
-
-
C:\Windows\System\jVxlcYh.exeC:\Windows\System\jVxlcYh.exe5⤵PID:8928
-
-
C:\Windows\System\OsHlsjl.exeC:\Windows\System\OsHlsjl.exe5⤵PID:8476
-
-
C:\Windows\System\ZjgIdrp.exeC:\Windows\System\ZjgIdrp.exe5⤵PID:10068
-
-
C:\Windows\System\ZygBbjH.exeC:\Windows\System\ZygBbjH.exe5⤵PID:10600
-
-
C:\Windows\System\ohCsion.exeC:\Windows\System\ohCsion.exe5⤵PID:10740
-
-
C:\Windows\System\Jnvyzah.exeC:\Windows\System\Jnvyzah.exe5⤵PID:10792
-
-
C:\Windows\System\HjwwvEc.exeC:\Windows\System\HjwwvEc.exe5⤵PID:11836
-
-
C:\Windows\System\lzdxjMx.exeC:\Windows\System\lzdxjMx.exe5⤵PID:8720
-
-
C:\Windows\System\HfkkTFy.exeC:\Windows\System\HfkkTFy.exe5⤵PID:8616
-
-
C:\Windows\System\LTvQYxt.exeC:\Windows\System\LTvQYxt.exe5⤵PID:12240
-
-
C:\Windows\System\VtbnQvi.exeC:\Windows\System\VtbnQvi.exe5⤵PID:10964
-
-
C:\Windows\System\ALlMsdS.exeC:\Windows\System\ALlMsdS.exe5⤵PID:6928
-
-
C:\Windows\System\hhKJFOh.exeC:\Windows\System\hhKJFOh.exe5⤵PID:1512
-
-
C:\Windows\System\xYuZdLj.exeC:\Windows\System\xYuZdLj.exe5⤵PID:13060
-
-
C:\Windows\System\DRAyixm.exeC:\Windows\System\DRAyixm.exe5⤵PID:13168
-
-
C:\Windows\System\MgDhOwM.exeC:\Windows\System\MgDhOwM.exe5⤵PID:8712
-
-
C:\Windows\System\YFznHJP.exeC:\Windows\System\YFznHJP.exe5⤵PID:11528
-
-
C:\Windows\System\QpoSfxe.exeC:\Windows\System\QpoSfxe.exe5⤵PID:12624
-
-
C:\Windows\System\aeLdlxk.exeC:\Windows\System\aeLdlxk.exe5⤵PID:13328
-
-
C:\Windows\System\UpsPzOC.exeC:\Windows\System\UpsPzOC.exe5⤵PID:13344
-
-
C:\Windows\System\YErDSmO.exeC:\Windows\System\YErDSmO.exe5⤵PID:13360
-
-
C:\Windows\System\RXRinkn.exeC:\Windows\System\RXRinkn.exe5⤵PID:13376
-
-
C:\Windows\System\PpaepSF.exeC:\Windows\System\PpaepSF.exe5⤵PID:13392
-
-
C:\Windows\System\lLZQFQZ.exeC:\Windows\System\lLZQFQZ.exe5⤵PID:13408
-
-
C:\Windows\System\HvfTipv.exeC:\Windows\System\HvfTipv.exe5⤵PID:13424
-
-
C:\Windows\System\QOkNqiz.exeC:\Windows\System\QOkNqiz.exe5⤵PID:13448
-
-
C:\Windows\System\VOeRFST.exeC:\Windows\System\VOeRFST.exe5⤵PID:13476
-
-
C:\Windows\System\jLPshIT.exeC:\Windows\System\jLPshIT.exe5⤵PID:13516
-
-
C:\Windows\System\yULtAkv.exeC:\Windows\System\yULtAkv.exe5⤵PID:13532
-
-
C:\Windows\System\jVsocao.exeC:\Windows\System\jVsocao.exe5⤵PID:13548
-
-
C:\Windows\System\nqaMtdd.exeC:\Windows\System\nqaMtdd.exe5⤵PID:13568
-
-
C:\Windows\System\FhhhyJf.exeC:\Windows\System\FhhhyJf.exe5⤵PID:13584
-
-
C:\Windows\System\vwvqFJc.exeC:\Windows\System\vwvqFJc.exe5⤵PID:13612
-
-
C:\Windows\System\FGiXINh.exeC:\Windows\System\FGiXINh.exe5⤵PID:13632
-
-
C:\Windows\System\gShyYxo.exeC:\Windows\System\gShyYxo.exe5⤵PID:13652
-
-
C:\Windows\System\HXRUyeq.exeC:\Windows\System\HXRUyeq.exe5⤵PID:13684
-
-
C:\Windows\System\zoAHoDp.exeC:\Windows\System\zoAHoDp.exe5⤵PID:13700
-
-
C:\Windows\System\OTMHZjw.exeC:\Windows\System\OTMHZjw.exe5⤵PID:13720
-
-
C:\Windows\System\VAuyMPM.exeC:\Windows\System\VAuyMPM.exe5⤵PID:13764
-
-
C:\Windows\System\ORedoUa.exeC:\Windows\System\ORedoUa.exe5⤵PID:13780
-
-
C:\Windows\System\yMTfiDH.exeC:\Windows\System\yMTfiDH.exe5⤵PID:13796
-
-
C:\Windows\System\dLivDhi.exeC:\Windows\System\dLivDhi.exe5⤵PID:13812
-
-
C:\Windows\System\TfKhKrI.exeC:\Windows\System\TfKhKrI.exe5⤵PID:13828
-
-
C:\Windows\System\VdLyelG.exeC:\Windows\System\VdLyelG.exe5⤵PID:14008
-
-
C:\Windows\System\eYhLRCO.exeC:\Windows\System\eYhLRCO.exe5⤵PID:14052
-
-
C:\Windows\System\hPAKFpI.exeC:\Windows\System\hPAKFpI.exe5⤵PID:14104
-
-
C:\Windows\System\voenfsp.exeC:\Windows\System\voenfsp.exe5⤵PID:14124
-
-
C:\Windows\System\JpMuamz.exeC:\Windows\System\JpMuamz.exe5⤵PID:14156
-
-
C:\Windows\System\VoNIksG.exeC:\Windows\System\VoNIksG.exe5⤵PID:11752
-
-
C:\Windows\System\TWfYcrW.exeC:\Windows\System\TWfYcrW.exe5⤵PID:11720
-
-
C:\Windows\System\bFBGZYZ.exeC:\Windows\System\bFBGZYZ.exe5⤵PID:11680
-
-
C:\Windows\System\ylxzkBd.exeC:\Windows\System\ylxzkBd.exe5⤵PID:11612
-
-
C:\Windows\System\dnZVpDT.exeC:\Windows\System\dnZVpDT.exe5⤵PID:11896
-
-
C:\Windows\System\QxrAhgU.exeC:\Windows\System\QxrAhgU.exe5⤵PID:11960
-
-
C:\Windows\System\SaihSSw.exeC:\Windows\System\SaihSSw.exe5⤵PID:12072
-
-
C:\Windows\System\mKRhcud.exeC:\Windows\System\mKRhcud.exe5⤵PID:11976
-
-
C:\Windows\System\PWWEhmo.exeC:\Windows\System\PWWEhmo.exe5⤵PID:12124
-
-
C:\Windows\System\cqaOiYM.exeC:\Windows\System\cqaOiYM.exe5⤵PID:12156
-
-
C:\Windows\System\ZspiPrF.exeC:\Windows\System\ZspiPrF.exe5⤵PID:12716
-
-
C:\Windows\System\RgkDfht.exeC:\Windows\System\RgkDfht.exe5⤵PID:10944
-
-
C:\Windows\System\jbfArxR.exeC:\Windows\System\jbfArxR.exe5⤵PID:7756
-
-
C:\Windows\System\mphZeKA.exeC:\Windows\System\mphZeKA.exe5⤵PID:9044
-
-
C:\Windows\System\CcjADCe.exeC:\Windows\System\CcjADCe.exe5⤵PID:10324
-
-
C:\Windows\System\mVIVdrO.exeC:\Windows\System\mVIVdrO.exe5⤵PID:1292
-
-
C:\Windows\System\RCgZFUz.exeC:\Windows\System\RCgZFUz.exe5⤵PID:12768
-
-
C:\Windows\System\OdIZFDw.exeC:\Windows\System\OdIZFDw.exe5⤵PID:11392
-
-
C:\Windows\System\NBFXidr.exeC:\Windows\System\NBFXidr.exe5⤵PID:12820
-
-
C:\Windows\System\oDfRdif.exeC:\Windows\System\oDfRdif.exe5⤵PID:12432
-
-
C:\Windows\System\GDcLftI.exeC:\Windows\System\GDcLftI.exe5⤵PID:12880
-
-
C:\Windows\System\uhWuKAp.exeC:\Windows\System\uhWuKAp.exe5⤵PID:13032
-
-
C:\Windows\System\bYuIeYC.exeC:\Windows\System\bYuIeYC.exe5⤵PID:13096
-
-
C:\Windows\System\HOGwXcB.exeC:\Windows\System\HOGwXcB.exe5⤵PID:13176
-
-
C:\Windows\System\PQhpvFa.exeC:\Windows\System\PQhpvFa.exe5⤵PID:12600
-
-
C:\Windows\System\jaeyvoS.exeC:\Windows\System\jaeyvoS.exe5⤵PID:13240
-
-
C:\Windows\System\mGTgpin.exeC:\Windows\System\mGTgpin.exe5⤵PID:8080
-
-
C:\Windows\System\KnDTxzX.exeC:\Windows\System\KnDTxzX.exe5⤵PID:10248
-
-
C:\Windows\System\NZsrxew.exeC:\Windows\System\NZsrxew.exe5⤵PID:11756
-
-
C:\Windows\System\DJDagpJ.exeC:\Windows\System\DJDagpJ.exe5⤵PID:12172
-
-
C:\Windows\System\xcfkSBC.exeC:\Windows\System\xcfkSBC.exe5⤵PID:2580
-
-
C:\Windows\System\ryHChxm.exeC:\Windows\System\ryHChxm.exe5⤵PID:3776
-
-
C:\Windows\System\bsYJVWn.exeC:\Windows\System\bsYJVWn.exe5⤵PID:9152
-
-
C:\Windows\System\hqaGBXP.exeC:\Windows\System\hqaGBXP.exe5⤵PID:10764
-
-
C:\Windows\System\lNOJKLc.exeC:\Windows\System\lNOJKLc.exe5⤵PID:12316
-
-
C:\Windows\System\MasXaog.exeC:\Windows\System\MasXaog.exe5⤵PID:13340
-
-
C:\Windows\System\dgJOyvc.exeC:\Windows\System\dgJOyvc.exe5⤵PID:13372
-
-
C:\Windows\System\AlUhRNz.exeC:\Windows\System\AlUhRNz.exe5⤵PID:13508
-
-
C:\Windows\System\oIObuqC.exeC:\Windows\System\oIObuqC.exe5⤵PID:12676
-
-
C:\Windows\System\FJBvjuR.exeC:\Windows\System\FJBvjuR.exe5⤵PID:12736
-
-
C:\Windows\System\WVZJGdZ.exeC:\Windows\System\WVZJGdZ.exe5⤵PID:12780
-
-
C:\Windows\System\HsnGpSV.exeC:\Windows\System\HsnGpSV.exe5⤵PID:10328
-
-
C:\Windows\System\TpDIbab.exeC:\Windows\System\TpDIbab.exe5⤵PID:12904
-
-
C:\Windows\System\NvRgcif.exeC:\Windows\System\NvRgcif.exe5⤵PID:12964
-
-
C:\Windows\System\cqxdPsC.exeC:\Windows\System\cqxdPsC.exe5⤵PID:13008
-
-
C:\Windows\System\HKAIWeR.exeC:\Windows\System\HKAIWeR.exe5⤵PID:13104
-
-
C:\Windows\System\wLdzsMc.exeC:\Windows\System\wLdzsMc.exe5⤵PID:13140
-
-
C:\Windows\System\PbgKBlu.exeC:\Windows\System\PbgKBlu.exe5⤵PID:13248
-
-
C:\Windows\System\drAMCEt.exeC:\Windows\System\drAMCEt.exe5⤵PID:13264
-
-
C:\Windows\System\UhMVwnu.exeC:\Windows\System\UhMVwnu.exe5⤵PID:11232
-
-
C:\Windows\System\ZcKxHUb.exeC:\Windows\System\ZcKxHUb.exe5⤵PID:1020
-
-
C:\Windows\System\RlRSTrs.exeC:\Windows\System\RlRSTrs.exe5⤵PID:13296
-
-
C:\Windows\System\lptqiAe.exeC:\Windows\System\lptqiAe.exe5⤵PID:9060
-
-
C:\Windows\System\qbYJIsz.exeC:\Windows\System\qbYJIsz.exe5⤵PID:8444
-
-
C:\Windows\System\NsGyYzN.exeC:\Windows\System\NsGyYzN.exe5⤵PID:9372
-
-
C:\Windows\System\pgMhGhn.exeC:\Windows\System\pgMhGhn.exe5⤵PID:7728
-
-
C:\Windows\System\IdgAoRY.exeC:\Windows\System\IdgAoRY.exe5⤵PID:13324
-
-
C:\Windows\System\dtQFgUL.exeC:\Windows\System\dtQFgUL.exe5⤵PID:13504
-
-
C:\Windows\System\QOYcLZE.exeC:\Windows\System\QOYcLZE.exe5⤵PID:13756
-
-
C:\Windows\System\LAhUlcW.exeC:\Windows\System\LAhUlcW.exe5⤵PID:8600
-
-
C:\Windows\System\Alsetse.exeC:\Windows\System\Alsetse.exe5⤵PID:9492
-
-
C:\Windows\System\cYhXqcj.exeC:\Windows\System\cYhXqcj.exe5⤵PID:14348
-
-
C:\Windows\System\RNaOnlS.exeC:\Windows\System\RNaOnlS.exe5⤵PID:14364
-
-
C:\Windows\System\vtxlGqN.exeC:\Windows\System\vtxlGqN.exe5⤵PID:14380
-
-
C:\Windows\System\IxgQSnx.exeC:\Windows\System\IxgQSnx.exe5⤵PID:14396
-
-
C:\Windows\System\qVKGxbd.exeC:\Windows\System\qVKGxbd.exe5⤵PID:14412
-
-
C:\Windows\System\EbobAzF.exeC:\Windows\System\EbobAzF.exe5⤵PID:14428
-
-
C:\Windows\System\MTKsVdB.exeC:\Windows\System\MTKsVdB.exe5⤵PID:14448
-
-
C:\Windows\System\TDKzWEC.exeC:\Windows\System\TDKzWEC.exe5⤵PID:14464
-
-
C:\Windows\System\OpPWvLT.exeC:\Windows\System\OpPWvLT.exe5⤵PID:14484
-
-
C:\Windows\System\AbRyEdw.exeC:\Windows\System\AbRyEdw.exe5⤵PID:14504
-
-
C:\Windows\System\ywxIcdt.exeC:\Windows\System\ywxIcdt.exe5⤵PID:14520
-
-
C:\Windows\System\UwsGPXO.exeC:\Windows\System\UwsGPXO.exe5⤵PID:14540
-
-
C:\Windows\System\YXIXScC.exeC:\Windows\System\YXIXScC.exe5⤵PID:14564
-
-
C:\Windows\System\OJVEhiP.exeC:\Windows\System\OJVEhiP.exe5⤵PID:14584
-
-
C:\Windows\System\fDxiAPd.exeC:\Windows\System\fDxiAPd.exe5⤵PID:14600
-
-
C:\Windows\System\jlBmtXN.exeC:\Windows\System\jlBmtXN.exe5⤵PID:14616
-
-
C:\Windows\System\DdRhGTi.exeC:\Windows\System\DdRhGTi.exe5⤵PID:14632
-
-
C:\Windows\System\FKHlFsr.exeC:\Windows\System\FKHlFsr.exe5⤵PID:14656
-
-
C:\Windows\System\zhdEkyY.exeC:\Windows\System\zhdEkyY.exe5⤵PID:14676
-
-
C:\Windows\System\efmZxiO.exeC:\Windows\System\efmZxiO.exe5⤵PID:14704
-
-
C:\Windows\System\oVKRxaz.exeC:\Windows\System\oVKRxaz.exe5⤵PID:14732
-
-
C:\Windows\System\XbfkjGX.exeC:\Windows\System\XbfkjGX.exe5⤵PID:14748
-
-
C:\Windows\System\JujdtaP.exeC:\Windows\System\JujdtaP.exe5⤵PID:14772
-
-
C:\Windows\System\VTryJhC.exeC:\Windows\System\VTryJhC.exe5⤵PID:14792
-
-
C:\Windows\System\BTgGWcy.exeC:\Windows\System\BTgGWcy.exe5⤵PID:14812
-
-
C:\Windows\System\zMFPvwD.exeC:\Windows\System\zMFPvwD.exe5⤵PID:14840
-
-
C:\Windows\System\DEztfvT.exeC:\Windows\System\DEztfvT.exe5⤵PID:14860
-
-
C:\Windows\System\toerXoI.exeC:\Windows\System\toerXoI.exe5⤵PID:14876
-
-
C:\Windows\System\sQzfVqf.exeC:\Windows\System\sQzfVqf.exe5⤵PID:14920
-
-
C:\Windows\System\ivaSSfW.exeC:\Windows\System\ivaSSfW.exe5⤵PID:14940
-
-
C:\Windows\System\MMQtByT.exeC:\Windows\System\MMQtByT.exe5⤵PID:14964
-
-
C:\Windows\System\KkoownK.exeC:\Windows\System\KkoownK.exe5⤵PID:14996
-
-
C:\Windows\System\ofXEMix.exeC:\Windows\System\ofXEMix.exe5⤵PID:15012
-
-
C:\Windows\System\RGslBhp.exeC:\Windows\System\RGslBhp.exe5⤵PID:15056
-
-
C:\Windows\System\hkabhwf.exeC:\Windows\System\hkabhwf.exe5⤵PID:15076
-
-
C:\Windows\System\ZsZEvNt.exeC:\Windows\System\ZsZEvNt.exe5⤵PID:15104
-
-
C:\Windows\System\KZGpdko.exeC:\Windows\System\KZGpdko.exe5⤵PID:15120
-
-
C:\Windows\System\jMEzYgp.exeC:\Windows\System\jMEzYgp.exe5⤵PID:15144
-
-
C:\Windows\System\kseeqRu.exeC:\Windows\System\kseeqRu.exe5⤵PID:15164
-
-
C:\Windows\System\HutzgVv.exeC:\Windows\System\HutzgVv.exe5⤵PID:15180
-
-
C:\Windows\System\yMCSUnx.exeC:\Windows\System\yMCSUnx.exe5⤵PID:15200
-
-
C:\Windows\System\VQYSpte.exeC:\Windows\System\VQYSpte.exe5⤵PID:15244
-
-
C:\Windows\System\TvFiFKm.exeC:\Windows\System\TvFiFKm.exe5⤵PID:15288
-
-
C:\Windows\System\NuDEnjI.exeC:\Windows\System\NuDEnjI.exe5⤵PID:15304
-
-
C:\Windows\System\nskiuCT.exeC:\Windows\System\nskiuCT.exe5⤵PID:15328
-
-
C:\Windows\System\HIpQhPM.exeC:\Windows\System\HIpQhPM.exe5⤵PID:15344
-
-
C:\Windows\System\gBMauwC.exeC:\Windows\System\gBMauwC.exe5⤵PID:8084
-
-
C:\Windows\System\XBcsxQU.exeC:\Windows\System\XBcsxQU.exe5⤵PID:8124
-
-
C:\Windows\System\hHsRDkZ.exeC:\Windows\System\hHsRDkZ.exe5⤵PID:7840
-
-
C:\Windows\System\GbROKwr.exeC:\Windows\System\GbROKwr.exe5⤵PID:12056
-
-
C:\Windows\System\LNDUoaP.exeC:\Windows\System\LNDUoaP.exe5⤵PID:11320
-
-
C:\Windows\System\JmorvWb.exeC:\Windows\System\JmorvWb.exe5⤵PID:9428
-
-
C:\Windows\System\ItfxUly.exeC:\Windows\System\ItfxUly.exe5⤵PID:10368
-
-
C:\Windows\System\gtjuyio.exeC:\Windows\System\gtjuyio.exe5⤵PID:10256
-
-
C:\Windows\System\nRaKapG.exeC:\Windows\System\nRaKapG.exe5⤵PID:11096
-
-
C:\Windows\System\FMXRCof.exeC:\Windows\System\FMXRCof.exe5⤵PID:7648
-
-
C:\Windows\System\gENQArb.exeC:\Windows\System\gENQArb.exe5⤵PID:13420
-
-
C:\Windows\System\VvkozkO.exeC:\Windows\System\VvkozkO.exe5⤵PID:13464
-
-
C:\Windows\System\GHlGBdx.exeC:\Windows\System\GHlGBdx.exe5⤵PID:13528
-
-
C:\Windows\System\AOFTrwL.exeC:\Windows\System\AOFTrwL.exe5⤵PID:13576
-
-
C:\Windows\System\yurKuLM.exeC:\Windows\System\yurKuLM.exe5⤵PID:13648
-
-
C:\Windows\System\rldEcdR.exeC:\Windows\System\rldEcdR.exe5⤵PID:13736
-
-
C:\Windows\System\NwcBnvL.exeC:\Windows\System\NwcBnvL.exe5⤵PID:13792
-
-
C:\Windows\System\LtoFnSa.exeC:\Windows\System\LtoFnSa.exe5⤵PID:3904
-
-
C:\Windows\System\imNOsSo.exeC:\Windows\System\imNOsSo.exe5⤵PID:12644
-
-
C:\Windows\System\jwgNhXn.exeC:\Windows\System\jwgNhXn.exe5⤵PID:11760
-
-
C:\Windows\System\xBipfEU.exeC:\Windows\System\xBipfEU.exe5⤵PID:15380
-
-
C:\Windows\System\tzmVodu.exeC:\Windows\System\tzmVodu.exe5⤵PID:15396
-
-
C:\Windows\System\WNDOtvL.exeC:\Windows\System\WNDOtvL.exe5⤵PID:15412
-
-
C:\Windows\System\nGypYEs.exeC:\Windows\System\nGypYEs.exe5⤵PID:15428
-
-
C:\Windows\System\WLYQpIR.exeC:\Windows\System\WLYQpIR.exe5⤵PID:15448
-
-
C:\Windows\System\lEAshtI.exeC:\Windows\System\lEAshtI.exe5⤵PID:15480
-
-
C:\Windows\System\zNTSHRL.exeC:\Windows\System\zNTSHRL.exe5⤵PID:15496
-
-
C:\Windows\System\VultQxr.exeC:\Windows\System\VultQxr.exe5⤵PID:15512
-
-
C:\Windows\System\FyBlBqX.exeC:\Windows\System\FyBlBqX.exe5⤵PID:15544
-
-
C:\Windows\System\cBmWGuy.exeC:\Windows\System\cBmWGuy.exe5⤵PID:15560
-
-
C:\Windows\System\ouwyYok.exeC:\Windows\System\ouwyYok.exe5⤵PID:15576
-
-
C:\Windows\System\yuUnknr.exeC:\Windows\System\yuUnknr.exe5⤵PID:15596
-
-
C:\Windows\System\bYaEXlU.exeC:\Windows\System\bYaEXlU.exe5⤵PID:15612
-
-
C:\Windows\System\VihqSRh.exeC:\Windows\System\VihqSRh.exe5⤵PID:15628
-
-
C:\Windows\System\HWEbyiS.exeC:\Windows\System\HWEbyiS.exe5⤵PID:15644
-
-
C:\Windows\System\mKcqCiA.exeC:\Windows\System\mKcqCiA.exe5⤵PID:15660
-
-
C:\Windows\System\DSiZMKP.exeC:\Windows\System\DSiZMKP.exe5⤵PID:15676
-
-
C:\Windows\System\CUhTvzc.exeC:\Windows\System\CUhTvzc.exe5⤵PID:15692
-
-
C:\Windows\System\VPzDwmB.exeC:\Windows\System\VPzDwmB.exe5⤵PID:15712
-
-
C:\Windows\System\oEIhxZV.exeC:\Windows\System\oEIhxZV.exe5⤵PID:15728
-
-
C:\Windows\System\BHxvXVy.exeC:\Windows\System\BHxvXVy.exe5⤵PID:15748
-
-
C:\Windows\System\BUYTLtr.exeC:\Windows\System\BUYTLtr.exe5⤵PID:15768
-
-
C:\Windows\System\HqqkCid.exeC:\Windows\System\HqqkCid.exe5⤵PID:15784
-
-
C:\Windows\System\kWBVzVA.exeC:\Windows\System\kWBVzVA.exe5⤵PID:15800
-
-
C:\Windows\System\qrYqcfy.exeC:\Windows\System\qrYqcfy.exe5⤵PID:15816
-
-
C:\Windows\System\LFKyEdg.exeC:\Windows\System\LFKyEdg.exe5⤵PID:15832
-
-
C:\Windows\System\NAtotJH.exeC:\Windows\System\NAtotJH.exe5⤵PID:15848
-
-
C:\Windows\System\sIZJrbK.exeC:\Windows\System\sIZJrbK.exe5⤵PID:15864
-
-
C:\Windows\System\OcaGIiQ.exeC:\Windows\System\OcaGIiQ.exe5⤵PID:15880
-
-
C:\Windows\System\XgppdXQ.exeC:\Windows\System\XgppdXQ.exe5⤵PID:15896
-
-
C:\Windows\System\XVzzgFL.exeC:\Windows\System\XVzzgFL.exe5⤵PID:16280
-
-
C:\Windows\System\pqPyHJo.exeC:\Windows\System\pqPyHJo.exe5⤵PID:16376
-
-
C:\Windows\System\iaVuWJg.exeC:\Windows\System\iaVuWJg.exe5⤵PID:12148
-
-
C:\Windows\System\BDdMRBl.exeC:\Windows\System\BDdMRBl.exe5⤵PID:10760
-
-
C:\Windows\System\IfoPZyg.exeC:\Windows\System\IfoPZyg.exe5⤵PID:9508
-
-
C:\Windows\System\EvSCmWU.exeC:\Windows\System\EvSCmWU.exe5⤵PID:10824
-
-
C:\Windows\System\BZpECKj.exeC:\Windows\System\BZpECKj.exe5⤵PID:13824
-
-
C:\Windows\System\qvuLdiN.exeC:\Windows\System\qvuLdiN.exe5⤵PID:7284
-
-
C:\Windows\System\COAczMs.exeC:\Windows\System\COAczMs.exe5⤵PID:9940
-
-
C:\Windows\System\LyTxapd.exeC:\Windows\System\LyTxapd.exe5⤵PID:14420
-
-
C:\Windows\System\rxAzYxF.exeC:\Windows\System\rxAzYxF.exe5⤵PID:14496
-
-
C:\Windows\System\yMIpMwp.exeC:\Windows\System\yMIpMwp.exe5⤵PID:14764
-
-
C:\Windows\System\farVSKs.exeC:\Windows\System\farVSKs.exe5⤵PID:14984
-
-
C:\Windows\System\irWlgLG.exeC:\Windows\System\irWlgLG.exe5⤵PID:13956
-
-
C:\Windows\System\UhMUvSN.exeC:\Windows\System\UhMUvSN.exe5⤵PID:9656
-
-
C:\Windows\System\XXZOFJp.exeC:\Windows\System\XXZOFJp.exe5⤵PID:14072
-
-
C:\Windows\System\iorICEJ.exeC:\Windows\System\iorICEJ.exe5⤵PID:14044
-
-
C:\Windows\System\sEjgWgW.exeC:\Windows\System\sEjgWgW.exe5⤵PID:14084
-
-
C:\Windows\System\aPKLMmJ.exeC:\Windows\System\aPKLMmJ.exe5⤵PID:14096
-
-
C:\Windows\System\MOUnNNr.exeC:\Windows\System\MOUnNNr.exe5⤵PID:14136
-
-
C:\Windows\System\QcpZSiK.exeC:\Windows\System\QcpZSiK.exe5⤵PID:15312
-
-
C:\Windows\System\LHYxbaz.exeC:\Windows\System\LHYxbaz.exe5⤵PID:8120
-
-
C:\Windows\System\OogqgCX.exeC:\Windows\System\OogqgCX.exe5⤵PID:12472
-
-
C:\Windows\System\RJvSkhI.exeC:\Windows\System\RJvSkhI.exe5⤵PID:1496
-
-
C:\Windows\System\pxUZtQx.exeC:\Windows\System\pxUZtQx.exe5⤵PID:6332
-
-
C:\Windows\System\KIQGEYn.exeC:\Windows\System\KIQGEYn.exe5⤵PID:9584
-
-
C:\Windows\System\bahUAHa.exeC:\Windows\System\bahUAHa.exe5⤵PID:13460
-
-
C:\Windows\System\CiZXDKY.exeC:\Windows\System\CiZXDKY.exe5⤵PID:1060
-
-
C:\Windows\System\gBcyEis.exeC:\Windows\System\gBcyEis.exe5⤵PID:12044
-
-
C:\Windows\System\JgGqqIQ.exeC:\Windows\System\JgGqqIQ.exe5⤵PID:5696
-
-
C:\Windows\System\wXdiLuW.exeC:\Windows\System\wXdiLuW.exe5⤵PID:10808
-
-
C:\Windows\System\buOjjdG.exeC:\Windows\System\buOjjdG.exe5⤵PID:15708
-
-
C:\Windows\System\zgNFzmm.exeC:\Windows\System\zgNFzmm.exe5⤵PID:15720
-
-
C:\Windows\System\ptUPKVY.exeC:\Windows\System\ptUPKVY.exe5⤵PID:15744
-
-
C:\Windows\System\MOzPswM.exeC:\Windows\System\MOzPswM.exe5⤵PID:15792
-
-
C:\Windows\System\tsIwnlJ.exeC:\Windows\System\tsIwnlJ.exe5⤵PID:15840
-
-
C:\Windows\System\yLOmcHB.exeC:\Windows\System\yLOmcHB.exe5⤵PID:6860
-
-
C:\Windows\System\VNgNwsA.exeC:\Windows\System\VNgNwsA.exe5⤵PID:10820
-
-
C:\Windows\System\VgEoALU.exeC:\Windows\System\VgEoALU.exe5⤵PID:13356
-
-
C:\Windows\System\gjIYAjh.exeC:\Windows\System\gjIYAjh.exe5⤵PID:8076
-
-
C:\Windows\System\rCzGGFZ.exeC:\Windows\System\rCzGGFZ.exe5⤵PID:14212
-
-
C:\Windows\System\gcHPPRr.exeC:\Windows\System\gcHPPRr.exe5⤵PID:16388
-
-
C:\Windows\System\DgIunST.exeC:\Windows\System\DgIunST.exe5⤵PID:16404
-
-
C:\Windows\System\uzjvaso.exeC:\Windows\System\uzjvaso.exe5⤵PID:16424
-
-
C:\Windows\System\EoiJREN.exeC:\Windows\System\EoiJREN.exe5⤵PID:16440
-
-
C:\Windows\System\IjbSTmp.exeC:\Windows\System\IjbSTmp.exe5⤵PID:16460
-
-
C:\Windows\System\DYmGBwn.exeC:\Windows\System\DYmGBwn.exe5⤵PID:16488
-
-
C:\Windows\System\uRnaFjN.exeC:\Windows\System\uRnaFjN.exe5⤵PID:16524
-
-
C:\Windows\System\tPbiDvz.exeC:\Windows\System\tPbiDvz.exe5⤵PID:16552
-
-
C:\Windows\System\SdLalAp.exeC:\Windows\System\SdLalAp.exe5⤵PID:16596
-
-
C:\Windows\System\GyDWUxh.exeC:\Windows\System\GyDWUxh.exe5⤵PID:16616
-
-
C:\Windows\System\AKiqVxa.exeC:\Windows\System\AKiqVxa.exe5⤵PID:16632
-
-
C:\Windows\System\MuVEVav.exeC:\Windows\System\MuVEVav.exe5⤵PID:16656
-
-
C:\Windows\System\QiQkTyM.exeC:\Windows\System\QiQkTyM.exe5⤵PID:16696
-
-
C:\Windows\System\juscZsN.exeC:\Windows\System\juscZsN.exe5⤵PID:16716
-
-
C:\Windows\System\NwDcnOA.exeC:\Windows\System\NwDcnOA.exe5⤵PID:16732
-
-
C:\Windows\System\rYwzkCS.exeC:\Windows\System\rYwzkCS.exe5⤵PID:16748
-
-
C:\Windows\System\lWUOKWE.exeC:\Windows\System\lWUOKWE.exe5⤵PID:16764
-
-
C:\Windows\System\UmgxSaD.exeC:\Windows\System\UmgxSaD.exe5⤵PID:16780
-
-
C:\Windows\System\faSmCwt.exeC:\Windows\System\faSmCwt.exe5⤵PID:16796
-
-
C:\Windows\System\vWdzcVn.exeC:\Windows\System\vWdzcVn.exe5⤵PID:16816
-
-
C:\Windows\System\VZItKIg.exeC:\Windows\System\VZItKIg.exe5⤵PID:16832
-
-
C:\Windows\System\WOCOSZT.exeC:\Windows\System\WOCOSZT.exe5⤵PID:16884
-
-
-
C:\Users\Admin\Downloads\240929-ye4xfs1eqaServer.exeC:\Users\Admin\Downloads\240929-ye4xfs1eqaServer.exe4⤵PID:9364
-
-
C:\Users\Admin\Downloads\240929-yfn8ds1eqfBackdoor.batC:\Users\Admin\Downloads\240929-yfn8ds1eqfBackdoor.bat4⤵PID:10436
-
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵PID:10676
-
-
-
C:\Users\Admin\Downloads\240929-ylal7a1fpg2cfa6dcb4550dbd34ba715a866c44070669f180d5f54055c1ca2859a0d6a725e.exeC:\Users\Admin\Downloads\240929-ylal7a1fpg2cfa6dcb4550dbd34ba715a866c44070669f180d5f54055c1ca2859a0d6a725e.exe4⤵PID:10628
-
-
C:\Users\Admin\Downloads\240929-x2m2saxbmj1f1ac68cacf882d54884df5dc93fc18d52924854c17916b8195abfd469cec284.exeC:\Users\Admin\Downloads\240929-x2m2saxbmj1f1ac68cacf882d54884df5dc93fc18d52924854c17916b8195abfd469cec284.exe4⤵PID:9132
-
C:\Windows\SysWOW64\Gnqfcbnj.exeC:\Windows\system32\Gnqfcbnj.exe5⤵PID:11656
-
C:\Windows\SysWOW64\Jcmdaljn.exeC:\Windows\system32\Jcmdaljn.exe6⤵PID:740
-
C:\Windows\SysWOW64\Nggnadib.exeC:\Windows\system32\Nggnadib.exe7⤵PID:14908
-
C:\Windows\SysWOW64\Qhhpop32.exeC:\Windows\system32\Qhhpop32.exe8⤵PID:16584
-
-
-
-
-
-
C:\Users\Admin\Downloads\240929-ysfrsasajcff3d192a36671374e4b73048b87f6d4f_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-ysfrsasajcff3d192a36671374e4b73048b87f6d4f_JaffaCakes118.exe4⤵PID:12728
-
-
C:\Users\Admin\Downloads\240929-xw3kaawhnnff32ab90101c04c4e16b0cfdc9205832_JaffaCakes118.exeC:\Users\Admin\Downloads\240929-xw3kaawhnnff32ab90101c04c4e16b0cfdc9205832_JaffaCakes118.exe4⤵PID:13692
-
-
-
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s CDPSvc1⤵PID:4740
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV1⤵PID:4556
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵PID:4292
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2556
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s wlidsvc1⤵PID:5016
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
3Hidden Files and Directories
3Impair Defenses
2Disable or Modify System Firewall
2Indicator Removal
1File Deletion
1Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1System Time Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD59d2eae015dacbb72f6f2766b10aef497
SHA10733010f816ceec574acda67fe197e67b91e2100
SHA2562afa9a7bdc6bbb61e518629bb6f6594e4064ddef6033465459ba863847a8c4da
SHA512551c0490b7856268afbaec6b83dd44bd18b963e06fe58fc2768a7d585a7feae156369f0c4fb04690297c064de0f648f0b775512c476349550b9a1a89494649f5
-
Filesize
272B
MD53f0c5c65239816c7010eeaba3c605a6a
SHA1b066e601c76421041415a3b51530a2e24b5f09b2
SHA256b148a82e255d297dfd3d7f0cbd399599019e3365b348d83a1a9f908c1ffd03ef
SHA512eaf5466e0e5efcaa6c5b3e20f14426e2315cacbe19cc386823d299d8e3e6d0c74b2844d3874c9c858ada46ad1b8d09a44afe52cd44ac8004058c13332df92cef
-
Filesize
272B
MD524359a65181fdfeeb217a9fbd6696b61
SHA1bb4f90341ee6b8a2721f1ac8c2bafecad7801000
SHA2564e351b5141e37885f425e22ee841568c34ca995e943d0b8b05e5e0acdd68c22e
SHA5121badcb8c109188d9731aaa9d3aec8afebc03bc0d0be6e6380ae434741706d969c43742638a98aaaa5b2646a05002b89fe19cf423ca2e4ecab9a424d6654ec9e4
-
Filesize
272B
MD560174fe484a5a5430d79576bbc063bfd
SHA127b8078b9f9034fe89ddf95adb4f5e194db8f5ab
SHA2569909a45a8ab146e7728e5598c2366cadc656666ec78b846c03ce14e081ed1879
SHA512118f087fc6bdf15d2a694bf9a2d73aef71f19888870cf4ffd1240a5bd42bd90eba17ecc85f7af9dcacd76c6945bee094873c0a0c17f047d81720693ad3955ff1
-
Filesize
8B
MD5a5b32d9ed706acb9529af76f7ecc0688
SHA146dcfbda1c2430c744693a9481a983812c6d63fd
SHA256a94f4540f4b1b68e32c74f29d068112615b3d1aa091c41f017ba0f46ab342c11
SHA512488a2746516cf08e9644782e46019d7b74da4994e84d054cd137a14a060fcab835430f8dba392eb3ecd73ff942581fa995d62ab6254d08aee90ecb797c116673
-
Filesize
8B
MD5565b722b48ce8df2a51fcf7544ab4cb5
SHA1e6d3ddcba3e7f754503b94304119d83af5bc4156
SHA2566155c9e07c2ed323a1d50f60460c1c3a01db76f021000e0f30d2e18f40117610
SHA51213f548304f3b52f418b2808e86ba5e64d8ae2b493273fde8b0076b37887af09b46ebcd1ba3c5792c65e63e81701aa541f76efe4b9e947216045cf8a20b82bd45
-
Filesize
8B
MD576b28708c8dfd96ffd641b06a97ac761
SHA184dee62f7712ed2e55b7b2630ad4f1ea227f2daa
SHA2562f7aa40544884189984daada7dc1a63b949e96202a1b750cdcf8037c26db5f2a
SHA51234d1b08ee584f7045d569f22a418415044d2017cac3cab2ee4ed4010b5a1e249f8c9bf9d9b1b03d395cd27eaf63ed924bb9c8947f6e797a052e926e417040537
-
Filesize
8B
MD528eb9a1119d3cb08fae75befa48c2760
SHA16a963e25bb338dfe0f7edec11e37fcf30c4f3a79
SHA256326c16bdeaedd973b43b899fafa019868bd6ecb011cc1a5eba5d318b846b0831
SHA51254210863ae8ff8d1aa7d967a39d0bbb58be3409ef848ebcb1cb1f51e9eb83f28ba7ae385058053134a774ce0f9962f32428aa5b6ac3e1f41a2625b6a26572beb
-
Filesize
8B
MD57e56a1eed340b2c899704eb55079946c
SHA134013fe72b9dab0c86d093ba41074fc2c6d6812f
SHA256c34e5cc8a882466cf5712eb2171f8af3c38ea382726a04245300808a13ca8c5c
SHA51292872bccc768560c4d7d7342d8852d0349161583f831d58bb59509c24e02aa98c7d7dd7915bb797b805c26e926e80b93de87ede63f72a84fe630432ddcad56d0
-
Filesize
8B
MD54a09e5f69e74760cfef21a4121b1c10e
SHA12eba4b21658a7fa1e0dc4ee50bfac394f0f1f765
SHA2568e6c68671b9443f8732875cfcf592476d5e342d08098f63096a4b26603c9bed4
SHA512964159bb7bbfda80979eb2276a3f62866f266d06ccad4852c1a6d6f3a51ace5cd45f33aeeb0a1525158b46ca315f5bf4766258ec26108c6781ea1b8f8dfa40b4
-
Filesize
8B
MD528e815d45dd6b93f97818cc1062e1393
SHA196718b47ea9e84df02c5cbcc21ff24155b102d61
SHA256de219c45e2596abd90ac15807150b71e35ec61ad62a1d49163fa1fe94180b912
SHA51292ea2b2ea43fed13b09e7dd3b285b497235e6c5af24d5c350ebda1340c15ece272ee7f9cdb14e437c978dd989ba59514820a386f6c52e9b535621f0ebd9e3b8c
-
Filesize
8B
MD5d7d04b5e3e92167bf2d6bef82613109d
SHA1af47336f86592be1b2f8d4af327b4694d4d82ade
SHA25696c847cad9f2daf9fe2038fc3ebd5d6c68947299b1a1038e91cf9f3c24d3f0a3
SHA512b3b881efee774331a5d0041ba8dc137954935924be839d4887b01808650504130a1384084db6e1f43f63e2a3e04e485c0af89c18471de932c5088658d2da2836
-
Filesize
8B
MD5c872ed3c80a30f9d66dcc4040e0da9ba
SHA1f1169c62f8f28d632fdf94ac3e41b9b0efe7aec5
SHA25636d59336fc8b94736d8bb27cf3b1d8eb4e03900cf0cde225ea84194f91a4bb4c
SHA512ba915c00961a10a2a8116ec71caab5b9f2de7cbc60f75b67e86ab2c2e3c44757fd6ec6e3a18081d2a5865d9b2066e5584c42656dab98fc4de292ab86244b58cb
-
Filesize
8B
MD58708800bbf1f80a041711c867b1f816f
SHA113f4cc5dbe2309ea82bfba6cd6934b4f204cf942
SHA2567f5f7fbe00ee339f176f1e273a60d623de24c65a92f75e3babf3513c81695667
SHA5123d1e1ec8c5917f35e1570aaca184cafa4f941afd6f91674e88a20d5ae21cbbb1d44c4fb36542b28a1846f9c89ab29c113c4b6d6d68f77c2d7c6c1f0904230f5c
-
Filesize
8B
MD5347df7dcaaeea4aee183b66122b47730
SHA1f903942915a9e8ab993ece08bbad3580678991d9
SHA25653e819872c5df4b61c9ad26a7133258b68a32ca8f888630a8dee4e78b897c65b
SHA512d77da82ac9dc059a55f13aa6fdcf264a90fe33fe9695c8e49885948ec70f96b566fc6205735ef17cd94d05737bfd618e6dca115aaee2d1feae389e6752cdf126
-
Filesize
8B
MD51fc0ab361addc063eaf6e9bea8e94d74
SHA1a78814b55ab0b4a535f23b7fe864fb477b1e0fbe
SHA2562a838b60358ca91d4a1012300b7469d184938bb78dda6111647fbf27ca1d6b2f
SHA5128d927a66779686005c083f201af90ff4bc5e4c5bf788cb400cb25bcfb3314c15c6770c6798cae1da2be9627ed8a1098a78317eee0a612036969c0ba190df49d6
-
Filesize
8B
MD50a0213a61ba21a170121cb91368a52f7
SHA1c5344aa504f57940bdc891ede46ba358dd2d70fb
SHA256ec1a9a9511226b1f3654e2378d81518ba242a81bfa09fda2b24fac98cae62ae6
SHA5123582f3d51279b0b3c5c9cbb5ff1c7140f9b44be51792e7699858169fd109e6d24159b847157b00b7a853a23fdd9b4b0e8edb6520a6df2327c25ee8d6a3026756
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
48KB
MD5f8dfa78045620cf8a732e67d1b1eb53d
SHA1ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371
-
Filesize
802KB
MD59ad5bb6f92ee2cfd29dde8dd4da99eb7
SHA130a8309938c501b336fd3947de46c03f1bb19dc8
SHA256788acbfd0edd6ca3ef3e97a9487eeaea86515642c71cb11bbcf25721e6573ec8
SHA512a166abcb834d6c9d6b25807adddd25775d81e2951e1bc3e9849d8ae868dedf2e1ee1b6b4b288ddfbd88a63a6fa624e2d6090aa71ded9b90c2d8cbf2d9524fdbf
-
Filesize
83KB
MD5dd26ed92888de9c57660a7ad631bb916
SHA177d479d44d9e04f0a1355569332233459b69a154
SHA256324268786921ec940cbd4b5e2f71dafd08e578a12e373a715658527e5b211697
SHA512d693367565005c1b87823e781dc5925146512182c8d8a3a2201e712c88df1c0e66e65ecaec9af22037f0a8f8b3fb3f511ea47cfd5774651d71673fab612d2897
-
Filesize
175KB
MD5d8caf1c098db12b2eba8edae51f31c10
SHA1e533ac6c614d95c09082ae951b3b685daca29a8f
SHA256364208a97336f577d99bbaaed6d2cf8a4a24d6693b323de4665f75a964ca041d
SHA51277e36f4fb44374b7c58a9005a1d7dfeb3214eabb90786e8a7c6593b5b1c7a305d6aa446be7a06ae0ff38f2bedea68cacb39053b7b7ec297bff3571b3922fd938
-
Filesize
122KB
MD5c8afa1ebb28828e1115c110313d2a810
SHA11d0d28799a5dbe313b6f4ddfdb7986d2902fa97a
SHA2568978972cf341ccd0edf8435d63909a739df7ef29ec7dd57ed5cab64b342891f0
SHA5124d9f41bd23b62600d1eb097d1578ba656b5e13fd2f31ef74202aa511111969bb8cfc2a8e903de73bd6e63fadaa59b078714885b8c5b8ecc5c4128ff9d06c1e56
-
Filesize
251KB
MD5cea3b419c7ca87140a157629c6dbd299
SHA17dbff775235b1937b150ae70302b3208833dc9be
SHA25695b9850e6fb335b235589dd1348e007507c6b28e332c9abb111f2a0035c358e5
SHA5126e3a6781c0f05bb5182073cca1e69b6df55f05ff7cdcea394bacf50f88605e2241b7387f1d8ba9f40a96832d04f55edb80003f0cf1e537a26f99408ee9312f5b
-
Filesize
64KB
MD5d19cb5ca144ae1fd29b6395b0225cf40
SHA15b9ec6e656261ce179dfcfd5c6a3cfe07c2dfeb4
SHA256f95ec2562a3c70fb1a6e44d72f4223ce3c7a0f0038159d09dce629f59591d5aa
SHA5129ac3a8a4dbdb09be3760e7ccb11269f82a47b24c03d10d289bcdded9a43e57d3cd656f8d060d66b810382ecac3a62f101f83ea626b58cd0b5a3cca25b67b1519
-
Filesize
156KB
MD58cfbafe65d6e38dde8e2e8006b66bb3e
SHA1cb63addd102e47c777d55753c00c29c547e2243c
SHA2566d548db0ab73291f82cf0f4ca9ec0c81460185319c8965e829faeacae19444ff
SHA512fa021615d5c080aadcd5b84fd221900054eb763a7af8638f70cf6cd49bd92773074f1ac6884f3ce1d8a15d59439f554381377faee4842ed5beb13ff3e1b510f4
-
Filesize
22KB
MD5a58f3fbbbbb1ecb4260d626b07be2cda
SHA1aed4398a71905952064fc5da1191f57846bbd2d6
SHA25689dd6fbea61edb8f1c934b7e5e822b4ce9bea939ff585c83c197e06a1fd8311a
SHA5127fd371818932384b014d219bb318fb86c1787f3a58a3f08e904b7bbe3486f7ad6bc3776b335c178658c87efd663b913a14fb16d1e52198801659e132fa830d07
-
Filesize
22KB
MD5adf9263b966cea234762c0782aba6e78
SHA1e97047edecf92a0b654f7a25efd5484f13ded88f
SHA25610cd6bf518350f93ab4643f701efdac851cdd7a26a0d8bcabfbb2bd273e1f529
SHA51256c09d786f4ba401d4827da4148d96b140f28f647a03ac6ab94f64de9be4c75ecb8b583efad28aa0c51356978caa96f0cb9d56cc4883ff42c1ee7f736e481c52
-
Filesize
22KB
MD528840d7d1ea0a873fb8f91c3e93d6108
SHA10856b3ceb5e300510b9791b031fffceaa78ee929
SHA256d3fad206a52d9b1dd954c37a45e63e691ebc7bfe8af27a87553203fb445224ce
SHA51293596ec710bd738fcbddf4db0f102f537355bbbaea347d2314d62064d5110cf1deb3ecb6d1e0922f019351acfe2d1c694684d0e62e22c004d5a20a6cae5c7fe3
-
Filesize
22KB
MD5586d46d392348ad2ee25404b9d005a4e
SHA14bece51a5daacf3c7dcff0edf34bcb813512027f
SHA2562859fe2fe069e5f4300dd0106733750b1c8c67ee5d8788c4556b7d21c6da651d
SHA512daad865dbb4ca7542d5bd50186ffa633a709bfe1cf79d0d98e738760634da49afef1c418357d9482dbe33fe995847e05f653b6e3bba00aa42badce47dd072115
-
Filesize
22KB
MD5221f63ee94e3ffb567d2342df588bebc
SHA14831d769ebe1f44bf4c1245ee319f1452d45f3cd
SHA256fd7c5503aa81dea1de9baee318e6a53663f7a4634f42e116e83c6a0f36d11143
SHA5123d36175eaa6dc035f2b26b5638e332408579aa461d663f1cf5a3e9df20e11a7cca982b80c9dcf35ba9a8bc4203ac2f64f5dc043b60a6f16720f4d4ce052096c9
-
Filesize
26KB
MD56ee268f365dc48d407c337d1c7924b0c
SHA13eb808e972ae127c5cfcd787c473526a0caee699
SHA256eb50cc53863c5a1c0b2fe805d9ecefef3f2dbd0e749a6cc142f89406f4ffdb10
SHA512914da19994d7c9b1b02adb118d0b9cb2fdd5433ee448b15e21445ecfc30941045246b7c389a2d9c59fb6487bb00426579b054c946e52982516d09b095279c4d9
-
Filesize
22KB
MD5852904535068e569e2b157f3bca0c08f
SHA1c79b4d109178f4ab8c19ab549286eee4edf6eddb
SHA256202b77cd363fce7c09d9a59b5779f701767c8734cc17bbe8b9ece5a0619f2225
SHA5123e814678c7aa0d3d3a637ce3048e3b472dbb01b2e2a5932e5b257aa76bf8de8117a38e2a352daff66939a73c1b971b302f5635ea1d826b8a3afa49f9b543a541
-
Filesize
22KB
MD5cdfc83e189bda0ac9eab447671754e87
SHA1cf597ee626366738d0ea1a1d8be245f26abbea72
SHA256f4811f251c49c9ae75f9fe25890bacede852e4f1bfdc6685f49096253a43f007
SHA512659ee46e210fcad6c778988a164ce3f69a137d05fb2699ff662540cbb281b38719017f1049d5189fafdae06c07a48d3d29dd98e11c1cae5d47768c243af37fe9
-
Filesize
22KB
MD5c79ccd7c5b752b1289980b0be29804c4
SHA12054a8f9ebf739adfcfc23534759ae52901c189f
SHA2568e910589f3f9a27ed6ce1d4f2d579b4ef99cfa80c0bf6f59b48ba6556e1578a0
SHA51292de7aec7f91f6f4f7cc3dd575b11ea0f4fe516682ba2d05d605380a785597bc953b575cf0ff722980f0849a65d8c4a14c7717eeed8631a7aac0cb626d050e75
-
Filesize
22KB
MD5aa20afdb5cbf1041d355a4234c2c1d45
SHA1811f508bd33e89bbd13e37623b6e2e9e88fdcd7c
SHA256ef6657aac4aa97a57e034fd5baf4490706128ffafce7c285dc8736b1f7ee4d09
SHA51206740552875ff2df234ec76f45cce3c66b7d5280a3d1b90874799780ff534437e5dffacf9e40bfddc301507d833235e25eab8119ac80d2587a43a80d4f0068b8
-
Filesize
22KB
MD5f8203547595aa86bfe2cf85e579de087
SHA1ca31fc30201196931595ac90f87c53e736f64acf
SHA256e2d698823ba78b85d221744f38d3f9e8acccd0eedbb62c13e7d0dff4a04bd2b1
SHA512d0818ee6b1a775793305828ba59c6c0f721d3fe2fcaca5bbfe047f25a500243ab4486c368302636e1c3934becc88c8178606a29871fe019d68b932ad1be3ee1b
-
Filesize
22KB
MD50ccdef1404dbe551cd48604ff4252055
SHA138a8d492356dc2b1f1376bdeacab82d266a9d658
SHA2564863006b0c2aa2a39dff2050b64fbbe448b3e28a239e9e58a9a6d32f5f5a3549
SHA5120846489a418d2480e65f7bef4a564fe68fe554f4a603a6f372ddd03eed7ee6299649b61172a7a9ca9a9500a924c2642493cce1040fcd6601d5862c248c902e9e
-
Filesize
22KB
MD5f1d0595773886d101e684e772118d1ef
SHA1290276053a75cbeb794441965284b18311ab355d
SHA256040e1572da9a980392184b1315f27ebcdaf07a0d94ddf49cbd0d499f7cdb099a
SHA512db57f4ae78f7062cfe392d6829c5975be91d0062ff06725c45c06a74e04ade8bcaf709cfebeba8146fb4396206141aa49572968ea240aa1cba909e43985dc3ee
-
Filesize
22KB
MD53abf2eb0c597131b05ee5b8550a13079
SHA15197da49b5e975675d1b954febb3738d6141f0c8
SHA256ff611cc2cb492c84748fa148eda80dec0cb23fc3b71828475ecea29597c26cd8
SHA512656213a8785fe937c38c58f0f01f693dc10dff1192b232f00fb18aa32c05c76a95566a9148462ea39b39f1740a7fee1c9ac9a90c6810f38512b3103d18c89b72
-
Filesize
22KB
MD583a0b483d37ed23c6e67896d91cea3f0
SHA16b5045ed8717c5b9f50e6a23643357c8c024abdb
SHA256d7511eb9191a63eb293af941667aa2318fa6da79f06119b280e0b11e6b6b1d25
SHA512dab0203fc26c0249b7a8882d41365d82690d908db359c3a6880f41a1c4eebde51ae084bd123864c32d8574cb0a22cfbc94bcd8e33b51f37f49575e2b9de93807
-
Filesize
22KB
MD58b0fe1a0ea86820020d2662873425bc4
SHA13c2292c34a2b53b29f62cc57838e087e98498012
SHA256070d8827798ee2aa4c2dc70d7faef8ef680eca4c46ecc2dad3ce16380cab1f82
SHA5120c29c8fae6c5a8de2f0047cbe66e0b2ae7c30cbeced6df1ea2e472ba123bf9e542d9e6cd8eb06b4f0cbe2e343b7929cf25bce1e79937076bf1d0480d91d2c9b4
-
Filesize
22KB
MD5eaa2228507c1fbde1698256c01cd97b7
SHA1c98936c79b769cf03e2163624b195c152324c88a
SHA2564297033ef8061c797127f0382df24f69264dca5c14d4f5b6cd2bcca33e26c1f5
SHA5128319949a1e1acca312dbe99dfd9eedd1b5e4a13946a6ff829d6792d72f0a3a618ce10140954c035a5390a5a6e3b8ae2f23513629007cd3b7a88d5fb6fd81d763
-
Filesize
22KB
MD5e26a5e364a76bf00feaab920c535adbb
SHA1411eaf1ca1d8f1aebcd816d93933561c927f2754
SHA256b3c0356f64e583c8aca3b1284c6133540a8a12f94b74568fb78ddc36eac6ab15
SHA512333e42eeea07a46db46f222e27429facaaf2ce8a433f0c39f5d5c72e67d894c813d3cf77880434f6373e0d8fffa3ef96d5f37e38dd4775491f3da2b569e9df59
-
Filesize
22KB
MD582e58246846b6daf6ad4e4b208d322d4
SHA180f3b8460ab80d9abe54886417a6bc53fd9289fa
SHA256f6eb755c146d0a0ebf59d24fb9e1e87dc0220b31b33c6acbc8bebaf31493c785
SHA512e1a032846c6110758fbc8eb84dbd3d228e83b3200bf5820c67d9740f6f8c7e926e4c89b92e8d34721d84fd597ab64455fd3029138e35f22329af23f599afdadf
-
Filesize
22KB
MD5650c005113599fb8b0b2e0d357756ac7
SHA156791db00766dc400df477dcb4bd59c6fa509de6
SHA2565f16a1131c8f00ebbe3c4b108bd772071a2d9b4ca01b669b8aeb3ffb43dabcda
SHA5124bc54ad70b75f550e623311dc48ea0fd8ff71207f64127379fcd48027ee2458d27a2aaa454637b4f09d713cc9e1f2cc09bb6cd55b0c6b7ed25e52cb46827fff2
-
Filesize
22KB
MD5f6afbc523b86f27b93074bc04668d3f2
SHA16311708ab0f04cb82accc6c06ae6735a2c691c1d
SHA25671c0c7c163d1a3d35e74f8d7299eb38ef7268af1fa276e9a3966761212c570f0
SHA5129ab0c2d025525fe047e27769c3b2be7526ad0d0cbe76eb1e3a84dc2cff60ab3c4a218388892f600f7b3b003909ae133b0e7da19c9ba96b624fa8f5123c3a97cf
-
Filesize
22KB
MD5445571331c2fc8a153952a6980c1950a
SHA1bea310d6243f2b25f2de8d8d69abaeb117cf2b82
SHA2561dda55027f7d215442e11c88a82c95f312673b7e7454569e5c969c1c24047915
SHA512853797dd50d0ad6018e7e7d11aefbca61653baa8c60b22fdd34133fce6bf6f02ed0c747457c2783e699e8e7097f14429286904267c13521ee9cb255d3ea79806
-
Filesize
22KB
MD55da5938e0d3a9024f42d55e1fd4c0cd7
SHA17e83fec64b4c4a96cfcae26ced9a48d4447f12b7
SHA2560ea1cf78c0be94554ff7cd17a9c863c951c1e1eaa54191d7f2b0e043697c8d00
SHA5129a302c664bfddf509c0489af24a238b15612802c7d6dccbbfb57b39691b80af79ed35cab31e84424a34e0de32179054277ca09a0457b90c72af195f8328c82dd
-
Filesize
22KB
MD5c1919eacf044d5c47cc2c83d3d9c9cd9
SHA10a80158c5999ea9f1c4ca11988456634d7491fcc
SHA2569b82643497092524e0aed6cfbaf7467849cde82292313bbd745c61ed2fd32ea8
SHA512ad2ccabbdc769cbeb3c0b4d8d647647c8f43d3c3f3c85ab638ce00665379f9a0f5bfc24fe25184003d180143c29da0c36c6d2c7ffeae68a81c27b90f69336cbe
-
Filesize
22KB
MD5566232dabd645dcd37961d7ec8fde687
SHA188a7a8c777709ae4b6d47bed6678d0192eb3bc3f
SHA2561290d332718c47961052ebc97a3a71db2c746a55c035a32b72e5ff00eb422f96
SHA512e5d549c461859445006a4083763ce855adbb72cf9a0bcb8958daa99e20b1ca8a82dec12e1062787e2ae8aee94224b0c92171a4d99ed348b94eab921ede205220
-
Filesize
22KB
MD50793ca01735f1d6a40dd6767e06dbb67
SHA16abea799a4a6e94d5a68fab51e79734751e940c5
SHA256cdf7915f619a728fb64c257bfaa8257ee2353bf3c0b88214d5624931a1ac247b
SHA51233f703cea3b6cef3fcbd973812635129ef204c2b1590ffe027dbd55ba35cbd481cf769de16634bd02acbdbd59e6af52cad0964d4d36327606c1948f38048703f
-
Filesize
22KB
MD5eeafb70f56cc0052435c2268021588e9
SHA189c89278c2ac4846ac7b8bd4177965e6f8f3a750
SHA256b529fed3875c6f4eecf2d9c012bc0e27cb2d124c2dd1da155f8337b4cb002030
SHA512ce211b79f4d0dc942dbe1544d7e26e8e6f2c116dce6bc678aede9cb2104771758c0bd670e1eca2d5a9a6728346d093f44459e9791317b215c6ff73e47d1203f8
-
Filesize
26KB
MD517680cd553168e9126ca9d7437caecc7
SHA18acafcb5f01d3b01a7c48a3b91bdeeb8bf1cf841
SHA2566438c683e376583f6368c582ce3caab274cf3f7d7320e7f6cda427ba338847ca
SHA512146ae3230c213ffab4b2c7805374ccb5f53155266ba9213d8f22e073deef0bd733b9488c2091c3db037c1d1dfaa4bbfb90e2afd041a447603c25690681239ae3
-
Filesize
22KB
MD5e9d4a1374a200a6e195e3c5ab42e6bbd
SHA1c0c79309a6ab14592b91087bec0cc519979e5ebf
SHA256612df2aaf3435c2be575581d1b2deddcef33f1b53179acff3e4ac24a0fcd3d50
SHA5121de9d70036eb5211184b3b40f671608cf75b539f6fd36b812facdd9722927eb8e5c4c579db6a360003d06cc139f2ddbda8d19de17cb3a36fcfb53e462a9d7b27
-
Filesize
22KB
MD510a42548fcf16732d354a6ed24f53ec5
SHA1b6b28307c0cc79e0abef15ed25758947c1ccab85
SHA256ca3e5b21f83d87a958ba7934c5e4d8e7939b2e9013fe2deaeba1f9088b4277bb
SHA512ecebb5973ecf8f34115985ae24061c29a9d943592389a4e8f215df7408c770a1f7c6c8927d30403d5c43814a4b64ac622ec018be02532f88dbbca6d6208266ab
-
Filesize
22KB
MD55d3da2f634470ab215345829c1518456
SHA1fec712a88415e68925f63257d3a20ab496c2aac0
SHA256d2ed53111a652fde26c08504803f76301fce2fba04f33a7f250b5b2569e4f240
SHA51216079ce0bcc9816297f23c95573bd52da08b29b90da4855b4315b3fa98947b1b35ffd30760064144f3f5647c27e0c1bd3aba623d17364fff45c9b2fa598a2ba8
-
Filesize
22KB
MD5c74e10b82c8e652efdec8e4d6ad6deaa
SHA1bad903bb9f9ecfda83f0db58d4b281ea458a06bd
SHA256d42b2d466a81e8e64d8132fad0f4df61d33875449ead8d4f76732b04f74bbce6
SHA5125cc4b0d7e862fd32e8374501d1b8798e369b19dc483cdb568915b48a956e4f0a79b1d2c59322394128a330fea7c939161a7af1787b4dc5f250e74f8df8805f6e
-
Filesize
30KB
MD5e07a207d5d3cc852aa6d60325b68ed03
SHA164ba9a5c2ca4b6af03e369a7c2a2b3c79cac6c51
SHA256b8fdf7893ff152a08fbc4d3f962905da3161b0b9fe71393ab68c56199277e322
SHA5120dbafab60618ec0c815ae91994490c55878c904af625ba6931fe0ea80eb229c98e367623e472e3b4c0e27e0af6feeb4d2cdacd4c426e1a99a1291b41cc52f666
-
Filesize
22KB
MD598bf2202e52b98a742f24724bb534166
SHA160a24df76b24aa6946bb16ead9575c7828d264b0
SHA256fe005d1a7908e36d4fd6cb2711de251462c9bebf99e4060687df11bd0bbedc8a
SHA512d346eaf8a966720e47099293d91f2856c816acb7e5f952e6700e007ba176147218798648a4a3e1b928e7a46622ef3603aa4d909113fb02d5551c40ed0e243441
-
Filesize
26KB
MD56edcd747d5beb5d5b0550b9e8c84e3a3
SHA18b8baf8f112ac0a64ee79091b02a412d19497e69
SHA256d5b5c4ee347678e60af236c5e6fd6b47ad5786e080d14fdb11af0aa5740e7760
SHA5121bc72f7b6b13374dab05f8914dc96f194bfa86cad4549a3fca1dd79485cfdbe1d45053f197e2bdd280b8787edcbd96c4c74dffdf044c99520148d153bb0a438e
-
Filesize
26KB
MD5374349666a3b260411281ab95c5405a2
SHA142a9a8f5d1933ec140bd89aa6c42c894285f14d1
SHA2562a6f53be6e8b8fabbf8fcc2ac1224f70628f4ab35e0b36612a6728df7685d56a
SHA5125c4a79503f83eb8e12a38605c1ab2cf6332f7ef845dc7ac5c34dc71cb86e903dc002c91a7142a56433fff97ff21ec926c9cc0be92a31ecffe2a7c5e042d6fc4a
-
Filesize
26KB
MD506f29e2e2ebc8e3d8d0110a48aa7b289
SHA1b9047a9aa94d25f331e85aa343729a7f3ff23773
SHA2566c24d050afc07bc5d2ba5eb07840345569b52e97442bcc7c4413fccedc11e6c4
SHA5129de0b3f3ab2c0ed61920d99e3a931bbc08015d848907bf4cd5cb2c81017de4d23f2f8977a3a7895b92208ae7e5753ab8c4b00c00e375da005b432b5534ea7838
-
Filesize
22KB
MD5a1002f4a501f4a8de33d63f561a9fbc6
SHA1e1217b42c831ce595609cfde857cd1b6727c966d
SHA256fe94985959fe310cafa1eb3e32f28001ef03afefd32497d0c099eb9393bf6f4b
SHA512123a5ebca5d8a1292f238bab3bd8cc12ab3157672a904361a72f5f7177f4ce0dd4708fdfda34f2ed0b4973ad7d92bc69b85651687a4604def4bf7bdca5d49b17
-
Filesize
22KB
MD59f15a5d2f28cca5f4c2b51451fa2db7c
SHA1cef982e7cb6b31787c462d21578c3c750d1f3edb
SHA25633af8b4a4f1f9a76d5d59fdf634bb469ca9a830133a293a5eef1236b27e37e63
SHA5127668d42fd8cce5daa7e0c8c276edd3bda0d4ee1c5450fa8d46cf7600f40b2f56e024f98157a86e9843d0b7d33cb281ebdca3a25275e08981f5d9cbaad1cfe371
-
Filesize
1.3MB
MD5763d1a751c5d47212fbf0caea63f46f5
SHA1845eaa1046a47b5cf376b3dbefcf7497af25f180
SHA256378a4b40f4fa4a8229c93e0afee819085251af03402ccefa3b469651e50e60b7
SHA512bb356dd610e6035f4002671440ce96624addf9a89fd952a6419647a528a551a6ccd0eca0ee2eeb080d9aad683b5afc9415c721fa62c3bcddcb7f1923f59d9c45
-
Filesize
5.0MB
MD5e547cf6d296a88f5b1c352c116df7c0c
SHA1cafa14e0367f7c13ad140fd556f10f320a039783
SHA25605fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA5129f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d
-
Filesize
768KB
MD519a2aba25456181d5fb572d88ac0e73e
SHA1656ca8cdfc9c3a6379536e2027e93408851483db
SHA2562e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006
SHA512df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337
-
Filesize
66KB
MD58dbe9bbf7118f4862e02cd2aaf43f1ab
SHA1935bc8c5cea4502d0facf0c49c5f2b9c138608ed
SHA25629f173e0147390a99f541ba0c0231fdd7dfbca84d0e2e561ef352bf1ec72f5db
SHA512938f8387dcc356012ac4a952d371664700b110f7111fcc24f5df7d79791ae95bad0dbaf77d2d6c86c820bfd48a6bdbe8858b7e7ae1a77df88e596556c7135ed4
-
Filesize
6.6MB
MD5cae8fa4e7cb32da83acf655c2c39d9e1
SHA17a0055588a2d232be8c56791642cb0f5abbc71f8
SHA2568ad53c67c2b4db4387d5f72ee2a3ca80c40af444b22bf41a6cfda2225a27bb93
SHA512db2190da2c35bceed0ef91d7553ff0dea442286490145c3d0e89db59ba1299b0851e601cc324b5f7fd026414fc73755e8eff2ef5fb5eeb1c54a9e13e7c66dd0c
-
Filesize
30KB
MD579ce1ae3a23dff6ed5fc66e6416600cd
SHA16204374d99144b0a26fd1d61940ff4f0d17c2212
SHA256678e09ad44be42fa9bc9c7a18c25dbe995a59b6c36a13eecc09c0f02a647b6f0
SHA512a4e48696788798a7d061c0ef620d40187850741c2bec357db0e37a2dd94d3a50f9f55ba75dc4d95e50946cbab78b84ba1fc42d51fd498640a231321566613daa
-
Filesize
1.1MB
MD5a9f5b06fae677c9eb5be8b37d5fb1cb9
SHA15c37b880a1479445dd583f85c58a8790584f595d
SHA2564e9e93fd6486571e1b5dce381fa536fb6c5593584d3330368ccd47ee6107bf52
SHA5125d7664716fa52f407d56771862262317ac7f4a03f31f209333c3eea7f1c8cf3d5dbafc1942122948d19208d023df220407014f47e57694e70480a878822b779a
-
Filesize
1.1MB
MD5b848e259fabaf32b4b3c980a0a12488d
SHA1da2e864e18521c86c7d8968db74bb2b28e4c23e2
SHA256c65073b65f107e471c9be3c699fb11f774e9a07581f41229582f7b2154b6fc3c
SHA5124c6953504d1401fe0c74435bceebc5ec7bf8991fd42b659867a3529cee5cc64da54f1ab404e88160e747887a7409098f1a85a546bc40f12f0dde0025408f9e27
-
Filesize
93KB
MD5a535dad10d6cd4f4c2511f63fb158aeb
SHA1cd7be9d3482a016e0f72c5ba387f33a96294641a
SHA256615cce712299d6ba862286d4a7ea94f765b44f2f05b5d4f02046beba8b3791a3
SHA51216037d0cbafe06314534cb17f3e72b19f28acfa1828ac66949d162e046b92b61892d66322c24a57859657dc587c8f6bacaa7c13c73e89d721b6ab966c0b13f89
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471
-
Filesize
776KB
MD5ff395614f783c57799b28d0ba00238d7
SHA1eb46b3344bfde15186c0c5ecfe83c0143a625e60
SHA256545de61d6577374357ad14153cdc73e54e2dd4a0178704f74338ff92688e7ce9
SHA512f677e7aaf558122cb0988410936c33ac26cffeac60e081b94743a180c36659b9d25ddae540727ff6de22916d7b9c4e235d40a8c181e44b66715bfe29e155ee15
-
Filesize
3KB
MD53893366a22daff8e3c4b2f014abda7ff
SHA16efe935e8b9bb50b553563523eae46ae05dcccbc
SHA2560360ee0089088a9cef5ba26e57df230ebf5a2681ff621fefb91498cce0c4d474
SHA51246d0f89747f41d5d8a3f088a740aed18557a701885959a23a720d1bab8251a98d3d00315d55e7122ccdcc216e1a7cc2f472ec1330938c6aadbf2568ef7739d21
-
Filesize
272B
MD590c65e773f31e2a81056a3f863c51ab4
SHA1364790b82252730b98ab4766a85e6972ada8ca9d
SHA256ec029984e0890dc0e93b7c6e509c583631641ed8e3d5f6e7674ce7e6409dba89
SHA512bb957b26b11e4d4e1dc17a49de597afa66ac3b2bf5254652702af5badf27629076c6ac8ab45cf7ede1ab2aa6cf0bdf5f9730cbac9f297f50c13b8d128b19f1a8
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
912B
MD559429dbdcbcc9588d43803d94a6acf44
SHA1124dbc3790804b50f1f59554a88a5b36c8984720
SHA2569c1f830d0256b5c90d0bb390dfb4d95b32c2af9f241d76b2186b5626ed27d392
SHA512c62ec5726f685f8ad6886180a09a3149d0f0b66846ae60a72d9fb66e38b40c09ee9ba8607aeff033d622c0ff7970002a1ba5ea4d9ab20f82e67d3c9fe0ff7c6d
-
C:\Users\Admin\Downloads\240929-x6vmesxdjj229d43228023231af72855fc865471c406e7a37f67bd67e34a9959ea234b67bf.dat
Filesize1001B
MD5f9575614387b2862d4e678197b9a7226
SHA1fc892009f6cd21dab879a2d8856fcb4e835f1534
SHA256d50d12d8bc3d004db64660548b9562d0eafa8ef37892d8ffb5c042c5ab9ed98f
SHA5127ce759088c4f939de6ac4b8b526d96fd928c98f08d8c23254d9ed9e3f2ef2b39a2b46b89d0b32efebc19485c09b543ad0a7e7529fa6e75ef5a98d7b05be14b10
-
C:\Users\Admin\Downloads\240929-xra98swflr19cd32dc2ea33cd417827f72b107ba6454ef0071eade330db1ec8961c5034644.exe
Filesize65KB
MD5ab9e36b527308b6e76f4d6d5cb76c79a
SHA16be49cf30a79272fcba2a6311ada26ebee34f832
SHA25619cd32dc2ea33cd417827f72b107ba6454ef0071eade330db1ec8961c5034644
SHA5120cb61814e930565556f3eed069da9873559346a653a26600ed7b2106ba9c8d799c40421969045b940208e704658a1ad62417e9ed40f026cd830fa28124c1559c
-
Filesize
57KB
MD5c690c2f1697ec83e6e0cb428f97d1625
SHA16732fe366c9b83bdeab8f15efed4fc1c55bc36b7
SHA2565e0f3dd5ce23ae97c6cdc49bb0fe3c053962b6876b0afe3e2a33208c35be15bd
SHA5125e1f998f1a7e49707b2a1bc88d479631afea67280201b151af8459f80a2356c2947b9e0a7646897006b00aca29a4409833104eac403632b3c87599a794d8facd
-
C:\Users\Admin\Downloads\240929-yfjmxaxekp294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5.exe
Filesize122KB
MD5a787862ad718ee4a9872077d8c1a582d
SHA1ca907b84e12911c463b0d45099e700c9ad001ed9
SHA256294aefd67e16d30f9a4c7c86ec29b61e5875928d383e91c8028fa5f0927b86a5
SHA5123108a560973dd7ac14d37e44bc7c64779d11c09a90dfbe0b1d019534c476982021a36cae167934da6d3594e777489e25ee4b1f12bf927c0547a7d104a637423e
-
C:\Users\Admin\Downloads\240929-ylal7a1fpg2cfa6dcb4550dbd34ba715a866c44070669f180d5f54055c1ca2859a0d6a725e.zip
Filesize69KB
MD57613d084f67b49284a8ae358b88125a9
SHA14e21bd11f6b7f21c38ba5dc55b242bb146021fb5
SHA256ae8c0cdaef9e07104d00ddde3eba09d24b18991aa72c4819cd7467f69a16bcc4
SHA5125b38fbc482a6644d0b51eb1ae2ce40ab68699cfe220ba676c61f48a2a767a4c1a3b670842cee81d68b0586ed741c08ac6743cdedad40afc2db02e092ba0f517b
-
Filesize
658KB
MD5ff3d6aef981d8bf9a33ad10a5385ec4a
SHA12b29bff1b96bb9d492c4d7d38614f1aa1a425720
SHA256fcdadb070cdd9c3e33c95076476910ac97834bf578bfaff98cc98943f4eff097
SHA51298e0be9f241020adf6995dff8b527732006dd09112aa91bf586488d738299cf2b671a06c09e20637cd96a602dcdedff1b0350d4d87f907d07e353884cf12ac16
-
Filesize
41KB
MD539c3b1ce74f7ff59984b67f6a9121f35
SHA10b6ff2bf40a38550137e725a5227dca8ddddccbd
SHA25601c95b053b24823c2a0f3ad224c8901014cccdbf645139f17a0fb50b8fd0dfeb
SHA5124c22440096da88baaab65b89a900a6a58204ca0936cce55ae7741e62483a1ce583f5c8439d8864e0e49e1ba65191b9e7e8a5ef6ba687b5402db7a206b0c7e692
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f
-
Filesize
26KB
MD5a17583eac2fd78c561027c7f3248cbe7
SHA1fe951437bdaf4d02aabb55c58f63761005f34ca6
SHA2567ec938e1eddd9e4c5bf57f866c098c0df7da8e3313ce294b46439816cfbf44b4
SHA512d6a3bb468d4c454ce1235f88680855814f07e6fee6feb617e8682490debe3e6f09426d93bf5046fbc4556a3b0a002fa92972c1b75b66e5b416fbb9d3e1dc4246
-
Filesize
92KB
MD5179ff8673f2f5c47da81e17a62b6e78d
SHA1197ad9c83eff70d2e9c6f26619753d2ec304e6db
SHA2567a24eea57c5b787d4cd771d65890ab2509d917e750733baf8a1ef5adaf307bf2
SHA51272e3f12777f6bf186b733c63efa9120a26e352c9681e40a917953839226bce0b022d82ae0c8fa22cf06c5112fd01848a6be5513f2ba26cf2d50a883472bb1d49
-
Filesize
121KB
MD5ff3958a457c5a33550e4b62572db898c
SHA19c8e694174a03312603181e50b9a1f319c5639ec
SHA25657686504a07afd430d0251b3fc12e713e8c46513832dae1da204fa47063bb976
SHA512d58924741050ac26c1852a05b82ff288b06a405d521bca9d2032381fa14f91d1fb0b133c276b88d217a44ed2811854c14cb82628d33cde2dd70ac4d53a37d7a8
-
Filesize
55KB
MD51ce090492620e40cde655acf936a15d8
SHA1918cc666768e1645323b8234567979a60bdcc7df
SHA256b839c3a191f49be93e5d08b2a4c91083482881e6fad57f02a65f7cc473abac6a
SHA5125967c733ddc368bffa8f0bc420e6a71ccf6aea8bdd26baf71285ddae8ae0c15b3d4504e4ba99b0ffc7dde72db0c1571d8a2ce013b0436b90359c77af2b713133
-
Filesize
55KB
MD527afcb2604dd0b14f183d24d38e2c86a
SHA18561acb66da8fe7c7e42d6e3709285f28f052528
SHA25609f4b68e46e5b02e154019654917a3ca89e1664a62933ff8c5ac31d9bede5265
SHA5122524b78022c601c6fb60c589c145e6e0eee98e6e36465170f507d00828d60a558e29519c662ae837501cf1dce6eef3782af6693873253c2d6a17bf4fa1d6390a
-
Filesize
448KB
MD55664bd37eeb8836490c9445400d33da8
SHA145252c31546ce4378a7f2005cd2a3dccaee4719e
SHA256fc263abab1bbec3435bcdaacaf00a9609dcd942f246e0c2f2dfa0bbb102bf534
SHA512d17365bdab8aa3bda108664359f2de8435b1e09bf30977d220a523de23da04312eb56f2270e8c4ad8435716a648296ec8c978c54b7190853555f760747befc55
-
Filesize
55KB
MD5374567cecd9239a4129b9b4892d21c9f
SHA1efea970f964a4c3ebf1f8455cb5c8d708d8e86cb
SHA256fb110288e8e9eccdfe194af8639c9d8dd9995dbacf62ab758ebe4ee1f1efa319
SHA512b935d31fa111120336bed54a4a252b868bc68babc5f1a7567c466e5149d932e863ebba455fec2e6ffeb641a2759724c80d32c17a0ce066f1c2380b7efea90e97
-
Filesize
224KB
MD52b65c1b722b14167913ab810431ef93d
SHA105b2632616266439ebc27c36342a9e2c39872d30
SHA25677ca5bc9faf3996fa508a8b67b07b05b9f8f5b66ebc0f3cf37e870768f01f164
SHA512d499473f5d06d4220caca4e41819ffa25c1855225822bbeeb4201987a56493e72cef417cf66eb8761b12c60e3cc7ca4e5469b68baf330f024df032637d264a75
-
Filesize
55KB
MD5b730ad6d23b8313721c5c609aa591ae7
SHA18da284af8e1bec7bf32a36ffc40c58cbb2898fed
SHA256cede979b41cb965b8dfc94c34b2ac8bb43f98d55d088e78c113f5b2761ad2c4d
SHA51257d36d332bf2095afd57de6fe83d7599ec891bc64a53a4838d0a0e7e38fed32b9d88df8d7d51039e469467de2920690cbe239364684175d263099fd3705371cd
-
Filesize
168KB
MD537182f9315b3c9ec886d2ed7654702b7
SHA11816aac958d87014c39505df1ede127e0e7395b4
SHA25634a8bd8638d1c9a293681f11c86c3ba2d8e0ad2676995dc8ff4dbc32b70f7b70
SHA512f00decefac8e76102d60d70928d528c9c4f504dbb4ece1c69f3069d0a3f16ad0a395bae1b33fc4ee41f4624ab519fd1c3d9de7c72f1330e2c51eca355e17704a
-
Filesize
7KB
MD5fd4f9b687d0ff621577aca91a6eb99e9
SHA147cf9faba61a526d7f6bcb47060867d606637e04
SHA25602f0090222ffad3911e7e06baccce1b9b8e0aaf2eee2afef0645338cf094924d
SHA5128415a8a80f80790a877d8365526ff2abd380561b15a04415c2a989bef47de351b772c816347bb254f9a46b95376692deaa27f8a4a23bd7d92131ebcea8a2294a
-
Filesize
121KB
MD5e8a2190a9e8ee5e5d2e0b599bbf9dda6
SHA14e97bf9519c83835da9db309e61ec87ddf165167
SHA25680ab0b86de58a657956b2a293bd9957f78e37e7383c86d6cd142208c153b6311
SHA51257f8473eedaf7e8aad3b5bcbb16d373fd6aaec290c3230033fc50b5ec220e93520b8915c936e758bb19107429a49965516425350e012f8db0de6d4f6226b42ee
-
Filesize
82B
MD53f7fbd2eb34892646e93fd5e6e343512
SHA1265ac1061b54f62350fb7a5f57e566454d013a66
SHA256e75e8d9bfc7a2876d908305186c3656e9de2a4af7f6927ccc6d8c812645abbc7
SHA51253d40eb2f05a23464fbf06193868e7cb30cf0df3da53586a75123fb2c37b29cdddda287ce134809d16a559d87fb20aee0e8add22d396fcb7a55f9a753739b140
-
Filesize
448KB
MD5baae861799ce28360cc70cc10a30cc99
SHA18518d108a0a5a6a53e0c9de1dd00cebf58e8d0c0
SHA256490c8c2531871fa66218e9cb7f1ceeb2ddbaa35daa3ad1531d30b471c88ee8cf
SHA512417cdea81fd19840c557c30e2348e5efeb62f1ba48a874be15b5f32da4f4ed4ea2e40152f781daa1b21b318d2aac59e6395f2eb15d2a16315bfa9afc05a8cb67
-
Filesize
67KB
MD529bdd534d7915c38b9607dcdad0e1801
SHA17ed7c4ab2690902037d4174458c539e73713863d
SHA2563552582c3718454279ee2294d4437452b5539fab6a92d5fb0bb7ca18ce661e5e
SHA512e1a5dd770545ad8b24d0f9eee073472c6f1477e333aedb01828c8862f64e6619ccc1f6d3c4f3024bf2d0bdc538bd8388c3f59e7586e0d95986740d0187f0f6fd
-
Filesize
448KB
MD53c9c73b07bd6f4e67d3bef560ba9460e
SHA18f5c6ea6dc6b152eb140c4b4da303fedacbd38fa
SHA256eaf0aceb18af14249a231588e82faa189383ed9b8998af8fbee09f08c2c98e7d
SHA512c5a5de81ca2e094db4615ab6e1125f64426655ecb98bc8de8582547b61e8ba26f191c8f851c310bb4612e31a0dd7cfac74d2bce9f84270c9df5836484227231f
-
Filesize
7KB
MD559d62b886da44db13d8f1c24d271d6a8
SHA1faca1564b9d61b8ce50926996b9b7807589663a0
SHA256131b549de81259720f1e85d17951c8e01993ac7fb2c08d522480d2431bbb7e37
SHA512c5a2f81f62546f5f4a2d0fb13c17f4f3df5104044e1ca9baa38def7c58a1fe94686fc442306c2138c90d2e04616f8a6b0244986cf77fd88f356b4532916365f2
-
Filesize
519KB
MD5ff353dc46aaaeb657fc490c0697b2ceb
SHA17ec9b7f9589f6313d86ed69669b908e4c2b49fd0
SHA25661ffa4beb7f207c23c2584827c2c6c94d6e46e209fd47b736d5536adee897348
SHA512c18612e4ccd5c9fc40d3198cb05d900538920f83e13e9d519a906867a9c737027c9700dd6c5495d7574138996fe1380e290ab29521bbfe608534d7864f9d81cf
-
Filesize
616KB
MD5ff3a6ade12a2fa3f600c080368ab576b
SHA12c4806e2eef0686f2ef83995e26d8ff00465f944
SHA256c248c164276205a37ef12e0a7c46f3ed15fb72168ae53213f1d05f3a790a828b
SHA512a65cee8337bf008c7125e36fa66f9e78978c4bda51af1126e0deef04c168edaf3876ebf9b6dec01c10195e7c11f51efd90aa1d29680b8289ce5cc2f3a1a699dc
-
Filesize
460B
MD57db3d565d6ddbe65a8b0e093910e7dcd
SHA1d4804e6180c6e74ba79d3343f2f2ccb15e502f12
SHA256a2778cb87fd88c7508ffd506a8ff8d58d0ffc02156f846956e5e99c6cb3d2f3f
SHA5120b3d1d0f44feba9dd78903ff77fdeaea834d930990a86641fb2e4ce04da280d33f6bee0ae0b1320e4070cbe20824062e45b52e5cad797c5985d8e31dce1ef82b
-
Filesize
719KB
MD57649263ed9cda4f8006c2d1c7f723124
SHA1cab0e76949089f94ffd40d77d76914a90849763f
SHA256d6a7a28b25b2ed0339c403de13be8d08bf55061780119d47fba33492443c70f1
SHA512306bcdbce714efb7ab2b91343e3c43cc6c0a6291e800b11eb3a77f5d21f66529b278cd3830cffc091e7bfb64f575ea7f0cfdf0da4085a1754fc55e8dc4897d0b
-
Filesize
1.6MB
MD5e9822a59c40ee8e9a72a15449bab2ac4
SHA163fd8027daebbb6fd0eb038b3e0f3daa2a3d128c
SHA25614e78b6d624d40eccd8540b094ef33f577e48698745ee64b503027e9bb0882d4
SHA5120fe05c5048b32cd09261bc6dc1ecfd18aad4dc6ec0c1f27d0c2a253d759e4b4379f199000bc50aecfeab1a4b65159c0d610600b2d84c4a1da4fb1dce57187184
-
Filesize
2KB
MD5e7d7ec66bd61fac3843c98650b0c68f6
SHA1a15ae06e1be51038863650746368a71024539bac
SHA2566475d5ecc14fea090774be55723d2d52b7ec7670527a7dbd61edf28c77944cb8
SHA512ac9e9893f5a0af03957731445f63279085f164e9a968d706a99d13012e4459314a7ccc32dc48f62379d69e21a0953c13543c9ded38b5ad5fbc346aa442af1ae6
-
Filesize
289KB
MD5ff3b4cf029657941a5abef886ebdc6ec
SHA16b0835129bfa6768f955d0262ea8f0ed8bbc1cf8
SHA256192f403f9e1598a76e77cec4b645d0be62ca8ab6373c78352be55e88c6f3a85b
SHA5125fe5d040793c492433f1c7cd21d8b6c6a3074bec0c5297481f756a6005747f33d35b73c08757e3f755fd453bf16e35eb2593ee7d46de82d1a86f18753b7c7ca4
-
Filesize
100KB
MD5cb80b1573e20bcf14e266d64aa6ffa68
SHA15369e1bd433305401082abfda40da87d9bc0ed84
SHA256e8dcedc03a9b38ce66599cfcd9046c4d7525084d681e66af92cf56322378ec5a
SHA512acf5ff6312a8d22a58ddaf6b1f8f622851c1c9d9215eacf87d3ab09cab3d54930dee9037d330ab03305a14942a05c5ed9d5b9c65d5f882b6f774ff2754ffb85f
-
Filesize
237B
MD594bcd02c5afd5918b4446345e7a5ded9
SHA179839238e84be225132e1382fae6333dfc4906a1
SHA2565d9f41e4f886926dae2ed8a57807708110d3c6964ab462be21462bff0088d9a1
SHA512149f6bd49fc3b62fa5f41666bfb3a58060514eec1b61c6aa1ac4c75417c840b028e701eb5533460eb00e2fee8543379564bc47d7477264771d81b99a0caab500
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978